Gregory Siegel, Accenture & Frank Urbano, FBI | AWS Public Sector Partner Awards 2020
(upbeat music) >> Announcer: From around the globe, it's theCUBE with digital coverage of AWS Public Sector Partner Awards. Brought to you by Amazon Web Services. >> Hi everyone, welcome back to theCUBE's coverage of AWS Public Sector Partner Awards Show. I'm John Furrier, host of theCUBE. We're here in Paolo Alto, California but during COVID, we're doin' all the remote interviews and gettin' the stories and celebrating the awards for the Partner Awards Show. And the award here is most customer-obsessed mission-based win in the federal area. We've got two great guests, Greg Siegel Senior Manager at Accenture and Frank Urbano Program Manager with the FBI Federal Bureau of Investigation. Gentlemen, thank you for joining me and congratulations on the win. >> Thank you. >> Thank you. >> So let's break this down. So you're federal, big category, a lot of intelligence agencies been using the gov cloud and Amazon. What's the mission win? What's the award for? Tell us. >> So I guess the award is the Bureau was shutting down our data centers and we needed to move to an infrastructure that would support our application. That was the first problem that we were trying to actually solve. But also, we know we were always seeing a performance hit on our infrastructure, and we always suspected that by moving to the gov cloud, we'll see an increase in performance because once we went live in our current, in or old environment seven years ago, performance was always an issue, our end users were always complaining and then we moved to our VMs four years after that. We saw an increase in performance a little bit but then once we moved over to the cloud, the FBI secret cloud, we heard crickets. The end users haven't been complaining. Greg and I were actually talking about that the other day how, you know, there's minimal complaints as far as performance. That's going to be one of the themes you hear throughout is performance, performance, performance. >> Got to love the no complaints, that means it's workin', people are doin' their job, gettin' the job done. Greg, I want to get your thoughts on this because Accenture, we've had many conversations with you guys over there about being agile and now you're a partner. You know, the FBI, I saw a presentation in person at Reinvent, I think last year where the FBI was like, "Lookit, our workloads "are increasing and budget isn't increasing "at the same rate." So it's kind of like, you know, "I need more power." It's like that scene in Star Trek, "Scotty, more power," you need to get that power. Take us through that transformation because one, you got a good user experience. That means people are doin' their job. But the cases get bigger, the more workload is there, but the budget's got to be increased or leveraged better. What's your thoughts? How do you tackle that problem because it's do more with less, classic do more with less. >> That's right. Yeah, so as Frank said, I think the system had been live for about seven years and you see over that time in the traditional data centers how the performance requirements increase but as you said, are kind of there on hardware and not easily able to adapt and overcome those. So, you know, when it became clear that the cloud move was a serious consideration we were able to pull on a few other experiences that the firm has had moving similar technologies to the cloud and then kind of combined that with the experience implementing technology at the FBI. And those two components kind of together were able to get us on a path to successfully move to the cloud and be, you know, kind of one of the first big systems at the FBI to make that transition. So that was our approach. >> Frank, I'd like to ask, you mentioned crickets. That means, that's good, actually. No one's complaining. What was it like before when you had the data center? What were some of the complaints? What were some of the challenges that you were dealing with? >> So (chuckling) so some of the challenges we were dealing with was, to give an example, when we went live seven years ago, we actually deployed our application on hardware that was already end of life. And so immediately we saw challenges there. And so by moving to the cloud, it gave us a lot of architectural flexibility. And what I mean by that is that we control, now, our own destiny, meaning that in the past, we would have to put in change requests to have firewall configuration changes. Now that responsibility is with us. Our DBAs had limited access to actually do some type of performance tuning on the backend to our databases. Now we have full control of that. I guess a couple of examples, or one example that I would give is that we're in the COVID era, as you mentioned, right? We have a space where we, prior to COVID, we had about 70 people on staff, both government and at Accenture. And all of our development is done on the secret side. And we have major deliverables due at the end of September. Well, COVID hits, we now have to social distance and come up with a plan, and we have to have reduce our staff of 70, both functional developers down to anywhere between 10 people or less on-site. So that, right there, you know, we were talking major hit in our development effort and in cost, I guess, also. While we're doing our social distancing plan Greg came up to me and said, "Hey, why don't we move "our development environment and our test environment "to the gov cloud and scramble the data. "We'll be able to have our developers remote access in "and continue with our development efforts?" And I told Greg, "Great, put a plan together. "Let's talk to our information security officer." I said, "If he signs off on it, let's get off and running." We met with him, he signed off on them, and within two weeks that dev and test environment was up and running. And now, we're still on-track to meet our deliverable dates in September. >> That's a great example, well, that's awesome insight. Greg, expand on that because this is an example of agility. You talk about readiness, I mean it's unforecasted disruption, there's all kinds of use cases. "Oh, we have a hurricane," or whatever, you know. This is unforeseen and unique. Take us through-- >> Yeah, that's absolutely right. >> The agility piece here, on how you got deployed, time frame, and solution. >> Yeah, definitely. So yeah, it can't be overstated how much of a benefit it was that we had already gone through the process of refactoring a lot of our applications into the cloud and using some of those services available and, you know, able to containerize and take some of those application from where they were, as Frank mentioned, scramble the data, and then able to quickly use the cloud experience that we had to stand up an environment in gov cloud where it was more accessible for development that didn't need to take place on-site, was, essentially, the saving grace. We would have had major slowdowns in delivery, as Frank mentioned and a lot of cost implications there, so it really can't be overstated how much that experience having gone through it and being in a spot where we had that flexibility to quickly replicate our architecture, went a long way towards keeping the mission going as the world deals with the pandemic. >> Yeah, this is just a striking example. You know, first of all, I'm a cloud-biased person. I'm very much a, I lean heavily towards pro-cloud so I'll just say this as total bias. There are companies that have gone cloud and took advantage of that refactoring or reinvention and are in a position not only to hit the deadlines but also be in a position of growth strategy, or in this case, a mission-based expansion for the FBI, as Frank was alluding to. Could you imagine, Frank, if you had the data center challenge and you weren't in the cloud? And the you had to go to Greg, or somebody, and say, "Hey, what do you do?" So imagine you had the data center, and then COVID hits. A lot of people are on that side of the street, right now, goin', "What do we do?" >> Yeah, yeah we would have been dead in the water as Greg mentioned. You know, all of our work streams would have been forced out to the left. I couldn't even imagine, you know, the timelines that we would have had to come up with because we would have had to have come up with some rotation plan to develop, you know, team one can only come in on Mondays and Tuesdays and then team two would come in on Wednesdays and Thursdays which would have pushed out our delivery dates and as Greg mentioned also, cost goes up. Time is money, money's time. >> Yeah, I totally, and people goin' out of business because of it and, or settin' their mission back you know, decades. Greg, talk about what goes on next because obviously, congratulations on being a customer success, it's a great mission win here, but you got to get through this. So how are you guys huddling on this point? What are the conversations? What are you thinking? >> Yeah, so now we're at a point where I think, as I'd mentioned, when we first moved to the cloud, the primary mission was getting there securely, getting there within policy, and getting operational so we were making trade-off decisions on where to lift and shift, and where to refactor. Got through all of that successfully. Got through the initial challenge of COVID which definitely threw some of the plans for a loop as we shifted our operations and focused on getting operational in gov cloud. And now we are at a point where we've stabilized delivery again, and we're re-picking up where we left off on the cloud journey which is really focused now, on continuing to look at the investments that AWS is making in the technologies that are coming next. And it really enables us to get ahead of the trends, easily analyze some of these services, available, and then we enter into conversations with Frank and others and start making those trade-off decisions of when it's time to refactor, retire another part of our application and start to look to go cloud-native. So that's where we are now, is looking for ways to maximize and use those services to, again, save costs, improve performance, all of those things that go along with getting more and more mature in the cloud. >> You know, one of the things, Frank, I want to hear your thoughts on just as while I got you guys here is you think about old school, old guard, as Andy Jassy would say, or Teresa talk about. You got silos and you got all these things: legacy. Okay, got that. But as you guys look at your mission have secure data, catch the bad guys, and protect citizens, right? So (chuckling) I mean, I'm over-simplifying but generally, that's it. Data's critical, right? I mean, speed to the edge of the network which is the field and the people doing the job, is critical. Cloud has an opportunity to make that development cycle faster, and ultimately, the workloads and the impact. Could you share your thoughts on how the cloud and Amazon are bringin' that to the table because havin' the right data at the right time could mean the difference between life or death. >> Yeah, so Greg and I experienced this, and again, it's all about having that architectural flexibility, right? So back in February, we had a requirement where we had to expose a large amount of data to employees about themselves, but not only about themselves, but also to their managers. And so, you know, we went through the basic you know, develop it, and then put it into our test environment, however the problem that we had was that we couldn't assimilate the large amount of data that we're exposing to 40,000 FBI employees. Because when we tested out, everything seemed to go fine, but as luck would have it, once we went operational, the application crashed. Our two main engineers come in my office and within 30 minutes, they identified the problem, they had the solution, and we already implemented the solution. Within 30 minutes. You know, going back in the past, like seven years, like you were mentioning, back in the old days, I would have to go around, beg for funding, buy hardware, then I would have to submit a requisition. It would have to go through the approval process. We then would have to procure the hardware, receive the hardware, install it, test it out, load the application, test it again, and then go into Ops. You know, you're lookin' anywhere from a three month to a nine month delay right then and there that our engineers were able to solve within 30 minutes. >> I mean, again, I'm back to my bias again. I'm old enough to remember when I was in college. I mean, I never programmed on punch cards, so that's kind of dates me, (chuckling) but so I'm post punch card generation. I used to look at the guys runnin' the mainframes sayin', "Look at those old relics over there," and "huggin' the mainframe." But what they did was that the smart people repurposed and got into mini-computers, they got into networking, LANs and PCs. This is kind of the cloud moment where if you're going to hold onto that old way you're going to have that operating model, it's just not effective in any way. I just don't see any benefit, other than have a preserved workload that needs the certain data, or you put containers around it and you can bring that in, but there are those corner cases. But generally speaking, you got to move to the new model. >> Mm-hmm. >> Guys, react to that. What's your thoughts? >> Yeah. >> Evermore. Yeah. >> Yeah, I agree, I mean It can't really be overstated, just the flexibility that exists. I think a lot of times, people get hung up on the you know, most efficient way to move to the cloud or you have to use X amount of cloud services. But it can't be overstated, regardless of the approach that you take to making that migration, that once you are there, the kind of intangibles that you get, the ease to take an idea and test it out, flip the switch on, flip the switch off if you like it or not. It's really just opened the door for the team to take some of the more innovative ideas and we have regular conversations with Frank and others that I think are fun for all of us where we get to look at some of these things and we can actually think about and envision how to get them in without, to Frank's point, "putting in requisitions," doing major activities that are going to derail our other schedules to pilot some of these new ideas. >> Frank, you got to attract some, it's a personnel challenge, too. You want to attract young minds, smart, young people. They want what's contemporary and they want state-of-the-art, they want to be in the right positions, drivin' the right, fastest car they can, and being successful. There's a staff component. What's your thoughts on that? Because, you know, if a young person comes in it's like, "Hey, I want to rock and roll with this new stuff, "not the old stuff I see there." >> Right. >> And so Greg put together an innovation team where we have these great, young minds, right? And you know, they're always bringing different ideas, different services that we can utilize on AWS, and sometimes Greg and I have to pull the reins on 'em, like, "Okay, we'll do that, but we have "major applications that we got to develop and deploy." But it's always refreshing and great to see young people with their innovative ideas that they bring to the table. >> Well, final question for you guys, while I got ya here. You know, I've been reporting, we've been saying on these CUBE interviews, trying to make sense of this COVID environment, what's goin' on and what it exposes. And you can see the obvious things. But it generally exposes this great IoT experiment. We're all IoT devices at this point. You've got work places which are not home and office, workforces which are remote, workloads and workflows that are changing, new things are happening. How do you guys see this? Because it ultimately opens up the fact that the architecture has to support multiple endpoints, edge of the network, new connections, new workflows. How are you guys looking at this? What's your vision on this? >> So Greg, I'll take a first crack at it from a Bureau employee being with the Bureau for 31 years. I would never have thought in my wildest dreams that we'd actually have people workin' from home and being able to remote in, and actually do development. And we did it all within two weeks. It's just incredible the obstacles that the team overcome, but also the flexibility of the FBI leadership, knowing that this had to happen in order to, for continuity of operations. >> Great point, great insight. Greg, your thoughts. >> Yeah, I agree with everything that Frank said. It's been a great partnership and I think that the nice thing that surprised us all was when it got down to it, the security controls and requirements were there and able to be met with the tools at our disposal. So I think the great fear that everybody had to Frank's point, it just wasn't something that was normal to this point. But as we were all forced to reevaluate what we had to do, the fear was, "Well, what accommodations are we "going to have to make from a security standpoint?" And the answer was being able to operate again without exposing any of that data, the risk was really extremely low, to zero. All the folks from security we're able to work closely with in partnership, and make this happen again so we can keep delivering the mission. So I think that partnership and getting through it together and all feeling really comfortable that we're doing it in a secure way was really what enabled us to be successful. >> That's a great point. Frank, he brings up something I didn't bring up which is super important. You mentioned in the old way you got to get all these requisitions in purchase. Security is the same kind of new dynamic which is like, "Okay, you got to get "everything tested," but it goes faster when you have the cloud 'cause that's also another criteria, you got to still got to get the approvals whether you're working with another vendor or integrating with another app. That's still now the new issue. So that's got to be approved faster, so that's also now a bottleneck. How does cloud help make those security reviews go faster? >> Right, so so we were the first ones on the cloud. So or security team was still defining the ATO process for us. However, what we did was we aligned ourselves with that team so that we could meet all the security requirements, but also app out all the security controls. And so from the time that we actually had the design till we went into deployment onto the SC2S or the cloud, and we went through the ATO process, it only took us eight months which really, in the past, that effort could have took anywhere from a year and a half to two years just because of the old ATO process. >> Awesome. Well, Greg and Frank, congratulations on a great award, Amazon Public Sector Partner Awards Show, most customer-obsessed mission-based win in the federal category. Congratulations. >> Thank you. >> Thank you. >> Okay, theCUBE's coverage of AWS Public Sector Partner Awards Show, I'm John Furrier, your host of theCUBE. Thanks for watching. (soft electronic melody music)
SUMMARY :
Brought to you by Amazon Web Services. and congratulations on the win. What's the award for? of the themes you hear but the budget's got to be increased clear that the cloud move that you were dealing with? our own destiny, meaning that in the past, or whatever, you know. Yeah, that's on how you got deployed, a lot of our applications into the cloud And the you had to go the timelines that we would What are the conversations? of the plans for a loop and the people doing the job, is critical. however the problem that we had was that and "huggin' the mainframe." Guys, react to that. Yeah. and test it out, flip the switch on, in the right positions, drivin' the right, and I have to pull the reins that the architecture has to support obstacles that the team overcome, Greg, your thoughts. that data, the risk was You mentioned in the just because of the old ATO process. in the federal category. of AWS Public Sector Partner Awards Show,
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Greg | PERSON | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Greg Siegel | PERSON | 0.99+ |
Andy Jassy | PERSON | 0.99+ |
FBI | ORGANIZATION | 0.99+ |
February | DATE | 0.99+ |
Frank | PERSON | 0.99+ |
September | DATE | 0.99+ |
John Furrier | PERSON | 0.99+ |
Teresa | PERSON | 0.99+ |
Frank Urbano | PERSON | 0.99+ |
eight months | QUANTITY | 0.99+ |
31 years | QUANTITY | 0.99+ |
Star Trek | TITLE | 0.99+ |
Amazon Web Services | ORGANIZATION | 0.99+ |
Gregory Siegel | PERSON | 0.99+ |
10 people | QUANTITY | 0.99+ |
Accenture | ORGANIZATION | 0.99+ |
Thursdays | DATE | 0.99+ |
first problem | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
three month | QUANTITY | 0.99+ |
FBI Federal Bureau of Investigation | ORGANIZATION | 0.99+ |
two years | QUANTITY | 0.99+ |
70 | QUANTITY | 0.99+ |
Mondays | DATE | 0.99+ |
Wednesdays | DATE | 0.99+ |
Tuesdays | DATE | 0.99+ |
40,000 | QUANTITY | 0.99+ |
end of September | DATE | 0.99+ |
Paolo Alto, California | LOCATION | 0.99+ |
one example | QUANTITY | 0.99+ |
two main engineers | QUANTITY | 0.99+ |
two weeks | QUANTITY | 0.98+ |
Partner Awards Show | EVENT | 0.98+ |
seven years ago | DATE | 0.98+ |
a year and a half | QUANTITY | 0.98+ |
about seven years | QUANTITY | 0.98+ |
first | QUANTITY | 0.98+ |
one | QUANTITY | 0.98+ |
two components | QUANTITY | 0.97+ |
nine month | QUANTITY | 0.97+ |
seven years | QUANTITY | 0.97+ |
two great guests | QUANTITY | 0.97+ |
both | QUANTITY | 0.97+ |
about 70 people | QUANTITY | 0.96+ |
30 minutes | QUANTITY | 0.96+ |
Amazon Public Sector Partner Awards Show | EVENT | 0.96+ |
team two | QUANTITY | 0.96+ |
zero | QUANTITY | 0.96+ |
AWS Public Sector Partner Awards Show | EVENT | 0.95+ |
Gregory Siegel, Accenture & Frank Urbano, FBI | AWS Public Sector Partner Awards 2020
(upbeat music) >> Announcer: From around the globe, it's theCUBE with digital coverage of AWS Public Sector Partner Awards. Brought to you by Amazon Web Services. >> Hi everyone, welcome back to theCUBE's coverage of AWS Public Sector Partner Awards Show. I'm John Furrier, host of theCUBE. We're here in Paolo Alto, California but during COVID, we're doin' all the remote interviews and gettin' the stories and celebrating the awards for the Partner Awards Show. And the award here is most customer-obsessed mission-based win in the federal area. We've got two great guests, Greg Siegel Senior Manager at Accenture and Frank Urbano Program Manager with the FBI Federal Bureau of Investigation. Gentlemen, thank you for joining me and congratulations on the win. >> Thank you. >> Thank you. >> So let's break this down. So you're federal, big category, a lot of intelligence agencies been using the gov cloud and Amazon. What's the mission win? What's the award for? Tell us. >> So I guess the award is the Bureau was shutting down our data centers and we needed to move to an infrastructure that would support our application. That was the first problem that we were trying to actually solve. But also, we know we were always seeing a performance hit on our infrastructure, and we always suspected that by moving to the gov cloud, we'll see an increase in performance because once we went live in our current, in or old environment seven years ago, performance was always an issue, our end users were always complaining and then we moved to our VMs four years after that. We saw an increase in performance a little bit but then once we moved over to the cloud, the FBI secret cloud, we heard crickets. The end users haven't been complaining. Greg and I were actually talking about that the other day how, you know, there's minimal complaints as far as performance. That's going to be one of the themes you hear throughout is performance, performance, performance. >> Got to love the no complaints, that means it's workin', people are doin' their job, gettin' the job done. Greg, I want to get your thoughts on this because Accenture, we've had many conversations with you guys over there about being agile and now you're a partner. You know, the FBI, I saw a presentation in person at Reinvent, I think last year where the FBI was like, "Lookit, our workloads "are increasing and budget isn't increasing "at the same rate." So it's kind of like, you know, "I need more power." It's like that scene in Star Trek, "Scotty, more power," you need to get that power. Take us through that transformation because one, you got a good user experience. That means people are doin' their job. But the cases get bigger, the more workload is there, but the budget's got to be increased or leveraged better. What's your thoughts? How do you tackle that problem because it's do more with less, classic do more with less. >> That's right. Yeah, so as Frank said, I think the system had been live for about seven years and you see over that time in the traditional data centers how the performance requirements increase but as you said, are kind of there on hardware and not easily able to adapt and overcome those. So, you know, when it became clear that the cloud move was a serious consideration we were able to pull on a few other experiences that the firm has had moving similar technologies to the cloud and then kind of combined that with the experience implementing technology at the FBI. And those two components kind of together were able to get us on a path to successfully move to the cloud and be, you know, kind of one of the first big systems at the FBI to make that transition. So that was our approach. >> Frank, I'd like to ask, you mentioned crickets. That means, that's good, actually. No one's complaining. What was it like before when you had the data center? What were some of the complaints? What were some of the challenges that you were dealing with? >> So (chuckling) so some of the challenges we were dealing with was, to give an example, when we went live seven years ago, we actually deployed our application on hardware that was already end of life. And so immediately we saw challenges there. And so by moving to the cloud, it gave us a lot of architectural flexibility. And what I mean by that is that we control, now, our own destiny, meaning that in the past, we would have to put in change requests to have firewall configuration changes. Now that responsibility is with us. Our DBAs had limited access to actually do some type of performance tuning on the backend to our databases. Now we have full control of that. I guess a couple of examples, or one example that I would give is that we're in the COVID era, as you mentioned, right? We have a space where we, prior to COVID, we had about 70 people on staff, both government and at Accenture. And all of our development is done on the secret side. And we have major deliverables due at the end of September. Well, COVID hits, we now have to social distance and come up with a plan, and we have to have reduce our staff of 70, both functional developers down to anywhere between 10 people or less on-site. So that, right there, you know, we were talking major hit in our development effort and in cost, I guess, also. While we're doing our social distancing plan Greg came up to me and said, "Hey, why don't we move "our development environment and our test environment "to the gov cloud and scramble the data. "We'll be able to have our developers remote access in "and continue with our development efforts?" And I told Greg, "Great, put a plan together. "Let's talk to our information security officer." I said, "If he signs off on it, let's get off and running." We met with him, he signed off on them, and within two weeks that dev and test environment was up and running. And now, we're still on-track to meet our deliverable dates in September. >> That's a great example, well, that's awesome insight. Greg, expand on that because this is an example of agility. You talk about readiness, I mean it's unforecasted disruption, there's all kinds of use cases. "Oh, we have a hurricane," or whatever, you know. This is unforeseen and unique. Take us through-- >> Yeah, that's absolutely right. >> The agility piece here, on how you got deployed, time frame, and solution. >> Yeah, definitely. So yeah, it can't be overstated how much of a benefit it was that we had already gone through the process of refactoring a lot of our applications into the cloud and using some of those services available and, you know, able to containerize and take some of those application from where they were, as Frank mentioned, scramble the data, and then able to quickly use the cloud experience that we had to stand up an environment in gov cloud where it was more accessible for development that didn't need to take place on-site, was, essentially, the saving grace. We would have had major slowdowns in delivery, as Frank mentioned and a lot of cost implications there, so it really can't be overstated how much that experience having gone through it and being in a spot where we had that flexibility to quickly replicate our architecture, went a long way towards keeping the mission going as the world deals with the pandemic. >> Yeah, this is just a striking example. You know, first of all, I'm a cloud-biased person. I'm very much a, I lean heavily towards pro-cloud so I'll just say this as total bias. There are companies that have gone cloud and took advantage of that refactoring or reinvention and are in a position not only to hit the deadlines but also be in a position of growth strategy, or in this case, a mission-based expansion for the FBI, as Frank was alluding to. Could you imagine, Frank, if you had the data center challenge and you weren't in the cloud? And the you had to go to Greg, or somebody, and say, "Hey, what do you do?" So imagine you had the data center, and then COVID hits. A lot of people are on that side of the street, right now, goin', "What do we do?" >> Yeah, yeah we would have been dead in the water as Greg mentioned. You know, all of our work streams would have been forced out to the left. I couldn't even imagine, you know, the timelines that we would have had to come up with because we would have had to have come up with some rotation plan to develop, you know, team one can only come in on Mondays and Tuesdays and then team two would come in on Wednesdays and Thursdays which would have pushed out our delivery dates and as Greg mentioned also, cost goes up. Time is money, money's time. >> Yeah, I totally, and people goin' out of business because of it and, or settin' their mission back you know, decades. Greg, talk about what goes on next because obviously, congratulations on being a customer success, it's a great mission win here, but you got to get through this. So how are you guys huddling on this point? What are the conversations? What are you thinking? >> Yeah, so now we're at a point where I think, as I'd mentioned, when we first moved to the cloud, the primary mission was getting there securely, getting there within policy, and getting operational so we were making trade-off decisions on where to lift and shift, and where to refactor. Got through all of that successfully. Got through the initial challenge of COVID which definitely threw some of the plans for a loop as we shifted our operations and focused on getting operational in gov cloud. And now we are at a point where we've stabilized delivery again, and we're re-picking up where we left off on the cloud journey which is really focused now, on continuing to look at the investments that AWS is making in the technologies that are coming next. And it really enables us to get ahead of the trends, easily analyze some of these services, available, and then we enter into conversations with Frank and others and start making those trade-off decisions of when it's time to refactor, retire another part of our application and start to look to go cloud-native. So that's where we are now, is looking for ways to maximize and use those services to, again, save costs, improve performance, all of those things that go along with getting more and more mature in the cloud. >> You know, one of the things, Frank, I want to hear your thoughts on just as while I got you guys here is you think about old school, old guard, as Andy Jassy would say, or Teresa talk about. You got silos and you got all these things: legacy. Okay, got that. But as you guys look at your mission have secure data, catch the bad guys, and protect citizens, right? So (chuckling) I mean, I'm over-simplifying but generally, that's it. Data's critical, right? I mean, speed to the edge of the network which is the field and the people doing the job, is critical. Cloud has an opportunity to make that development cycle faster, and ultimately, the workloads and the impact. Could you share your thoughts on how the cloud and Amazon are bringin' that to the table because havin' the right data at the right time could mean the difference between life or death. >> Yeah, so Greg and I experienced this, and again, it's all about having that architectural flexibility, right? So back in February, we had a requirement where we had to expose a large amount of data to employees about themselves, but not only about themselves, but also to their managers. And so, you know, we went through the basic you know, develop it, and then put it into our test environment, however the problem that we had was that we couldn't assimilate the large amount of data that we're exposing to 40,000 FBI employees. Because when we tested out, everything seemed to go fine, but as luck would have it, once we went operational, the application crashed. Our two main engineers come in my office and within 30 minutes, they identified the problem, they had the solution, and we already implemented the solution. Within 30 minutes. You know, going back in the past, like seven years, like you were mentioning, back in the old days, I would have to go around, beg for funding, buy hardware, then I would have to submit a requisition. It would have to go through the approval process. We then would have to procure the hardware, receive the hardware, install it, test it out, load the application, test it again, and then go into Ops. You know, you're lookin' anywhere from a three month to a nine month delay right then and there that our engineers were able to solve within 30 minutes. >> I mean, again, I'm back to my bias again. I'm old enough to remember when I was in college. I mean, I never programmed on punch cards, so that's kind of dates me, (chuckling) but so I'm post punch card generation. I used to look at the guys runnin' the mainframes sayin', "Look at those old relics over there," and "huggin' the mainframe." But what they did was that the smart people repurposed and got into mini-computers, they got into networking, LANs and PCs. This is kind of the cloud moment where if you're going to hold onto that old way you're going to have that operating model, it's just not effective in any way. I just don't see any benefit, other than have a preserved workload that needs the certain data, or you put containers around it and you can bring that in, but there are those corner cases. But generally speaking, you got to move to the new model. >> Mm-hmm. >> Guys, react to that. What's your thoughts? >> Yeah. >> Evermore. Yeah. >> Yeah, I agree, I mean It can't really be overstated, just the flexibility that exists. I think a lot of times, people get hung up on the you know, most efficient way to move to the cloud or you have to use X amount of cloud services. But it can't be overstated, regardless of the approach that you take to making that migration, that once you are there, the kind of intangibles that you get, the ease to take an idea and test it out, flip the switch on, flip the switch off if you like it or not. It's really just opened the door for the team to take some of the more innovative ideas and we have regular conversations with Frank and others that I think are fun for all of us where we get to look at some of these things and we can actually think about and envision how to get them in without, to Frank's point, "putting in requisitions," doing major activities that are going to derail our other schedules to pilot some of these new ideas. >> Frank, you got to attract some, it's a personnel challenge, too. You want to attract young minds, smart, young people. They want what's contemporary and they want state-of-the-art, they want to be in the right positions, drivin' the right, fastest car they can, and being successful. There's a staff component. What's your thoughts on that? Because, you know, if a young person comes in it's like, "Hey, I want to rock and roll with this new stuff, "not the old stuff I see there." >> Right. >> And so Greg put together an innovation team where we have these great, young minds, right? And you know, they're always bringing different ideas, different services that we can utilize on AWS, and sometimes Greg and I have to pull the reins on 'em, like, "Okay, we'll do that, but we have "major applications that we got to develop and deploy." But it's always refreshing and great to see young people with their innovative ideas that they bring to the table. >> Well, final question for you guys, while I got ya here. You know, I've been reporting, we've been saying on these CUBE interviews, trying to make sense of this COVID environment, what's goin' on and what it exposes. And you can see the obvious things. But it generally exposes this great IoT experiment. We're all IoT devices at this point. You've got work places which are not home and office, workforces which are remote, workloads and workflows that are changing, new things are happening. How do you guys see this? Because it ultimately opens up the fact that the architecture has to support multiple endpoints, edge of the network, new connections, new workflows. How are you guys looking at this? What's your vision on this? >> So Greg, I'll take a first crack at it from a Bureau employee being with the Bureau for 31 years. I would never have thought in my wildest dreams that we'd actually have people workin' from home and being able to remote in, and actually do development. And we did it all within two weeks. It's just incredible the obstacles that the team overcome, but also the flexibility of the FBI leadership, knowing that this had to happen in order to, for continuity of operations. >> Great point, great insight. Greg, your thoughts. >> Yeah, I agree with everything that Frank said. It's been a great partnership and I think that the nice thing that surprised us all was when it got down to it, the security controls and requirements were there and able to be met with the tools at our disposal. So I think the great fear that everybody had to Frank's point, it just wasn't something that was normal to this point. But as we were all forced to reevaluate what we had to do, the fear was, "Well, what accommodations are we "going to have to make from a security standpoint?" And the answer was being able to operate again without exposing any of that data, the risk was really extremely low, to zero. All the folks from security we're able to work closely with in partnership, and make this happen again so we can keep delivering the mission. So I think that partnership and getting through it together and all feeling really comfortable that we're doing it in a secure way was really what enabled us to be successful. >> That's a great point. Frank, he brings up something I didn't bring up which is super important. You mentioned in the old way you got to get all these requisitions in purchase. Security is the same kind of new dynamic which is like, "Okay, you got to get "everything tested," but it goes faster when you have the cloud 'cause that's also another criteria, you got to still got to get the approvals whether you're working with another vendor or integrating with another app. That's still now the new issue. So that's got to be approved faster, so that's also now a bottleneck. How does cloud help make those security reviews go faster? >> Right, so so we were the first ones on the cloud. So or security team was still defining the ATO process for us. However, what we did was we aligned ourselves with that team so that we could meet all the security requirements, but also app out all the security controls. And so from the time that we actually had the design till we went into deployment onto the SC2S or the cloud, and we went through the ATO process, it only took us eight months which really, in the past, that effort could have took anywhere from a year and a half to two years just because of the old ATO process. >> Awesome. Well, Greg and Frank, congratulations on a great award, Amazon Public Sector Partner Awards Show, most customer-obsessed mission-based win in the federal category. Congratulations. >> Thank you. >> Thank you. >> Okay, theCUBE's coverage of AWS Public Sector Partner Awards Show, I'm John Furrier, your host of theCUBE. Thanks for watching. (soft electronic melody music)
SUMMARY :
Brought to you by Amazon Web Services. and congratulations on the win. What's the award for? of the themes you hear but the budget's got to be increased clear that the cloud move that you were dealing with? our own destiny, meaning that in the past, or whatever, you know. Yeah, that's on how you got deployed, a lot of our applications into the cloud And the you had to go the timelines that we would What are the conversations? of the plans for a loop and the people doing the job, is critical. however the problem that we had was that and "huggin' the mainframe." Guys, react to that. Yeah. and test it out, flip the switch on, in the right positions, drivin' the right, and I have to pull the reins that the architecture has to support obstacles that the team overcome, Greg, your thoughts. that data, the risk was You mentioned in the just because of the old ATO process. in the federal category. of AWS Public Sector Partner Awards Show,
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Greg | PERSON | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Greg Siegel | PERSON | 0.99+ |
Andy Jassy | PERSON | 0.99+ |
FBI | ORGANIZATION | 0.99+ |
February | DATE | 0.99+ |
Frank | PERSON | 0.99+ |
September | DATE | 0.99+ |
John Furrier | PERSON | 0.99+ |
Teresa | PERSON | 0.99+ |
Frank Urbano | PERSON | 0.99+ |
eight months | QUANTITY | 0.99+ |
31 years | QUANTITY | 0.99+ |
Star Trek | TITLE | 0.99+ |
Amazon Web Services | ORGANIZATION | 0.99+ |
Gregory Siegel | PERSON | 0.99+ |
10 people | QUANTITY | 0.99+ |
Accenture | ORGANIZATION | 0.99+ |
Thursdays | DATE | 0.99+ |
first problem | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
three month | QUANTITY | 0.99+ |
FBI Federal Bureau of Investigation | ORGANIZATION | 0.99+ |
two years | QUANTITY | 0.99+ |
70 | QUANTITY | 0.99+ |
Mondays | DATE | 0.99+ |
Wednesdays | DATE | 0.99+ |
Tuesdays | DATE | 0.99+ |
40,000 | QUANTITY | 0.99+ |
end of September | DATE | 0.99+ |
Paolo Alto, California | LOCATION | 0.99+ |
one example | QUANTITY | 0.99+ |
two main engineers | QUANTITY | 0.99+ |
two weeks | QUANTITY | 0.98+ |
Partner Awards Show | EVENT | 0.98+ |
seven years ago | DATE | 0.98+ |
a year and a half | QUANTITY | 0.98+ |
about seven years | QUANTITY | 0.98+ |
first | QUANTITY | 0.98+ |
one | QUANTITY | 0.98+ |
two components | QUANTITY | 0.97+ |
nine month | QUANTITY | 0.97+ |
seven years | QUANTITY | 0.97+ |
two great guests | QUANTITY | 0.97+ |
both | QUANTITY | 0.97+ |
about 70 people | QUANTITY | 0.96+ |
30 minutes | QUANTITY | 0.96+ |
Amazon Public Sector Partner Awards Show | EVENT | 0.96+ |
team two | QUANTITY | 0.96+ |
zero | QUANTITY | 0.96+ |
AWS Public Sector Partner Awards Show | EVENT | 0.95+ |
M.K. Palmore, FBI | Open Systems, The Future is Crystal Clear with SD-WAN & Security
>> From Las Vegas, it's theCUBE. Covering Open Systems, the future is crystal clear with security and SD-WAN. Brought to you by Open Systems >> Hello everyone, welcome to theCUBE, We're here in Las Vegas again for another awesome set of conversations. CUBE coverage here at the Cosmopolitan hotel at the Chandelier Bar. We're here covering Open Systems having a special event in conjunction with a lot of the conference going on, Gardner has a big symposium, lot of things happening, we're here with M.K. Palmore whose the head of the FBI'S cyber security, San Francisco branch of the FBI, great to have you thanks for spending time. >> Thanks for having me, John. Much appreciated >> Chandelier Bar, everyone's having a good time, you guys had a lot of sessions today, conversations. You gave a speech today during a session around info sec and culture. >> Info sec risk and leadership. >> Okay talk about that, what will you, what was your main theme. >> Yeah, so I've over the past five years or so had the opportunity to go out and speak a lot about the cyber threat landscape. Going into this year, because the message is getting a little stayed and old, I think I want to concentrate on those issues that I think can help move the ball down the field a little bit. So, talking about cyber security risks as an enterprise risk, discussing it as a matter of an enterprises responsibility to address cyber securities as an enterprise risk is an important message to carry, and I like to add in topics and subjects about leadership, and tie all of those in because in my view, information security professionals have to be leaders as well, because we're all venturing into space that's not known to us. >> That's a great point, leadership also has to take into the new environment, your dealing with you know, a decentralized threat landscape, distributed, decentralized. >> Global. >> Back in the old days when I was in college, you get a pager, you get a new one, now you get flip phones and you can swap em out, now you're everywhere, you got social media, the ability to dodge the authorities, is easier, almost easier than ever before, requires you guys to be on your toes, to catch the bad guys, you need cutting edge technology, but you got to have a mindset in a management culture of leadership, to empower people at the edges. How are you guys thinking about, cause this is like one of the main cyber topics is, setting that system up to be nimble, reactive, used data, >> Right. >> What's your thoughts? >> Yeah so I mean, frankly the FBI is learning in new ways to approach this cyber security problem. We understand that we have to hire the right people with the right talent and that we as an organization we're used, frankly we're used to fighting you know, bad guys in the streets, are now taking this fight to the networked environment and we have to come up with new ways of tackling the problem. One of the biggest problems that we face and you touched on it, is that near 100% anonymity that criminals enjoy operating in the network environment, that ability to conduct transactions, that ability to essentially go unnoticed for long periods of time, without anyone knowing your true identity, creates a huge obstacle for law enforcement, but the good thing is that frankly it's something that we're very good at in terms of identifying whose on the other end of the keyboard, but it takes a lot of work. >> You know I'm old enough to have some friends that have graduated from you know, criminal justice majors when I was in college, I was a CS major, they went DEA, FBI, so a lot of friends and it's evolved a lot from having that branch office >> Yes. >> Focus, you now have digital, and one comment that always kind of resonated from my friends that were in the law enforcement area goes, John it's like putting the puzzle together, and you got to get the puzzle pieces to put it all together >> Right. >> Now you have a sea of puzzle pieces, it's almost like a three dimensional puzzle, because you have to get the data, you got to understand the landscape now and multiple dimensions >> Right. >> That you just mentioned. How do you guys keep up with putting that puzzle together, before it changes? >> We get a lot of help, right, so what we're used to doing is using the FBI'S special agent as the main tool of our investigations, in the cyber world we've had to add some pieces to that, not only is there specific training now for cyber agents, those agents that are charged with investigating intrusions, we have computer scientists, we have data analysts, we have folks that we bring to bear, in any one particular investigation, who add talents and tools that every, you know it's like, everyone is at the table on these investigations bringing different aspects of the investigation together and it is like you said, multiple data points and as any investigation is, lots of pieces being brought together to tell a story that we ultimately have to, you know convince the judge of, in terms of judge and a jury sometimes, of the validity of what it is that we've found. >> So timing is very important as well. >> Timing's huge, as we like to say, we want to be involved in intrusion matters as quickly, and as often as we can. Part of the challenge that we face is that there's a little bit of tug and pull between us and the private sector, and we aren't always brought in as early in a breach investigation as we would like to be, and those, it's valuable, valuable minutes, valuable days that are lost sometimes in that, in that transactional process. >> I interviewed Christine Halverson, I don't even, I'm sorry I didn't interview her, I watched her give a presentation amazon reinvent last week, she gave a key, one of the key notes during a public sector summit, Teresa Carlson's breakfast that she had, and she said something very fascinating she said, we are in a data crisis at the FBI, meaning that they have to put the puzzle pieces together and get it done quick, it was something along those lines, but she said that the FBI has been very progressive in adopting new technology, you guys are moving very very fast and she said she's excited by that but she said we need the data, whether that's being called in quickly, >> Right. >> And or getting access to other data bases, right, so it's like the data is out there, so you guys need access to that, how do you guys, how do you, how's the FBI evolving with that, architectural cloud and what not, and how are you enabling the tools for the field agents, and the people in the trenches? >> So the data analytics is an interesting area to dive deeply into, I mean we face the same challenges as any private organization, in terms of how we intake the data, how the data's organized, how it is that we then retrieve the data, look at it, how it relates to the different data points relate to one another, we face all of those same challenges and we have the added challenge, I think in the environment that we're in, in terms of how we're able to adopt private sector products that are out there that might meet our needs, I mean I've been in government now for over 30 years, it's a bit of a challenge being able to acquire the types of platforms and products that you, that you would want to have as quickly as you would like to have them, but eventually we do get down those roads, we do adopt platforms that are useful to us, and again like everyone else, we're trying to move as quickly as we possibly can in this environment to keep up with the bad guys. >> And you guys do a great job moving those antiquated inadequate systems to more real time, >> We try. >> State of the art. >> We try. >> So I interviewed General Keith Alexander once, and we talked about identity and private sector, public sector collaboration. Can you share your thoughts on that, because this is something that's become a bigger trend recently in the past five to 10 years, past three years in particular where it's a sharing culture it's not just, well I'm not going to call the FBI they're going to come in, it's no no we're going to bring them in early, whether it's a breach you think, or someone hiding, I mean the Marriot thing they didn't even know they were there! So, you guys are now spending more time collaborating with the enterprises and businesses, how has that changed your approach, your posture, how you look at the data, can you give some insight into that? >> Yeah so I mean a lot of it's about relationship building, I will tell you that, in the San Francisco division one of the priorities we have within our cyber branch, is to ensure that we have a certain level of rapport, not just with the big tech giants in the valley, but also with the medium size enterprises and the small enterprises, we spend a fair amount of time putting ourselves in front of the C-Suites, boards of directors and talking to them about one, what capabilities the FBI brings to the table, we open the lines of communication with them and we build a rapport, in such a way that it allows them the trust to then bring problems to us and we then begin an exchange of information. The point you made about, public, private collaboration, it's an absolute must, there's no way we get through this tough period that we're in, without both sides sitting down at the table, establishing some trust, and then moving together to solve these problems. >> The other thing I'd observe and you may or may not want to comment on this, love to see if you would comment, but the notion of agility, especially with data and systems and cloud computing. CIA, the Department of Defense, are moving to systems that can be as reactive and accurate as possible, and this is a changing of relationship to the suppliers! >> Right. >> You know, and the government, oh multiple suppliers, we got to do five different things, >> Right. >> But if the systems don't talk to each other, you guys can't be fast. This is seat change and the mindset. >> The whole government I think is beginning to understand that in this world, technology, we need to be much more agile in terms of our adoption of new products that will allow us to combat crime, and frankly the threat from the national security sector that we're responsible for responding to. So we understand that there's a certain level of agility historically not present, that we need to move the marker to get towards. >> Let me ask you a question, does the FBI have an app store? (John laughs) >> So what, we have secured telephones that we utilize and we certainly have an approved list of apps that we're allowed to have on our phones, so we do. The short answer to that is yes, it's a very truncated list of apps that we have available to us, but they're helpful. >> Well we were joking. Well we were joking at reinvent and all these cloud conferences because, the developer now, building a right new software apps is faster, so this whole dev ops ethos of cloud computing >> Secure DevOps yeah. >> And so secure DevOps is really interesting because now you don't have to, you can free up the data in the infrastructure and yes infrastructure is code, your going to see a renaissance of new applications, so the joke was, you know you made it when you have an app store inside the FBI, there's an app for that. Okay, final question for you, as you guys do your thing and I know you get called in a lot to mentor and also collaborate with enterprises, what's your advice on the info sec landscape? Do you talk to CSO's and CXO's, CSO's in particular are under a lot of pressure, >> Right. >> Board level kind of responsibility, not part of IT anymore they are now a critical piece of building out these teams, what's your advice to them in terms of either, whether there's observation's our best practice that you've seen, that they can think about? >> So a couple of the points that I typically hit on in my talks, that I hit on today, one is this idea of looking at cyber security as an enterprise risk which you just talked about. We need to get away from the old school thought process of cyber being an IT function, right? It's an enterprise risk, it needs to be talked about in terms of risk, the language of risk management, with the C-Suite, with the boards of directors, because when you talk in a language of the likelihood of an event happening, the impact to the organization and what that means in terms of, daily revenue, daily dollars to the business, that's a language that business owners and business leaders understand. So the oweness is on information security leaders to adopt this language, so that we can communicate our needs to our colleagues in the C-Suite and the boards of directors. It's a seat change for information security professionals because this is not a language that they are typically used to speaking. >> And they got to level up there too because this is the reality. >> Absolutely. >> Alright, final final question, what's the most exciting thing that you're working on and or you're seeing happening around you, that you get up in the morning and say, man I'm so excited to work on that. Or trend or technology. >> I'll tell you when you work for an organization like the FBI, which I've done for almost 22 years, at the end of the day it's getting exposure to people who are engaged in trying to achieve the FBI's mission on a day to day basis and at the end of the day, I don't care how much technology you have around you, I don't care how much policy you have in place, having the right people in place who are dedicated to what we're trying to accomplish, that's the thing I get the most juice out of on a day to day basis, we get to actually, in this portion of my career, really work with some of the most talented people that the FBI has. >> And their being empowered more than ever right now in this technology >> Absolutely. >> M.K. Palmore thanks for coming on theCUBE appreciate it. Head of the FBI cyber security in San Francisco. It's theCUBE here in Las Vegas at the Chandelier Bar in the Cosmopolitan, breaking it down. Part of Open Systems private event, they just had a lot of stuff going on with Gardner, lot of events happening here in Vegas, I'm John Furrier, thanks for watching. (modern music)
SUMMARY :
Brought to you by Open Systems branch of the FBI, great to have Thanks for having me, John. everyone's having a good time, you guys you, what was your main theme. had the opportunity to go out and speak take into the new the ability to dodge the authorities, One of the biggest problems that we face How do you guys keep up with putting of the validity of what Part of the challenge that we face is that the data, look at it, how it relates to recently in the past five to 10 years, and the small enterprises, we of relationship to the suppliers! to each other, you guys can't be fast. and frankly the threat from list of apps that we have available the developer now, building a right new so the joke was, you know So a couple of the points And they got to level up there the morning and say, man I'm the FBI's mission on a day to day basis Head of the FBI cyber
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Christine Halverson | PERSON | 0.99+ |
CIA | ORGANIZATION | 0.99+ |
FBI | ORGANIZATION | 0.99+ |
Teresa Carlson | PERSON | 0.99+ |
San Francisco | LOCATION | 0.99+ |
John | PERSON | 0.99+ |
John Furrier | PERSON | 0.99+ |
Las Vegas | LOCATION | 0.99+ |
Vegas | LOCATION | 0.99+ |
Department of Defense | ORGANIZATION | 0.99+ |
Las Vegas | LOCATION | 0.99+ |
Gardner | PERSON | 0.99+ |
M.K. Palmore | PERSON | 0.99+ |
today | DATE | 0.99+ |
last week | DATE | 0.99+ |
both sides | QUANTITY | 0.99+ |
M.K. Palmore | PERSON | 0.98+ |
One | QUANTITY | 0.98+ |
over 30 years | QUANTITY | 0.98+ |
Chandelier Bar | LOCATION | 0.97+ |
Keith Alexander | PERSON | 0.97+ |
one | QUANTITY | 0.96+ |
amazon | ORGANIZATION | 0.96+ |
DEA | ORGANIZATION | 0.95+ |
almost 22 years | QUANTITY | 0.95+ |
Marriot | ORGANIZATION | 0.94+ |
C-Suite | TITLE | 0.92+ |
five different things | QUANTITY | 0.91+ |
theCUBE | ORGANIZATION | 0.9+ |
past three years | DATE | 0.9+ |
this year | DATE | 0.89+ |
one comment | QUANTITY | 0.89+ |
Cosmopolitan | LOCATION | 0.87+ |
Chandelier Bar | ORGANIZATION | 0.85+ |
General | PERSON | 0.84+ |
one of the key notes | QUANTITY | 0.83+ |
past five years | DATE | 0.81+ |
near 100% | QUANTITY | 0.79+ |
10 years | QUANTITY | 0.78+ |
Open Systems | EVENT | 0.76+ |
Cosmopolitan | ORGANIZATION | 0.71+ |
CUBE | ORGANIZATION | 0.67+ |
past five | DATE | 0.62+ |
once | QUANTITY | 0.56+ |
couple | QUANTITY | 0.52+ |
CXO | ORGANIZATION | 0.51+ |
three | QUANTITY | 0.51+ |
CSO | TITLE | 0.42+ |
Lena Smart & Tara Hernandez, MongoDB | International Women's Day
(upbeat music) >> Hello and welcome to theCube's coverage of International Women's Day. I'm John Furrier, your host of "theCUBE." We've got great two remote guests coming into our Palo Alto Studios, some tech athletes, as we say, people that've been in the trenches, years of experience, Lena Smart, CISO at MongoDB, Cube alumni, and Tara Hernandez, VP of Developer Productivity at MongoDB as well. Thanks for coming in to this program and supporting our efforts today. Thanks so much. >> Thanks for having us. >> Yeah, everyone talk about the journey in tech, where it all started. Before we get there, talk about what you guys are doing at MongoDB specifically. MongoDB is kind of gone the next level as a platform. You have your own ecosystem, lot of developers, very technical crowd, but it's changing the business transformation. What do you guys do at Mongo? We'll start with you, Lena. >> So I'm the CISO, so all security goes through me. I like to say, well, I don't like to say, I'm described as the ones throat to choke. So anything to do with security basically starts and ends with me. We do have a fantastic Cloud engineering security team and a product security team, and they don't report directly to me, but obviously we have very close relationships. I like to keep that kind of church and state separate and I know I've spoken about that before. And we just recently set up a physical security team with an amazing gentleman who left the FBI and he came to join us after 26 years for the agency. So, really starting to look at the physical aspects of what we offer as well. >> I interviewed a CISO the other day and she said, "Every day is day zero for me." Kind of goofing on the Amazon Day one thing, but Tara, go ahead. Tara, go ahead. What's your role there, developer productivity? What are you focusing on? >> Sure. Developer productivity is kind of the latest description for things that we've described over the years as, you know, DevOps oriented engineering or platform engineering or build and release engineering development infrastructure. It's all part and parcel, which is how do we actually get our code from developer to customer, you know, and all the mechanics that go into that. It's been something I discovered from my first job way back in the early '90s at Borland. And the art has just evolved enormously ever since, so. >> Yeah, this is a very great conversation both of you guys, right in the middle of all the action and data infrastructures changing, exploding, and involving big time AI and data tsunami and security never stops. Well, let's get into, we'll talk about that later, but let's get into what motivated you guys to pursue a career in tech and what were some of the challenges that you faced along the way? >> I'll go first. The fact of the matter was I intended to be a double major in history and literature when I went off to university, but I was informed that I had to do a math or a science degree or else the university would not be paid for. At the time, UC Santa Cruz had a policy that called Open Access Computing. This is, you know, the late '80s, early '90s. And anybody at the university could get an email account and that was unusual at the time if you were, those of us who remember, you used to have to pay for that CompuServe or AOL or, there's another one, I forget what it was called, but if a student at Santa Cruz could have an email account. And because of that email account, I met people who were computer science majors and I'm like, "Okay, I'll try that." That seems good. And it was a little bit of a struggle for me, a lot I won't lie, but I can't complain with how it ended up. And certainly once I found my niche, which was development infrastructure, I found my true love and I've been doing it for almost 30 years now. >> Awesome. Great story. Can't wait to ask a few questions on that. We'll go back to that late '80s, early '90s. Lena, your journey, how you got into it. >> So slightly different start. I did not go to university. I had to leave school when I was 16, got a job, had to help support my family. Worked a bunch of various jobs till I was about 21 and then computers became more, I think, I wouldn't say they were ubiquitous, but they were certainly out there. And I'd also been saving up every penny I could earn to buy my own computer and bought an Amstrad 1640, 20 meg hard drive. It rocked. And kind of took that apart, put it back together again, and thought that could be money in this. And so basically just teaching myself about computers any job that I got. 'Cause most of my jobs were like clerical work and secretary at that point. But any job that had a computer in front of that, I would make it my business to go find the guy who did computing 'cause it was always a guy. And I would say, you know, I want to learn how these work. Let, you know, show me. And, you know, I would take my lunch hour and after work and anytime I could with these people and they were very kind with their time and I just kept learning, so yep. >> Yeah, those early days remind me of the inflection point we're going through now. This major C change coming. Back then, if you had a computer, you had to kind of be your own internal engineer to fix things. Remember back on the systems revolution, late '80s, Tara, when, you know, your career started, those were major inflection points. Now we're seeing a similar wave right now, security, infrastructure. It feels like it's going to a whole nother level. At Mongo, you guys certainly see this as well, with this AI surge coming in. A lot more action is coming in. And so there's a lot of parallels between these inflection points. How do you guys see this next wave of change? Obviously, the AI stuff's blowing everyone away. Oh, new user interface. It's been called the browser moment, the mobile iPhone moment, kind of for this generation. There's a lot of people out there who are watching that are young in their careers, what's your take on this? How would you talk to those folks around how important this wave is? >> It, you know, it's funny, I've been having this conversation quite a bit recently in part because, you know, to me AI in a lot of ways is very similar to, you know, back in the '90s when we were talking about bringing in the worldwide web to the forefront of the world, right. And we tended to think in terms of all the optimistic benefits that would come of it. You know, free passing of information, availability to anyone, anywhere. You just needed an internet connection, which back then of course meant a modem. >> John: Not everyone had though. >> Exactly. But what we found in the subsequent years is that human beings are what they are and we bring ourselves to whatever platforms that are there, right. And so, you know, as much as it was amazing to have this freely available HTML based internet experience, it also meant that the negatives came to the forefront quite quickly. And there were ramifications of that. And so to me, when I look at AI, we're already seeing the ramifications to that. Yes, are there these amazing, optimistic, wonderful things that can be done? Yes. >> Yeah. >> But we're also human and the bad stuff's going to come out too. And how do we- >> Yeah. >> How do we as an industry, as a community, you know, understand and mitigate those ramifications so that we can benefit more from the positive than the negative. So it is interesting that it comes kind of full circle in really interesting ways. >> Yeah. The underbelly takes place first, gets it in the early adopter mode. Normally industries with, you know, money involved arbitrage, no standards. But we've seen this movie before. Is there hope, Lena, that we can have a more secure environment? >> I would hope so. (Lena laughs) Although depressingly, we've been in this well for 30 years now and we're, at the end of the day, still telling people not to click links on emails. So yeah, that kind of still keeps me awake at night a wee bit. The whole thing about AI, I mean, it's, obviously I am not an expert by any stretch of the imagination in AI. I did read (indistinct) book recently about AI and that was kind of interesting. And I'm just trying to teach myself as much as I can about it to the extent of even buying the "Dummies Guide to AI." Just because, it's actually not a dummies guide. It's actually fairly interesting, but I'm always thinking about it from a security standpoint. So it's kind of my worst nightmare and the best thing that could ever happen in the same dream. You know, you've got this technology where I can ask it a question and you know, it spits out generally a reasonable answer. And my team are working on with Mark Porter our CTO and his team on almost like an incubation of AI link. What would it look like from MongoDB? What's the legal ramifications? 'Cause there will be legal ramifications even though it's the wild, wild west just now, I think. Regulation's going to catch up to us pretty quickly, I would think. >> John: Yeah, yeah. >> And so I think, you know, as long as companies have a seat at the table and governments perhaps don't become too dictatorial over this, then hopefully we'll be in a good place. But we'll see. I think it's a really interest, there's that curse, we're living in interesting times. I think that's where we are. >> It's interesting just to stay on this tech trend for a minute. The standards bodies are different now. Back in the old days there were, you know, IEEE standards, ITF standards. >> Tara: TPC. >> The developers are the new standard. I mean, now you're seeing open source completely different where it was in the '90s to here beginning, that was gen one, some say gen two, but I say gen one, now we're exploding with open source. You have kind of developers setting the standards. If developers like it in droves, it becomes defacto, which then kind of rolls into implementation. >> Yeah, I mean I think if you don't have developer input, and this is why I love working with Tara and her team so much is 'cause they get it. If we don't have input from developers, it's not going to get used. There's going to be ways of of working around it, especially when it comes to security. If they don't, you know, if you're a developer and you're sat at your screen and you don't want to do that particular thing, you're going to find a way around it. You're a smart person. >> Yeah. >> So. >> Developers on the front lines now versus, even back in the '90s, they're like, "Okay, consider the dev's, got a QA team." Everything was Waterfall, now it's Cloud, and developers are on the front lines of everything. Tara, I mean, this is where the standards are being met. What's your reaction to that? >> Well, I think it's outstanding. I mean, you know, like I was at Netscape and part of the crowd that released the browser as open source and we founded mozilla.org, right. And that was, you know, in many ways kind of the birth of the modern open source movement beyond what we used to have, what was basically free software foundation was sort of the only game in town. And I think it is so incredibly valuable. I want to emphasize, you know, and pile onto what Lena was saying, it's not just that the developers are having input on a sort of company by company basis. Open source to me is like a checks and balance, where it allows us as a broader community to be able to agree on and enforce certain standards in order to try and keep the technology platforms as accessible as possible. I think Kubernetes is a great example of that, right. If we didn't have Kubernetes, that would've really changed the nature of how we think about container orchestration. But even before that, Linux, right. Linux allowed us as an industry to end the Unix Wars and as someone who was on the front lines of that as well and having to support 42 different operating systems with our product, you know, that was a huge win. And it allowed us to stop arguing about operating systems and start arguing about software or not arguing, but developing it in positive ways. So with, you know, with Kubernetes, with container orchestration, we all agree, okay, that's just how we're going to orchestrate. Now we can build up this huge ecosystem, everybody gets taken along, right. And now it changes the game for what we're defining as business differentials, right. And so when we talk about crypto, that's a little bit harder, but certainly with AI, right, you know, what are the checks and balances that as an industry and as the developers around this, that we can in, you know, enforce to make sure that no one company or no one body is able to overly control how these things are managed, how it's defined. And I think that is only for the benefit in the industry as a whole, particularly when we think about the only other option is it gets regulated in ways that do not involve the people who actually know the details of what they're talking about. >> Regulated and or thrown away or bankrupt or- >> Driven underground. >> Yeah. >> Which would be even worse actually. >> Yeah, that's a really interesting, the checks and balances. I love that call out. And I was just talking with another interview part of the series around women being represented in the 51% ratio. Software is for everybody. So that we believe that open source movement around the collective intelligence of the participants in the industry and independent of gender, this is going to be the next wave. You're starting to see these videos really have impact because there are a lot more leaders now at the table in companies developing software systems and with AI, the aperture increases for applications. And this is the new dynamic. What's your guys view on this dynamic? How does this go forward in a positive way? Is there a certain trajectory you see? For women in the industry? >> I mean, I think some of the states are trying to, again, from the government angle, some of the states are trying to force women into the boardroom, for example, California, which can be no bad thing, but I don't know, sometimes I feel a bit iffy about all this kind of forced- >> John: Yeah. >> You know, making, I don't even know how to say it properly so you can cut this part of the interview. (John laughs) >> Tara: Well, and I think that they're >> I'll say it's not organic. >> No, and I think they're already pulling it out, right. It's already been challenged so they're in the process- >> Well, this is the open source angle, Tara, you are getting at it. The change agent is open, right? So to me, the history of the proven model is openness drives transparency drives progress. >> No, it's- >> If you believe that to be true, this could have another impact. >> Yeah, it's so interesting, right. Because if you look at McKinsey Consulting or Boston Consulting or some of the other, I'm blocking on all of the names. There has been a decade or more of research that shows that a non homogeneous employee base, be it gender or ethnicity or whatever, generates more revenue, right? There's dollar signs that can be attached to this, but it's not enough for all companies to want to invest in that way. And it's not enough for all, you know, venture firms or investment firms to grant that seed money or do those seed rounds. I think it's getting better very slowly, but socialization is a much harder thing to overcome over time. Particularly, when you're not just talking about one country like the United States in our case, but around the world. You know, tech centers now exist all over the world, including places that even 10 years ago we might not have expected like Nairobi, right. Which I think is amazing, but you have to factor in the cultural implications of that as well, right. So yes, the openness is important and we have, it's important that we have those voices, but I don't think it's a panacea solution, right. It's just one more piece. I think honestly that one of the most important opportunities has been with Cloud computing and Cloud's been around for a while. So why would I say that? It's because if you think about like everybody holds up the Steve Jobs, Steve Wozniak, back in the '70s, or Sergey and Larry for Google, you know, you had to have access to enough credit card limit to go to Fry's and buy your servers and then access to somebody like Susan Wojcicki to borrow the garage or whatever. But there was still a certain amount of upfrontness that you had to be able to commit to, whereas now, and we've, I think, seen a really good evidence of this being able to lease server resources by the second and have development platforms that you can do on your phone. I mean, for a while I think Africa, that the majority of development happened on mobile devices because there wasn't a sufficient supply chain of laptops yet. And that's no longer true now as far as I know. But like the power that that enables for people who would otherwise be underrepresented in our industry instantly opens it up, right? And so to me that's I think probably the biggest opportunity that we've seen from an industry on how to make more availability in underrepresented representation for entrepreneurship. >> Yeah. >> Something like AI, I think that's actually going to take us backwards if we're not careful. >> Yeah. >> Because of we're reinforcing that socialization. >> Well, also the bias. A lot of people commenting on the biases of the large language inherently built in are also problem. Lena, I want you to weigh on this too, because I think the skills question comes up here and I've been advocating that you don't need the pedigree, college pedigree, to get into a certain jobs, you mentioned Cloud computing. I mean, it's been around for you think a long time, but not really, really think about it. The ability to level up, okay, if you're going to join something new and half the jobs in cybersecurity are created in the past year, right? So, you have this what used to be a barrier, your degree, your pedigree, your certification would take years, would be a blocker. Now that's gone. >> Lena: Yeah, it's the opposite. >> That's, in fact, psychology. >> I think so, but the people who I, by and large, who I interview for jobs, they have, I think security people and also I work with our compliance folks and I can't forget them, but let's talk about security just now. I've always found a particular kind of mindset with security folks. We're very curious, not very good at following rules a lot of the time, and we'd love to teach others. I mean, that's one of the big things stem from the start of my career. People were always interested in teaching and I was interested in learning. So it was perfect. And I think also having, you know, strong women leaders at MongoDB allows other underrepresented groups to actually apply to the company 'cause they see that we're kind of talking the talk. And that's been important. I think it's really important. You know, you've got Tara and I on here today. There's obviously other senior women at MongoDB that you can talk to as well. There's a bunch of us. There's not a whole ton of us, but there's a bunch of us. And it's good. It's definitely growing. I've been there for four years now and I've seen a growth in women in senior leadership positions. And I think having that kind of track record of getting really good quality underrepresented candidates to not just interview, but come and join us, it's seen. And it's seen in the industry and people take notice and they're like, "Oh, okay, well if that person's working, you know, if Tara Hernandez is working there, I'm going to apply for that." And that in itself I think can really, you know, reap the rewards. But it's getting started. It's like how do you get your first strong female into that position or your first strong underrepresented person into that position? It's hard. I get it. If it was easy, we would've sold already. >> It's like anything. I want to see people like me, my friends in there. Am I going to be alone? Am I going to be of a group? It's a group psychology. Why wouldn't? So getting it out there is key. Is there skills that you think that people should pay attention to? One's come up as curiosity, learning. What are some of the best practices for folks trying to get into the tech field or that's in the tech field and advancing through? What advice are you guys- >> I mean, yeah, definitely, what I say to my team is within my budget, we try and give every at least one training course a year. And there's so much free stuff out there as well. But, you know, keep learning. And even if it's not right in your wheelhouse, don't pick about it. Don't, you know, take a look at what else could be out there that could interest you and then go for it. You know, what does it take you few minutes each night to read a book on something that might change your entire career? You know, be enthusiastic about the opportunities out there. And there's so many opportunities in security. Just so many. >> Tara, what's your advice for folks out there? Tons of stuff to taste, taste test, try things. >> Absolutely. I mean, I always say, you know, my primary qualifications for people, I'm looking for them to be smart and motivated, right. Because the industry changes so quickly. What we're doing now versus what we did even last year versus five years ago, you know, is completely different though themes are certainly the same. You know, we still have to code and we still have to compile that code or package the code and ship the code so, you know, how well can we adapt to these new things instead of creating floppy disks, which was my first job. Five and a quarters, even. The big ones. >> That's old school, OG. There it is. Well done. >> And now it's, you know, containers, you know, (indistinct) image containers. And so, you know, I've gotten a lot of really great success hiring boot campers, you know, career transitioners. Because they bring a lot experience in addition to the technical skills. I think the most important thing is to experiment and figuring out what do you like, because, you know, maybe you are really into security or maybe you're really into like deep level coding and you want to go back, you know, try to go to school to get a degree where you would actually want that level of learning. Or maybe you're a front end engineer, you want to be full stacked. Like there's so many different things, data science, right. Maybe you want to go learn R right. You know, I think it's like figure out what you like because once you find that, that in turn is going to energize you 'cause you're going to feel motivated. I think the worst thing you could do is try to force yourself to learn something that you really could not care less about. That's just the worst. You're going in handicapped. >> Yeah and there's choices now versus when we were breaking into the business. It was like, okay, you software engineer. They call it software engineering, that's all it was. You were that or you were in sales. Like, you know, some sort of systems engineer or sales and now it's,- >> I had never heard of my job when I was in school, right. I didn't even know it was a possibility. But there's so many different types of technical roles, you know, absolutely. >> It's so exciting. I wish I was young again. >> One of the- >> Me too. (Lena laughs) >> I don't. I like the age I am. So one of the things that I did to kind of harness that curiosity is we've set up a security champions programs. About 120, I guess, volunteers globally. And these are people from all different backgrounds and all genders, diversity groups, underrepresented groups, we feel are now represented within this champions program. And people basically give up about an hour or two of their time each week, with their supervisors permission, and we basically teach them different things about security. And we've now had seven full-time people move from different areas within MongoDB into my team as a result of that program. So, you know, monetarily and time, yeah, saved us both. But also we're showing people that there is a path, you know, if you start off in Tara's team, for example, doing X, you join the champions program, you're like, "You know, I'd really like to get into red teaming. That would be so cool." If it fits, then we make that happen. And that has been really important for me, especially to give, you know, the women in the underrepresented groups within MongoDB just that window into something they might never have seen otherwise. >> That's a great common fit is fit matters. Also that getting access to what you fit is also access to either mentoring or sponsorship or some sort of, at least some navigation. Like what's out there and not being afraid to like, you know, just ask. >> Yeah, we just actually kicked off our big mentor program last week, so I'm the executive sponsor of that. I know Tara is part of it, which is fantastic. >> We'll put a plug in for it. Go ahead. >> Yeah, no, it's amazing. There's, gosh, I don't even know the numbers anymore, but there's a lot of people involved in this and so much so that we've had to set up mentoring groups rather than one-on-one. And I think it was 45% of the mentors are actually male, which is quite incredible for a program called Mentor Her. And then what we want to do in the future is actually create a program called Mentor Them so that it's not, you know, not just on the female and so that we can live other groups represented and, you know, kind of break down those groups a wee bit more and have some more granularity in the offering. >> Tara, talk about mentoring and sponsorship. Open source has been there for a long time. People help each other. It's community-oriented. What's your view of how to work with mentors and sponsors if someone's moving through ranks? >> You know, one of the things that was really interesting, unfortunately, in some of the earliest open source communities is there was a lot of pervasive misogyny to be perfectly honest. >> Yeah. >> And one of the important adaptations that we made as an open source community was the idea, an introduction of code of conducts. And so when I'm talking to women who are thinking about expanding their skills, I encourage them to join open source communities to have opportunity, even if they're not getting paid for it, you know, to develop their skills to work with people to get those code reviews, right. I'm like, "Whatever you join, make sure they have a code of conduct and a good leadership team. It's very important." And there are plenty, right. And then that idea has come into, you know, conferences now. So now conferences have codes of contact, if there are any good, and maybe not all of them, but most of them, right. And the ideas of expanding that idea of intentional healthy culture. >> John: Yeah. >> As a business goal and business differentiator. I mean, I won't lie, when I was recruited to come to MongoDB, the culture that I was able to discern through talking to people, in addition to seeing that there was actually women in senior leadership roles like Lena, like Kayla Nelson, that was a huge win. And so it just builds on momentum. And so now, you know, those of us who are in that are now representing. And so that kind of reinforces, but it's all ties together, right. As the open source world goes, particularly for a company like MongoDB, which has an open source product, you know, and our community builds. You know, it's a good thing to be mindful of for us, how we interact with the community and you know, because that could also become an opportunity for recruiting. >> John: Yeah. >> Right. So we, in addition to people who might become advocates on Mongo's behalf in their own company as a solution for themselves, so. >> You guys had great successful company and great leadership there. I mean, I can't tell you how many times someone's told me "MongoDB doesn't scale. It's going to be dead next year." I mean, I was going back 10 years. It's like, just keeps getting better and better. You guys do a great job. So it's so fun to see the success of developers. Really appreciate you guys coming on the program. Final question, what are you guys excited about to end the segment? We'll give you guys the last word. Lena will start with you and Tara, you can wrap us up. What are you excited about? >> I'm excited to see what this year brings. I think with ChatGPT and its copycats, I think it'll be a very interesting year when it comes to AI and always in the lookout for the authentic deep fakes that we see coming out. So just trying to make people aware that this is a real thing. It's not just pretend. And then of course, our old friend ransomware, let's see where that's going to go. >> John: Yeah. >> And let's see where we get to and just genuine hygiene and housekeeping when it comes to security. >> Excellent. Tara. >> Ah, well for us, you know, we're always constantly trying to up our game from a security perspective in the software development life cycle. But also, you know, what can we do? You know, one interesting application of AI that maybe Google doesn't like to talk about is it is really cool as an addendum to search and you know, how we might incorporate that as far as our learning environment and developer productivity, and how can we enable our developers to be more efficient, productive in their day-to-day work. So, I don't know, there's all kinds of opportunities that we're looking at for how we might improve that process here at MongoDB and then maybe be able to share it with the world. One of the things I love about working at MongoDB is we get to use our own products, right. And so being able to have this interesting document database in order to put information and then maybe apply some sort of AI to get it out again, is something that we may well be looking at, if not this year, then certainly in the coming year. >> Awesome. Lena Smart, the chief information security officer. Tara Hernandez, vice president developer of productivity from MongoDB. Thank you so much for sharing here on International Women's Day. We're going to do this quarterly every year. We're going to do it and then we're going to do quarterly updates. Thank you so much for being part of this program. >> Thank you. >> Thanks for having us. >> Okay, this is theCube's coverage of International Women's Day. I'm John Furrier, your host. Thanks for watching. (upbeat music)
SUMMARY :
Thanks for coming in to this program MongoDB is kind of gone the I'm described as the ones throat to choke. Kind of goofing on the you know, and all the challenges that you faced the time if you were, We'll go back to that you know, I want to learn how these work. Tara, when, you know, your career started, you know, to me AI in a lot And so, you know, and the bad stuff's going to come out too. you know, understand you know, money involved and you know, it spits out And so I think, you know, you know, IEEE standards, ITF standards. The developers are the new standard. and you don't want to do and developers are on the And that was, you know, in many ways of the participants I don't even know how to say it properly No, and I think they're of the proven model is If you believe that that you can do on your phone. going to take us backwards Because of we're and half the jobs in cybersecurity And I think also having, you know, I going to be of a group? You know, what does it take you Tons of stuff to taste, you know, my primary There it is. And now it's, you know, containers, Like, you know, some sort you know, absolutely. I (Lena laughs) especially to give, you know, Also that getting access to so I'm the executive sponsor of that. We'll put a plug in for it. and so that we can live to work with mentors You know, one of the things And one of the important and you know, because So we, in addition to people and Tara, you can wrap us up. and always in the lookout for it comes to security. addendum to search and you know, We're going to do it and then we're I'm John Furrier, your host.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Susan Wojcicki | PERSON | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
Jim | PERSON | 0.99+ |
Jason | PERSON | 0.99+ |
Tara Hernandez | PERSON | 0.99+ |
David Floyer | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
Lena Smart | PERSON | 0.99+ |
John Troyer | PERSON | 0.99+ |
Mark Porter | PERSON | 0.99+ |
Mellanox | ORGANIZATION | 0.99+ |
Kevin Deierling | PERSON | 0.99+ |
Marty Lans | PERSON | 0.99+ |
Tara | PERSON | 0.99+ |
John | PERSON | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Jim Jackson | PERSON | 0.99+ |
Jason Newton | PERSON | 0.99+ |
IBM | ORGANIZATION | 0.99+ |
Daniel Hernandez | PERSON | 0.99+ |
Dave Winokur | PERSON | 0.99+ |
Daniel | PERSON | 0.99+ |
Lena | PERSON | 0.99+ |
Meg Whitman | PERSON | 0.99+ |
Telco | ORGANIZATION | 0.99+ |
Julie Sweet | PERSON | 0.99+ |
Marty | PERSON | 0.99+ |
Yaron Haviv | PERSON | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Western Digital | ORGANIZATION | 0.99+ |
Kayla Nelson | PERSON | 0.99+ |
Mike Piech | PERSON | 0.99+ |
Jeff | PERSON | 0.99+ |
Dave Volante | PERSON | 0.99+ |
John Walls | PERSON | 0.99+ |
Keith Townsend | PERSON | 0.99+ |
five | QUANTITY | 0.99+ |
Ireland | LOCATION | 0.99+ |
Antonio | PERSON | 0.99+ |
Daniel Laury | PERSON | 0.99+ |
Jeff Frick | PERSON | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
six | QUANTITY | 0.99+ |
Todd Kerry | PERSON | 0.99+ |
John Furrier | PERSON | 0.99+ |
$20 | QUANTITY | 0.99+ |
Mike | PERSON | 0.99+ |
January 30th | DATE | 0.99+ |
Meg | PERSON | 0.99+ |
Mark Little | PERSON | 0.99+ |
Luke Cerney | PERSON | 0.99+ |
Peter | PERSON | 0.99+ |
Jeff Basil | PERSON | 0.99+ |
Stu Miniman | PERSON | 0.99+ |
Dan | PERSON | 0.99+ |
10 | QUANTITY | 0.99+ |
Allan | PERSON | 0.99+ |
40 gig | QUANTITY | 0.99+ |
Wendi Whitmore, Palo Alto Networks | Palo Alto Networks Ignite22
>>The Cube presents Ignite 22, brought to you by Palo Alto Networks. >>Welcome back to Vegas. Guys. We're happy that you're here. Lisa Martin here covering with Dave Valante, Palo Alto Networks Ignite 22. We're at MGM Grand. This is our first day, Dave of two days of cube coverage. We've been having great conversations with the ecosystem with Palo Alto executives, with partners. One of the things that they have is unit 42. We're gonna be talking with them next about cyber intelligence. And the threat data that they get is >>Incredible. Yeah. They have all the data, they know what's going on, and of course things are changing. The state of play changes. Hold on a second. I got a text here. Oh, my Netflix account was frozen. Should I click on this link? Yeah. What do you think? Have you had a, it's, have you had a little bit more of that this holiday season? Yeah, definitely. >>Unbelievable, right? A lot of smishing going on. >>Yeah, they're very clever. >>Yeah, we're very pleased to welcome back one of our alumni to the queue. Wendy Whitmore is here, the SVP of Unit 42. Welcome back, Wendy. Great to have >>You. Thanks Lisa. So >>Unit 42 created back in 2014. One of the things that I saw that you said in your keynote this morning or today was everything old is still around and it's co, it's way more prolific than ever. What are some of the things that Unit 42 is seeing these days with, with respect to cyber threats as the landscape has changed so much the last two years alone? >>You know, it, it has. So it's really interesting. I've been responding to these breaches for over two decades now, and I can tell you that there are a lot of new and novel techniques. I love that you already highlighted Smishing, right? In the opening gate. Right. Because that is something that a year ago, no one knew what that word was. I mean, we, it's probably gonna be invented this year, right? But that said, so many of the tactics that we have previously seen, when it comes to just general espionage techniques, right? Data act filtration, intellectual property theft, those are going on now more than ever. And you're not hearing about them as much in the news because there are so many other things, right? We're under the landscape of a major war going on between Russia and Ukraine of ransomware attacks, you know, occurring on a weekly basis. And so we keep hearing about those, but ultimately these nations aid actors are using that top cover, if you will, as a great distraction. It's almost like a perfect storm for them to continue conducting so much cyber espionage work that like we may not be feeling that today, but years down the road, they're, the work that they're doing today is gonna have really significant impact. >>Ransomware has become a household word in the last couple of years. I think even my mom knows what it is, to some degree. Yeah. But the threat actors are far more sophisticated than they've ever written. They're very motivated. They're very well funded. I think I've read a stat recently in the last year that there's a ransomware attack once every 11 seconds. And of course we only hear about the big ones. But that is a concern that goes all the way up to the board. >>Yeah. You know, we have a stat in our ransomware threat report that talks about how often victims are posted on leak sites. And I think it's once every seven minutes at this point that a new victim is posted. Meaning a victim has had their data, a victim organization had their data stolen and posted on some leak site in the attempt to be extorted. So that has become so common. One of the shifts that we've seen this year in particular and in recent months, you know, a year ago when I was at Ignite, which was virtual, we talked about quadruple extortion, meaning four different ways that these ransomware actors would go out and try to make money from these attacks in what they're doing now is often going to just one, which is, I don't even wanna bother with encrypting your data now, because that means that in order to get paid, I probably have to decrypt it. Right? That's a lot of work. It's time consuming. It's kind of painstaking. And so what they've really looked to do now is do the extortion where they simply steal the data and then threaten to post it on these leak sites, you know, release it other parts of the web and, and go from there. And so that's really a blending of these techniques of traditional cyber espionage with intellectual property theft. Wow. >>How trustworthy are those guys in terms of, I mean, these are hackers, right? In terms of it's really the, the hacker honor system, isn't it? I mean, if you get compromised like that, you really beholden to criminals. And so, you >>Know, so that's one of the key reasons why having the threat intelligence is so important, right? Understanding which group that you're dealing with and what their likelihood of paying is, what's their modus operandi. It's become even more important now because these groups switch teams more frequently than NFL trades, you know, free agents during the regular season, right? Or players become free agents. And that's because their infrastructure. So the, you know, infrastructure, the servers, the systems that they're using to conduct these attacks from is actually largely being disrupted more from law enforcement, international intelligence agencies working together with public private partnerships. So what they're doing is saying, okay, great. All that infrastructure that I just had now is, is burned, right? It's no longer effective. So then they'll disband a team and then they'll recruit a new team and it's constant like mixing and matching in players. >>All that said, even though that's highly dynamic, one of the other areas that they pride themselves on is customer service. So, and I think it's interesting because, you know, when I said they're not wanting to like do all the decryption? Yeah. Cuz that's like painful techni technical slow work. But on the customer service side, they will create these customer service portals immediately stand one up, say, you know, hey it's, it's like an Amazon, you know, if you've ever had to return a package on Amazon for example, and you need to click through and like explain, you know, Hey, I didn't receive this package. A portal window pops up, you start talking to either a bot or a live agent on the backend. In this case they're hu what appeared to be very much humans who are explaining to you exactly what happened, what they're asking for, super pleasant, getting back within minutes of a response. And they know that in order for them to get paid, they need to have good customer service because otherwise they're not going to, you know, have a business. How, >>So what's the state of play look like from between nation states, criminals and how, how difficult or not so difficult is it for you to identify? Do you have clear signatures? My understanding in with Solar Winds it was a little harder, but maybe help us understand and help our audience understand what the state of play is right now. >>One of the interesting things that I think is occurring, and I highlighted this this morning, is this idea of convergence. And so I'll break it down for one example relates to the type of malware or tools that these attackers use. So traditionally, if we looked at a nation state actor like China or Russia, they were very, very specific and very strategic about the types of victims that they were going to go after when they had zero day. So, you know, new, new malware out there, new vulnerabilities that could be exploited only by them because the rest of the world didn't know about it. They might have one organization that they would target that at, at most, a handful and all very strategic for their objective. They wanted to keep that a secret as long as possible. Now what we're seeing actually is those same attackers going towards one, a much larger supply chain. >>So, so lorenzen is a great example of that. The Hafnia attacks towards Microsoft Exchange server last year. All great examples of that. But what they're also doing is instead of using zero days as much, or you know, because those are expensive to build, they take a lot of time, a lot of funding, a lot of patience and research. What they're doing is using commercially available tools. And so there's a tool that our team identified earlier this year called Brute Rael, C4 or BRC four for short. And that's a tool that we now know that nation state actors are using. But just two weeks ago we invested a ransomware attack where the ransomware actor was using that same piece of tooling. So to your point, yak can get difficult for defenders when you're looking through and saying, well wait, they're all using some of the same tools right now and some of the same approaches when it comes to nation states, that's great for them because they can blend into the noise and it makes it harder to identify as >>Quickly. And, and is that an example of living off the land or is that B BRC four sort of a homegrown hacker tool? Is it, is it a, is it a commercial >>Off the shelf? So it's a tool that was actually, so you can purchase it, I believe it's about 2,500 US dollars for a license. It was actually created by a former Red teamer from a couple well-known companies in the industry who then decided, well hey, I built this tool for work, I'm gonna sell this. Well great for Red teamers that are, you know, legitimately doing good work, but not great now because they're, they built a, a strong tool that has the ability to hide amongst a, a lot of protocols. It can actually hide within Slack and teams to where you can't even see the data is being exfiltrated. And so there's a lot of concern. And then now the reality that it gets into the wrong hands of nation state actors in ransomware actors, one of the really interesting things about that piece of malware is it has a setting where you can change wallpaper. And I don't know if you know offhand, you know what that means, but you know, if that comes to mind, what you would do with it. Well certainly a nation state actor is never gonna do something like that, right? But who likes to do that are ransomware actors who can go in and change the background wallpaper on a desktop that says you've been hacked by XYZ organization and let you know what's going on. So pretty interesting, obviously the developer doing some work there for different parts of the, you know, nefarious community. >>Tremendous amount of sophistication that's gone on the last couple of years alone. I was just reading that Unit 42 is now a founding member of the Cyber Threat Alliance includes now more than 35 organizations. So you guys are getting a very broad picture of today's threat landscape. How can customers actually achieve cyber resilience? Is it achievable and how do you help? >>So I, I think it is achievable. So let me kind of parse out the question, right. So the Cyber Threat Alliance, the J C D C, the Cyber Safety Review Board, which I'm a member of, right? I think one of the really cool things about Palo Alto Networks is just our partnerships. So those are just a handful. We've got partnerships with over 200 organizations. We work closely with the Ukrainian cert, for example, sharing information, incredible information about like what's going on in the war, sharing technical details. We do that with Interpol on a daily basis where, you know, we're sharing information. Just last week the Africa cyber surge operation was announced where millions of nodes were taken down that were part of these larger, you know, system of C2 channels that attackers are using to conduct exploits and attacks throughout the world. So super exciting in that regard and it's something that we're really passionate about at Palo Alto Networks in terms of resilience, a few things, you know, one is visibility, so really having a, an understanding of in a real, as much of real time as possible, right? What's happening. And then it goes into how you, how can we decrease operational impact. So that's everything from network segmentation to wanna add the terms and phrases I like to use a lot is the win is really increasing the time it takes for the attackers to get their work done and decreasing the amount of time it takes for the defenders to get their work done, right? >>Yeah. I I call it increasing the denominator, right? And the ROI equation benefit over or value, right? Equals equals or benefit equals value over cost if you can increase the cost to go go elsewhere, right? Absolutely. And that's the, that's the game. Yeah. You mentioned Ukraine before, what have we learned from Ukraine? I, I remember I was talking to Robert Gates years ago, 2016 I think, and I was asking him, yeah, but don't we have the best cyber technology? Can't we attack? He said, we got the most to lose too. Yeah. And so what have we learned from, from Ukraine? >>Well, I, I think that's part of the key point there, right? Is you know, a great offense essentially can also be for us, you know, deterrent. So in that aspect we have as an, as a company and or excuse me, as a country, as a company as well, but then as partners throughout all parts of the world have really focused on increasing the intelligence sharing and specifically, you know, I mentioned Ukrainian cert. There are so many different agencies and other sorts throughout the world that are doing everything they can to share information to help protect human life there. And so what we've really been concerned with, with is, you know, what cyber warfare elements are going to be used there, not only how does that impact Ukraine, but how does it potentially spread out to other parts of the world critical infrastructure. So you've seen that, you know, I mentioned CS rrb, but cisa, right? >>CISA has done a tremendous job of continuously getting out information and doing everything they can to make sure that we are collaborating at a commercial level. You know, we are sharing information and intelligence more than ever before. So partners like Mania and CrowdStrike, our Intel teams are working together on a daily basis to make sure that we're able to protect not only our clients, but certainly if we've got any information relevant that we can share that as well. And I think if there's any silver lining to an otherwise very awful situation, I think the fact that is has accelerated intelligence sharing is really positive. >>I was gonna ask you about this cause I think, you know, 10 or so years ago, there was a lot of talk about that, but the industry, you know, kind of kept things to themselves, you know, a a actually tried to monetize some of that private data. So that's changing is what I'm hearing from you >>More so than ever more, you know, I've, I mentioned I've been in the field for 20 years. You know, it, it's tough when you have a commercial business that relies on, you know, information to, in order to pay people's salaries, right? I think that has changed quite a lot. We see the benefit of just that continuous sharing. There are, you know, so many more walls broken down between these commercial competitors, but also the work on the public private partnership side has really increased some of those relationships. Made it easier. And you know, I have to give a whole lot of credit and mention sisa, like the fact that during log four J, like they had GitHub repositories, they were using Slack, they were using Twitter. So the government has really started pushing forward with a lot of the newer leadership that's in place to say, Hey, we're gonna use tools and technology that works to share and disseminate information as quickly as we can. Right? That's fantastic. That's helping everybody. >>We knew that every industry, no, nobody's spared of this. But did you notice in the last couple of years, any industries in particular that are more vulnerable? Like I think of healthcare with personal health information or financial services, any industries kind of jump out as being more susceptible than others? >>So I think those two are always gonna be at the forefront, right? Financial services and healthcare. But what's been really top of mind is critical infrastructure, just making sure right? That our water, our power, our fuel, so many other parts of right, the ecosystem that go into making sure that, you know, we're keeping, you know, houses heated during the winter, for example, that people have fresh water. Those are extremely critical. And so that is really a massive area of focus for the industry right now. >>Can I come back to public-private partnerships? My question is relates to regulations because the public policy tends to be behind tech, the technology industry as an understatement. So when you take something like GDPR is the obvious example, but there are many, many others, data sovereignty, you can't move the data. Are are, are, is there tension between your desire as our desire as an industry to share data and government's desire to keep data private and restrict that data sharing? How is that playing out? How do you resolve that? >>Well I think there have been great strides right in each of those areas. So in terms of regulation when it comes to breaches there, you know, has been a tendency in the past to do victim shaming, right? And for organizations to not want to come forward because they're concerned about the monetary funds, right? I think there's been tremendous acceleration. You're seeing that everywhere from the fbi, from cisa, to really working very closely with organizations to, to have a true impact. So one example would be a ransomware attack that occurred. This was for a client of ours within the United States and we had a very close relationship with the FBI at that local field office and made a phone call. This was 7:00 AM Eastern time. And this was an organization that had this breach gone public, would've made worldwide news. There would've been a very big impact because it would've taken a lot of their systems offline. >>Within the 30 minutes that local FBI office was on site said, we just saw this piece of malware last week, we have a decryptor for it from another organization who shared it with us. Here you go. And within 60 minutes, every system was back up and running. Our teams were able to respond and get that disseminated quickly. So efforts like that, I think the government has made a tremendous amount of headway into improving relationships. Is there always gonna be some tension between, you know, competing, you know, organizations? Sure. But I think that we're doing a whole lot to progress it, >>But governments will make exceptions in that case. Especially for something as critical as the example that you just gave and be able to, you know, do a reach around, if you will, on, on onerous regulations that, that ne aren't helpful in that situation, but certainly do a lot of good in terms of protecting privacy. >>Well, and I think there used to be exceptions made typically only for national security elements, right? And now you're seeing that expanding much more so, which I think is also positive. Right. >>Last question for you as we are wrapping up time here. What can organizations really do to stay ahead of the curve when it comes to, to threat actors? We've got internal external threats. What can they really do to just be ahead of that curve? Is that possible? >>Well, it is now, it's not an easy task so I'm not gonna, you know, trivialize it. But I think that one, having relationships with right organizations in advance always a good thing. That's a, everything from certainly a commercial relationships, but also your peers, right? There's all kinds of fantastic industry spec specific information sharing organizations. I think the biggest thing that impacts is having education across your executive team and testing regularly, right? Having a plan in place, testing it. And it's not just the security pieces of it, right? As security responders, we live these attacks every day, but it's making sure that your general counsel and your head of operations and your CEO knows what to do. Your board of directors, do they know what to do when they receive a phone call from Bloomberg, for example? Are they supposed supposed to answer? Do your employees know that those kind of communications in advance and training can be really critical and make or break a difference in an attack. >>That's a great point about the testing but also the communication that it really needs to be company wide. Everyone at every level needs to know how to react. Wendy, it's been so great having, >>Wait one last question. Sure. Do you have a favorite superhero growing up? >>Ooh, it's gotta be Wonder Woman. Yeah, >>Yeah, okay. Yeah, so cuz I'm always curious, there's not a lot of women in, in security in cyber. How'd you get into it? And many cyber pros like wanna save the world? >>Yeah, no, that's a great question. So I joined the Air Force, you know, I, I was a special agent doing computer crime investigations and that was a great job. And I learned about that from, we had an alumni day and all these alumni came in from the university and they were in flight suits and combat gear. And there was one woman who had long blonde flowing hair and a black suit and high heels and she was carrying a gun. What did she do? Because that's what I wanted do. >>Awesome. Love it. We >>Blonde >>Wonder Woman. >>Exactly. Wonder Woman. Wendy, it's been so great having you on the program. We, we will definitely be following unit 42 and all the great stuff that you guys are doing. Keep up the good >>Work. Thanks so much Lisa. Thank >>You. Day our pleasure. For our guest and Dave Valante, I'm Lisa Martin, live in Las Vegas at MGM Grand for Palo Alto Ignite, 22. You're watching the Cube, the leader in live enterprise and emerging tech coverage.
SUMMARY :
The Cube presents Ignite 22, brought to you by Palo Alto One of the things that they have is unit Have you had a, it's, have you had a little bit more of that this holiday season? A lot of smishing going on. Wendy Whitmore is here, the SVP One of the things that I saw that you said in your keynote this morning or I love that you already highlighted Smishing, And of course we only hear about the big ones. the data and then threaten to post it on these leak sites, you know, I mean, if you get compromised like that, you really So the, you know, infrastructure, the servers, the systems that they're using to conduct these attacks from immediately stand one up, say, you know, hey it's, it's like an Amazon, you know, if you've ever had to return a or not so difficult is it for you to identify? One of the interesting things that I think is occurring, and I highlighted this this morning, days as much, or you know, because those are expensive to build, And, and is that an example of living off the land or is that B BRC four sort of a homegrown for Red teamers that are, you know, legitimately doing good work, but not great So you guys are getting a very broad picture of today's threat landscape. at Palo Alto Networks in terms of resilience, a few things, you know, can increase the cost to go go elsewhere, right? And so what we've really been concerned with, with is, you know, And I think if there's any silver lining to an otherwise very awful situation, I was gonna ask you about this cause I think, you know, 10 or so years ago, there was a lot of talk about that, but the industry, And you know, I have to give a whole lot of credit and mention sisa, like the fact that during log four But did you notice in the last couple of years, making sure that, you know, we're keeping, you know, houses heated during the winter, is the obvious example, but there are many, many others, data sovereignty, you can't move the data. of regulation when it comes to breaches there, you know, has been a tendency in the past to Is there always gonna be some tension between, you know, competing, you know, Especially for something as critical as the example that you just And now you're seeing that expanding much more so, which I think is also positive. Last question for you as we are wrapping up time here. Well, it is now, it's not an easy task so I'm not gonna, you know, That's a great point about the testing but also the communication that it really needs to be company wide. Wait one last question. Yeah, How'd you get into it? So I joined the Air Force, you know, I, I was a special agent doing computer We Wendy, it's been so great having you on the program. For our guest and Dave Valante, I'm Lisa Martin, live in Las Vegas at MGM
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Dave Valante | PERSON | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
Wendy | PERSON | 0.99+ |
2014 | DATE | 0.99+ |
FBI | ORGANIZATION | 0.99+ |
Lisa | PERSON | 0.99+ |
Interpol | ORGANIZATION | 0.99+ |
Palo Alto Networks | ORGANIZATION | 0.99+ |
Dave | PERSON | 0.99+ |
Cyber Threat Alliance | ORGANIZATION | 0.99+ |
Bloomberg | ORGANIZATION | 0.99+ |
two days | QUANTITY | 0.99+ |
Cyber Safety Review Board | ORGANIZATION | 0.99+ |
Wendi Whitmore | PERSON | 0.99+ |
Las Vegas | LOCATION | 0.99+ |
last year | DATE | 0.99+ |
Wendy Whitmore | PERSON | 0.99+ |
20 years | QUANTITY | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Palo Alto Networks | ORGANIZATION | 0.99+ |
last week | DATE | 0.99+ |
United States | LOCATION | 0.99+ |
two | QUANTITY | 0.99+ |
J C D C | ORGANIZATION | 0.99+ |
Palo Alto | ORGANIZATION | 0.99+ |
one woman | QUANTITY | 0.99+ |
CISA | ORGANIZATION | 0.99+ |
today | DATE | 0.99+ |
Netflix | ORGANIZATION | 0.99+ |
first day | QUANTITY | 0.99+ |
CrowdStrike | ORGANIZATION | 0.99+ |
Robert Gates | PERSON | 0.99+ |
a year ago | DATE | 0.99+ |
30 minutes | QUANTITY | 0.99+ |
XYZ | ORGANIZATION | 0.99+ |
Vegas | LOCATION | 0.99+ |
zero days | QUANTITY | 0.99+ |
over 200 organizations | QUANTITY | 0.99+ |
Unit 42 | ORGANIZATION | 0.99+ |
more than 35 organizations | QUANTITY | 0.99+ |
Mania | ORGANIZATION | 0.99+ |
GitHub | ORGANIZATION | 0.99+ |
Ignite | ORGANIZATION | 0.98+ |
this year | DATE | 0.98+ |
two weeks ago | DATE | 0.98+ |
one | QUANTITY | 0.98+ |
Microsoft | ORGANIZATION | 0.98+ |
one example | QUANTITY | 0.98+ |
each | QUANTITY | 0.98+ |
GDPR | TITLE | 0.98+ |
millions | QUANTITY | 0.98+ |
zero day | QUANTITY | 0.97+ |
2016 | DATE | 0.97+ |
MGM Grand | LOCATION | 0.97+ |
One | QUANTITY | 0.97+ |
Ukraine | LOCATION | 0.96+ |
one last question | QUANTITY | 0.96+ |
earlier this year | DATE | 0.95+ |
60 minutes | QUANTITY | 0.95+ |
Ukrainian | OTHER | 0.95+ |
unit 42 | OTHER | 0.95+ |
one organization | QUANTITY | 0.94+ |
fbi | ORGANIZATION | 0.93+ |
Intel | ORGANIZATION | 0.92+ |
Russia | ORGANIZATION | 0.92+ |
years ago | DATE | 0.92+ |
about 2,500 US dollars | QUANTITY | 0.92+ |
once every 11 seconds | QUANTITY | 0.9+ |
10 or so years ago | DATE | 0.9+ |
this morning | DATE | 0.89+ |
Haiyan Song & Dan Woods, F5 | AWS re:Invent 2022
>> Hello friends and welcome back to Fabulous Las Vegas, Nevada. We are here at AWS re:Invent in the heat of day three. Very exciting time. My name is Savannah Peterson, joined with John Furrier here on theCUBE. John, what's your, what's your big hot take from the day? Just from today. >> So right now the velocity of content is continuing to flow on theCUBE. Thank you, everyone, for watching. The security conversations. Also, the cost tuning of the cloud kind of vibe is going on. You're hearing that with the looming recession, but if you look at the show it's the bulk of the keynote time spent talking is on data and security together. So Security, Security Lake, Amazon, they continue to talk about security. This next segment's going to be awesome. We have a multi-, eight-time CUBE alumni coming back and great conversation about security. I'm looking forward to this. >> Alumni VIP, I know, it's so great. Actually, both of these guests have been on theCUBE before so please welcome Dan and Haiyan. Thank you both for being here from F5. How's the show going? You're both smiling and we're midway through day three. Good? >> It's so exciting to be here with you all and it's a great show. >> Awesome. Dan, you having a good time too? >> It's wearing me out. I'm having a great time. (laughter) >> It's okay to be honest. It's okay to be honest. It's wearing out our vocal cords for sure up here, but it is definitely a great time. Haiyan, can you tell me a little bit about F5 just in case the audience isn't familiar? >> Sure, so F5 we specialize in application delivery and security. So our mission is to deliver secure and optimize any applications, any APIs, anywhere. >> I can imagine you have a few customers in the house. >> Absolutely. >> Yeah, that's awesome. So in terms of a problem that, well an annoyance that we've all had, bots. We all want the anti-bots. You have a unique solution to this. How are you helping AWS customers with bots? Let's send it to you. >> Well we, we collect client side signals from all devices. We might study how it does floating point math or how it renders emojis. We analyze those signals and we can make a real time determination if the traffic is from a bot or not. And if it's from a bot, we could take mitigating action. And if it's not, we just forward it on to origin. So client side signals are really important. And then the second aspect of bot protection I think is understanding that bot's retool. They become more sophisticated. >> Savannah: They learn. >> They learn. >> They unfortunately learn as well. >> Exactly, yeah. So you have to have a second stage what we call retrospective analysis where you're looking over all the historical transactions, looking for anything that may have been missed by a realtime defense and then updating that stage one that real time defense to deal with the newly discovered threat. >> Let's take a step back for a second. I want to just set the table in the context for the bot conversation. Bots, automation, that's, people know like spam bots but Amazon has seen the bot networks develop. Can you scope the magnitude and the size of the problem of bots? What is the problem? And give a size of what this magnitude of this is. >> Sure, one thing that's important to realize is not all bots are bad. Okay? Some bots are good and you want to identify the automation from those bots and allow listed so you don't interfere with what they're doing. >> I can imagine that's actually tricky. >> It is, it is. Absolutely. Yeah. >> Savannah: Nuanced. >> Yeah, but the bad bots, these are the ones that are attempting credential stuffing attacks, right? They're trying username password pairs against login forms. And because of consumer habits to reuse usernames and passwords, they end up taking over a lot of accounts. But those are the bookends. There are all sorts of types of bots in between those two bookends. Some are just nuisance, like limited time offer bots. You saw some of this in the news recently with Ticketmaster. >> That's a spicy story. >> Yeah, it really is. And it's the bots that is causing that problem. They use automation to buy all these concert tickets or sneakers or you know, any limited time offer project. And then they resell those on the secondary market. And we've done analysis on some of these groups and they're making millions of dollars. It isn't something they're making like 1200 bucks on. >> I know Amazon doesn't like to talk about this but the cloud for its double edged sword that it is for all the greatness of the agility spinning up resources bots have been taking advantage of that same capability to hide, change, morph. You've seen the matrix when the bots attacked the ship. They come out of nowhere. But Amazon actually has seen the bot problem for a long time, has been working on it. Talk about that kind of evolution of how this problem's being solved. What's Amazon doing about, how do you guys help out? >> Yeah, well we have this CloudFront connector that allows all Amazon CloudFront customers to be able to leverage this technology very, very quickly. So what historically was available only to like, you know the Fortune 500 at most of the global 2000 is now available to all AWS customers who are using CloudFront just by really you can explain how do they turn it on in CloudFront? >> Yeah. So I mean CloudFront technologies like that is so essential to delivering the digital experience. So what we do is we do a integration natively. And so if your CloudFront customers and you can just use our bot defense solution by turning on, you know, that traffic. So go through our API inspection, go through our bot inspection and you can benefit from all the other efficiencies that we acquired through serving the highest and the top institutions in the world. >> So just to get this clarification, this is a super important point. You said it's native to the service. I don't have to bolt it on? Is it part of the customer experience? >> Yeah, we basically built the integration. So if you're already a CloudFront customer and you have the ability to turn on our bot solutions without having to do the integration yourself. >> Flick a switch and it's on. >> Haiyan: Totally. >> Pretty much. >> Haiyan: Yeah. >> That's how I want to get rid of all the spam in my life. We've talked a lot about the easy button. I would also like the anti-spam button if we're >> Haiyan: 100% >> Well we were talking before you came on camera that there's a potentially a solution you can sit charge. There are techniques. >> Yeah. Yeah. We were talking about the spam emails and I thought they just charge, you know 10th of a penny for every sent email. It wouldn't affect me very much. >> What's the, are people on that? You guys are on this but I mean this is never going to stop. We're going to see the underbelly of the web, the dark web continue to do it. People are harvesting past with the dark web using bots that go in test challenge credentials. I mean, it's just happening. It's never going to stop. What's, is it going to be that cat and mouse game? Are we going to see solutions? What's the, when are we going to get some >> Well it's certainly not a cat and mouse game for F5 customers because we win that battle every time. But for enterprises who are still battling the bots as a DIY project, then yes, it's just going to be a cat and mouse. They're continuing to block by IP, you know, by rate limiting. >> Right, which is so early 2000's. >> Exactly. >> If we're being honest. >> Exactly. And the attackers, by the way, the attackers are now coming from hundreds of thousands or even millions of IP addresses and some IPs are using one time. >> Yeah, I mean it seems like such an easy problem to circumnavigate. And still be able to get in. >> What are I, I, let's stick here for a second. What are some of the other trends that you're seeing in how people are defending if they're not using you or just in general? >> Yeah, maybe I'll add to to that. You know, when we think about the bot problem we also sort of zoom out and say, Hey, bot is only one part of the problem when you think about the entire digital experience the customer experiencing, right? So at F5 we actually took a more holistic sort of way to say, well it's about protecting the apps and applications and the APIs that's powering all of those. And we're thinking not only the applications APIs we're thinking the infrastructure that those API workloads are running. So one of the things we're sharing since we acquired Threat Stack, we have been busy doing integrations with our distributed cloud services and we're excited. In a couple weeks you will hear announcement of the integrated solution for our application infrastructure protection. So that's just another thing. >> On that Threat Stack, does that help with that data story too? Because it's a compliance aspect as well. >> Yeah, it helps with the telemetries, collecting more telemetries, the data story but is also think about applications and APIs. You can only be as secure as the infrastructure you're running on it, right? So the infrastructure protection is a key part of application security. And the other dimension is not only we can help with the credentials, staffing and, and things but it's actually thinking about the customer's top line. Because at the end of the day when all this inventory are being siphoned out the customer won't be happy. So how do we make sure their loyal customers have the right experience so that can improve their top line and not just sort of preventing the bots. So there's a lot of mission that we're on. >> Yeah, that surprise and delight in addition to that protection. >> 100% >> If I could talk about the evolution of an engagement with F5. We first go online, deploy the client side signals I described and take care of all the bad bots. Okay. Mitigate them. Allow list all the good bots, now you're just left with human traffic. We have other client side signals that'll identify the bad humans among the good humans and you could deal with them. And then we have additional client side signals that allow us to do silent continuous authentication of your good customers extending their sessions so they don't have to endure the friction of logging in over and over and over. >> Explain that last one again because I think that was, that's, I didn't catch that. >> Yeah. So right now we require a customer to enter in their username and password before we believe it's them. But we had a customer who a lot of their customers were struggling to log in. So we did analysis and we realized that our client side signals, you know of all those that are struggling to log in, we're confident like 40% of 'em are known good customers based on some of these signals. Like they're doing floating point math the way they always have. They're rendering emojis the way they always have all these clients that signals are the same. So why force that customer to log in again? >> Oh yeah. And that's such a frustrating user experience. >> So true. >> I actually had that thought earlier today. How many time, how much of my life am I going to spend typing my email address? Just that in itself. Then I could crawl back under the covers but >> With the biometric Mac, I forget my passwords. >> Or how about solving CAPTCHA's? How fun is that? >> How many pictures have a bus? >> I got one wrong the other day because I had to pick all the street signs. I got it wrong and I called a Russian human click farm and figured out why was I getting it wrong? And they said >> I love that you went down this rabbit hole deeply. >> You know why that's not a street sign. That's a road sign, they told me. >> That's the secret backdoor. >> Oh well yeah. >> Talk about your background because you have fascinating background coming from law enforcement and you're in this kind of role. >> He could probably tell us about our background. >> They expunge those records. I'm only kidding. >> 25, 30 years in working in local, state and federal law enforcement and intelligence among those an FBI agent and a CIA cyber operations officer. And most people are drawn to that because it's interesting >> Three letter agencies can get an eyebrow raise. >> But I'll be honest, my early, early in my career I was a beat cop and that changed my life. That really did, that taught me the importance of an education, taught me the criminal mindset. So yeah, people are drawn to the FBI and CIA background, but I really value the >> So you had a good observation eye for kind of what, how this all builds out. >> It all kind of adds up, you know, constantly fighting the bad guys, whether they're humans, bots, a security threat from a foreign nation. >> Well learning their mindset and learning what motivates them, what their objectives are. It is really important. >> Reading the signals >> You don't mind slipping into the mind of a criminal. It's a union rule. >> Right? It actually is. >> You got to put your foot and your hands in and walk through their shoes as they say. >> That's right. >> The bot networks though, I want to get into, is not it sounds like it's off the cup but they're highly organized networks. >> Dan: They are. >> Talk about the aspect of the franchises or these bots behind them, how they're financed, how they use the money that they make or ransomware, how they collect, what's the enterprise look like? >> Unfortunately, a lot of the nodes on a botnet are now just innocent victim computers using their home computers. They can subscribe to a service and agree to let their their CPU be used while they're not using it in exchange for a free VPN service, say. So now bad actors not, aren't just coming from you know, you know, rogue cloud providers who accept Bitcoin as payment, they're actually coming from residential IPs, which is making it even more difficult for the security teams to identify. It's one thing when it's coming from- >> It's spooky. I'm just sitting here kind of creeped out too. It's these unknown hosts, right? It's like being a carrier. >> You have good traffic coming from it during the day. >> Right, it appears normal. >> And then malicious traffic coming from it. >> Nefarious. >> My last question is your relationship with Amazon. I'll see security center piece of this re:Invent. It's always been day zero as they say but really it's the security data lake. A lot of gaps are being filled in the products. You kind of see that kind of filling out. Talk about the relationship with F5 and AWS. How you guys are working together, what's the status? >> We've been long-term partners and the latest release the connector for CloudFront is just one of the joint work that we did together and try to, I think, to Dan's point, how do we make those technology that was built for the very sophisticated big institutions to be available for all the CloudFront customers? So that's really what's exciting. And we also leverage a lot of the technology. You talked about the data and our entire solution are very data driven, as you know, is automation. If you don't use data, you don't use analytics, you don't use AI, it's hard to really sort of win that war. So a lot of our stuff, it's very data driven >> And the benefit to customers is what? Access? >> The customer's access, the customer's top line. We talked about, you know, like how we're really bringing better experiences at the end of the day. F5's mission is try to bring a better digital world to life. >> And it's also collaborative. We've had a lot of different stories here on on the set about companies collaborating. You're obviously collaborating and I also love that we're increasing access, not just narrowing this focus for the larger companies at scale already, but making sure that these companies starting out, a lot of the founders probably milling around on the floor right now can prevent this and ensure that user experience for their customers. throughout the course of their product development. I think it's awesome. So we have a new tradition here on theCUBE at re:Invent, and since you're alumni, I feel like you're maybe going to be a little bit better at this than some of the rookies. Not that rookies can't be great, but you're veterans. So I feel strong about this. We are looking for your 30-second Instagram reel hot take. Think of it like your sizzle of thought leadership from the show this year. So eventually eight more visits from now we can compile them into a great little highlight reel of all of your sound bites over the evolution of time. Who wants to give us their hot take first? >> Dan? >> Yeah, sure. >> Savannah: You've been elected, I mean you are an agent. A former special agent >> I guess I want everybody to know the bot problem is much worse than they think it is. We go in line and we see 98, 99% of all login traffic is from malicious bots. And so it is not a DIY project. >> 98 to 99%? That means only 1% of traffic is actually legitimate? >> That's right. >> Holy moly. >> I just want to make sure that everybody heard you say that. >> That's right. And it's very common. Didn't happen once or twice. It's happened a lot of times. And when it's not 99 it's 60 or it's 58, it's high. >> And that's costing a lot too. >> Yes, it is. And it's not just in fraud, but think about charges that >> Savannah: I think of cloud service providers >> Cost associated with transactions, you know, fraud tools >> Savannah: All of it. >> Yes. Sims, all those things. There's a lot of costs associated with that much automation. So the client side signals and multi-stage defense is what you need to deal with it. It's not a DIY project. >> Bots are not DIY. How would you like to add to that? >> It's so hard to add to that but I would say cybersecurity is a team sport and is a very data driven solution and we really need to sort of team up together and share intelligence, share, you know, all the things we know so we can be better at this. It's not a DIY project. We need to work together. >> Fantastic, Dan, Haiyan, so great to have you both back on theCUBE. We look forward to seeing you again for our next segment and I hope that the two of you have really beautiful rest of your show. Thank you all for tuning into a fantastic afternoon of coverage here from AWS re:Invent. We are live from Las Vegas, Nevada and don't worry we have more programming coming up for you later today with John Furrier. I'm Savannah Peterson. This is theCUBE, the leader in high tech coverage.
SUMMARY :
in the heat of day three. So right now the velocity of content How's the show going? It's so exciting to Dan, you It's wearing me out. just in case the audience isn't familiar? So our mission is to deliver secure few customers in the house. How are you helping AWS determination if the traffic that real time defense to deal with in the context for the bot conversation. and you want to identify the automation It is, it is. Yeah, but the bad bots, And it's the bots that for all the greatness of the the Fortune 500 at most of the and the top institutions in the world. Is it part of the customer experience? built the integration. We've talked a lot about the easy button. solution you can sit charge. and I thought they just charge, you know the dark web continue to do it. are still battling the bots And the attackers, by the way, And still be able to get in. What are some of the other So one of the things we're sharing does that help with that data story too? and not just sort of preventing the bots. to that protection. care of all the bad bots. Explain that last one again the way they always have. And that's such a my life am I going to spend With the biometric Mac, all the street signs. I love that you went down That's a road sign, they told me. because you have fascinating He could probably tell They expunge those records. And most people are drawn to can get an eyebrow raise. taught me the importance So you had a good observation eye fighting the bad guys, and learning what motivates into the mind of a criminal. It actually is. You got to put your is not it sounds like it's off the cup for the security teams to identify. kind of creeped out too. coming from it during the day. And then malicious but really it's the security data lake. lot of the technology. at the end of the day. a lot of the founders elected, I mean you are an agent. to know the bot problem everybody heard you say that. It's happened a lot of times. And it's not just in fraud, So the client side signals How would you like to add to that? all the things we know so I hope that the two of you have
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Dan | PERSON | 0.99+ |
Savannah | PERSON | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Savannah Peterson | PERSON | 0.99+ |
Haiyan | PERSON | 0.99+ |
CIA | ORGANIZATION | 0.99+ |
John | PERSON | 0.99+ |
John Furrier | PERSON | 0.99+ |
1200 bucks | QUANTITY | 0.99+ |
FBI | ORGANIZATION | 0.99+ |
40% | QUANTITY | 0.99+ |
Dan Woods | PERSON | 0.99+ |
both | QUANTITY | 0.99+ |
two | QUANTITY | 0.99+ |
hundreds of thousands | QUANTITY | 0.99+ |
60 | QUANTITY | 0.99+ |
100% | QUANTITY | 0.99+ |
CloudFront | TITLE | 0.99+ |
one time | QUANTITY | 0.99+ |
Ticketmaster | ORGANIZATION | 0.99+ |
today | DATE | 0.99+ |
98, 99% | QUANTITY | 0.99+ |
millions of dollars | QUANTITY | 0.99+ |
30-second | QUANTITY | 0.99+ |
second aspect | QUANTITY | 0.99+ |
58 | QUANTITY | 0.99+ |
twice | QUANTITY | 0.98+ |
once | QUANTITY | 0.98+ |
99% | QUANTITY | 0.98+ |
Haiyan Song | PERSON | 0.98+ |
one | QUANTITY | 0.97+ |
second stage | QUANTITY | 0.97+ |
Three letter agencies | QUANTITY | 0.97+ |
one part | QUANTITY | 0.97+ |
1% | QUANTITY | 0.97+ |
two bookends | QUANTITY | 0.97+ |
Security Lake | ORGANIZATION | 0.97+ |
F5 | ORGANIZATION | 0.97+ |
one thing | QUANTITY | 0.97+ |
Threat Stack | TITLE | 0.97+ |
day three | QUANTITY | 0.97+ |
98 | QUANTITY | 0.96+ |
99 | QUANTITY | 0.96+ |
Las Vegas, Nevada | LOCATION | 0.96+ |
early 2000's | DATE | 0.96+ |
this year | DATE | 0.96+ |
Russian | OTHER | 0.95+ |
eight-time | QUANTITY | 0.95+ |
every sent email | QUANTITY | 0.93+ |
millions of IP addresses | QUANTITY | 0.92+ |
eight more visits | QUANTITY | 0.92+ |
10th of a penny | QUANTITY | 0.91+ |
first | QUANTITY | 0.91+ |
earlier today | DATE | 0.87+ |
Ayal Yogev, Anjuna Security | AWS Summit SF 2022
>>Okay, welcome back everyone to the cubes coverage here in San Francisco, California of AWS summit, 2022. I'm John Farry host of the cube AWS summit in New York city. Coming up in the summer. We'll be there as well for live interviews there. Events are back and we're excited. I have a great guest here y'all you of CEO and co-founder and Juna security based outta Palo Alto. Great to have you coming on the queue. Appreciate it. Yeah. >>Thanks. >>Thanks for having, so tell us about what you guys are doing. You guys have a really cool cost of confidential computing. Take a minute to explain what the company does. >>Sure. So, uh, at high level confidential computing is the ability to take any workload, any piece of data, regardless of sensitive, it is and run it completely isolated, completely private, completely protected, essentially on any infrastructure, uh, and that enables organizations to take any, any workload and move it to UN you know, um, sensitive, potential sensitive locations, like the public cloud, where somebody else is managing your infrastructure. >>So basically the problem you solve is you provide security layer for workloads. >>Exactly. >>Exactly's also govern in security issues, but also just general hacking, >>Right? Oh, ex exactly. Essentially any, any organization having any type of sensitive information, think about, you know, financial services, think about healthcare, think about, you know, oil and gas that need to protect the data where they're gonna drill next. Any, any kind of organization that has sensitive information has that issue and needs to protect data in any environment they run in. >>So Amazon would be like, wait a minute. We're secure. What come on. >>Uh, actually AWS is, uh, is one of our partners and we we're actually building on top of, uh, a new technology that AWS, uh, built called, uh, nitro enclaves. And actually all the public clouds have built a technology like this. Uh, the reason why they've done this is to security and privacy are the number one. And number two reasons why people don't move more workloads to the public cloud. Mm-hmm <affirmative>. So what the public clouds have done is added this technology to be able to tell their customers one is we don't have any access to your data running on top of our infrastructure. And number two, be able to turn to the government and tell them, uh, during the case with the iPhone and, uh, the FBI or the FBI to apple asked him for data on the iPhone. Yeah. And apple said, we just can't, we don't have access to that data. This is exactly what the public clouds want to be able to do, turn to the government and tell them we just don't have access to our customer's data. >>Wow. That's gonna put a lot of pressure. So talk about the surface area of attacks. How has that changed? What do you guys, what's your role in that obviously this no perimeter anymore in the cloud, the security is dead. That's a huge issue. >>Yeah, of course. So, so I guess what we fit into this, as I mentioned, all the clouds added, uh, this technology, uh, what we fit in is very similar to what VMware did for virtualization, right? Virtualization was this extremely powerful technology that everybody knew was going to change the world. You wouldn't have the public cloud without virtualization. Uh, the problem was, it was very difficult to use very, very low level because it was a hardware technology. And then every, uh, vendor built a different technology. This is exactly the case now with confidential computing, every cloud added, uh, uh, a hardware level technology to go support this. But one it's very low level. It's very, very difficult to use. And every cloud added the different technology, which makes it even harder for organizations to go use. We added a softer stack exactly like VE VMware did for virtualization to make it super simple, to use and ubiquitous across the different clouds. >>How did you come up with the idea? What did this all come from? Were you scratching and inch and security? Did you have one of those things like, Hey, I can solve this problem. What's the origination story? Where did this all start? >>Yeah, it's actually, so I I've been in security for, you know, over 20 years now. Um, and I kept running into that same problem. Right. I, I was in the, I was actually in, um, unit 8,200, which is the really equivalent of the NSA. Uh, I was then, uh, in the private sector and I was, uh, a bunch of companies open DNS, Cisco, and, and I kept running into that same issue. And when you kind of peeled the layers of the onion of what the core security problem was, it always came back to how do you protect data while it's being used, which is essentially the core, the same sort of core problem, the confidential computing solves. Um, but there was never a solution. There was never a way to solve this. Uh, and, uh, above four years ago, my co-founder, uh, just finished his PhD at Stanford and he ran into, there's finally a way to do this. Finally, the CPU vendors have built something in, uh, the clouds are going to adopt this. This is going to allow you to one finally solve that huge problem that always existed. And, and number two, this allows you to kind of rearchitect security the right way, uh, because this has always been the core problem that people try to somehow mitigate never having a good solution. >>It's like putting a rapper around it, an envelope and saying secure. >>Exactly. So was this >>PhD working at Stanford in parallel to industry momentum at the same time Sarah Diply? Or was it kind of like, was he working with partners already in his program? >>Yeah, so he just, uh, this was something was happening and this is, uh, this has been going on for, well over a decade. It, it actually funny enough, it started with the, uh, with cell phones. I dunno if you ever thought, you know, what happens if you lose your phone, you have the biometric data, right? Your fingerprint or your face ID. Can somebody get that information out the phone if you lose it? And what the, the phone vendors have done is basically put techn, confidential computing technology to make sure that even if somebody gets physical access to your device, they're not going to be able to get access to that data. And what the, the evolution was is that the Intel AMD, the CPU vendors have realized, wait, this is a really, really great idea. Yeah, you should put it on the server side as well. >>And that started with Intel in 2015. So this has been an evolution, uh, and now essentially every, every one of the CPU vendors is now supporting this. You have Intel and R and AMD and video just announced, uh, their confidential, uh, uh, GPU solution, uh, all the clouds and I've adopted this. Uh, so my, my co-founder when he ran into this, this was as this was, uh, starting to, to happen. He got extremely excited, but he has noticed a big problem of everyone is coming up with different solutions. We're gonna need to build a layer, a software layer on top of this, uh, to, so >>You have, you have to get this to be de facto >>Exactly standard. >>Oh, how's that going? So Amazon's a partner, >>Amazon's a partner. Aw. Uh, Azure is a partner. Uh, we can run on top of essentially any, any one of the clouds out there >>They're enabling you to do that. Cuz they're they want to buy into security. >>Exactly. They want the benefit. Exactly. They want tell their customers, you can move anything to the cloud because we don't have any access to your data. This helps us, them essentially sell cloud >>A couple things around. Um, I want to ask about performance, but before I get to that, yep. It seems like this whole protective data thing has always been like a database thing. Not so much low level re resetting, if you will, it's almost a reset. It's not like just protect your data in the database. >>Oh yeah. Yes. It's different. Yes, exactly. It's funny because uh, you bring sort of the right exact right point. Really. You kind of think about where data can reside. There're essentially three locations. There's data at rest, which is essentially data in a database or file system. There's data in transit, which is data on the, you know, in the network. Yep. Uh, and then there's data use and the data and use piece is essentially when an application needs to process data, it has to decry it and load it completely in the clear, in memory in order to process it. Got it. And at that point, the data is not decade. This is why it's so hard for organizations to move data to the cloud or to run data and geographies where they're not, you know, they don't trust the government or don't trust the, the admins. >>So injecting some malware or vulnerability or attack in the workload while it's running is just another attack, vector. >>Exactly. Or just, or just stealing the data. If you, if you have access to the infrastructure, if you can run code, you can then just basically look in the memory and get all the data out of it. And, and to some extent, even the, the, the encryption keys you use for data, rest those keys, leaving the clear in memory. So even that hasn't been completely solved. Got it. Now that you have this component, you can finally solve, you know, solved our problem and protect the data regardless of where it resides. >>All right. So I gotta a performance question cause remember going, even back to the earlier encryption. Yeah. There's always overhead penalty. Yes. But cloud's a beautiful thing you can spend compute up and you're talking about now, the, the CPU vendors are kind of getting involved. >>Yes. Talk >>About the security, uh, how you mitigate that. Is it an issue? No issue. Why? Yeah, >>Actually, actually, uh, you talk about performance because I think this is a really, really great point. What's nice about this. Uh, and uh, this is why the, the, the, the sort of the benefit of the CPU vendors doing this performance has always essentially had two underlying issues. One is performance, as you mentioned. And the other one is ease of use. This is, this is sort of the, the piece we add to that. We make it super simple to use when you can take essentially any workload and run it securely on top of any, any one of these solutions and the performing thing, the, the heavy lifting is done by the hardware vendors themselves, which means there's a another, uh, chip next to the CPU that does all the heavy lifting encryption, which is very similar. I don't know if you remember the, uh, um, uh, the TLS, you know, the SL acceleration cards. Yeah. This was exactly the same thing. It was this, you know, chip outside the CPU. So it's not, uh, in the sort of the critical path that does all the heavy lifting. And this is what allowed, uh, TLS or HTB TTP HTTPS to become the default where you now protect every website. And this is sort of when security becomes transparent and there's no performance impact, like why, why would you use it for everything? >>It becomes a no brainer unless there's legacy baggage, right. >>In >>Dogma around use this approach, culture issue, or technical, right. Unwind those two, two things. So what's your a take on that? What's your react. Culture's easy. Just like, I think that's easy to fix. We want better security get on board or see you later. Exactly. Technical architecture could be an inhibitor. How do you see that is the blocker? How do you unwind that? How do you get that to >>Reset? So it's exactly the value that we bring to the table. We build a software stack to make it super simple. You don't need to, you know, you don't need to rewrite the application. You don't need to recompile, it's essentially security becoming a part of the infrastructure. You essentially have security as just a piece of the infrastructure that makes it super simple to get a no brainer. Yeah, exactly. The way, you know, TLS was it's. Yeah. We're a software vendor. >>All right. So how do I see it integrating with Amazon? It's gonna get into the chip level. They're enabling hooks for you. Exactly. That's how it works. >>So there's essentially the, uh, all the cloud vendors have enabled these technologies for Amazon it's yeah. It's essentially this hardware capability. We, we have access to it and we're a software layer on top of it to make it simple, similar to, again, what M VMware did for virtualization and what, um, some extent, this is what, uh, Microsoft has done for the CPU, what windows is right. Every time there's a new, really amazing hardware, hardware, uh, feature. You need a software sec on top of it to make it simple use. >>What's great about the cloud is, is that you kind of have that whole operating system mindset now being democratized across everything. Right. I mean, it's a systems thinking in software, right. With all the cap X of the cloud. Yes. And you're decoupled from it and you're riding on top of >>It. Exactly. >>It's an amazing opportunity as a co-founder or just if, if there was no cloud, how hard were this to be the two <laugh>, I mean, like almost impossible. Yep. So very cool. All right. Take a minute to explain what you guys are working on. How big is the company, what you guys are doing right now, you're hiring, you're looking for people funding, give a, give some, uh, give, give some, give a plug to the company. >>Sure. So, uh, we're, uh, we're a series B company, uh, lost, uh, raised 30 million from insight in the last round. Um, we're, uh, we're about 80 people right now. We're growing extremely aggressively. Um, mostly on the salsa and the cells go to market side just because of the demand that we're seeing in the market, but we're also growing on the engineering side. So again, if, uh, we're always happy to talk to >>Side about Palo Alto probably have remote teams, >>Uh, we're based in Palo Alto. So the, the, the, the sort of headquarters and most of the team is in Palo Alto, but yeah, we're very open to remote. We have now engineers in all across the us, and also outside the us as well, just because COVID made it sort of very easy to, to do >>That. Right. I mean, you got a good product, great idea, and a great opportunity. I mean, this is, you know, Dave LAN and I had at a VM world, I think it was like 2013. Now we're dating ourselves. <laugh> this is when we started covering AWS. Yep. He asked pat Gelsinger, it might have been 2015. Cause the CEO of VMware at the time. Yeah. Is security a Doover. Yep. And he's like, absolutely. And this is now happening. This is a security Mulligan, a redo over, this is what we need. Right. >>Exactly. And this is why, so, uh, we're part of a, uh, something called the confidential computing consortium, which essentially has all the large, all the, you know, the cloud vendors, the CPU vendors, VMware is a part of this as well. Basically the, this is sort of too big of a shift for these large organizations to ignore the, and uh, yeah. VMware is definitely going to have a, a part of >>This. Awesome. Well, congratulations. You guys are gonna probably be really huge or get bought out pretty quickly. <laugh> we're I think >>This, this is a huge, this is just a huge opportunity. We can become the VMware of security. So I think this is, you know, I'm hoping to stay independent. >>Yeah. Congratulations on a great venture. Love the idea. And again, every application should run this way. It's no, uh, if you can get that security built in yep. You gotta shield. Right. You wrap it up, probe it anywhere exactly made the best cloud >>Win. Exactly. Right. Exactly. >>And that's, what's gonna happen. That's >>That's >>Why I love the Silicon angle of Amazon Silicon play. Yes. As that Silicon gets better. >>Yes. >>It only helps this, these kinds of use cases. Right? >>Exactly. We, we, again, we, we leverage, we leverage these technologies and to some extent, this is, this is actually part of the, the value we talk to customers about, because this is sort of the cutting edge of technology and security. And this keeps evolving. As, as I mentioned in video, just announced their confidential GPS. We provide this layer on top of it where organizations don't have to go and kind of rebuild every application as this evolves and just use our people >>Who know me in the cube know I'm a Hawk when it comes to cybersecurity. I think the red line is people operating below the red line. And, and why should companies have to provision their own militia? Exactly. This is essentially the shield they can put up. Exactly. And not rely on the government who just know what they're doing. Exactly. >>So get exactly security should be easy. Should be, should be us everywhere. I >>Should you get a lot of banking customers, FinTech customers coming on board. Exactly. Right. Outta the gate. Yeah. Thanks for coming on the queue. Yeah. Appreciate. Thank you. Live coverage here. San Francisco, California. I'm John farrier with the cube. We'll be right back with more after this short break.
SUMMARY :
Great to have you Thanks for having, so tell us about what you guys are doing. and that enables organizations to take any, any workload and move it to UN you know, um, think about, you know, financial services, think about healthcare, think about, you know, So Amazon would be like, wait a minute. be able to turn to the government and tell them, uh, during the case with the iPhone and, What do you guys, what's your role in that obviously this no perimeter anymore in the cloud, And every cloud added the different technology, which makes it even harder for organizations How did you come up with the idea? This is going to allow you to one finally solve that huge problem that So was this Can somebody get that information out the phone if you lose it? and now essentially every, every one of the CPU vendors is now supporting this. any one of the clouds out there They're enabling you to do that. They want tell their customers, you can move anything to the cloud resetting, if you will, it's almost a reset. It's funny because uh, you bring sort of the right exact right So injecting some malware or vulnerability or attack in the workload and to some extent, even the, the, the encryption keys you use for data, rest those keys, leaving the clear in memory. But cloud's a beautiful thing you can spend compute up and you're About the security, uh, how you mitigate that. the default where you now protect every website. How do you get that to You don't need to, you know, you don't need to rewrite the application. It's gonna get into the chip level. So there's essentially the, uh, all the cloud vendors have enabled these technologies for Amazon it's yeah. What's great about the cloud is, is that you kind of have that whole operating system mindset now being democratized across How big is the company, what you guys are doing right now, Um, mostly on the salsa and the cells go to market and also outside the us as well, just because COVID made it sort of very easy to, to do I mean, this is, you know, which essentially has all the large, all the, you know, the cloud vendors, the CPU vendors, You guys are gonna probably be really huge or get bought out pretty quickly. you know, I'm hoping to stay independent. It's no, uh, if you can get that security built in yep. Exactly. And that's, what's gonna happen. Why I love the Silicon angle of Amazon Silicon play. It only helps this, these kinds of use cases. And this keeps evolving. And not rely on the government who So get exactly security should be easy. Should you get a lot of banking customers, FinTech customers coming on board.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Amazon | ORGANIZATION | 0.99+ |
John Farry | PERSON | 0.99+ |
Cisco | ORGANIZATION | 0.99+ |
2015 | DATE | 0.99+ |
FBI | ORGANIZATION | 0.99+ |
Sarah Diply | PERSON | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Palo Alto | LOCATION | 0.99+ |
2013 | DATE | 0.99+ |
AMD | ORGANIZATION | 0.99+ |
30 million | QUANTITY | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
Dave LAN | PERSON | 0.99+ |
VMware | ORGANIZATION | 0.99+ |
Ayal Yogev | PERSON | 0.99+ |
San Francisco, California | LOCATION | 0.99+ |
two | QUANTITY | 0.99+ |
iPhone | COMMERCIAL_ITEM | 0.99+ |
One | QUANTITY | 0.99+ |
John farrier | PERSON | 0.99+ |
apple | ORGANIZATION | 0.99+ |
one | QUANTITY | 0.99+ |
over 20 years | QUANTITY | 0.98+ |
two underlying issues | QUANTITY | 0.98+ |
Intel | ORGANIZATION | 0.98+ |
COVID | ORGANIZATION | 0.98+ |
Stanford | ORGANIZATION | 0.97+ |
three locations | QUANTITY | 0.96+ |
two things | QUANTITY | 0.94+ |
Azure | ORGANIZATION | 0.92+ |
about 80 people | QUANTITY | 0.88+ |
AWS Summit | EVENT | 0.88+ |
New York city | LOCATION | 0.86+ |
cube AWS | EVENT | 0.84+ |
2022 | DATE | 0.83+ |
SF 2022 | LOCATION | 0.83+ |
VE VMware | ORGANIZATION | 0.81+ |
above four years ago | DATE | 0.79+ |
decade | QUANTITY | 0.79+ |
Anjuna | PERSON | 0.75+ |
Amazon Silicon | ORGANIZATION | 0.75+ |
AWS summit | EVENT | 0.74+ |
two reasons | QUANTITY | 0.74+ |
minute | QUANTITY | 0.74+ |
well over a decade | QUANTITY | 0.73+ |
windows | TITLE | 0.71+ |
pat Gelsinger | PERSON | 0.7+ |
every cloud | QUANTITY | 0.7+ |
Juna | ORGANIZATION | 0.68+ |
Security | ORGANIZATION | 0.66+ |
M VMware | ORGANIZATION | 0.66+ |
cloud | QUANTITY | 0.51+ |
8,200 | OTHER | 0.46+ |
Dave Trader, Presidio | AWS re:Invent 2021
>>Good morning live from Las Vegas. It's the Q with AWS reinvent 2021. This is our fourth day of coverage. The third full day of the conference. Lisa Martin here with Dave Nicholson. Dave, we had had a tremendous number of conversations. In fact, we've two live sets over a hundred guests on the program, and I have another web. I've got two Dave's for you for the price of one. Dave trader joins us the field CSO client advisor at Presidio. We're going to be talking about ransomware and security, Dave, welcome to the program. Thank you for having me. So it's looking at your background. You've got a very cool background. You hold numerous cybersecurity certifications, including CIS SP you've received numerous endorsements from the department of Homeland security, the FBI and NSA. And in 2018, you graduated from the FBI's CSO academy in Quantico. Wow. Yeah, it sounds like he's a man with a very special set of skills. I think you're right. I think you're right. One of the things that we have seen the cybersecurity landscape has changed dramatically in the last year and a half 22 months or so. I was reading some stats ransomware and the check happens delivery once every 11 seconds. It's now a matter of when not, if talk to us about some of the things that you're seeing, the threat landscape, changing ransomware as a service what's going on. >>The last part that you mentioned was ransomware as a service is key. The access to be able to launch a tax has become so simplified that the, the, the, uh, the attacker level doesn't have to be sophisticated. Really. You can get down to the 100 level brand new hackers that are just getting into the space. They can go to a help desk and they can purchase ransomware, and they can run this ransomware that has the comes with quality assurance, by the way. And if they didn't run correctly, they've got a help desk support system. That'll help them run this in a, you know, as a criminal enterprise. Um, the access is really what is, what has made this so prevalent, and it really exacerbated the problem to the massive scale that we're seeing today. Yeah. >>And of course, we're only hearing about the big ones, you know, re you know, Conti colonial pipeline. But as I mentioned, an attack occurring every 11 seconds, I also was reading the first half of calendar, 21, that ransomware was up nearly 11 X. So the trajectory it's going the wrong way, it's going up into the right and the way that we don't want it to go, are they becoming more brazen? Is it easier? Ransomware is the surface, but also they're able to be paid in Bitcoin and that's less traceable. >>Yeah. So, um, exponential is not even fair, right? Cause it, that's not even a fair assessment because that up and right, it's just, it's been so pervasive that we just see that continued growth. Uh, you know, there's how, you know, different ways and how we're going to stop that. And what we're, what we're doing from a national perspective is all coming into play and what we're going to do about it. You know? So the, one of the things that I'm seeing, that's kind of new is the taunting aspect. So the taunting aspect is, uh, you know, they've been in your network for a little while, the dwell times extended and they're collecting intelligence, but what they're doing is, you know, they used to let you, after they would present you with the ransomware note, they would let you kind of circle the wagons. And then you would come to a decision point as an organization. >>Is, am I going to pay or am I not well? And they would give you a little bit of time to deliberate. Well, now during your deliberation time, they're actually sending texts to the CEO and the CFO and there's, and they're, they're, they're showcasing their, their, uh, technical prowess and that they've got you, they own you at that point. And they're, they're texting on your personal device. And they're saying, you should go ahead and pay us, or we're going to make this worse. The taunting aspect is even twisting the knife and it's, uh, you know, out of box isn't even from a criminal aspect, I expect that to be out of bounds, no >>Crazy. And of course, you know, some of the things that we've seen, um, uh, the, the white houses, counter ransomware initiative, a coalition of 30 countries aimed to ramp up global efforts to attack that it's like, are you seeing cyber crime with the rise and the proliferation, you think there's gonna be more regulations and organizations that are going to be having to deal with? What do you think? Some of the things that we're going to see on that legal? >>Yeah. So we have to, we have to leverage compliance, and there's a lot of really great frameworks out there today that we are leveraging. And there's, there's good methodology on how to stop this. The issue is it's the adoption and really the, the, the knowledge, the subject matter expertise, and really that consultant side, that's the message that I try and get out to, to, to our customers and our clients. And I'm trying to really get them to understand what that evolution looks like and what, what is needed in each discipline, because there's various disciplines across the board and you almost have to have them all, um, you know, in order to be able to stop ransomware and solve for that ransomware problem. And I do think the regulation is going to be key. I also think that I need some air support from not only the federal government, but our internet service providers and, and we as a free country, we need to be careful of, you know, on, on some of that, some of those fronts. But I, I, I still think that I would appreciate, you know, my ISP doing a little bit of block and tackle for me, you know, and helping me out, even though I want the freedom to do and be able to do whatever I want. I still like them to say, you know, we're gonna block known that because, you know, it would just be nice to have a little bit of support even on that side. So how does >>An ISP prevent me from panning out my password and being fooled in a, in a, in a phishing attack is the, is the question that, is, that, is that still a real issue? >>So I wouldn't put that. I wouldn't put that on the ISP. I would put that more on the end point and some personal responsibility, right. Knowing, and I do, I do stress that a little bit, but relatively early >>Morning sarcasm in my bag. >>Yeah. So I do put that on, but there, but there are tremendous partners that I work with that are able to do that and automate a lot of that for you. And I need to make it simple, but simple as hard. And that's what you know is, especially in cybersecurity, we want to make it simple for it and really be able to remove the threat to the end user and protect the user. But in order to do that, there's a ton of things on a ton of sophistication and innovation that happens in the background. And we really need to be able to showcase how that's done. And, um, I, it's, obviously I'm excited about it, but we need more people that are able to just specialize in this. We need more good guys that are able to come in and help us on this front. >>I also think we need to break down some barriers for on the competition with, you know, market share and the partners we need to, we need to kind of elevate the conversation a little bit and we all need to work together because we're all in the same boat when it comes to how we're being attacked. Um, you know, from a national perspective on a global scale. And I think that if we elevate the conversation, our collective, uh, mindset in that, that, that, that, uh, that, that mind share is going to be able to really help us innovate and, and put a stop to this. >>So then how is Presidio and AWS, how are you helping them until you get to it? Ransomware and mitigation can talk to us about that. How are you going to be helping, especially there's cyber security skills gap that's gone on like five years. >>Sure. Yeah. That skills gap is going to continue to, we're going to continue to see that grow as well. And we're efforting that on many fronts, but I'm really excited about the ransomware mitigation kit that got, uh, unveiled yesterday. Um, I got a call earlier this year from, uh, AWS and, and, uh, we basically, the question was posed to me, you know, what are we going to do about this is from an AWS perspective, what can we do? Um, you know, cause th the cyber adversaries are, uh, are, are relatively unchecked and, and, and their attitude is what are you going to do about it? So AWS posed the question, what are we going to do about it? And what we came up with was, you know, as, as an isolated organization, or as an isolated discipline as with like a managed detection and response or endpoint protection, um, that silo could not by itself accomplish and the solve to eliminate ransomware or to make a dent in eliminate ransomware. >>So what we had to do was combine disciplines, and we reached over to BCDR disaster recovery and, and, and, and our backup teams. And we said, let's put together endpoint protection, MDR, and let's, let's merge the two of these. And let's automate that. So that what happens is, is when we detect the ransomware attack, there's, there's a specific indicators of compromise that happened in the attack, the end point protection, which is CrowdStrike in our case can see that and can notify that, and then can tell the backup and recovery team, Hey, we know that this is a, this is an indicator of compromise. We know that this system is, has been owned. And then there's an inflection point where we can ask the user if they want to manually intervene, or if they want us to automate that and intervene for them. So it really keeps production going full-time and, uh, it doesn't, it takes away the cyber adversaries ability to hold our data hostage. So this is an, it was this one, and I don't use PI verbally, uh, frequently, but this is a monumental, uh, uh, evolution of what, of what we're going to see and how to prevent ransomware. >>Wow. I was reading that, that ransomware is backups, or you talked about backup, the backup backup attacks are on the rise as well. How can organizations, how can they work with Presidio in AWS? You described this as monumental kind of game-changing, how can they work with you guys to, to implement this technology so that we can start dialing down the threats? >>Yeah. So we would love to, we would love to hear from you, right? Give us a, give us a call. Um, but, uh, our teams, you know, with, with CloudEndure and AWS CloudEndure and CrowdStrike and what they've really come up with, and, and you have to have these two things ahead of time. So I sit on our critical incident response team, and, you know, I, I do work with, you know, the, the bureau as often as I can on attribution, but you have to have these ahead of time. So your, your, your, your, uh, critical response plan needs to be in place. And if you have the two things that we, that we've really put a lot of effort into over the last eight months, if you've got CrowdStrike and you've got cloud on, on the backend, we can establish all of those, um, and, and really set this up for you to eliminate that threat. And, and that's what we're excited to showcase this week, and, you know, in the coming months, and we're going to, and we've also got additional things in additional features that we plan to add to that in the, in the coming months, Dave, >>Your thoughts on the partnership between private industry and government entities. Uh, you mentioned that the level of sophistication to engage in this bad behavior doesn't necessarily have to be the, have to rise to the level of state sponsored. Um, but can we do this in the private sector, by ourselves? What are your, what are your sort of philosophical? >>I will give you my, I will give you a statistic on this and it will, it'll be self-explanatory. But, um, 80% of our critical infrastructure in the United States is privately held. So we're unique in that perspective, we aren't like some other countries where they can just mandate the requirement that the government will control critical infrastructure. It's privately held here in the United States. So you almost have to invite the federal government to come in, even though you are a critical infrastructure, they still have to be invited to come help you. And that partnership is key in order to be able to defend yourself, but also to defend the nation. Our power grids are our water sources. I mean, you'll see those are private private companies, but we need that federal help. And I try and evangelize that partnership. I mean, you know, there's always the, um, you know, when you think about working with federal agencies, like the, like the FBI, um, there's a little bit of hesitation and you're not really quite sure. >>I will tell you that those, those men and women are, um, uh, they're amazing. They're amazing to work with they're, they're really good at what they do. And, and you're certainly it's a partnership and they have a whole division set up there's the office of the private sector is designed to have these conversations and help you prepare. And then in the unfortunate instance where you might have an attack there, right. They're trying to figure out who did that to you, you know, and, and you're a victim, you're a victim of a federal crime at that point. And they, they treat you with such care and, you know, they're, uh, they do such a great job. So I think we have to engage them in order to, and we should actually be able to help them with the technology and how, and make it easier for them to do their job, but something I'm also very interested in. >>Talk to me about your interests as the last question, in terms of what's going to go on here, we are wrapping up 2021 entering 2022, which hopefully will be a much better year for on many fronts, including the decrease in ransomware. What are some of the things that you're excited about? There's so much technology, there's so much opportunity and innovation going on with AWS and its partner ecosystem. What excites you, what opportunities do you see as we head into 2020? Yeah. >>So I do see some, I do see some threats that are going to evolve. Um, ransomware is certainly going to be more of the same until we get this out in this new methodology and what we've built until that becomes widely adopted. I think we, you know, we're not going to make a dent in the numbers that we're seeing just yet, but I'm hoping that that will change when, you know, when the industries do start to adopt that. The other thing that I'm seeing is I think operational technology is going to take a hit in 2022 because the bad guys have started to figure out how, um, you know, that, that, that, that operational technology is not as, uh, it's not front and center. And it's not top of mind for a lot of CSOs. So they're, they're targeting that weakness and going after that. So I think we really need to brace for that and, and really, uh, get in front of that. Uh, so that's one of the things that I'm prepping for is really the operational IOT conversation, and then how I can help, uh, organizations and even, even home users, you know, with some of the stuff that you've got, you know, maybe in your own home that could be used again, >>Right? Cause that work from anywhere is going to persist for quite some time. Dave, thank you so much for joining Dave Nicholson and me on the program this morning, talking about what's going on in the threat landscape ransomware, but also this monumental shift and from, from a technology and a partnership perspective that Presidio and AWS are doing to help customers and every industry, private and public sector. We appreciate your insights. Thank you >>For having me. Thanks >>For being here. Very Dave and Dave I'm Lisa you're watching the cube, the global leader in live tech coverage.
SUMMARY :
And in 2018, you graduated from the FBI's CSO academy in Quantico. That'll help them run this in a, you know, as a criminal enterprise. And of course, we're only hearing about the big ones, you know, re you know, Conti colonial So the taunting aspect is, uh, you know, they've been in your network for a little while, And they would give you a little bit of time to deliberate. And of course, you know, some of the things that we've seen, um, uh, I still like them to say, you know, we're gonna block known that because, you know, Knowing, and I do, I do stress that a little bit, but relatively early And that's what you know is, I also think we need to break down some barriers for on the competition with, you know, market share and the partners So then how is Presidio and AWS, how are you helping them until you get to it? and, uh, we basically, the question was posed to me, you know, what are we going to do about this is from an AWS it takes away the cyber adversaries ability to hold our data hostage. how can they work with you guys to, to implement this technology so that we can start dialing down the threats? this week, and, you know, in the coming months, and we're going to, and we've also got additional things in additional features Uh, you mentioned that the level of sophistication to engage in this bad I mean, you know, there's always the, um, you know, when you think about working with federal And they, they treat you with such care and, you know, they're, uh, they do such a great job. What are some of the things that you're excited about? I think we, you know, we're not going to make a dent in the numbers that we're seeing just yet, but I'm hoping that that will change and me on the program this morning, talking about what's going on in the threat landscape ransomware, but also this monumental For having me. Very Dave and Dave I'm Lisa you're watching the cube, the global leader
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Dave Nicholson | PERSON | 0.99+ |
FBI | ORGANIZATION | 0.99+ |
NSA | ORGANIZATION | 0.99+ |
Dave | PERSON | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Dave Trader | PERSON | 0.99+ |
2018 | DATE | 0.99+ |
Las Vegas | LOCATION | 0.99+ |
2020 | DATE | 0.99+ |
fourth day | QUANTITY | 0.99+ |
80% | QUANTITY | 0.99+ |
2022 | DATE | 0.99+ |
2021 | DATE | 0.99+ |
United States | LOCATION | 0.99+ |
two | QUANTITY | 0.99+ |
five years | QUANTITY | 0.99+ |
30 countries | QUANTITY | 0.99+ |
yesterday | DATE | 0.99+ |
first half | QUANTITY | 0.99+ |
Lisa | PERSON | 0.99+ |
100 level | QUANTITY | 0.99+ |
each discipline | QUANTITY | 0.98+ |
two things | QUANTITY | 0.98+ |
today | DATE | 0.98+ |
Presidio | ORGANIZATION | 0.98+ |
One | QUANTITY | 0.98+ |
one | QUANTITY | 0.97+ |
CloudEndure | ORGANIZATION | 0.96+ |
this week | DATE | 0.96+ |
CrowdStrike | ORGANIZATION | 0.95+ |
two live sets | QUANTITY | 0.93+ |
third full day | QUANTITY | 0.92+ |
over a hundred guests | QUANTITY | 0.92+ |
earlier this year | DATE | 0.91+ |
Invent | EVENT | 0.9+ |
last eight months | DATE | 0.85+ |
once every 11 seconds | QUANTITY | 0.8+ |
last year and a half | DATE | 0.77+ |
nearly 11 X. | QUANTITY | 0.76+ |
Quantico | ORGANIZATION | 0.75+ |
this morning | DATE | 0.74+ |
11 seconds | QUANTITY | 0.72+ |
department of Homeland security | ORGANIZATION | 0.71+ |
22 months | QUANTITY | 0.7+ |
21 | OTHER | 0.69+ |
Presidio | PERSON | 0.65+ |
CSO | ORGANIZATION | 0.62+ |
Conti | ORGANIZATION | 0.52+ |
BCDR | TITLE | 0.44+ |
Breaking Analysis: Investors Cash in as Users Fight a Perpetual Cyber War
>> From theCUBE studios in Palo Alto in Boston, bringing you data-driven insights from theCUBE in ETR. This is Breaking Analysis with Dave Vellante. >> Despite the more than $100 billion spent each year fighting Cyber-crime. When we do an end-of-the year look back and ask "How did we do?" The answer is invariably the same, "Worse than last year." Pre pandemic, the picture was disheartening, but since March of 2020 the situation has only worsened as cyber-criminals have become increasingly sophisticated, better funded and more brazen. SecOps pros continue to fight, but unlike conventional wars, this one has no end. Now the flip side of course, is that markets continue to value cybersecurity firms at significant premiums. Because this huge market will continue to grow by double digits for the foreseeable future. Hello and welcome to this week's Wikibon theCUBE Insights powered by ETR. In this Breaking Analysis, we look at the state of cybersecurity in 2021 and beyond. We'll update you with the latest survey data from enterprise technology research and share the fundamentals that have investors piling into the security space like never before. Let's start with the customer view. Cybersecurity remains the number one priority for CIOs and CSOs. This latest ETR survey, once again asked IT buyers to rank their top priorities for the next 12 months. Now the last three polling period dating back to last March. Cybersecurity has outranked every top spending category, including cloud, data analytics, productivity software, networking, AI, and automation or RPA. Now this shouldn't surprise anybody, but it underscores the challenges that organizations face. Not only are they in the midst of a non-optional digital transformation, but they have to also fund a cyber war that has no ceasefires, no truces, and no exit path. Now there's much more going on in cybersecurity than ransomware, but certainly that has the attention of executives. And it's becoming more and more lucrative for attackers. Here's a snapshot of some of the more well-documented attacks this decade many which have occurred in very recent months. CNA Financial, they got hit earlier this year and paid a $40 million ransom. The Ireland Health Service also got hit this year and refused to pay the ransom, but it's estimated that the cost to recover and the damage to the organization exceeded half a billion dollars. The request was for a $20 million ransom. The JBS meat company hack, they paid $11 million. CWT travel paid $5 million. The disruption from the Colonial Pipeline company, was widely reported they paid more than $4 million, as the Brenntag, the chemical company. The NBA got hit. Computer makers, Quanta and Acer also. More than 2,000 random attacks were reported to the FBI in the first seven months of 2021. Up more than 60% from 2020. Now, as I've said many times, you don't have to be a genius to be a ransomware as today. Anyone can go on the dark web, tap into ransomware as a service. Attackers, they have insidious names like darkside, evil, the cobalt, crime gang, wizard spider, the Lazarus gang, and numerous others. Criminals they have negotiation services is most typically the attackers, they'll demand a specific amount of money but they're willing to compromise in an exchange of cryptocurrency for decryption keys. And as mentioned, it's not just ransomware supply chain attacks like the solar winds hack hit organizations within the U.S government and companies like Mimecast this year. Now, while these attacks often do end up in a ransom situation. The attackers sometimes find it more lucrative to live off the land and stealth fashion and ex filtrates sensitive data that can be sold or in the case of many financial institution attacks they'll steal information from say a chief investment officer that signals an upcoming trading strategy and then the attackers will front run that trade in the stock market. Now, of course phishing, remains one of the most prominent threats. Only escalated by the work from home trend as users bring their own devices and of course home networks are less secure. So it's bad, worse than ever before. But you know, if there's a problem, entrepreneurs and investors, they're going to be there to solve it. So here's a LinkedIn post from one of the top investors in the business, Mike Speiser. He was a founding investor in Snowflake. He helped get pure storage to escape velocity and many, many other successes. This hit my LinkedIn feed the other day, his company Sutter Hill Ventures is co-leading a 1.3 Series D on an $8.3 billion valuation. They're putting in over $200 million. Now Lacework is a threat detection software company that looks at security as a data problem and they monitor exposures across clouds. So very timely. So watch that company. They're going to soar. Now the right hand chart shows venture investments in cybersecurity over the past several years. You can see it exploded in 2019 to $7.6 billion. And people thought the market was peaking at that time, if you recall. But then investments rose a little bit to $7.8 billion in 2020 right in the middle of lockdown. And then the hybrid work, the cloud, the new normal thesis kicked in big time. It's in full gear this year. You can see nearly $12 billion invested in cybersecurity in the first half of 2021 alone. So the money keeps coming in as the problem gets worse and the market gets more crowded. Now we'd like to show this slide from Optiv, it's their security taxonomy. It'll make your eyes cross. It's so packed with companies in different sectors. We'll put a link in our posts, so you can stare at this. We've used this truck before. It's pretty good. It's comprehensive and it's worth spending some time to see what that landscape looks like. But now let's reduce this down a bit and bring in some of the ETR data. This is survey data from October that shows net score or spending momentum on the vertical axis and market share or pervasiveness in the dataset on the horizontal axis. That's a measure of mentioned share if you will. Now this is just isolated on the information security sector within the ETR taxonomies. No filters in terms of the number of responses. So it's every company that ETR picks up in cybersecurity from its buyer surveys. Now companies above that red line, we consider them to have a highly elevated spending momentum for their products and services. And you can see, there are a lot of companies that are in this map first of all, and several above that magic mark. So you can see the momentum of Microsoft and Palo Alto. That's most impressive because of their size, their pervasiveness in the study, Cisco and Splunk are also quite prominent. They don't have as much spending momentum, but they're pretty respectable. And you can see the companies that have been real movers in this market that we've been reporting on for a while. Okta, CrowdStrike, Zscaler, CyberArk, SailPoint, Authzero, all companies that we've extensively covered in previous breaking analysis episodes as the up and comers. And isn't it interesting that Datadog is now showing up in the vertical axis. You see that in the left-hand side up high, they're becoming more and more competitive to Splunk in this space as an alternative and lines are blurring between observability, log analytics, security, and as we previously reported even backup and recovery. But now let's simplify this picture a bit more and filter down a little bit further. This chart shows the same X, Y view. Same data construct and framework, but we required more than a hundred responses to hit the chart. So the companies, they have to have a notable market presence in the ETR survey. It's perhaps a bit less crowded, but still very packed. Isn't it? You can see firms that are less prominent in the space like Datadog fell off. The big companies we mentioned, obviously still prominent Microsoft, Palo Alto, Cisco and Splunk and then those with real momentum, they stand out a little bit. There's somewhat smaller, but they're gaining traction in the market. As we felt they would Okta and Auth zero, which Okta acquired as we reported on earlier this year, both showing strength as our CrowdStrike, Zscaler, CyberArk, which does identity and competition with Okta and SentinelOne, which went public mid this year. The company SentinelOne uses AI to do threat detection and has been doing quite well. SalePoint and Proofpoint are right on that red elevated line and then there's a big pack in the middle. Look, this is not an easy market to track. It's virtually every company plays in security. Look, AWS says some of the most advanced security in the business but they're not in the chart specifically, but you see Microsoft is. Because much of AWS security is built into services. Amazon customers heavily rely on the Amazon ecosystem which is in the Amazon marketplace for security products. And often they associate their security spend with those partners and not necessarily Amazon. And you'll see networking companies you see right there, like Juniper and the bottom there and in the ETR data set and the players like VMware in the middle of the pack. They've been really acquisitive for example, with carbon black. And the, of course, you've got a lot of legacy players like McAfee and RSA and IBM. Look, virtually every company has a security story and that will only become more common in the coming years. Now here's another look at the ETR data it's in the raw form, but it'll give you a sense of two things; One is how the data from the previous chart is plotted. And two, it gives you a time series of the data. So the data lists the top companies in the ETR data sets sorted by the October net score in the right most column. Again, that measures spending momentum. So to make the cut here, you had to have more than a hundred mentions which is shown on the left-hand side of the chart that shared N, IE that's shared accounts in the dataset. And you can track the data from last October, July of this year and the most recent October, 2021 survey. So we, drew that red line just about at the 40% net score market coincidentally, there are 10 companies that are over that figure over that bar. We sometimes call out the four star companies. We give four stars to those companies that both are in the top 10 and spending momentum and the top in prominence are shared N in the dataset. So some of these 10 would fit into that profile by that methodology, specifically, Microsoft, Okta, CrowdStrike, and Palo Alto networks. They would be the four star companies. Now a couple of other things to point out here, DDoS attacks, they're still relevant, and they're real threat. So a company like CloudFlare which is just above that red line they play in that space. Now we've also shaded the companies in the fat middle. A lot of these companies like Cisco and Splunk for example, they're major players in the security space with very strong offerings and customer affinity. We sometimes give them two stars. So this is what makes this market so interesting. It's not like the high end discourage market where literally every vendor in the Gartner magic quadrant is up in the right, okay. And there's only five or four or five, six vendors there. This market is diverse with many, many segments and sub segments, and it's such a vital space. And there's so many holes to fill with an ever changing threat landscape as we've seen in the last two years. So this is in part which makes it such a good market for investors. There's a lot of room for growth and not just from stealing market share. That's certainly an opportunity there, but things like cloud, multi-cloud, shifting end points, the edge ,and so forth make this space really ripe for investments. And to underscore this, we put together this little chart of some of the pure play security firms to see how their stock performance has done recently. So you can see that here, you know, it's a little hard to read, but it's not hard to see that Okta, CrowdStrike, Zscaler on the left have been big movers. These charts where possible all show a cross here, starting at the lockdown last year. The only exception is SentinelOne which IPO mid this year. So that's the point March, 2020 when the whole world changed and security priorities really started to shift to accommodate the work from home. But it's quite obvious that since the pandemic, these six companies have been on a tear for the fundamental reason that hybrid work has created a shift in spending priorities for CSOs. No longer are organizations just spending on hardening a perimeter, that perimeter has been blown away. The network is flattening. Work is what you do, it's no longer a place. As such threats are on the rise and cloud, endpoint security, identity access tools there become increasingly vital and the vendors who provide them are on the rise. So it's no surprise that the players that we've listed here which play quite prominently in those markets are all on fire. So now in summary, I want to stress that while the picture is sometimes discouraging. The entire world is becoming more and more tuned in to the cyber threat. And that's a good thing. Money is pouring in. Look, technology got us into this problem and technology is a defensive weapon that will help us continue this fight. But it's going to take more than technology. And I want to share something. We get dozens and dozens of in bounds this time of the year because we do an annual predictions posts. So folks and they want to help us out. So now most of the in bounds and the predictions that we get, they're just kind of observations or frankly, non predictions that can't really be measured as like where you right, or where you're wrong. So for the most part I like predictions that are binary. For example, last December we predicted their IT spending in 2021 would rebound and grow at 4% relative to 2020. Well, it did rebound but that prediction really wasn't as accurate as I'd like. It was frankly wrong. We think it's actually the market's going to actually grow. Spending's going to grow more like 7% this year. Not to worry plenty of our predictions came true, but we'll leave that for another day. Anyway, I got an email from Dean Fisk of Fisk partners. It's a PR firm representing an individual named Lyndon Brown chief of strategy officer of Pondurance. Pondurance is a security consultancy. And the email had the standard, Hey, in case you're working on a predictions post this year end, blah, blah, blah. But instead of sharing with me, a bunch of non predictions, the notes said here's some trends in cybersecurity that might be worth thinking about. And there were a few predictions sprinkled in there, but I wanted to call it a couple of the comments from Linden Brown, whom I don't know, I never met the guy, but I really thought his trends were spot on. The first was a stat I'll share that the United Nations report cyber crime is up 600% due to the pandemic. If as if I couldn't feel worse already. His first point though was that the hybrid workplace will be the new frontier for cyber. Yes, we totally agree. There are permanent shifts taking place. And we actually predicted that last year, but he further cited that many companies went from zero to full digital transformation overnight and many are still on that journey. And his point is that hybrid work is going to require a complete overhaul of how we think about security. We think this is very true. Now the other point that stood out is that governments are going to crack down on this behavior. And we've seen this where criminals have had their critical infrastructure dismantled by governments. No doubt the U.S government has the capabilities to do so. And it is very much focused on this issue. But it's tricky as Robert Gates, who was the former defense secretary, told me a few years back in theCUBE. He said, well, we have the best offense. We also have the most to lose. So we have to be very careful, but Linden's key point was you are going to see a much more forward and aggressive public policy and new laws that give crime fighters more latitude . Again, it's tricky kind of like the Patriot act was tricky but it's coming. Now, another call-out from Linden shares his assertion that natural disasters will bring increased cyber risk. And I thought this was a really astute point because natural disasters they're on the rise. And when there's chaos, there's cash opportunities for criminals. And I'll add to this that the supply chain risk is far from over. This is going to be continuing theme this coming year and beyond. And one of the things that Linden Brown said in his note to me is essentially you can't take humans out of the equation. Automation alone can't solve the problem, but some companies operate as though they can. Just as bad human behavior, can tramp good security, Good human education and behavior is going to be a key weapon in this endless war. Now the last point is we're going to see continued escalation government crackdowns are going to bring retaliation and to Gates' point. The U.S has a lot at stake. So expect insurance premiums are going to go through the roof. That's assuming you can even get cyber insurance. And so we got to hope for the best, but for sure, we have to plan for the worst because it's coming. Deploy technology aggressively but people in process will ultimately be the other ingredients that allow us to live to battle for another day. Okay. That's a wrap for today. Remember these episodes they're all available as podcasts, wherever you listen just search "breaking analysis" podcast. Check out ETR his website at ETR.plus. We also publish a full report every week on Wikibond.com and siliconangle.com. You can get in touch. Email me @david.volante@tsiliconangle.com or you can DM me @dvellante. Comment on our LinkedIn posts. This is Dave Vellante for theCUBE insights powered by ETR. Have a great week. everybody stay safe, be well. And we'll see you next time. (techno music)
SUMMARY :
in Palo Alto in Boston, and the damage to the organization
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Cisco | ORGANIZATION | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
Lyndon Brown | PERSON | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
IBM | ORGANIZATION | 0.99+ |
Quanta | ORGANIZATION | 0.99+ |
Mike Speiser | PERSON | 0.99+ |
Gates' | PERSON | 0.99+ |
October | DATE | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
2019 | DATE | 0.99+ |
Splunk | ORGANIZATION | 0.99+ |
FBI | ORGANIZATION | 0.99+ |
2020 | DATE | 0.99+ |
$8.3 billion | QUANTITY | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Acer | ORGANIZATION | 0.99+ |
JBS | ORGANIZATION | 0.99+ |
four | QUANTITY | 0.99+ |
Ireland Health Service | ORGANIZATION | 0.99+ |
Pondurance | ORGANIZATION | 0.99+ |
Palo Alto | LOCATION | 0.99+ |
Mimecast | ORGANIZATION | 0.99+ |
Palo Alto | ORGANIZATION | 0.99+ |
March, 2020 | DATE | 0.99+ |
Robert Gates | PERSON | 0.99+ |
$7.6 billion | QUANTITY | 0.99+ |
Linden | PERSON | 0.99+ |
Okta | ORGANIZATION | 0.99+ |
CrowdStrike | ORGANIZATION | 0.99+ |
CNA Financial | ORGANIZATION | 0.99+ |
five | QUANTITY | 0.99+ |
Brenntag | ORGANIZATION | 0.99+ |
10 companies | QUANTITY | 0.99+ |
Zscaler | ORGANIZATION | 0.99+ |
$7.8 billion | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
McAfee | ORGANIZATION | 0.99+ |
March of 2020 | DATE | 0.99+ |
2021 | DATE | 0.99+ |
Dean Fisk | PERSON | 0.99+ |
two stars | QUANTITY | 0.99+ |
$20 million | QUANTITY | 0.99+ |
Sutter Hill Ventures | ORGANIZATION | 0.99+ |
4% | QUANTITY | 0.99+ |
RSA | ORGANIZATION | 0.99+ |
more than $4 million | QUANTITY | 0.99+ |
40% | QUANTITY | 0.99+ |
$11 million | QUANTITY | 0.99+ |
$5 million | QUANTITY | 0.99+ |
United Nations | ORGANIZATION | 0.99+ |
more than $100 billion | QUANTITY | 0.99+ |
last March | DATE | 0.99+ |
$40 million | QUANTITY | 0.99+ |
six companies | QUANTITY | 0.99+ |
Lacework | ORGANIZATION | 0.99+ |
Linden Brown | PERSON | 0.99+ |
Patriot act | TITLE | 0.99+ |
last December | DATE | 0.99+ |
10 | QUANTITY | 0.99+ |
over $200 million | QUANTITY | 0.99+ |
ORGANIZATION | 0.99+ | |
Authzero | ORGANIZATION | 0.99+ |
One | QUANTITY | 0.99+ |
Juniper | ORGANIZATION | 0.99+ |
Fisk | ORGANIZATION | 0.99+ |
More than 2,000 random attacks | QUANTITY | 0.99+ |
Datadog | ORGANIZATION | 0.99+ |
first | QUANTITY | 0.99+ |
SentinelOne | ORGANIZATION | 0.99+ |
7% | QUANTITY | 0.99+ |
two | QUANTITY | 0.99+ |
mid this year | DATE | 0.99+ |
each year | QUANTITY | 0.99+ |
half a billion dollars | QUANTITY | 0.99+ |
CyberArk | ORGANIZATION | 0.99+ |
six vendors | QUANTITY | 0.99+ |
Parasar Kodati & David Noy | KubeCon + CloudNativeCon NA 2021
>>mhm mhm >>Hey guys, welcome back to Los Angeles lisa martin. Coming to you live from cuba con and cloud native Con north America 2021. Very excited to be here. This is our third day of back to back coverage on the cube and we've got a couple of guests cube alumni joining me remotely. Please welcome parse our karate senior consultant, product marketing, Dell Technologies and David Noi VP product management at Dell Technologies. Gentlemen welcome back to the program. >>Thanks johnny >>so far so let's go ahead and start with you. Let's talk about what Dell EMC is offering to developers today in terms of unstructured data. >>Absolutely, it's great to be here. So let me start with the container storage interface. This is Q khan and a couple of years ago the container storage interface was still in beta and the storage vendors, we're very enthusiastically kind of building the plug in city of the different storage portfolio to offer enterprise grade features to developers are building applications of the Cuban this platform. And today if you look at the deli in storage portfolio, big block volumes. Nash shares s three object A P I S beyond their virtual volumes. However you're consuming storage, you have the plug ins that are required to run your applications with these enterprise Great feature speech right about snap sharks data replication, all available in the Cuban this layer and just this week at coupon we announced the container storage modules which is kind of the next step of productivity for developers beat you know uh in terms of observe ability of the storage metrics using tools like Prometheus visualizing it ravana authorization capabilities so that you know too bad moments can have better resource management of the storage that is being consumed um that so there are these multiple models were released. And if you look at unstructured data, this term may be a bit new for our kind of not very family for developers but basically the storage. Well there is a distinction that is being made you know, between primary storage and unstructured storage or unstructured data solutions And by unstructured we mean file and object storage. If you look at the cube contact nickel sessions, I was very glad to see that there is an entire stream for um machine learning and data so that speaks to how popular communities deployment models are getting when it comes to machine learning and artificial intelligence. Um even applications like genomics and media and entertainment and with the container storage interface uh and the container storage modules with the object storage portfolio that bill has, we offer the comprehensive unstructured data solutions for developers beat object or file. And the advantage the developers are getting is these you know, if you look at platforms like power scale and these areas, these are like the industry workhorses with the highest performance. And if you think of scale, you know, think of 250 nasnotes, you know with a single name space with NVIDIA gpu direct capabilities. All these capabilities developers can use um for you know, applications like machine learning or any competition intensive for data intensive applications that requires these nass uh scale of mass platforms. So so um that's that's what is new in terms of uh what we are offering, you have the storage heaters >>got a parcel. Thank you. David, let's bring you into the conversation now you've launched objects scale at VM World. Talk to us about that, what some of the key features and capabilities are and some of those big business benefits that customers are going to be able to achieve. >>Sure thing. So I really want to focus on three of the biggest benefits. This would be the fact that the product is actually based on kubernetes country, the scale of the product and then its ability to do global replication. So let me just touch on those in order. Mhm You said that the product is based on kubernetes and here we are cube concept. The perfect time to be talking about that. This product really caters to those who are looking for a flexible way to deploy object storage in containerized fashion, appeals to the devops folks and folks who like to automate things and call the communities a P I. S to make uh the actual deployment of the product. Very simple in turnkey and that's really what people turn to kubernetes for is the ability to spin things up when they need them and spend them down as they don't and make that all on commodity hardware and commodity, you know, the quantity pricing and the idea there is that I'm making it as simple and easy as possible. You're not going to get as much shadow I. T. You won't have people going off and putting things off into a public cloud. And so where security of an organization or control of the data that flows with an organization is important. Having something that's easy for developers to use in the same paradigm that they're used to is critical. Now I talked about scale and you know, if you have come to me two years ago I would have told you, you know, kubernetes, yeah, containers people are kicking it around and they're doing some interesting science experiments, I would say in the last year I started to see a lot of requests from customers um in the dozens, even 200 petabyte range as it relates to capacity for committees and specifically looking for C. S. I and cozy with this. This this is the the object storage implementation of the container storage interfaces. Uh So skin was definitely there and the idea of this product is to provide easy scalability from the terabytes range into the multi petabyte range and again it's that ease of use, ease of deployment because it is kubernetes basically because it's a KPI driven that makes that possible. So we're talking about going from a three night minimum to thousands of nodes. and this allows people to deploy the product either at the edge or in the data center um in the edge because you can get very small deployments in the data center to massive scale. So we want to provide something that covers the gamut. The last thing I talked about was replication. So let me just touch upon what I mean by that uh when people go and build these deployments, if you're building a deployment at the edge of an object scale product, you're probably taking in sensor data or some kind of information that you want to then send back to a data center for processing. So you make it simple to do bucket based replication. An object, sorry object storage based replication to move things to another location. And uh that can be used either for bringing data back for analytics from the edge, it can be used for availability. So making sure that you have data available across multiple data centers in the case that you have an outage. It could be even used for sharing data between developers in one site and another site. So we provide that level of flexibility overall. Um this is the next generation object store leveraging. Dell technologies number one position in object storage. So I'm pretty excited about >>and how David is object scale integrated with VM ware software. Stop give us that slice and dice. >>Yeah, and that's a good question. And so, you know, we're talking about this being a Kubernetes based product, you can deploy it on open shift or we integrate directly with VM ware cloud foundation and with Tansy, which is VM ware's container orchestration and management platform. I've seen the demo of the product myself from my team and they've showed it to be did all of the management of the product was actually done within the V sphere Ui, which is great. So easy to go and just enter the V sphere. You I installed the product very simply have it up and running and then go and do all of your management through that user interface or to automate it using the same api is that you used to through VM ware and the 10 Zoo uh platform. >>Thank you, paris are back to you. Security is a big theme here in kubernetes. It's also been a big theme here. We've been talking about it the last three days here at cop con. How does Dell EMC's unstructured portfolio offer that necessary cyber protection that developers need to have and bake that into what they're doing. So >>surely, you know, they talk about cybersecurity, you know, there are different layers of security right from, you know, smarter firewalls to you know how to manage privileged account access and so on. And what we are trying to do is to provide a layer of cyber defense, right at the asset that you're trying to protect, which is the data and this is where the ransom their defender solution is basically detecting any patterns of the compromise that might have happened and alerting the I. T. Um administration about this um possible um intrusions into their into the data by looking at the data access parents in real time. So that's a pretty big deal. Then we're actually putting all this, you know, observance on the primary data and that's what the power scale platform cybersecurity protection features offers. Now we've also extended this kind of detection mechanism for the object data framework on pcs platforms as well. So this is like an additional layer of security at the um layer of uh you know where the data is actually being read and written. Do that's the area, you know, in case of object here we're looking at the S. Three traffic and trying to find his parents in case of a file data atmosphere, looking at the file's access parents and so on. So and in relation to this we're also providing uh data isolation mechanism that is very critical in many cyber recovery processes with the smart absolution as well. So this is something that the developers are getting for like without having to worry about it because that is something implemented at the infrastructure layer itself. So they don't have to worry about you know trying to court it or develop their application to integrate these kinds of things because it's an it's embedded in the infrastructure at the one of the FBI level at the E C. S A P I level. So that's pretty um pretty differentiating in the industry in the country storage solutions. I'll get. >>Uh huh. Yeah. I mean look if you look at what a lot of the object storage players are doing as it relates to cyber security. They're they're playing off the fact that they've implemented object lock and basically using that to lockdown data. And that's that's good. I mean I'm glad that they're doing that and if the case that you were able to lock something down and someone wasn't able to bypass that in some way, that's fantastic. Or if they didn't already encrypted before I got locked down what parts are is referring to is a little bit more than that. It's actually the ability to look at user behavior and determined that something bad is happening. So this is about actually being able to do, you know, predictive analytics being able to go and figure out that you're under attack. There's anomalous behavior um and we're able to go and actually infer from that that something bad is happening and where we think it's happening and lock it down even even more securely than for example just saying hey we provide object like capabilities which is one of the responses that I've seen out there from object storage vendors >>can you share with us. Parts are a customer example like walk us through how this is actually being used and deployed and what some of those business outcomes are. >>Yes lisa. So in terms of container realization itself, they have a media and entertainment kind of customer story here. Um Swiss TXT um they have a platform as a service where they serve their customer base with a range of uh you know, media production and broadcasting solutions and they have containers this platform and part of this computerization is part of their services is they offer infrastructure as a service to you know, media producers who need a high performance storage, high performance computing and power skill And Iceland have been their local solutions to offer this And now that they have containerized their core platform. Well you see a sign interface for power skills, they are able to continue to deliver the infrastructure, high performance infrastructure and storage services to their customers through the A. P I. And it's great to see how fast they could, you know, re factor their application but yet continue to offer the high performance and degrees enterprise grade uh features of the power scale platform. So Swiss Txt and would love to share more. Keep it on the story. Yeah. Hyperlink. >>And where can folks go to learn more about objects scale and what you guys are announcing? Yes, particular. You are a website that you want to direct folks too. >>I would say that technologies dot com. And uh that's the best place to start. >>Yeah, I would go to the Delta product pages around objects should be publicly built. >>Excellent guys, thank you for joining me on the program today. Walking through what how Dell EMC is helping developers with respect to unstructured data, Talking to us about objects skill that you launched VM world, some of those big customer benefits and of course showing us the validation, the proof in the pudding with that customer story. We appreciate your insights. >>Thank you. Thank you lisa >>For my guests. I'm Lisa Martin. You're watching the Cube live from Los Angeles. We're coming to you from our coverage of coupon and cloud native on North America 21. Coming back. Stick around. Rather I should say we'll be back after a short break with our next guest.
SUMMARY :
Coming to you live from cuba con and cloud so far so let's go ahead and start with you. is kind of the next step of productivity for developers beat you know uh are and some of those big business benefits that customers are going to be able to achieve. centers in the case that you have an outage. and how David is object scale integrated with VM ware software. And so, you know, we're talking about this being a Kubernetes necessary cyber protection that developers need to have and bake that into what So they don't have to worry about you know trying So this is about actually being able to do, can you share with us. offer infrastructure as a service to you know, media producers And where can folks go to learn more about objects scale and what you guys are announcing? And uh that's the best place to start. EMC is helping developers with respect to unstructured data, Talking to us about objects skill that you launched Thank you lisa We're coming to you from our coverage of coupon and cloud native on North America 21.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
David | PERSON | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
Los Angeles | LOCATION | 0.99+ |
David Noi | PERSON | 0.99+ |
FBI | ORGANIZATION | 0.99+ |
lisa martin | PERSON | 0.99+ |
David Noy | PERSON | 0.99+ |
johnny | PERSON | 0.99+ |
North Amer | LOCATION | 0.99+ |
three | QUANTITY | 0.99+ |
three night | QUANTITY | 0.99+ |
250 nasnotes | QUANTITY | 0.99+ |
Dell EMC | ORGANIZATION | 0.99+ |
two years ago | DATE | 0.99+ |
today | DATE | 0.99+ |
NVIDIA | ORGANIZATION | 0.99+ |
Dell | ORGANIZATION | 0.98+ |
last year | DATE | 0.98+ |
thousands | QUANTITY | 0.98+ |
Dell EMC | ORGANIZATION | 0.98+ |
Delta | ORGANIZATION | 0.97+ |
200 petabyte | QUANTITY | 0.97+ |
third day | QUANTITY | 0.97+ |
lisa | PERSON | 0.97+ |
one site | QUANTITY | 0.97+ |
one | QUANTITY | 0.96+ |
Prometheus | TITLE | 0.96+ |
dozens | QUANTITY | 0.95+ |
this week | DATE | 0.95+ |
VM World | ORGANIZATION | 0.93+ |
Swiss TXT | ORGANIZATION | 0.9+ |
single | QUANTITY | 0.9+ |
couple of years ago | DATE | 0.89+ |
Hyperlink | ORGANIZATION | 0.8+ |
V sphere Ui | TITLE | 0.8+ |
Kodati | PERSON | 0.8+ |
north America | LOCATION | 0.78+ |
CloudNativeCon NA 2021 | EVENT | 0.77+ |
Con | EVENT | 0.75+ |
Swiss Txt | ORGANIZATION | 0.75+ |
KubeCon + | EVENT | 0.75+ |
couple | QUANTITY | 0.74+ |
nodes | QUANTITY | 0.72+ |
three object | QUANTITY | 0.72+ |
Iceland | LOCATION | 0.71+ |
Nash | PERSON | 0.7+ |
Tansy | ORGANIZATION | 0.67+ |
petabyte | QUANTITY | 0.66+ |
VM | TITLE | 0.66+ |
cop | ORGANIZATION | 0.64+ |
Cuban | LOCATION | 0.64+ |
E | EVENT | 0.64+ |
paris | ORGANIZATION | 0.63+ |
con | EVENT | 0.63+ |
Parasar | ORGANIZATION | 0.62+ |
Cuban | OTHER | 0.62+ |
C. S. | PERSON | 0.6+ |
last three days | DATE | 0.58+ |
Cube | TITLE | 0.55+ |
guests | QUANTITY | 0.53+ |
S. Three | TITLE | 0.53+ |
2021 | EVENT | 0.51+ |
Kubernetes | TITLE | 0.49+ |
cuba | LOCATION | 0.49+ |
V | TITLE | 0.42+ |
10 Zoo | TITLE | 0.38+ |
Protect Your Data & Recover from Cyberthreats & Ransomware in Minutes
>>Welcome back to the cubes coverage of H P S. Green Lake announcement. We've been following Green Lake and the cadence of announcements making. Now we're gonna talk about ransomware, ransomware become a household term. But what people really don't understand is that virtually any bad actor can become a ransomware criminal by going on the dark web hiring a ransomware as a service sticking, putting a stick into a server and taking a piece of the action and that is a really insidious threat. Uh, the adversaries are extremely capable, so we're going to dig into that with Omar assad, who's the storage platform, lead cloud data services at H P E and Deepak verma vice president of product Zito, which is now an H P E company Gentlemen, welcome to the cube. Good to see you. Thank you. >>Thank you. Welcome. Pleasure to be here. So >>over you heard my little narrative upfront. How does the Xarelto acquisition fit into that discourse? >>Thank you. Dave first of all, we're extremely excited to welcome Sir toe into the HP family. Uh, the acquisition of Puerto expands the Green Lake offerings from H P E uh, into the data protection as a service and ransomware protection as a service capabilities and it at the same time accelerates the transformation that the HP storage businesses going through as it transforms itself into more of a cloud native business, which sort of follows on from the May 4th announcements that you helped us cover. Uh, this enables the HP sales teams to now expand the data protection perimeter and to start offering data protection as a service and ransomware as a service with the best in class technologies uh, from a protection site as well as from ransomware recovery side of the house. And so we're all the way down already trying to integrate uh, you know, the little offerings as part of the Green lake offerings and extending support through our services organization. And the more of these announcements are gonna roll out later in the month. >>And I think that's what you want to see from it as a service offering. You want to see a fast cadence of new services that are not a box by a box that are applying. No, it's services that you want to access. So let's, let's talk about before we get into the tech, can we talk about how you're helping customers deal with ransomware? Maybe some of the use cases that you're seeing. >>First of all, extremely excited to be part of the HP family now. Um, Quick history and that we've been around for about 11 years. We've had about 9000 plus customers and they all benefit from essentially the same technology that we invented 11 years ago. First and foremost, one of the use cases has been continuous data protection. So were built on the CdP platform, which means extremely low RTO S and R P O S for recovery. I'll give you example there um, United Airlines is an application that cost them $1 million dollars for every hour that they're down. They use traditional approaches. That would be a lot of loss with Zito, we have that down two seconds of loss in case and the application goes down. So that's kind of core and fundamental to our plaque. The second uh critical use case that for us has been simplicity. A lot of customers have said we make the difficult, simple. So DRS is a complex uh process. Um, give you an example there. Hcea Healthcare Consolidated four different disaster recovery platforms into a single platform in Puerto and saved about $10 million dollars a year. So it's making that operations of having disaster recovery process is much simpler. Um the third kind of critical use case for us as uh, the environment has evolved as the landscape has involved has been around hybrid cloud. So being able to take customers to the platforms that they want to go to that's critical for us And for our customers an example, there is Kingston technology's so Kingston tried some competitive products to move to Azure, it would take them about 24 hours to recover 30 VMS or so with zero technology. They will get about all their 1000 VMS up in Azure instantaneously. So these are three use cases that were foundational. Built. Built the company in the tech. >>Nice. Thank you. Thank you for that. So simple works well these days, especially with all this complexity we have to deal with. Can we get into the secret sauce a little bit. I mean CdP has been around forever. What do you guys do that? That's different. Maybe you can talk about that. Sure. >>Um it's cdp based, I think we've perfected the technology. It's less about being able to just copy the data. It's more about what you do when things go bump. We've made it simpler with driven economies of scale lower and being platform agnostic. We've really brought that up across to whatever platforms once upon a time it was moving from physical to virtual or even across different virtualization platforms and then being able to move across to whatever cloud platform customer may want or or back >>to cbP continuous data protection by the way for the audience that may not know that go ahead. And >>one of the additional points that I want to add to the box comment over here is the the basics of platform independence is what really drew uh hp technologists into the technology because you know, one of the things we have many, we have the high end platform with the H B electra nine Kv of the electro six kids the midrange platform. Then we have a bunch of file and object offerings on the side. What zero does it University universally applies to all those technologies and along with, you know, as you pair them up with our computer offerings to offer a full stack but now the stack is disaster recovery capable. Natively with the integration of certo, you know, one of the things that, you know, Deepak talked about about the as your migrations that a lot of the customers are talking about cloud is also coming up as a D our use case for a lot of our customers, customers, you know, you know, as we went through thousands of customers interviews one of the, one of the key things that came back was investing in a D our data center which is just waiting there for a disaster to happen. It's a very expensive insurance policy. So absurd. Oh, through its native capabilities allows customers to do is to just use public cloud as a D our target and and as a service, it just takes care of all the format conversions and recoveries and although that's completely automated inside the platform and and we feel that, you know, when you combine this either at the high end of data center storage offering or the middle age offering with this replication, D. R. And ransomware protection built into the same package, working under the same hood, it just simplifies and streamlines the customers deployment. >>Come here a couple of things. So first of all historically, if you wanted to recover to appoint within let's say, you know, 10 seconds, five seconds you have to pay up. Big time. Number one. Number two is you couldn't test your D. R. It was too risky. So people just had it in, they had a checkbox on compliance but they actually couldn't really test it because they were afraid they were going to lose data. So it sounds like you're solving both of those problems or >>or you know we remember the D. R. Test where it was a weekend. It was an event right? It was the event and at the end of july that the entire I. T. Organizing honey >>it's not gonna be home this weekend. Exactly what >>we've changed. That is a click of a button. You can D. R. Test today if you want to you can have disaster recovery still running. You can D. R. Test in Azure bring up your environment an isolated network bubble, make sure everything's running and bring it and bring it down. The interesting thing is the technology was invented back when our fear in the industry was losing a data center was losing power was catastrophic, natural disasters. But the technology has lent itself very well to the new threats which which are very much around ransomware as you mentioned because it's a type of disaster. Somebody's going after your data. Physical servers are still around but you still need to go back to a point in time and you need to do that very quickly. So the technology has really just found itself uh appealing to new challenges. >>If a customer asks you can I really eliminate cyber attacks, where should I put my my if I had 100 bucks to spend. Should I spend it on you know layers and defense should I spend it on recovery. Both, what would you tell them? >>I think it's a balanced answer. I think prevention is 100% impossible. Uh It's really I'd say spend it in in thirds. You want to spend a third of it and and prevention a third of it maybe in detection and then a third of it in uh recovery. So it's really that balancing act that means you can't leave the front door open but then have a lot of recovery techniques invested in. It has to be it has to be a balance and it's also not a matter of if it's a matter of when so we invest in all three areas. Hopefully two of them will work to your advantage. >>You dave you you should always protect your perimeter. I mean that that goes without saying but then as you invest in other aspects of the business, as Deepak mentioned, recovery needs to be fast and quick recovery whether from your recovering from a backup disaster. Are you covering from a data center disaster a corrupted file or from a ransomware attack. A couple of things that zero really stitches together like journal based recovery has been allowed for a while but making journal based recovery platform independent in a seamless fashion with the click of a button within five seconds go back to where your situation was. That gives you the peace of mind that even if the perimeter was breached, you're still protected, you know, five minutes into the problem And, and that's the peace of mind, which along with data protection as a service, disaster recovery as a service and now integrating this, you know, recovery from ransomware along with it in a very simple, easy to consume package is what drew us into the >>more you can do this you said on the use the cloud as a target. I could use the cloud as an air gap if I wanted to. It sounds like it's cloud Native, correct? Just wrap your stack in kubernetes and shove it in the cloud and have a host and say we're cloud to No, really I'm serious. So >>absolutely, we we looked at that approach and that that's where the challenge comes in, Right? So I give you the example of Kingston technology just doesn't scale, it's not fast enough. What we did was developed a platform for cloud Native. We consume cloud services where necessary in order to provide that scalability. So one example in Azure is being able to use scale set. So think about a scenario where you just declare a disaster, you've got 1000 VMS to move over, we can spin up the workers that need to do the work to get 1000 VMS spin them down. So you're up and running instantaneously and that involves using cloud Native uh tools and technologies, >>can we stay on that for a minute, So take take us through an example of what life was like would be like without zero trying to recover and what it's like with Puerto resources, complexity time maybe you could sort of paint a picture. Sure. >>Let me, I'll actually use an example from a customer 10 Kata. They uh develop defensive fabrics, especially fabric. So think about firefighters, think about our men and women abroad that need protective clothing that developed the fibers behave. They were hit by ransomware by crypto locker. That this was before zero. Unfortunately it took they took about a two week uh data loss. It took them weeks to recover that environment, bring it back up and the confidence was pretty low. They invested in, they looked at our technology, they invested in the technology and then they were hit with a different variant of crypto locker immediately. The the IT administrators and the ITS folks there were relieved right, they had a sense of confidence to say yes we can recover. And the second time around they had data loss of about 10 seconds, they could recover within a few minutes. So that's the before and after picture giving customers that confidence to say yep, a breach happened, we tried our best but now it's up to recovery and I can recover without having to dig tapes out from some vault and hopefully have a good copy of data sitting there and then try that over and over again and there's a tolerance right before a time before which business will not be able to sustain itself. So what we want to do is minimize that for businesses so that they can recover as quickly as possible with as little data loss as possible. >>Thank you for that. So, Omar, there's a bigger sort of cyber recovery agenda that you have as part of, of green lake, I'm sure. What, what should we expect, what's next? Where do you want to take this? >>So uh excellent question point in the future day. So one of the things that you helped us, uh you know, unveil uh in May was the data services. Cloud console. Data services. Cloud console was the first uh sort of delivery as we took the storage business as it is and start to transform into more of a cloud native business. We introduced electra uh which is the cloud native hardware with the customers buy for persistent storage within their data center. But then data services, cloud console truly cemented that cloud operational model. Uh We separated the management from, from the devices itself and sort of lifted it up as a sas service into the public, public cloud. So now what you're gonna see is, you know, more and more data and data management services come up on the data services. Cloud console and and zero is going to be one of the first ones. Cloud physics was another one that we we talked about, but zero is the is the true data management service that is going to come up on data services, cloud console as part of the Green Lake services agenda that that HP has in the customer's environ and then you're gonna see compliance as a service. You're going to see data protection as a service. You're gonna see disaster recovery as a service. But the beautiful thing about it is, is choice with simplicity as these services get loaded up on data services, clown console. All our customers instantly get it. There's nothing to install, there's nothing to troubleshoot uh, there's nothing to size. All those capabilities are available on the console, customers go in and just start consuming Xarelto capabilities from a management control plane, Disaster recovery control plan are going to be available on the data services, cloud console, automatically detecting electro systems, rian Bear systems, container based systems, whichever our customers have deployed and from there is just a flip of a button. Another way to look at it is it sort of gives you that slider that you have data protection or back up on one side, you've got disaster recovery on one side, you've got ransomware protection on on the extreme right side, you can just move a slider across and choose the service level that you want without worrying about best practices, installation, application integration. All of that just takes control from the data services, cloud concepts. >>Great, great summary because historically you would have to build that right now. You can buy it as a service. You can programmatically, you know, deploy it and that's a game changer. Have to throw it over the fence to some folks. That's okay. Now, you know, make it make it work and then they change the code and you come back a lot of finger pointing. It's now it's your responsibility. >>Absolutely. Absolutely. We're excited to provide Zito continue provides the desert of customers but also integrate with the Green Green Lake platform and let the rest of Green Lake customers experience some of the sort of technology and really make that available as a service. >>That's great. This is a huge challenge for customers. I mean they do, I pay their ransom. Do not pay the ransom. If I pay the ransom the FBI is going to come after me. But if I don't pay the ransom, I'm not gonna get the crypto key. So solutions like this are critical. You certainly see the president pushing for that. The United States government said, hey, we got to do a better job. Good job guys, Thanks for for sharing your story in the cube and congratulations. Thank >>you. Thank you David. >>All right. And thank you for watching everybody. Uh this is the, I want to tell you that everything that you're seeing today as part of the Green Lake announcement is going to be available on demand as part of the HP discover more. So you got to check that out. Thank you. You're watching the cube. >>Mhm mm.
SUMMARY :
Uh, the adversaries are extremely capable, so we're going to dig into that with Omar assad, Pleasure to be here. over you heard my little narrative upfront. itself into more of a cloud native business, which sort of follows on from the May 4th announcements that you And I think that's what you want to see from it as a service offering. First and foremost, one of the use cases has been Thank you for that. It's more about what you do when things go bump. to cbP continuous data protection by the way for the audience that may not know that go ahead. technologists into the technology because you know, one of the things we have many, we have the high end platform with So first of all historically, if you wanted to recover to appoint within let's say, or you know we remember the D. R. Test where it was a weekend. it's not gonna be home this weekend. back to a point in time and you need to do that very quickly. Both, what would you tell them? So it's really that balancing act that means you can't leave the front door You dave you you should always protect your perimeter. more you can do this you said on the use the cloud as a target. So think about a scenario where you just declare a disaster, you've got 1000 VMS to move over, complexity time maybe you could sort of paint a picture. So that's the before and after picture giving customers that confidence to Thank you for that. So one of the things that you You can programmatically, you know, deploy it and that's a game changer. of the sort of technology and really make that available as a service. If I pay the ransom the FBI is going to come after me. Thank you David. So you got to check that out.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
David | PERSON | 0.99+ |
Omar | PERSON | 0.99+ |
100 bucks | QUANTITY | 0.99+ |
FBI | ORGANIZATION | 0.99+ |
1000 VMS | QUANTITY | 0.99+ |
H P E | ORGANIZATION | 0.99+ |
Deepak | PERSON | 0.99+ |
May 4th | DATE | 0.99+ |
10 seconds | QUANTITY | 0.99+ |
HP | ORGANIZATION | 0.99+ |
100% | QUANTITY | 0.99+ |
five minutes | QUANTITY | 0.99+ |
United Airlines | ORGANIZATION | 0.99+ |
five seconds | QUANTITY | 0.99+ |
Kingston | ORGANIZATION | 0.99+ |
two seconds | QUANTITY | 0.99+ |
May | DATE | 0.99+ |
second time | QUANTITY | 0.99+ |
First | QUANTITY | 0.99+ |
$1 million dollars | QUANTITY | 0.99+ |
Omar assad | PERSON | 0.99+ |
Both | QUANTITY | 0.99+ |
Azure | TITLE | 0.99+ |
three use cases | QUANTITY | 0.99+ |
first | QUANTITY | 0.99+ |
one | QUANTITY | 0.98+ |
Dave | PERSON | 0.98+ |
today | DATE | 0.98+ |
second | QUANTITY | 0.98+ |
about 10 seconds | QUANTITY | 0.98+ |
30 VMS | QUANTITY | 0.98+ |
11 years ago | DATE | 0.98+ |
Puerto | LOCATION | 0.98+ |
thousands of customers | QUANTITY | 0.97+ |
Hcea Healthcare | ORGANIZATION | 0.97+ |
both | QUANTITY | 0.97+ |
Zito | ORGANIZATION | 0.97+ |
zero | QUANTITY | 0.97+ |
about 11 years | QUANTITY | 0.97+ |
United States government | ORGANIZATION | 0.96+ |
about 24 hours | QUANTITY | 0.96+ |
third | QUANTITY | 0.96+ |
Green Lake | ORGANIZATION | 0.96+ |
third kind | QUANTITY | 0.95+ |
D. R. Test | EVENT | 0.94+ |
Green Lake | LOCATION | 0.94+ |
H P S. Green Lake | ORGANIZATION | 0.93+ |
about a two week | QUANTITY | 0.93+ |
three | QUANTITY | 0.93+ |
about 9000 plus customers | QUANTITY | 0.93+ |
about $10 million dollars a year | QUANTITY | 0.93+ |
single platform | QUANTITY | 0.92+ |
Cloud physics | TITLE | 0.91+ |
one side | QUANTITY | 0.89+ |
Xarelto | TITLE | 0.89+ |
one example | QUANTITY | 0.88+ |
10 Kata | ORGANIZATION | 0.86+ |
minutes | QUANTITY | 0.85+ |
end of july | DATE | 0.84+ |
Deepak verma | PERSON | 0.83+ |
two of | QUANTITY | 0.82+ |
first ones | QUANTITY | 0.82+ |
Lake | ORGANIZATION | 0.81+ |
Puerto | ORGANIZATION | 0.81+ |
Green Green Lake | ORGANIZATION | 0.78+ |
Number two | QUANTITY | 0.78+ |
a minute | QUANTITY | 0.78+ |
Howard Levenson
>>AWS public sector summit here in person in Washington, D. C. For two days live. Finally a real event. I'm john for your host of the cube. Got a great guest Howard Levinson from data bricks, regional vice president and general manager of the federal team for data bricks. Uh Super unicorn. Is it a decade corn yet? It's uh, not yet public but welcome to the cube. >>I don't know what the next stage after unicorn is, but we're growing rapidly. >>Thank you. Our audience knows David bricks extremely well. Always been on the cube many times. Even back, we were covering them back when big data was big data. Now it's all data everything. So we watched your success. Congratulations. Thank you. Um, so there's no, you know, not a big bridge for us across to see you here at AWS public sector summit. Tell us what's going on inside the data bricks amazon relationship. >>Yeah. It's been a great relationship. You know, when the company got started some number of years ago we got a contract with the government to deliver the data brooks capability and they're classified cloud in amazon's classified cloud. So that was the start of a great federal relationship today. Virtually all of our businesses in AWS and we run in every single AWS environment from commercial cloud to Govcloud to secret top secret environments and we've got customers doing great things and experiencing great results from data bricks and amazon. >>The federal government's the classic, I call migration opportunity. Right? Because I mean, let's face it before the pandemic even five years ago, even 10 years ago. Glacier moving speed slow, slow and they had to get modernized with the pandemic forced really to do it. But you guys have already cleared the runway with your value problems. You've got lake house now you guys are really optimized for the cloud. >>Okay, hardcore. Yeah. We are, we only run in the cloud and we take advantage of every single go fast feature that amazon gives us. But you know john it's The Office of Management and Budget. Did a study a couple of years ago. I think there were 28,000 federal data centers, 28,000 federal data centers. Think about that for a minute and just think about like let's say in each one of those data centers you've got a handful of operational data stores of databases. The federal government is trying to take all of that data and make sense out of it. The first step to making sense out of it is bringing it all together, normalizing it. Fed aerating it and that's exactly what we do. And that's been a real win for our federal clients and it's been a real exciting opportunity to watch people succeed in that >>endeavour. We have another guest on. And she said those data center huggers tree huggers data center huggers, majority of term people won't let go. Yeah. So but they're slowly dying away and moving on to the cloud. So migrations huge. How are you guys migrating with your customers? Give us an example of how it's working. What are some of the use cases? >>So before I do that I want to tell you a quick story. I've I had the luxury of working with the Air Force Chief data officer Ailene vedrine and she is commonly quoted as saying just remember as as airmen it's not your data it's the Air Force's data. So people were data center huggers now their data huggers but all of that data belongs to the government at the end of the day. So how do we help in that? Well think about all this data sitting in all these operational data stores they're getting it's getting updated all the time. But you want to be able to Federated this data together and make some sense out of it. So for like an organization like uh us citizenship and immigration services they had I think 28 different data sources and they want to be able to pull that data basically in real time and bring it into a data lake. Well that means doing a change data capture off of those operational data stores transforming that data and normalizing it so that you can then enjoy it. And we've done that I think they're now up to 70 data sources that are continually ingested into their data lake. And from there they support thousands of users doing analysis and reports for the whole visa processing system for the United States, the whole naturalization environment And their efficiency has gone up I think by their metrics by 24 x. >>Yeah. I mean Sandy carter was just on the cube earlier. She's the Vice president partner ecosystem here at public sector. And I was coming to her that federal game has changed, it used to be hard to get into you know everybody and you navigate the trip wires and all the subtle hints and and the people who are friends and it was like cloak and dagger and so people were locked in on certain things databases and data because now has to be freely available. I know one of the things that you guys are passionate about and this is kind of hard core architectural thing is that you need horizontally scalable data to really make a I work right. Machine learning works when you have data. How far along are these guys in their thinking when you have a customer because we're seeing progress? How far along are we? >>Yeah, we still have a long way to go in the federal government. I mean, I tell everybody, I think the federal government's probably four or five years behind what data bricks top uh clients are doing. But there are clearly people in the federal government that have really ramped it up and are on a par were even exceeding some of the commercial clients, U. S. C. I. S CBP FBI or some of the clients that we work with that are pretty far ahead and I'll say I mentioned a lot about the operational data stores but there's all kinds of data that's coming in at U S. C. I. S. They do these naturalization interviews, those are captured in real text. So now you want to do natural language processing against them, make sure these interviews are of the highest quality control, We want to be able to predict which people are going to show up for interviews based on their geospatial location and the day of the week and other factors the weather perhaps. So they're using all of these data types uh imagery text and structure data all in the Lake House concept to make predictions about how they should run their >>business. So that's a really good point. I was talking with keith brooks earlier directive is development, go to market strategy for AWS public sector. He's been there from the beginning this the 10th year of Govcloud. Right, so we're kind of riffing but the jpl Nasa Jpl, they did production workloads out of the gate. Yeah. Full mission. So now fast forward today. Cloud Native really is available. So like how do you see the the agencies in the government handling Okay. Re platform and I get that but now to do the reef acting where you guys have the Lake House new things can happen with cloud Native technologies, what's the what's the what's the cross over point for that point. >>Yeah, I think our Lake House architecture is really a big breakthrough architecture. It used to be, people would take all of this data, they put it in a Hadoop data lake, they'd end up with a data swamp with really not good control or good data quality. And uh then they would take the data from the data swamp where the data lake and they curate it and go through an E. T. L. Process and put a second copy into their data warehouse. So now you have two copies of the data to governance models. Maybe two versions of the data. A lot to manage. A lot to control with our Lake House architecture. You can put all of that data in the data lake it with our delta format. It comes in a curated way. Uh there's a catalogue associated with the data. So you know what you've got. And now you can literally build an ephemeral data warehouse directly on top of that data and it exists only for the period of time that uh people need it. And so it's cloud Native. It's elastically scalable. It terminates when nobody's using it. We run the whole center for Medicaid Medicare services. The whole Medicaid repository for the United States runs in an ephemeral data warehouse built on Amazon S three. >>You know, that is a huge call out, I want to just unpack that for a second. What you just said to me puts the exclamation point on cloud value because it's not your grandfather's data warehouse, it's like okay we do data warehouse capability but we're using higher level cloud services, whether it's governance stuff for a I to actually make it work at scale for those environments. I mean that that to me is re factoring that's not re platform Ng. Just re platform that's re platform Ng in the cloud and then re factoring capability for on uh new >>advantages. It's really true. And now you know at CMS, they have one copy of the data so they do all of their reporting, they've got a lot of congressional reports that they need to do. But now they're leveraging that same data, not making a copy of it for uh the center for program integrity for fraud. And we know how many billions of dollars worth of fraud exist in the Medicaid system. And now we're applying artificial intelligence and machine learning on entity analytics to really get to the root of those problems. It's a game >>changer. And this is where the efficiency comes in at scale. Because you start to see, I mean we always talk on the cube about like how software is changed the old days you put on the shelf shelf where they called it. Uh that's our generation. And now you got the cloud, you didn't know if something is hot or not until the inventory is like we didn't sell through in the cloud. If you're not performing, you suck basically. So it's not working, >>it's an instant Mhm. >>Report card. So now when you go to the cloud, you think the data lake and uh the lake house what you guys do uh and others like snowflake and were optimized in the cloud, you can't deny it. And then when you compare it to like, okay, so I'm saving you millions and millions if you're just on one thing, never mind the top line opportunities. >>So so john you know, years ago people didn't believe the cloud was going to be what it is. Like pretty much today, the clouds inevitable. It's everywhere. I'm gonna make you another prediction. Um And you can say you heard it here first, the data warehouse is going away. The Lake house is clearly going to replace it. There's no need anymore for two separate copies, there's no need for a proprietary uh storage copy of your data and people want to be able to apply more than sequel to the data. Uh Data warehouses, just restrict. What about an ocean house? >>Yeah. Lake is kind of small. When you think about this lake, Michigan is pretty big now, I think it's I >>think it's going to go bigger than that. I think we're talking about Sky Computer, we've been a cloud computing, we're going to uh and we're going to do that because people aren't gonna put all of their data in one place, they're going to have, it spread across different amazon regions or or or amazon availability zones and you're going to want to share data and you know, we just introduced this delta sharing capability. I don't know if you're familiar with it but it allows you to share data without a sharing server directly from picking up basically the amazon, you RLS and sharing them with different organizations. So you're sharing in place. The data actually isn't moving. You've got great governance and great granularity of the data that you choose to share and data sharing is going to be the next uh >>next break. You know, I really loved the Lake House were fairly sing gateway. I totally see that. So I totally would align with that and say I bet with you on that one. The Sky net Skynet, the Sky computing. >>See you're taking it away man, >>I know Skynet got anything that was computing in the Sky is Skynet that's terminated So but that's real. I mean I think that's a concept where it's like, you know what services and functions does for servers, you don't have a data, >>you've got to be able to connect data, nobody lives in an island. You've got to be able to connect data and more data. We all know more data produces better results. So how do you get more data? You connect to more data sources, >>Howard great to have you on talk about the relationship real quick as we end up here with amazon, What are you guys doing together? How's the partnership? >>Yeah, I mean the partnership with amazon is amazing. We have, we work uh, I think probably 95% of our federal business is running in amazon's cloud today. As I mentioned, john we run across uh, AWS commercial AWS GovCloud secret environment. See to us and you know, we have better integration with amazon services than I'll say some of the amazon services if people want to integrate with glue or kinesis or Sagemaker, a red shift, we have complete integration with all of those and that's really, it's not just a partnership at the sales level. It's a partnership and integration at the engineering level. >>Well, I think I'm really impressed with you guys as a company. I think you're an example of the kind of business model that people might have been afraid of which is being in the cloud, you can have a moat, you have competitive advantage, you can build intellectual property >>and, and john don't forget, it's all based on open source, open data, like almost everything that we've done. We've made available to people, we get 30 million downloads of the data bricks technology just for people that want to use it for free. So no vendor lock in. I think that's really important to most of our federal clients into everybody. >>I've always said competitive advantage scale and choice. Right. That's a data bricks. Howard? Thanks for coming on the key, appreciate it. Thanks again. Alright. Cube coverage here in Washington from face to face physical event were on the ground. Of course, we're also streaming a digital for the hybrid event. This is the cubes coverage of a W. S. Public sector Summit will be right back after this short break.
SUMMARY :
to the cube. Um, so there's no, you know, So that was the start of a great federal relationship But you guys have already cleared the runway with your value problems. But you know john it's The How are you guys migrating with your customers? So before I do that I want to tell you a quick story. I know one of the things that you guys are passionate So now you want to do natural language processing against them, make sure these interviews are of the highest quality So like how do you see the So now you have two copies of the data to governance models. I mean that that to me is re factoring that's not re platform And now you know at CMS, they have one copy of the data talk on the cube about like how software is changed the old days you put on the shelf shelf where they called So now when you go to the cloud, you think the data lake and uh the lake So so john you know, years ago people didn't believe the cloud When you think about this lake, Michigan is pretty big now, I think it's I of the data that you choose to share and data sharing is going to be the next uh So I totally would align with that and say I bet with you on that one. I mean I think that's a concept where it's like, you know what services So how do you get more See to us and you know, we have better integration with amazon services Well, I think I'm really impressed with you guys as a company. I think that's really important to most of our federal clients into everybody. Thanks for coming on the key, appreciate it.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
amazon | ORGANIZATION | 0.99+ |
Howard Levinson | PERSON | 0.99+ |
Washington | LOCATION | 0.99+ |
Skynet | ORGANIZATION | 0.99+ |
Howard | PERSON | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
two copies | QUANTITY | 0.99+ |
Washington, D. C. | LOCATION | 0.99+ |
two days | QUANTITY | 0.99+ |
30 million | QUANTITY | 0.99+ |
two versions | QUANTITY | 0.99+ |
keith brooks | PERSON | 0.99+ |
95% | QUANTITY | 0.99+ |
two separate copies | QUANTITY | 0.99+ |
Howard Levenson | PERSON | 0.99+ |
millions | QUANTITY | 0.99+ |
Ailene vedrine | PERSON | 0.99+ |
one copy | QUANTITY | 0.99+ |
four | QUANTITY | 0.99+ |
Sky | ORGANIZATION | 0.99+ |
10 years ago | DATE | 0.99+ |
five years | QUANTITY | 0.99+ |
first step | QUANTITY | 0.99+ |
28 different data sources | QUANTITY | 0.99+ |
Michigan | LOCATION | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Sky Computer | ORGANIZATION | 0.98+ |
United States | LOCATION | 0.98+ |
28,000 federal data centers | QUANTITY | 0.98+ |
billions of dollars | QUANTITY | 0.98+ |
28,000 federal data centers | QUANTITY | 0.98+ |
five years ago | DATE | 0.98+ |
second copy | QUANTITY | 0.98+ |
thousands of users | QUANTITY | 0.98+ |
pandemic | EVENT | 0.98+ |
AWS | EVENT | 0.97+ |
today | DATE | 0.97+ |
10th year | QUANTITY | 0.97+ |
W. S. Public sector Summit | EVENT | 0.97+ |
Lake House | LOCATION | 0.97+ |
john | PERSON | 0.96+ |
Air Force | ORGANIZATION | 0.96+ |
one | QUANTITY | 0.96+ |
Nasa | ORGANIZATION | 0.96+ |
Sky net | ORGANIZATION | 0.96+ |
each one | QUANTITY | 0.96+ |
Medicaid Medicare | ORGANIZATION | 0.95+ |
one thing | QUANTITY | 0.94+ |
24 | QUANTITY | 0.94+ |
data bricks | ORGANIZATION | 0.94+ |
U S. C. I. S. | LOCATION | 0.92+ |
up to 70 data sources | QUANTITY | 0.91+ |
Chief data officer | PERSON | 0.9+ |
first | QUANTITY | 0.89+ |
Govcloud | ORGANIZATION | 0.88+ |
Cloud Native | TITLE | 0.88+ |
one place | QUANTITY | 0.87+ |
GovCloud | TITLE | 0.87+ |
couple of years ago | DATE | 0.86+ |
Office of Management and Budget | ORGANIZATION | 0.85+ |
Sandy carter | PERSON | 0.84+ |
years ago | DATE | 0.83+ |
AWS public sector summit | EVENT | 0.83+ |
U. S. C. I. S | ORGANIZATION | 0.81+ |
Medicaid | ORGANIZATION | 0.79+ |
a minute | QUANTITY | 0.77+ |
number of years ago | DATE | 0.77+ |
a second | QUANTITY | 0.75+ |
center huggers | ORGANIZATION | 0.72+ |
Ng | TITLE | 0.71+ |
Andrew MacKay and Parasar Kodati | CUBE Conversation, August 2021
(upbeat music) >> Welcome to this CUBE conversation. I'm Lisa Martin. Today, we're going to be talking about the cyber protection and recovery solutions for unstructured data. I have two guests joining me, Andrew Mackay is here, The President of Superna, and Parasar Kodati, Senior Consultant, ISG Product Marketing at Dell technologies. Guys, great to have you on the program talking about cybersecurity, cyber resiliency. Something that we've heard a lot in the news in the last 18 months or so. Parasar, let's go ahead and start with you. Talk to us about what you're seeing from a cybersecurity perspective, some of the challenges the last 18 months or so, and then tell us what Dell is doing specifically to really infuse its storage solutions to enable customers to have that cyber resiliency that they need. >> Sure, Lisa. So today, there's no question that cyberattacks have become a serious threat for business operations, for organizations of all sizes across all industries. And if you look at the consequences, there is a huge financial impact of course, through the, like 70% of the cyberattacks when they're financially motivated. Look at the ransom part, which is a big financial impact in itself, but look at the lost revenue from disrupted operations, legal expenses, and sometimes regulatory fines, and so on, add up to the financial impact. And if you look at the data after data loss that is involved, data being such a critical asset for organizations, think about losing customer data, losing access to customer data or critical applications that depend on customer data. Similarly, data related to your business operations data that is source of your competitive advantage data that could be very confidential information as well. And when it comes to government organization, institutions, there is also the issue of national security and the need to protect critical infrastructure that depend on these IT systems as well. So absolutely it is becoming an imperative for IT organizations to improve the cyber resiliency, to boost the cyber resiliency of their organization. At Dell technologies, for the storage products that we offer, we have integrated solutions to protect the data in terms of detecting patterns of data access, to detect the cyber attacks in advance, to kind of put IT a step ahead of these attackers and also have the tools and technologies to recover from a cyberattack rapidly so that the business can continue to run. >> That recovery is absolutely critical. It's one thing to have all this data, customer data, PII, competitive advantage data, but you have to be able to recover it because as you said, we've seen this now become a matter of national security, infrastructure being threatened. The ransomware rise we have seen in the last 18 months has been unprecedented. I want to talk now, Andrew, about Superna. Talk to us about what you guys do and how you're a partner with Dell technologies and helping customers recover and really be cyber resilient. >> Yeah, we've been working with Dell for years. In fact, our products are built in targeting the Isilon PowerScale platform. So we're at very closely tightly integrated solution that focuses on solving one problem, solving it really well. >> Talk to me a little bit about what you guys are doing specifically with the Dell technology storage solutions to help customers in any industry be able to recover. As we know now, ransomware is not, if it happens to us, it's a wand. Give us a little bit more of a dissection of those solutions. >> So when we looked at this problem, it's associated with files, right? But today, there's files and objects, objects and other types of unstructured data. So we've built a solution that addresses both file and object. But one of the areas that we think is important for customers to consider is the framework that they choose. They shouldn't just jump in and start looking for products. They should step back and take a look at what frameworks exist. For instance, the NIST framework, that guides them in how they build and tick off all the key boxes and how to build a cyber resilient solution. >> So for companies that are using traditional legacy tools, backup and restore it, how was what Superna enables, how is it different? >> So the buzzword these days is zero trust. So I'm going to use the buzzword. So we use a zero trust model, but really that comes down to being proactive. And I consider a backup/restore, a bit of a legacy approach. That's just restore the data after you've been attacked. So we think you should get in front of the problem and don't trust any of the access to the storage and try to take care of the problem at the source, which means detection patterns, locking usually out of the file system, reacting in real time to real-time IO that's being processed by a storage device. >> Got it. Parasar, let's talk now about unstructured data specifically and why does it need protection against the attacks? >> Traditionally, structured data or the enterprise databases have been the more critical data to protect, but more and more unstructured data is also becoming a source of competitive differentiation for customers. Think about artificial intelligence, machine learning, internet of things, a lot of edge computing. And a lot of this data is actually being stored on highly scalable NAS platforms like Dell EMC PowerScale. And this is where, given the volume of the data involved, we actually have a unique solution for unstructured data to protect it from cyberattacks and also having the recovery mechanisms in place. So most of the audience might have already heard about the PowerProtect Cyber Recovery solution, but for unstructured data, we have something unique in the industry in terms of rapid recovery of large amount of data within a few hours for a business to be up and running in the event of a cyberattack. So when it comes to the data protection technologies on the PowerScale platform, we have, starting from the operating system, the OneFS, already has a great foundation in terms of access control, separate access zones that can be protected. And these things work across multiple protocols, which is a really key thing about how this technology works in terms of access control. But thanks to the great technology that Andrew and his team is building, the Ransomware Defender, real-time access auditing. These products from the core, kind of cyber resiliency framework when it comes to unstructured data on power skill platforms. >> Got it. Andrew, let's talk about the NIST framework. As we've talked about in the last few minutes, cybersecurity has really become quite a business. Unfortunately, in the last 18 months, we've seen huge x-fold increases in ransomware attacks of any type of company. Talk to me about how, where are those conversations? Are you having conversations at the board level, at the C-level, in terms of the right cyber resiliency framework that organizations need to put in place? >> Yeah, we talk with customers almost daily. That's a daily conversation we have with customers about the requirements and the frameworks offer. And then this one, especially offers all of the key requirements from detection to prevention to recovery. And if you look at all of those requirements, you may end up with multiple products. And so we've built a solution that can address all of the key requirements in a single product. So for example, I mentioned detection and mitigation and recovery. Well, that's our protect the data at the source strategy, but the number one recommendation these days is to have an offline copy of your data. And that requires a cyber vault solution where you're going to take a copy of your data, place it in an offline storage device and you're going to manage that through some sort of automation. We've married those two requirements into a single product. So we actually look at the whole framework and can comply with all aspects of that, including the offline component. And that's one of the sort of secret sauce, part of our solution is that we can both protect at the source and maintain and monitor the offline copy of the data as well at the same time. >> So, the offline copy, interesting. Talk to me about how frequently is that updated so that if a business has to go back and restore and recover, they can. What's that timeframe of how frequently that's updated? >> So generally, we recommend about 24 hours. Because in reality, it's going to take time to uncover that there's something seriously wrong with your production data. In the case of our solution, the hope and intent is that really the problem is addressed right at the source, meaning we've detected ransomware on the source data and we can protect it and stop it before it actually ends up in your cyber vault. That's really the key to our solution. But if you have that day, recovery with the Isilon PowerScale snapshotting features, you can revert petabytes of data and bring it online in a worst-case scenario. And we tell customers, you need to work backwards from what is the worst case. And if you do that, you're going to realize that what you need is petabyte scale data recovery with your offline data. And that's a very hard problem to solve that we think we've solved really well with the PowerScale. >> And just sticking with you for a second. In the last year and a half, since things have been so turbulent, have you seen any industries in particular that have come to you saying, we really need to get ahead of this challenging situation as we've seen attacks across infrastructure? I mean, you name it, we've seen it. >> Yeah, the number one vertical for sure is healthcare. Healthcare has been the target. In fact, it was last October. I think the FBI made an announcement to all healthcare organizations to improve their cybersecurity. That's probably our largest vertical, but there really isn't a vertical that doesn't feel the need to do something more than they are today. Finance of course, manufacturing, retail. Basically, there's no target that isn't the target these days. But I would say for sure, it's going to be healthcare because they have a willingness and a need to have their data online all the time. >> Right, and it's absolutely a such critical information. Parasar, back to you. I'm curious to understand maybe any joint customers that you guys are working together with and how they have, what are some of the recovery time and the recovery point objectives that you're able to help them achieve? >> Sure, Lisa. So with Ransomware Defender, for example, there are more than thousand customers, almost thousand, we are very close, I think the exact number is around 970 or something, but have adopted this set of tools to boost their cyber resiliency in terms of being able to detect these attack patterns or any indications of a compromised through the way data is being accessed or the kinds of users that are accessing the data and so on. But also when it comes to isolation of the data, that has also been a lot of interest for customers to be able to have this cyber ward, which is air gap from your primary infrastructure. And of course, which is regulated with a lot of intelligence in terms of looking for any flags to close the connection and continue to replicate data or to terminate the connection and keep the cyber ward secure. So, absolutely. >> Andrew, how do you guys help? First of all, is it possible for companies to be able to stay ahead of the attackers? The attackers are also taking advantage of the emerging technologies that businesses are, but how do you, if the answer is yes, how do you help companies stay ahead of those attackers? >> I think a prime example of that is if you look at ransomware today and there's publicized versions or variants or names of it, they all attack files. But the bad actors are looking for the weak link. They're always looking for the weak link to go after the corporate data. And so the new frontier is object storage because these types of systems are compliance data. It's frequently used to store backup data, and that is a prime target for attackers. And so the security tools and the maturity of the technology to protect object data is nowhere near what's in place for file data. So we've announced and released the ability to protect object data in real-time, the same way we've already done it for years for file data, because we understand that that's just the next target. And so we were offering that type of solution in a unified single product. >> And the last question, Parasar for you. Where can folks go to learn more about this joint solution and how can they get started with it? >> Sure, Lisa. delltechnologies.com/powerscale, that's the unstructured data platform or the scale of NAS platform from Dell technologies. And we have great content there to educate customers about the nature of this cyberattacks and what kind of data is at risk and what is the kind of steps that can take to the point that Andrew mentioned, to build a cyber resiliency strategy as well as how to use these tools effectively to protect against attacks and also be very agile when it comes to recovery. >> Right, that agility with respect to recovery is critical because as we know, the trends are that we're only going to see cybersecurity and risks and attacks increase in some businesses and every industry are vulnerable and really need to put in place the right types of strategies and solutions to be able to recover when something happens. Guys, thank you so much for joining me. This is such an interesting topic. Great to hear about the partnership with Superna and Dell Technologies. And I'm sure your joint customers are very appreciative of the work that you're doing together. >> Thank you, Lisa. >> Great, thank you. >> From my guests, I'm Lisa Martin and you're watching a CUBE conversation. (upbeat music)
SUMMARY :
in the last 18 months or so. and the need to protect Talk to us about what you guys do in targeting the Isilon if it happens to us, it's a wand. and how to build a cyber the access to the storage protection against the attacks? So most of the audience Unfortunately, in the last 18 months, and monitor the offline copy so that if a business has to go back That's really the key to our solution. that have come to you saying, that isn't the target these days. and the recovery point objectives and keep the cyber ward secure. the ability to protect And the last question, Parasar for you. about the nature of this cyberattacks of the work that you're doing together. I'm Lisa Martin and you're
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Andrew | PERSON | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
FBI | ORGANIZATION | 0.99+ |
Andrew Mackay | PERSON | 0.99+ |
August 2021 | DATE | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
70% | QUANTITY | 0.99+ |
Lisa | PERSON | 0.99+ |
Superna | ORGANIZATION | 0.99+ |
two guests | QUANTITY | 0.99+ |
Today | DATE | 0.99+ |
Andrew MacKay | PERSON | 0.99+ |
Parasar Kodati | PERSON | 0.99+ |
last October | DATE | 0.99+ |
two requirements | QUANTITY | 0.99+ |
today | DATE | 0.99+ |
around 970 | QUANTITY | 0.98+ |
ISG | ORGANIZATION | 0.98+ |
more than thousand customers | QUANTITY | 0.98+ |
both | QUANTITY | 0.98+ |
Dell Technologies | ORGANIZATION | 0.98+ |
single product | QUANTITY | 0.98+ |
single | QUANTITY | 0.98+ |
about 24 hours | QUANTITY | 0.97+ |
zero trust | QUANTITY | 0.97+ |
last year and a half | DATE | 0.96+ |
one | QUANTITY | 0.96+ |
CUBE | ORGANIZATION | 0.96+ |
last 18 months | DATE | 0.95+ |
one problem | QUANTITY | 0.95+ |
one thing | QUANTITY | 0.93+ |
Lisa. delltechnologies.com/powerscale | OTHER | 0.9+ |
Isilon | ORGANIZATION | 0.88+ |
both file | QUANTITY | 0.85+ |
years | QUANTITY | 0.82+ |
Ransomware Defender | TITLE | 0.8+ |
Superna | TITLE | 0.8+ |
PowerScale | TITLE | 0.79+ |
OneFS | COMMERCIAL_ITEM | 0.79+ |
NIST | ORGANIZATION | 0.73+ |
First | QUANTITY | 0.7+ |
Parasar | PERSON | 0.69+ |
ransomware | TITLE | 0.69+ |
PowerScale | COMMERCIAL_ITEM | 0.69+ |
thousand | QUANTITY | 0.68+ |
Parasar | ORGANIZATION | 0.6+ |
last few minutes | DATE | 0.58+ |
second | QUANTITY | 0.58+ |
PowerProtect | COMMERCIAL_ITEM | 0.54+ |
cyberattacks | QUANTITY | 0.52+ |
President | PERSON | 0.52+ |
EMC | COMMERCIAL_ITEM | 0.46+ |
Vijoy Pandey, Cisco | | Cisco Future Cloud
>>from around the globe it's the >>cube >>presenting >>Future Cloud one event. A >>world of >>opportunities >>brought to you by Cisco. We're here with Dejoy Pandey a VP of emerging tech and incubation at Cisco. V. Joy. Good to see you welcome. >>Good to see you as well. Thank you Dave and pleasure to be here. >>So in 2020 we kind of had to redefine the notion of agility when it came to digital business or you know organizations, they had to rethink their concept of agility and business resilience. What are you seeing in terms of how companies are thinking about their operations in this sort of new abnormal context? >>Yeah I think that's a great question I think what what we're seeing is that pretty much the application is the center of the universe and if you think about it the application is actually driving brand recognition and the brand experience and the brand value. So the example I like to give is think about a banking app uh recovered that did everything that you would expect it to do. But if you wanted to withdraw cash from your bank you would actually have to go to the ATM and punch in some numbers and then look at your screen and go through a process and then finally withdraw cash. Think about what that would have, what that would do in a post pandemic era where people are trying to go contact less. And so in a situation like this the digitization efforts that all of these companies are going through and the modernization of the automation is what is driving brand recognition, brand trust and brand experience. >>Yeah. So I was gonna ask you when I heard you say that, I was gonna say well but hasn't it always been about the application? But it's different now, isn't it? So I wonder if you talk more about how the application is experience is changing? Yes. As a result of this new digital mandate. But how should organizations think about optimizing those experiences in this new world? >>Absolutely. And I think, yes, it's always been about the application, but it's becoming the center of the universe right now because all interactions with customers and consumers and even businesses are happening through that application. So if the application is unreliable or if the application is not available is untrusted insecure, uh, there's a problem. There's a problem with the brand with the company and the trust that consumers and customers have with our company. So if you think about an application developer, the weight he or she is carrying on their shoulders is tremendous because you're thinking about rolling features quickly to be competitive. That's the only way to be competitive in this world. You need to think about availability and resiliency, like you pointed out and experience, you need to think about security and trust. Am I as a customer or consumer willing to put my data in that application? So velocity availability, security and trust and all of that depends on the developer. So the experience, the security, the trust, the feature velocity is what is driving the brand experience now. >>So are those two tensions that say agility and trust, you know, zero trust used to be a buzzword now, it's a mandate. But are those two vectors counter posed? Can they be merged into one and not affect each other? Does the question makes sense? Right? Security usually handcuffs my speed. But how do you address that? >>Yeah, that's a great question. And I think if you think about it today, that's the way things are. And if you think about this developer, all they want to do is run fast because they want to build those features out and they're going to pick and choose a purpose and services that matter to them and build up their app and they want the complexities of the infrastructure and security and trust to be handled by somebody else is not that they don't care about it, but they want that abstraction so that is handled by somebody else. And typically within an organization we've seen in the past where there's friction between Netapp, Succop cited hopes and the cloud platform teams and the developer on one side and these these frictions and these meetings and toil actually take a toll on the developer and that's why companies and apps and developers are not as agile as they would like to be. So I think, but it doesn't have to be that way. So I think if there was something that would allow a developer to pick and choose, discover the apis that they would like to use, connect those api is in a very simple manner and then be able to scale them out and be able to secure them and in fact not just secure them during the run time when it's deployed, we're right off the back when the fire up that I'd and start developing the application, wouldn't that be nice? And as you do that, there is a smooth transition between that discovery connectivity and ease of consumption and security with the idea cops, netapp psych ops teams and see source to ensure that they are not doing something that the organization won't allow them to do in a very seamless manner. >>I want to go back and talk about security but I want to add another complexity before we do that. So for a lot of organizations in the public cloud became a staple of keeping the lights on during the pandemic. But it brings new complexities and differences in terms of latency security, which I want to come back to deployment models etcetera. So what are some of the specific networking challenges that you've seen with the cloud? Native architecture is how are you addressing those? >>Yeah. In fact, if you think about cloud, to me that is a that is a different way of seeing a distributed system. And if you think about a distributed system, what is at the center of the distributed system is the network. So my my favorite comment here is that the network is the wrong time for all distribute systems and modern applications. And that is true because if you think about where things are today, like you said, there's there's cloud assets that a developer might use in the banking example that I gave earlier. I mean if you want to build a contact less app so that you get verified, a customer gets verified on the app. They walk over to the ATM and they were broadcast without touching that ATM. In that kind of an example, you're touching the mobile Rus, let's say, Ohio escapees, you're touching Cloud API is where the back end might sit, you're touching on primary purpose, maybe it's an oracle database or a mainframe even where transactional data exists, you're touching branch pipes were the team actually exists and the need for consistency when you withdraw cash and you're carrying all of this and in fact there might be customer data sitting in Salesforce somewhere. So it's cloud API is a song premise branch, it's ass is mobile and you need to bring all of these things together and over time you will see more and more of these API is coming from various as providers. So it's not just cloud providers but saAS providers that the developer has to use. And so this complexity is very very real and this complexity is across the wide open internet. So the application is built across this wide open internet. So the problems of discovery ability, the problems of being able to simply connect these apis and manage the data flow across these apis. The problems of consistency of policy and consumption because all of these areas have their own nuances and what they mean, what the arguments mean and what the A. P. I. Actually means. How do you make it consistent and easy for the developer? That is the networking problem. And that is a problem of building out this network, making traffic engineering easy making policy easy, making scale out, scale down easy, all of that our networking problems. And so we are solving those problems. Uh Francisco >>Yeah the internet is the new private network but it's not so private. So I want to go back to security. I often say that the security model of building a moat, you dig the moat, you get the hardened castle that's just outdated now that the queen is left her castle. I always say it's dangerous out there. And the point is you touched on this? It's it's a huge decentralized system and with distributed apps and data, that notion of perimeter security, it's just no longer valid. So I wonder if you could talk more about how you're thinking about this problem and you definitely address some of that in your earlier comments. But what are you specifically doing to address this? And how do you see it evolving? >>Yeah, I mean that that's that's a very important point. I mean I think if you think about again the wide open internet being the wrong time for all modern applications, what is perimeter security in this uh in this new world? I mean it's to me it boils down to securing an API because again, going with that running example of this contact lists cash withdrawal feature for a bank. The FBI wherever it sits on tram branch sas cloud, IOS android doesn't matter that FBI is your new security perimeter and the data object that is trying to access is also the new security perimeter. So if you can secure ap to ap communication and P two data object communication, you should be good. So that is the new frontier. But guess what? Software is buggy? Everybody's software not saying Cisco software, everybody's Softwares buggy. Uh software is buggy, humans are not reliable and so things mature, Things change, Things evolve over time. So there needs to be defense in depth. So you need to secure at the API layer had the data object layer, but you also need to secure at every layer below it so that you have good defense and depth if any layer in between is not working out properly. So for us that means ensuring ap to ap communication, not just during long time when the app has been deployed and is running, but during deployment and also during the development life cycle. So as soon as the developer launches an ID, they should be able to figure out that this API is security uses reputable. It has compliant, it is compliant to my my organization's needs because it is hosted, let's say from Germany and my organization wants a P is to be used only if they are being hosted out of Germany. So compliance needs and and security needs and reputation. Is it available all the time? Is it secure and being able to provide that feedback all the time between the security teams and the developer teams in a very seamless real time manner? Yes, again, that's something that we're trying to solve through some of the services that we're trying to produce in SAN Francisco. >>Yeah, I mean those that layered approach that you're talking about is critical because every layer has, you know, some vulnerability and so you you've got to protect that with some depth in terms of thinking about security, how should we think about where where Cisco's primary value add is, I mean it's parts of the interview has a great security business. Is growing business. Is it your intention to to to to add value across the entire value chain? I mean obviously you can't do everything so you've got a partner but so has the we think about Cisco's role over the next I'm thinking longer term over the over the next decade. >>Yeah, I mean I think so. We do come in with good strength from the runtime side of the house. So if you think about the security aspects that we haven't played today, uh there's a significant set of assets that we have around user security around around uh with with do and password less. We have significant assets in random security. I mean the entire portfolio that Cisco brings to the table is I don't run time security. The security checks aspects around posture and policy that will bring to the table. And as you see, Cisco evolve over time, you will see us shifting left. I mean I know it's an overused term, but that is where security is moving towards. And so that is where api security and data security are moving towards. So learning what we have during runtime. Because again, runtime is where you learn what's available and that's where you can apply all of the M. L. And I models to figure out what works what doesn't taking those learnings, Taking those catalogs, taking that reputation database and moving it into the deployment and development life cycle and making sure that that's part of that entire they have to deploy to runtime chain is what you will see Cisco do overtime. >>That's fantastic phenomenal perspective video. Thanks for coming on the cube. Great to have you and look forward to having you again. >>Absolutely. Thank you. Pleasure to be here. >>This is Dave Volonte for the cube. Thank you for watching. Mhm. >>Mhm mm.
SUMMARY :
Good to see you welcome. Good to see you as well. to digital business or you know organizations, they had to rethink their concept of agility and is the center of the universe and if you think about it the application is actually driving So I wonder if you talk more about how the application is experience is So if you think about an application developer, But how do you address that? And I think if you think about it today, that's the Native architecture is how are you addressing And that is true because if you think about where things are today, I often say that the security model of building a moat, you dig the moat, So as soon as the developer launches an ID, they should be able to figure out I mean obviously you can't do everything so you've got a partner but so has the we think about Cisco's role So if you think about the security aspects that we haven't played Great to have you and look forward to having you again. Pleasure to be here. Thank you for watching.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Dave Volonte | PERSON | 0.99+ |
Cisco | ORGANIZATION | 0.99+ |
Germany | LOCATION | 0.99+ |
Dave | PERSON | 0.99+ |
SAN Francisco | LOCATION | 0.99+ |
FBI | ORGANIZATION | 0.99+ |
Dejoy Pandey | PERSON | 0.99+ |
2020 | DATE | 0.99+ |
Vijoy Pandey | PERSON | 0.99+ |
two tensions | QUANTITY | 0.99+ |
two vectors | QUANTITY | 0.99+ |
today | DATE | 0.98+ |
IOS | TITLE | 0.98+ |
Ohio | LOCATION | 0.96+ |
pandemic | EVENT | 0.92+ |
one | QUANTITY | 0.91+ |
one side | QUANTITY | 0.89+ |
zero trust | QUANTITY | 0.87+ |
Netapp | ORGANIZATION | 0.86+ |
next decade | DATE | 0.85+ |
V. Joy | PERSON | 0.79+ |
Cloud API | TITLE | 0.79+ |
Cisco Future Cloud | ORGANIZATION | 0.77+ |
Francisco | PERSON | 0.72+ |
Salesforce | TITLE | 0.72+ |
M. L. | PERSON | 0.72+ |
Succop | ORGANIZATION | 0.68+ |
agile | TITLE | 0.6+ |
android | TITLE | 0.6+ |
Cloud | EVENT | 0.53+ |
CISCO FUTURE CLOUD FULL V3
>>mhm, mm. All right. Mhm. Mhm, mm mm. Mhm. Yeah, mm. Mhm. Yeah, yeah. Mhm, mm. Okay. Mm. Yeah, Yeah. >>Mhm. Mhm. Yeah. Welcome to future cloud made possible by Cisco. My name is Dave Volonte and I'm your host. You know, the cloud is evolving like the universe is expanding at an accelerated pace. No longer is the cloud. Just a remote set of services, you know, somewhere up there. No, the cloud, it's extending to on premises. Data centers are reaching into the cloud through adjacent locations. Clouds are being connected together to each other and eventually they're gonna stretch to the edge and the far edge workloads, location latency, local laws and economics will define the value customers can extract from this new cloud model which unifies the operating experience independent of location. Cloud is moving rapidly from a spare capacity slash infrastructure resource to a platform for application innovation. Now, the challenge is how to make this new cloud simple, secure, agile and programmable. Oh and it has to be cloud agnostic. Now, the real opportunity for customers is to tap into a layer across clouds and data centers that abstracts the underlying complexity of the respective clouds and locations. And it's got to accommodate both mission critical workloads as well as general purpose applications across the spectrum cost, effectively enabling simplicity with minimal labor costs requires infrastructure i. E. Hardware, software, tooling, machine intelligence, AI and partnerships within an ecosystem. It's kind of accommodate a variety of application deployment models like serverless and containers and support for traditional work on VMS. By the way, it also requires a roadmap that will take us well into the next decade because the next 10 years they will not be like the last So why are we here? Well, the cube is covering Cisco's announcements today that connect next generation compute shared memory, intelligent networking and storage resource pools, bringing automation, visibility, application assurance and security to this new decentralized cloud. Now, of course in today's world you wouldn't be considered modern without supporting containers ai and operational tooling that is demanded by forward thinking practitioners. So sit back and enjoy the cubes, special coverage of Cisco's future cloud >>From around the globe. It's the Cube presenting future cloud one event, a world of opportunities brought to you by Cisco. >>We're here with Dejoy Pandey, a VP of emerging tech and incubation at Cisco. V. Joy. Good to see you. Welcome. >>Good to see you as well. Thank you Dave and pleasure to be here. >>So in 2020 we kind of had to redefine the notion of agility when it came to digital business or you know organizations, they had to rethink their concept of agility and business resilience. What are you seeing in terms of how companies are thinking about their operations in this sort of new abnormal context? >>Yeah, I think that's a great question. I think what what we're seeing is that pretty much the application is the center of the universe. And if you think about it, the application is actually driving brand recognition and the brand experience and the brand value. So the example I like to give is think about a banking app uh recovered that did everything that you would expect it to do. But if you wanted to withdraw cash from your bank you would actually have to go to the ATM and punch in some numbers and then look at your screen and go through a process and then finally withdraw cash. Think about what that would have, what what that would do in a post pandemic era where people are trying to go contact less. And so in a situation like this, the digitization efforts that all of these companies are going through and and the modernization of the automation is what is driving brand recognition, brand trust and brand experience. >>Yeah. So I was gonna ask you when I heard you say that, I was gonna say well, but hasn't it always been about the application, but it's different now, isn't it? So I wonder if you talk more about how the application is experience is changing. Yes. As a result of this new digital mandate. But how should organizations think about optimizing those experiences in this new world? >>Absolutely. And I think, yes, it's always been about the application, but it's becoming the center of the universe right now because all interactions with customers and consumers and even businesses are happening through that application. So if the application is unreliable or if the application is not available is untrusted insecure, uh, there's a problem. There's a problem with the brand, with the company and the trust that consumers and customers have with our company. So if you think about an application developer, the weight he or she is carrying on their shoulders is tremendous because you're thinking about rolling features quickly to be competitive. That's the only way to be competitive in this world. You need to think about availability and resiliency. Like you pointed out and experience, you need to think about security and trust. Am I as a customer or consumer willing to put my data in that application? So velocity, availability, Security and trust and all of that depends on the developer. So the experience, the security, the trust, the feature, velocity is what is driving the brand experience now. >>So are those two tensions that say agility and trust, you know, Zero Trust used to be a buzzword now it's a mandate. But are those two vectors counter posed? Can they be merged into one and not affect each other? Does the question makes sense? Right? Security usually handcuffs my speed. But how do you address that? >>Yeah that's a great question. And I think if you think about it today that's the way things are. And if you think about this developer all they want to do is run fast because they want to build those features out and they're going to pick and choose a piece and services that matter to them and build up their app and they want the complexities of the infrastructure and security and trust to be handled by somebody else is not that they don't care about it but they want that abstraction so that is handled by somebody else. And typically within an organization we've seen in the past where this friction between Netapp Sec ops I. T. Tops and and the cloud platform Teams and the developer on one side and these these frictions and these meetings and toil actually take a toll on the developer and that's why companies and apps and developers are not as agile as they would like to be. So I think but it doesn't have to be that way. So I think if there was something that would allow a developer to pick and choose, discover the apis that they would like to use connect those api is in a very simple manner and then be able to scale them out and be able to secure them and in fact not just secure them during the run time when it's deployed. We're right off the back when the fire up that I'd and start developing the application. Wouldn't that be nice? And as you do that, there is a smooth transition between that discovery connectivity and ease of consumption and security with the idea cops. Netapp psych ops teams and see source to ensure that they are not doing something that the organization won't allow them to do in a very seamless manner. >>I want to go back and talk about security but I want to add another complexity before we do that. So for a lot of organizations in the public cloud became a staple of keeping the lights on during the pandemic but it brings new complexities and differences in terms of latency security, which I want to come back to deployment models etcetera. So what are some of the specific networking challenges that you've seen with the cloud native architecture is how are you addressing those? >>Yeah. In fact, if you think about cloud, to me that is a that is a different way of seeing a distributed system. And if you think about a distributed system, what is at the center of the distributed system is the network. So my my favorite comment here is that the network is the wrong time for all distribute systems and modern applications. And that is true because if you think about where things are today, like you said, there's there's cloud assets that a developer might use in the banking example that I gave earlier. I mean if you want to build a contact less app so that you get verified, a customer gets verified on the app. They walk over to the ATM and they were broadcast without touching that ATM. In that kind of an example, you're touching the mobile Rus, let's say U S A P is you're touching cloud API is where the back end might sit. You're touching on primary PS maybe it's an oracle database or a mainframe even where transactional data exists. You're touching branch pipes were the team actually exists and the need for consistency when you withdraw cash and you're carrying all of this and in fact there might be customer data sitting in salesforce somewhere. So it's cloud API is a song premise branch. It's ass is mobile and you need to bring all of these things together and over time you will see more and more of these API is coming from various as providers. So it's not just cloud providers but saas providers that the developer has to use. And so this complexity is very, very real. And this complexity is across the wide open internet. So the application is built across this wide open internet. So the problems of discovery ability, the problems of being able to simply connect these apis and manage the data flow across these apis. The problems of consistency of policy and consumption because all of these areas have their own nuances and what they mean, what the arguments mean and what the A. P. I. Actually means. How do you make it consistent and easy for the developer? That is the networking problem. And that is a problem of building out this network, making traffic engineering easy, making policy easy, making scale out, scale down easy, all of that our networking problems. And so we are solving those problems uh Francisco. >>Yeah the internet is the new private network but it's not so private. So I want to go back to security. I often say that the security model of building a moat, you dig the moat, you get the hardened castle that's just outdated now that the queen is left her castle, I always say it's dangerous out there. And the point is you touched on this, it's it's a huge decentralized system and with distributed apps and data, that notion of perimeter security, it's just no longer valid. So I wonder if you could talk more about how you're thinking about this problem and you definitely address some of that in your earlier comments. But what are you specifically doing to address this and how do you see it evolving? >>Yeah, I mean, that's that's a very important point. I mean, I think if you think about again the wide open internet being the wrong time for all modern applications, what is perimeter security in this uh in this new world? I mean, it's to me it boils down to securing an API because again, going with that running example of this contact lists cash withdrawal feature for a bank, the ap wherever it's it's entre branch SAs cloud, IOS android doesn't matter that FBI is your new security perimeter. And the data object that is trying to access is also the new security perimeter. So if you can secure ap to ap communication and P two data object communication, you should be good. So that is the new frontier. But guess what software is buggy? Everybody's software not saying Cisco software, everybody's Softwares buggy. Uh software is buggy, humans are not reliable and so things mature, things change, things evolve over time. So there needs to be defense in depth. So you need to secure at the API layer had the data object layer, but you also need to secure at every layer below it so that you have good defense and depth if any layer in between is not working out properly. So for us that means ensuring ap to ap communication, not just during long time when the app has been deployed and is running, but during deployment and also during the development life cycle. So as soon as the developer launches an ID, they should be able to figure out that this api is security uses reputable, it has compliant, it is compliant to my to my organization's needs because it is hosted, let's say from Germany and my organization wants appears to be used only if they are being hosted out of Germany so compliance needs and and security needs and reputation. Is it available all the time? Is it secure? And being able to provide that feedback all the time between the security teams and the developer teams in a very seamless real time manner. Yes, again, that's something that we're trying to solve through some of the services that we're trying to produce in san Francisco. >>Yeah, I mean those that layered approach that you're talking about is critical because every layer has, you know, some vulnerability. And so you you've got to protect that with some depth in terms of thinking about security, how should we think about where where Cisco's primary value add is, I mean as parts of the interview has a great security business is growing business, Is it your intention to to to to add value across the entire value chain? I mean obviously you can't do everything so you've got a partner but so has the we think about Cisco's role over the next I'm thinking longer term over the over the next decade. >>Yeah, I mean I think so, we do come in with good strength from the runtime side of the house. So if you think about the security aspects that we haven't played today, uh there's a significant set of assets that we have around user security around around uh with with do and password less. We have significant assets in runtime security. I mean, the entire portfolio that Cisco brings to the table is around one time security, the secure X aspects around posture and policy that will bring to the table. And as you see, Cisco evolve over time, you will see us shifting left. I mean, I know it's an overused term, but that is where security is moving towards. And so that is where api security and data security are moving towards. So learning what we have during runtime because again, runtime is where you learn what's available and that's where you can apply all of the M. L. And I models to figure out what works what doesn't taking those learnings, Taking those catalogs, taking that reputation database and moving it into the deployment and development life cycle and making sure that that's part of that entire they have to deploy to runtime chain is what you will see. Cisco do overtime. >>That's fantastic phenomenal perspective video. Thanks for coming on the cube. Great to have you and look forward to having you again. >>Absolutely. Thank you >>in a moment. We'll talk hybrid cloud applications operations and potential gaps that need to be addressed with costume, Das and VJ Venugopal. You're watching the cube the global leader in high tech coverage. Mhm >>You were cloud. It isn't just a cloud. It's everything flowing through it. It's alive. Yeah, connecting users, applications, data and devices and whether it's cloud, native hybrid or multi cloud, it's more distributed than ever. One company takes you inside, giving you the visibility and the insight you need to take action. >>One company >>has the vision to understand it, all the experience, to securely connect at all on any platform in any environment. So you can work wherever work takes you in a cloud first world between your cloud and being cloud smart, there's a bridge. Cisco the bridge to possible. >>Okay. We're here with costume does, who is the Senior Vice President, General Manager of Cloud and compute at Cisco. And VJ Venugopal, who is the Senior Director for Product Management for cloud compute at Cisco. KTV. J. Good to see you guys welcome. >>Great to see you. Dave to be here. >>Katie, let's talk about cloud you And I last time we're face to face was in Barcelona where we love talking about cloud and I always say to people look, Cisco is not a hyper Scaler, but the big public cloud players, they're like giving you a gift. They spent almost actually over $100 billion last year on Capex. The big four. So you can build on that infrastructure. Cisco is all about hybrid cloud. So help us understand the strategy. There may be how you can leverage that build out and importantly what a customer is telling you they want out of hybrid cloud. >>Yeah, no that's that's that's a perfect question to start with. Dave. So yes. So the hybrid hyper scholars have invested heavily building out their assets. There's a great lot of innovation coming from that space. Um There's also a great innovation set of innovation coming from open source and and that's another source of uh a gift. In fact the I. T. Community. But when I look at my customers they're saying well how do I in the context of my business implement a strategy that takes into consideration everything that I have to manage um in terms of my contemporary work clothes, in terms of my legacy, in terms of everything my developer community wants to do on DEVOPS and really harnessed that innovation that's built in the public cloud, that built an open source that built internally to me, and that naturally leads them down the path of a hybrid cloud strategy. And Siskel's mission is to provide for that imperative, the simplest more power, more powerful platform to deliver hybrid cloud and that platform. Uh It's inter site we've been investing in. Inner side, it's a it's a SAS um service um inner side delivers to them that bridge between their estates of today that were closer today, the need for them to be guardians of enterprise grade resiliency with the agility uh that's needed for the future. The embracing of cloud. Native of new paradigms of deVOPS models, the embracing of innovation coming from public cloud and an open source and bridging those two is what inner side has been doing. That's kind of that's kind of the crux of our strategy. Of course we have the entire portfolio behind it to support any, any version of that, whether that is on prem in the cloud, hybrid, cloud, multi cloud and so forth. >>But but if I understand it correctly from what I heard earlier today, the inter site is really a linchpin of that strategy, is it not? >>It really is and may take a second to totally familiarize those who don't know inner side with what it is. We started building this platform quite a few years back and we we built a ground up to be an immensely scalable SAs, super simple hybrid cloud platform and it's a platform that provides a slew of service is inherently and then on top of that there are suites of services, the sweets of services that are tied to infrastructure, automation. Cisco, as well as Cisco partners. The streets of services that have nothing to do with Cisco um products from a hardware perspective. And it's got to do with more cloud orchestration and cloud native and inner side and its suite of services um continue to kind of increase in pace and velocity of delivery video. Just over the last two quarters we've announced a whole number of things will go a little bit deeper into some of those but they span everything from infrastructure automation to kubernetes and delivering community than service to workload optimization and having visibility into your cloud estate. How much it's costing into your on premise state into your work clothes and how they're performing. It's got integrations with other tooling with both Cisco Abdi uh as well as non Cisco um, assets and then and then it's got a whole slew of capabilities around orchestration because at the end of the day, the job of it is to deliver something that works and works at scale that you can monitor and make sure is resilient and that includes that. That includes a workflow and ability to say, you know, do this and do this and do this. Or it includes other ways of automation, like infrastructure as code and so forth. So it includes self service that so that expand that. But inside the world's simplest hybrid cloud platform, rapidly evolving rapidly delivering new services. And uh we'll talk about some more of those day. >>Great, thank you, Katie VJ. Let's bring you into the discussion. You guys recently made an announcement with the ASCIi corp. I was stoked because even though it seemed like a long time ago, pre covid, I mean in my predictions post, I said, ha, she was a name to watch our data partners. Et are you look at the survey data and they really have become mainstream? You know, particularly we think very important in the whole multi cloud discussion. And as well, they're attractive to customers. They have open source offerings. You can very easily experiment. Smaller organizations can take advantage. But if you want to upgrade to enterprise features like clustering or whatever, you can plug right in. Not a big complicated migration. So a very, very compelling story there. Why is this important? Why is this partnership important to Cisco's customers? Mhm. >>Absolutely. When the spot on every single thing that you said, let me just start by paraphrasing what ambition statement is in the cloud and computer group. Right ambition statement is to enable a cloud operating model for hybrid cloud. And what we mean by that is the ability to have extreme amounts of automation orchestration and observe ability across your hybrid cloud idea operations now. Uh So developers and applications team get a great amount of agility in public clouds and we're on a mission to bring that kind of agility and automation to the private cloud and to the data centers and inter site is a quickie platform and lynchpin to enable that kind of operations. Uh, Cloud like operations in the in the private clouds and the key uh As you rightly said, harsher car is the, you know, they were the inventors of the concept of infrastructure at school and in terra form, they have the world's number one infrastructure as code platform. So it became a natural partnership for Cisco to enter into a technology partnership with harsher card to integrate inter site with hardship cops, terra form to bring the benefits of infrastructure as code to the to hybrid cloud operations. And we've entered into a very tight integration and uh partnership where we allow developers devops teams and infrastructure or administrators to allow the use of infrastructure as code in a SAS delivered manner for both public and private club. So it's a very unique partnership and a unique integration that allows the benefits of cloud managed i E C. To be delivered to hybrid cloud operations. And we've been very happy and proud to be partnering with Russian government shutdown. >>Yeah, Terra form gets very high marks from customers. The a lot of value there. The inner side integration adds to that value. Let's stay on cloud native for a minute. We all talk about cloud native cady was sort of mentioning before you got the the core apps, uh you want to protect those, make sure their enterprise create but they gotta be cool as well for developers. You're connecting to other apps in the cloud or wherever. How are you guys thinking about this? Cloud native trend? What other movies are you making in this regard? >>I mean cloud native is there is one of the paramount I. D. Trends of today and we're seeing massive amounts of adoption of cloud native architecture in all modern applications. Now, Cloud Native has become synonymous with kubernetes these days and communities has emerged as a de facto cloud native platform for modern cloud native app development. Now, what Cisco has done is we have created a brand new SAs delivered kubernetes service that is integrated with inter site, we call it the inter site community service for A. Ks. And this just geared a little over one month ago. Now, what interstate kubernetes service does is it delivers a cloud managed and cloud delivered kubernetes service that can be deployed on any supported target infrastructure. It could be a Cisco infrastructure, it could be a third party infrastructure or it could even be public club. But think of it as kubernetes anywhere delivered as says, managed from inside. It's a very powerful capability that we've just released into inter site to enable the power of communities and clog native to be used to be used anywhere. But today we made a very important aspect because we are today announced the brand new Cisco service mess manager, the Cisco service mesh manager, which is available as an extension to the KS are doing decide basically we see service measures as being the future of networking right in the past we had layer to networking and layer three networking and now with service measures, application networking and layer seven networking is the next frontier of, of networking. But you need to think about networking for the application age very differently how it is managed, how it is deployed. It needs to be ready, developer friendly and developer centric. And so what we've done is we've built out an application networking strategy and built out the service match manager as a very simple way to deliver application networking through the consumers, like like developers and application teams. This is built on an acquisition that Cisco made recently of Banzai Cloud and we've taken the assets of Banzai Cloud and deliver the Cisco service mesh manager as an extension to KS. That brings the promise of future networking and modern networking to application and development gives >>God thank you. BJ. And so Katie, let's let's let's wrap this up. I mean, there was a lot in this announcement today, a lot of themes around openness, heterogeneity and a lot of functionality and value. Give us your final thoughts. >>Absolutely. So, couple of things to close on, first of all, um Inner side is the simplest, most powerful hybrid cloud platform out there. It enables that that cloud operating model that VJ talked about, but enables that across cloud. So it's sad, it's relatively easy to get into it and give it a spin so that I'd highly encouraged anybody who's not familiar with it to try it out and anybody who is familiar with it to look at it again, because they're probably services in there that you didn't notice or didn't know last time you looked at it because we're moving so fast. So that's the first thing. The second thing I close with is um, we've been talking about this bridge that's kind of bridging, bridging uh your your on prem your open source, your cloud estates. And it's so important to to make that mental leap because uh in past generation, we used to talk about integrating technologies together and then with public cloud, we started talking about move to public cloud, but it's really how do we integrate, how do we integrate all of that innovation that's coming from the hyper scale, is everything they're doing to innovate superfast, All of that innovation is coming from open source, all of that innovation that's coming from from companies around the world, including Cisco, How do we integrate that to deliver an outcome? Because at the end of the day, if you're a cloud of Steam, if you're an idea of Steam, your job is to deliver an outcome and our mission is to make it super simple for you to do that. That's the mission we're on and we're hoping that everybody that's excited as we are about how simple we made that. >>Great, thank you a lot in this announcement today, appreciate you guys coming back on and help us unpack you know, some of the details. Thank thanks so much. Great having you. >>Thank you >>Dave in a moment. We're gonna come back and talk about disruptive technologies and futures in the age of hybrid cloud with Vegas Rattana and James leach. You're watching the cube, the global leader in high tech coverage. >>What if your server box >>wasn't a box at >>all? What if it could do anything run anything? >>Be any box you >>need with massive scale precision and intelligence managed and optimized from the cloud integrated with all your clouds, private, public or hybrid. So you can build whatever you need today and tomorrow. The potential of this box is unlimited. Unstoppable unseen ever before. Unbox the future with Cisco UCS X series powered by inter site >>Cisco. >>The bridge to possible. Yeah >>we're here with Vegas Rattana who's the director of product management for Pcs at Cisco. And James Leach is the director of business development for U. C. S. At the Cisco as well. We're gonna talk about computing in the age of hybrid cloud. Welcome gentlemen. Great to see you. >>Thank you. >>Thank you because let's start with you and talk about a little bit about computing architectures. We know that they're evolving. They're supporting new data intensive and other workloads especially as high performance workload requirements. What's this guy's point of view on all this? I mean specifically interested in your thoughts on fabrics. I mean it's kind of your wheelhouse, you've got accelerators. What are the workloads that are driving these evolving technologies and how how is it impacting customers? What are you seeing? >>Sure. First of all, very excited to be here today. You're absolutely right. The pace of innovation and foundational platform ingredients have just been phenomenal in recent years. The fabric that's writers that drives the processing power, the Golden city all have been evolving just an amazing place and the peace will only pick up further. But ultimately it is all about applications and the way applications leverage those innovations. And we do see applications evolving quite rapidly. The new classes of applications are evolving to absorb those innovations and deliver much better business values. Very, very exciting time step. We're talking about the impact on the customers. Well, these innovations have helped them very positively. We do see significant challenges in the data center with the point product based approach of delivering these platforms, innovations to the applications. What has happened is uh, these innovations today are being packaged as point point products to meet the needs of a specific application and as you know, the different applications have no different needs. Some applications need more to abuse, others need more memory, yet others need, you know, more course, something different kinds of fabrics. As a result, if you walk into a data center today, it is very common to see many different point products in the data center. This creates a manageability challenge. Imagine the aspect of managing, you know, several different form factors want you to you purpose built servers. The variety of, you know, a blade form factor, you know, this reminds me of the situation we had before smartphones arrived. You remember the days when you when we used to have a GPS device for navigation system, a cool music device for listening to the music. A phone device for making a call camera for taking the photos right? And we were all excited about it. It's when a smart phones the right that we realized all those cool innovations could be delivered in a much simpler, much convenient and easy to consume through one device. And you know, I could uh, that could completely transform our experience. So we see the customers were benefiting from these innovations to have a way to consume those things in a much more simplistic way than they are able to go to that. >>And I like to look, it's always been about the applications. But to your point, the applications are now moving in a much faster pace. The the customer experience is expectation is way escalated. And when you combine all these, I love your analogy there because because when you combine all these capabilities, it allows us to develop new Applications, new capabilities, new customer experiences. So that's that I always say the next 10 years, they ain't gonna be like the last James Public Cloud obviously is heavily influencing compute design and and and customer operating models. You know, it's funny when the public cloud first hit the market, everyone we were swooning about low cost standard off the shelf servers in storage devices, but it quickly became obvious that customers needed more. So I wonder if you could comment on this. How are the trends that we've seen from the hyper scale, Is how are they filtering into on prem infrastructure and maybe, you know, maybe there's some differences there as well that you could address. >>Absolutely. So I'd say, first of all, quite frankly, you know, public cloud has completely changed the expectations of how our customers want to consume, compute, right? So customers, especially in a public cloud environment, they've gotten used to or, you know, come to accept that they should consume from the application out, right? They want a very application focused view, a services focused view of the world. They don't want to think about infrastructure, right? They want to think about their application, they wanna move outward, Right? So this means that the infrastructure basically has to meet the application where it lives. So what that means for us is that, you know, we're taking a different approach. We're we've decided that we're not going to chase this single pane of glass view of the world, which, frankly, our customers don't want, they don't want a single pane of glass. What they want is a single operating model. They want an operating model that's similar to what they can get at the public with the public cloud, but they wanted across all of their cloud options they wanted across private cloud across hybrid cloud options as well. So what that means is they don't want to just consume infrastructure services. They want all of their cloud services from this operating model. So that means that they may want to consume infrastructure services for automation Orchestration, but they also need kubernetes services. They also need virtualization services, They may need terror form workload optimization. All of these services have to be available, um, from within the operating model, a consistent operating model. Right? So it doesn't matter whether you're talking about private cloud, hybrid cloud anywhere where the application lives. It doesn't matter what matters is that we have a consistent model that we think about it from the application out. And frankly, I'd say this has been the stumbling block for private cloud. Private cloud is hard, right. This is why it hasn't been really solved yet. This is why we had to take a brand new approach. And frankly, it's why we're super excited about X series and inter site as that operating model that fits the hybrid cloud better than anything else we've seen >>is acute. First, first time technology vendor has ever said it's not about a single pane of glass because I've been hearing for decades, we're gonna deliver a single pane of glass is going to be seamless and it never happens. It's like a single version of the truth. It's aspirational and, and it's just not reality. So can we stay in the X series for a minute James? Uh, maybe in this context, but in the launch that we saw today was like a fire hose of announcements. So how does the X series fit into the strategy with inter site and hybrid cloud and this operating model that you're talking about? >>Right. So I think it goes hand in hand, right. Um the two pieces go together very well. So we have uh, you know, this idea of a single operating model that is definitely something that our customers demand, right? It's what we have to have, but at the same time we need to solve the problems of the cost was talking about before we need a single infrastructure to go along with that single operating model. So no longer do we need to have silos within the infrastructure that give us different operating models are different sets of benefits when you want infrastructure that can kind of do all of those configurations, all those applications. And then, you know, the operating model is very important because that's where we abstract the complexity that could come with just throwing all that technology at the infrastructure so that, you know, this is, you know, the way that we think about is the data center is not centered right? It's no longer centered applications live everywhere. Infrastructure lives everywhere. And you know, we need to have that consistent operating model but we need to do things within the infrastructure as well to take full advantage. Right? So we want all the sas benefits um, of a Ci CD model of, you know, the inter site can bring, we want all that that proactive recommendation engine with the power of A I behind it. We want the connected support experience went all of that. They want to do it across the single infrastructure and we think that that's how they tie together, that's why one or the other doesn't really solve the problem. But both together, that's why we're here. That's why we're super excited. >>So Vegas, I make you laugh a little bit when I was an analyst at I D C, I was deep in infrastructure and then when I left I was doing, I was working with application development heads and like you said, uh infrastructure, it was just a, you know, roadblock but but so the target speakers with Cisco announced UCS a decade ago, I totally missed it. I didn't understand it. I thought it was Cisco getting into the traditional server business and it wasn't until I dug in then I realized that your vision was really to transform infrastructure, deployment and management and change them all. I was like, okay, I got that wrong uh but but so let's talk about the the ecosystem and the joint development efforts that are going on there, X series, how does it fit into this, this converged infrastructure business that you've, you've built and grown with partners, you got storage partners like Netapp and Pure, you've got i SV partners in the ecosystem. We see cohesive, he has been a while since we we hung out with all these companies at the Cisco live hopefully next year, but tell us what's happening in that regard. >>Absolutely, I'm looking forward to seeing you in the Cisco live next year. You know, they have absolutely you brought up a very good point. You see this is about the ecosystem that it brings together, it's about making our customers bring up the entire infrastructure from the core foundational hardware all the way to the application level so that they can, you know, go off and running pretty quick. The converse infrastructure has been one of the corners 2.5 hour of the strategy, as you pointed out in the last decade. And and and I'm I'm very glad to share that converse infrastructure continues to be a very popular architecture for several enterprise applications. Seven today, in fact, it is the preferred architecture for mission critical applications where performance resiliency latency are the critical requirements there almost a de facto standards for large scale deployments of virtualized and business critical data bases and so forth with X series with our partnerships with our Stories partners. Those architectures will absolutely continue and will get better. But in addition as a hybrid cloud world, so we are now bringing in the benefits of canvas in infrastructure uh to the world of hybrid cloud will be supporting the hybrid cloud applications now with the CIA infrastructure that we have built together with our strong partnership with the Stories partners to deliver the same benefits to the new ways applications as well. >>Yeah, that's what customers want. They want that cloud operating model. Right, go ahead please. >>I was going to say, you know, the CIA model will continue to thrive. It will transition uh it will expand the use cases now for the new use cases that were beginning to, you know, say they've absolutely >>great thank you for that. And James uh have said earlier today, we heard this huge announcement, um a lot of lot of parts to it and we heard Katie talk about this initiative is it's really computing built for the next decade. I mean I like that because it shows some vision and you've got a road map that you've thought through the coming changes in workloads and infrastructure management and and some of the technology that you can take advantage of beyond just uh, you know, one or two product cycles. So, but I want to understand what you've done here specifically that you feel differentiates you from other competitive architectures in the industry. >>Sure. You know that's a great question. Number one. Number two, um I'm frankly a little bit concerned at times for for customers in general for our customers customers in general because if you look at what's in the market, right, these rinse and repeat systems that were effectively just rehashes of the same old design, right? That we've seen since before 2000 and nine when we brought you C. S to market these are what we're seeing over and over and over again. That's that's not really going to work anymore frankly. And I think that people are getting lulled into a false sense of security by seeing those things continually put in the market. We rethought this from the ground up because frankly future proofing starts now, right? If you're not doing it right today, future proofing isn't even on your radar because you're not even you're not even today proved. So we re thought the entire chassis, the entire architecture from the ground up. Okay. If you look at other vendors, if you look at other solutions in the market, what you'll see is things like management inside the chassis. That's a great example, daisy chaining them together >>like who >>needs that? Who wants that? Like that kind of complexity is first of all, it's ridiculous. Um, second of all, um, if you want to manage across clouds, you have to do it from the cloud, right. It's just common sense. You have to move management where it can have the scale and the scope that it needs to impact your entire domain, your world, which is much larger now than it was before. We're talking about true hybrid cloud here. Right. So we had to solve certain problems that existed in the traditional architecture. You know, I can't tell you how many times I heard you talk about the mid plane is a great example. You know, the mid plane and a chastity is a limiting factor. It limits us on how much we can connect or how much bandwidth we have available to the chassis. It limits us on air flow and other things. So how do you solve that problem? Simple. Just get rid of it. Like we just we took it out, right. It's not no longer a problem. We designed an architecture that doesn't need it. It doesn't rely on it. No forklift upgrades. So, as we start moving down the path of needing liquid cooling or maybe we need to take advantage of some new, high performance, low latency fabrics. We can do that with almost. No problem at all. Right, So, we don't have any forklift upgrades. Park your forklift on the side. You won't need it anymore because you can upgrade gradually. You can move along as technologies come into existence that maybe don't even exist. They they may not even be on our radar today to take advantage of. But I like to think of these technologies, they're really important to our customers. These are, you know, we can call them disruptive technologies. The reality is that we don't want to disrupt our customers with these technologies. We want to give them these technologies so they can go out and be disruptive themselves. Right? And this is the way that we've designed this from the ground up to be easy to consume and to take advantage of what we know about today and what's coming in the future that we may not even know about. So we think this is a way to give our customers that ultimate capability flexibility and and future proofing. >>I like I like that phrase True hybrid cloud. It's one that we've used for years and but to me this is all about that horizontal infrastructure that can support that vision of what true hybrid cloud is. You can support the mission critical applications. You can you can develop on the system and you can support a variety of workload. You're not locked into one narrow stovepipe and that does have legs, Vegas and James. Thanks so much for coming on the program. Great to see you. >>Yeah. Thank you. Thank you. >>When we return shortly thomas Shiva who leads Cisco's data center group will be here and thomas has some thoughts about the transformation of networking I. T. Teams. You don't wanna miss what he has to say. You're watching the cube. The global leader in high tech company. Okay, >>mm. Mhm, mm. Okay. Mhm. Yeah. Mhm. Yeah. >>Mhm. Yes. Yeah. Okay. We're here with thomas Shiva who is the Vice president of Product Management, A K A VP of all things data center, networking STN cloud. You name it in that category. Welcome thomas. Good to see you again. >>Hey Sam. Yes. Thanks for having me on. >>Yeah, it's our pleasure. Okay, let's get right into observe ability. When you think about observe ability, visibility, infrastructure monitoring problem resolution across the network. How does cloud change things? In other words, what are the challenges that networking teams are currently facing as they're moving to the cloud and trying to implement hybrid cloud? >>Yeah. Yeah, visibility as always is very, very important. And it's quite frankly, it's not just it's not just the networking team is actually the application team to write. And as you pointed out, the underlying impetus to what's going on here is the data center is where the data is. And I think we set us a couple years back and really what happens the applications are going to be deployed uh in different locations, right. Whether it's in a public cloud, whether it's on prayer, uh, and they are built differently right there, built as microservices, they might actually be distributed as well at the same application. And so what that really means is you need as an operator as well as actually a user better visibility. Where are my pieces and you need to be able to correlate between where the app is and what the underlying network is that is in place in these different locations. So you have actually a good knowledge while the app is running so fantastic or sometimes not. So I think that's that's really the problem statement. What what we're trying to go afterwards, observe ability. >>Okay, and let's double click on that. So a lot of customers tell me that you gotta stare at log files until your eyes bleed and you gotta bring in guys with lab coats who have phds to figure all this stuff out. So, so you just described, it's getting more complex, but at the same time you have to simplify things. So how how are you doing that, >>correct? So what we basically have done is we have this fantastic product that that is called 1000 Ice. And so what this does is basically as the name, which I think is a fantastic fantastic name. You have these sensors everywhere. Um, and you can have a good correlation on uh links between if I run from a site to aside from a site to a cloud, from a cloud to cloud and you basically can measure what is the performance of these links. And so what we're, what we're doing here is we're actually extending the footprint of these thousands agent. Right? Instead of just having uh inversion machine clouds, we are now embedding them with the Cisco network devices. Right? We announced this with the catalyst 9000 and we're extending this now to our 8000 catalyst product line for the for the SD were in products as well as to the data center products the next line. Um and so what you see is is, you know, half a saying, you have 1000 eyes, you get a million insights and you get a billion dollar of improvements uh for how your applications run. And this is really uh, the power of tying together the footprint of where the network is with the visibility, what is going on. So you actually know the application behavior that is attached to this network. >>I see. So okay. So as the cloud evolves and expands it connects your actually enabling 1000 eyes to go further, not just confined within a single data center location, but out to the network across clouds, et cetera, >>correct. Wherever the network is, you're going to have 1000 I sensor and you can't bring this together and you can quite frankly pick if you want to say, hey, I have my application in public cloud provider, a uh, domain one and I have another one domain to, I can't do monitor that link. I can also monitor have a user that has a campus location or branch location. I kind of put an agent there and then I can monitor the connectivity from that branch location all the way to the let's say corporations that data centre, our headquarter or to the cloud. And I can have these probes and just we have visibility and saying, hey, if there's a performance, I know where the issue is and then I obviously can use all the other foods that we have to address those. >>All right, let's talk about the cloud operating model. Everybody tells us it's really the change in the model that drives big numbers in terms of R. O. I. And I want you to maybe address how you're bringing automation and devops to this world of of hybrid and specifically how is Cisco enabling I. T. Organizations to move to a cloud operating model? Is that cloud definition expands? >>Yeah, no that's that's another interesting topic beyond the observe ability. So really, really what we're seeing and this is going on for uh I want to say a couple of years now, it's really this transition from operating infrastructure as a networking team more like a service like what you would expect from a cloud provider. Right? It's really around the network team offering services like a cloud provided us. And that's really what the meaning is of cloud operating model. Right? But this is infrastructure running your own data center where that's linking that infrastructure was whatever runs on the public club is operating and like a cloud service. And so we are on this journey for why? So one of the examples uh then we have removing some of the control software assets, the customers that they can deploy on prayer uh to uh an instance that they can deploy in a cloud provider and just busy, insane. She ate things there and then just run it that way. Right. And so the latest example for this is what we have our identity service engine that is now limited availability available on AWS and will become available in mid this year, both in Italy as unusual as a service. You can just go to market place, you can load it there and now you create, you can start running your policy control in a cloud, managing your access infrastructure in your data center, in your campus wherever you want to do it. And so that's just one example of how we see our customers network operations team taking advantage of a cloud operating model and basically employing their, their tools where they need them and when they need them. >>So what's the scope of, I hope I'm saying it right. Ice, right. I see. I think it's called ice. What's the scope of that like for instance, turn in effect my or even, you know, address simplify my security approach. >>Absolutely. That's now coming to what is the beauty of the product itself? Yes. What you can do is really is that there's a lot of people talking about else. How do I get to zero trust approach to networking? How do I get to a much more dynamic, flexible segmentation in my infrastructure. Again, whether this is only campus X as well as a data center and Ice help today, you can use this as a point to define your policies and then any connect from there. Right. In this particular case we would instant Ice in the cloud as a software load. You now can connect and say, hey, I want to manage and program my network infrastructure and my data center on my campus, going to the respective control over this DNA Center for campus or whether it is the A. C. I. Policy controller. And so yes, what you get as an effect out of this is a very elegant way to automatically manage in one place. What is my policy and then drive the right segmentation in your network infrastructure? >>zero. Trust that, you know, it was pre pandemic. It was kind of a buzzword. Now it's become a mandate. I wonder if we could talk about right. I mean I wonder if you talk about cloud native apps, you got all these developers that are working inside organizations. They're maintaining legacy apps. They're connecting their data to systems in the cloud there, sharing that data. I need these developers, they're rapidly advancing their skill sets. How is Cisco enabling its infrastructure to support this world of cloud? Native making infrastructure more responsive and agile for application developers? >>Yeah. So, you know, we're going to the top of his visibility, we talked about the operating model, how how our network operators actually want to use tools going forward. Now, the next step to this is it's not just the operator. How do they actually, where do they want to put these tools, how they, how they interact with these tools as well as quite frankly as how, let's say, a devops team on application team or Oclock team also wants to take advantage of the program ability of the underlying network. And this is where we're moving into this whole cloud native discussion, right? Which is really two angles, that is the cloud native way, how applications are being built. And then there is the cloud native way, how you interact with infrastructure. Right? And so what we have done is we're a putting in place the on ramps between clouds and then on top of it we're exposing for all these tools, a P I S that can be used in leverage by standard uh cloud tools or uh cloud native tools. Right. And one example or two examples we always have and again, we're on this journey for a while is both answerable uh script capabilities that exist from red hat as well as uh Ashitaka from capabilities that you can orchestrate across infrastructure to drive infrastructure, automation and what what really stands behind it is what either the networking operations team wants to do or even the ap team. They want to be able to describe the application as a code and then drive automatically or programmatically in situation of infrastructure needed for that application. And so what you see us doing is providing all these capability as an interface for all our network tools. Right. Whether it's this ice that I just mentioned, whether this is our D. C. And controllers in the data center, uh whether these are the controllers in the in the campus for all of those, we have cloud native interfaces. So operator or uh devops team can actually interact directly with that infrastructure the way they would do today with everything that lives in the cloud, with everything how they brought the application. >>This is key. You can't even have the conversation of op cloud operating model that includes and comprises on prem without programmable infrastructure. So that's that's very important. Last question, thomas our customers actually using this, they made the announcement today. There are there are there any examples of customers out there doing this? >>We do have a lot of customers out there that are moving down the past and using the D. D. Cisco high performance infrastructure, but also on the compute side as well as on an exercise one of the customers. Uh and this is like an interesting case. It's Rakuten uh record and is a large tackle provider, a mobile five G. Operator uh in Japan and expanding and is in different countries. Uh and so people something oh, cloud, you must be talking about the public cloud provider, the big the big three or four. But if you look at it, there's a lot of the tackle service providers are actually cloud providers as well and expanding very rapidly. And so we're actually very proud to work together with with Rakuten and help them building a high performance uh, data and infrastructure based on hard gig and actually phone a gig uh to drive their deployment to. It's a five G mobile cloud infrastructure, which is which is uh where the whole the whole world where traffic is going. And so it's really exciting to see this development and see the power of automation visibility uh together with the high performance infrastructure becoming reality and delivering actually services, >>you have some great points you're making there. Yes, you have the big four clouds, your enormous, but then you have a lot of actually quite large clouds. Telcos that are either approximate to those clouds or they're in places where those hyper scholars may not have a presence and building out their own infrastructure. So so that's a great case study uh thomas, hey, great having you on. Thanks so much for spending some time with us. >>Yeah, same here. I appreciate it. Thanks a lot. >>I'd like to thank Cisco and our guests today V Joy, Katie VJ, viscous James and thomas for all your insights into this evolving world of hybrid cloud, as we said at the top of the next decade will be defined by an entirely new set of rules. And it's quite possible things will evolve more quickly because the cloud is maturing and has paved the way for a new operating model where everything is delivered as a service, automation has become a mandate because we just can't keep throwing it labor at the problem anymore. And with a I so much more as possible in terms of driving operational efficiencies, simplicity and support of the workloads that are driving the digital transformation that we talk about all the time. This is Dave Volonte and I hope you've enjoyed today's program. Stay Safe, be well and we'll see you next time.
SUMMARY :
Yeah, mm. the challenge is how to make this new cloud simple, to you by Cisco. Good to see you. Good to see you as well. to digital business or you know organizations, they had to rethink their concept of agility and And if you think about it, the application is actually driving So I wonder if you talk more about how the application is experience is So if you think about an application developer, trust, you know, Zero Trust used to be a buzzword now it's a mandate. And I think if you think about it today that's the the public cloud became a staple of keeping the lights on during the pandemic but So the problems of discovery ability, the problems of being able to simply I often say that the security model of building a moat, you dig the moat, So that is the new frontier. And so you you've got to protect that with some I mean, the entire portfolio that Cisco brings to the Great to have you and look forward to having you again. Thank you gaps that need to be addressed with costume, Das and VJ Venugopal. One company takes you inside, giving you the visibility and the insight So you can work wherever work takes you in a cloud J. Good to see you guys welcome. Great to see you. but the big public cloud players, they're like giving you a gift. and really harnessed that innovation that's built in the public cloud, that built an open source that built internally the job of it is to deliver something that works and works at scale that you can monitor But if you want to upgrade to enterprise features like clustering or the key uh As you rightly said, harsher car is the, We all talk about cloud native cady was sort of mentioning before you got the the core the power of communities and clog native to be used to be used anywhere. and a lot of functionality and value. outcome and our mission is to make it super simple for you to do that. you know, some of the details. and futures in the age of hybrid cloud with Vegas Rattana and James leach. So you can build whatever you need today The bridge to possible. And James Leach is the director of business development for U. C. S. At the Cisco as well. Thank you because let's start with you and talk about a little bit about computing architectures. to meet the needs of a specific application and as you know, the different applications have And when you combine all these, I love your analogy there because model that fits the hybrid cloud better than anything else we've seen So how does the X series fit into the strategy So we have uh, you know, this idea of a single operating model that is definitely something it was just a, you know, roadblock but but so the target speakers has been one of the corners 2.5 hour of the strategy, as you pointed out in the last decade. Yeah, that's what customers want. I was going to say, you know, the CIA model will continue to thrive. and and some of the technology that you can take advantage of beyond just uh, 2000 and nine when we brought you C. S to market these are what we're seeing over and over and over again. can have the scale and the scope that it needs to impact your entire domain, on the system and you can support a variety of workload. Thank you. You don't wanna miss what he has to say. Yeah. Good to see you again. When you think about observe ability, And it's quite frankly, it's not just it's not just the networking team is actually the application team to write. So a lot of customers tell me that you a site to aside from a site to a cloud, from a cloud to cloud and you basically can measure what is the performance So as the cloud evolves and expands it connects your and you can quite frankly pick if you want to say, hey, I have my application in public cloud that drives big numbers in terms of R. O. I. And I want you to You can just go to market place, you can load it there and even, you know, address simplify my security approach. And so yes, what you get as an effect I mean I wonder if you talk And so what you see us doing is providing all these capability You can't even have the conversation of op cloud operating model that includes and comprises And so it's really exciting to see this development and So so that's a great case study uh thomas, hey, great having you on. I appreciate it. that are driving the digital transformation that we talk about all the time.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Dave Volonte | PERSON | 0.99+ |
Dave Volonte | PERSON | 0.99+ |
Cisco | ORGANIZATION | 0.99+ |
James | PERSON | 0.99+ |
Japan | LOCATION | 0.99+ |
Katie | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
Italy | LOCATION | 0.99+ |
san Francisco | LOCATION | 0.99+ |
Sam | PERSON | 0.99+ |
Barcelona | LOCATION | 0.99+ |
thomas | PERSON | 0.99+ |
two pieces | QUANTITY | 0.99+ |
1000 eyes | QUANTITY | 0.99+ |
Germany | LOCATION | 0.99+ |
Dejoy Pandey | PERSON | 0.99+ |
thomas Shiva | PERSON | 0.99+ |
2020 | DATE | 0.99+ |
VJ Venugopal | PERSON | 0.99+ |
two vectors | QUANTITY | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
James Leach | PERSON | 0.99+ |
First | QUANTITY | 0.99+ |
single | QUANTITY | 0.99+ |
Rakuten | ORGANIZATION | 0.99+ |
first | QUANTITY | 0.99+ |
CIA | ORGANIZATION | 0.99+ |
mid this year | DATE | 0.99+ |
next year | DATE | 0.99+ |
ASCIi | ORGANIZATION | 0.99+ |
tomorrow | DATE | 0.99+ |
Steam | ORGANIZATION | 0.99+ |
last year | DATE | 0.99+ |
2.5 hour | QUANTITY | 0.99+ |
second thing | QUANTITY | 0.99+ |
two angles | QUANTITY | 0.99+ |
FBI | ORGANIZATION | 0.99+ |
first thing | QUANTITY | 0.99+ |
today | DATE | 0.99+ |
1000 | QUANTITY | 0.99+ |
Netapp | ORGANIZATION | 0.99+ |
both | QUANTITY | 0.99+ |
Vegas Rattana | ORGANIZATION | 0.99+ |
two tensions | QUANTITY | 0.98+ |
two | QUANTITY | 0.98+ |
Gil Vega, Veeam | VeeamON 2021
(upbeat music) >> Welcome everybody to VeeamON 2021 you're watching theCUBE. My name is Dave Villante. You know in 2020 cyber adversaries they seize the opportunity to really up their game and target workers from home and digital supply chains. It's become increasingly clear to observers that we're entering a new era of cyber threats where infiltrating companies via so-called Island Hopping and stealthily living off the land meaning they're using your own tools and infrastructure to steal your data. So they're not signaling with new tools that they're in there. It's becoming the norm for sophisticated hacks. Moreover, these well-funded and really sophisticated criminals and nation States are aggressively retaliating against incident responses. In other words, when you go to fix the problem they're not leaving the premises they're rather they're tightening the vice on victims by holding your data ransom and threatening to release previously ex filtrated and brand damaging information to the public. What a climate in which we live today. And with me to talk about these concerning trends and what you can do about it as Gil Vega, the CISO of Veeam Gil great to see you. Thanks for coming on. >> Great to see you, Dave. Thanks for having me. >> Yeah. So, you know, you're hearing my intro. It's probably understating the threat. You are a Veeam's first CISO. So how do you see the landscape right now? >> That's right. Yeah. And I've been with the company for just over a year now, but my background is in financial services and spent a lot of time managing cybersecurity programs at the classified level in Washington DC. So I've gleaned a lot of scar tissue from lots of sophisticated attacks and responses. But today I think what we're seeing is really a one-upmanship by a sophisticated potentially nation state sponsored adversaries, this idea of imprisoning your data and charging you to release it is it's quite frightening. And as we've seen in the news recently it can have devastating impacts not only for the economy, but for businesses. Look at the gas lines in the Northeast right now because of the quality of a pipeline, a ransomware attack. I just, the government just released an executive order this morning, that hopes to address some of the some of the nation's unpreparedness for these sophisticated attacks. And I think it's time. And I think everyone's excited about the opportunity to really apply a whole of government approach, to helping critical infrastructure to helping and partnering with private sector and imposing some risks, frankly, on some of the folks that are engaged in attacking our country. >> A number of years ago, I often tell this story. I had the pleasure of interviewing Robert Gates the former Defense Secretary. And it was a while ago we were talking about cyber and he sits on a number of boards. And we were talking about how it's a board level issue. And, and we're talking about cyber crime and the like and nation States. And I said, well, wait, cyber warfare, even. And I said, "But don't we have the best cyber tech. I mean, can't we go on the offense?" And he goes, "Yeah, we do. And we can, but we have more to lose." And to your point about critical infrastructure, it's not just like, okay, we have the most powerful weapons. It's really we have the most valuable infrastructure and a lot to lose. So it's really a tricky game. And this notion of having to be stealthy in your incident response is relatively new. Isn't it? >> It is. It is. And you know, there are, you mentioned that and I was surprised you mentioned because a lot of people really don't talk about it as you're going into your response your adversaries are watching or watching your every move. You have to assume in these days of perpetual state of compromise in your environments, which means that your adversaries have access to your environment to the point that they're watching your incident responders communicate with one another and they're countering your moves. So it's sort of a perverse spin on the old mutually assured destruction paradigm that you mentioned the United States has the world's largest economy. And quite frankly the world's most vulnerable, critical infrastructure. And I would concur with Director Gates or Secretary Gates rather it is assessment that we've got to be awfully careful and measured in our approach to imposing risks. I think the government has worked for many years on defining red lines. And I think this latest attack on the colonial pipeline affecting the economy and people's lives and potentially putting people's lives at risk is towing also the close to that red line. And I'm interested to see where this goes. I'm interested to see if this triggers even a, you know a new phase of cyber warfare, retaliation, you know proactive defense by the National Security Community of the United States government. Be interesting to see how this plays out. >> Yeah, you're absolutely right though. You've got this sort of asymmetric dynamic now which is unique for the United States as soon as strongest defense in the world. And I wanted to get it to ransomware a bit. And specifically this notion of ransomware as a service it's really concerning where criminals can actually outsource the hack as a service and the bad guys will set up, you know, on the dark web they'll have, you know, help desks and phone lines. They'll do the negotiations. I mean, this is a really concerning trend. And obviously Veeam plays a role here. I'm wondering as a, as a SecOps pro what should we be doing about this? >> Yeah, you mentioned ransomware as a service, whereas RWS it's an incredibly pernicious problem perpetrated by sophisticated folks who may or may not have nation state support or alliances. I think at a minimum certain governments are looking the other way as it relates to these criminal activities. But with ransomware as a service, you're essentially having very sophisticated folks create very complex ransomware code and distributed to people who are willing to pay for it. And oftentimes take a part of the ransom as their payment. The, issue with obviously ransomware is you know the age old question, are you going to pay a ransom or are you not going to pay a ransom? The FBI says, don't do it. It only encourages additional attacks. The Treasury Department put out some guidance earlier earlier in the year, advising companies that they could be subject to civil or criminal penalties. If they pay a ransom and the ransom goes to a sanction density. So there's danger on all sides. >> Wow okay. But so, and then the other thing is this infiltrating via digital supply chains I call it Island Hopping and the like, we saw that with the solar winds hack and the scary part is, you know different malware is coming in and self forming and creating different signatures. Not only is it very difficult to detect, but remediating, you know, one, you know combined self formed malware it doesn't necessarily take care of the others. And so, you know, you've got this sort of organic virus, like thing, you know, create mutating and that's something that's certainly relatively new to me in terms of its prevalence your thoughts on that and how to do it. >> Yeah, exactly right. You know, the advent of the polymorphic code that changes the implementation of advanced artificial intelligence and some of this malware is making our job increasingly difficult which is why I believe firmly. You've got to focus on the fundamentals and I think the best answers for protecting against sophisticated polymorphic code is,are found in the NIST cybersecurity framework. And I encourage everyone to really take a close look at implementing that cybersecurity framework across their environments, much like we've done here, here at Veeam implementing technologies around Zero Trust again assuming a perpetual state of compromise and not trusting any transaction in your environment is the key to combating this kind of attack. >> Well, and you know, as you mentioned, Zero Trust Zero Trust used to be a buzzword. Now it's like become a mandate. And you know, it's funny. I mean, in a way I feel like the crypto guys I know there's a lot of fraud in crypto, but but anybody who's ever traded crypto it's like getting into Fort Knox. I mean, you got to know your customer and you've got to do a little transaction. I mean, it's really quite sophisticated in terms of the how they are applying cybersecurity and you know, most even your bank isn't that intense. And so those kinds of practices, even though they're a bit of a pain in the neck, I mean it's worth the extra effort. I wonder if you could talk about some of the best practices that you're seeing how you're advising your clients in your ecosystem and the role that Veeam can play in helping here. >> Yeah, absolutely. As I mentioned so many recommendations and I think the thing to remember here so we don't overwhelm our small and medium sized businesses that have limited resources in this area is to remind them that it's a journey, right? It's not a destination that they can continually improve and focus on the fundamentals. As I mentioned, things like multi-factor authentication you know, a higher level topic might be micro-segmentation breaking up your environment into manageable components that you can monitor a real time. Real time monitoring is one of the key components to implementing Zero Trust architecture and knowing exactly what good looks like in your environment in a situation where you've got real-time monitoring you can detect the anomalies, the things that shouldn't be happening in your environment and to spin up your response teams, to focus and better understand what that is. I've always been a proponent of identity and access management controls and a key focus. We've heard it in this industry for 25 years is enforcing the concept of least privilege, making sure that your privileged users have access to the things they need and only the things that they need. And then of course, data immutability making sure that your data is stored in backups that verifiably has not been changed. And I think this is where Veeam comes into the equation where our products provide a lot of these very easily configured ransomware protections around data and your ability to the ability to instantly back up things like Office 365 emails, you know support for AWS and Azure. Your data can be quickly restored in the event that an attacker is able to in prison that with encryption and ransom demands. >> Well, and so you've certainly seen in the CISOs that I've talked to that they've had to obviously shift their priorities, thanks to the force march to digital, thanks to COVID, but Identity access management, end point security cloud security kind of overnight, you know, Zero Trust. We talked about that and you could see that in some of these, you know, high flying security stocks, Okta Zscaler, CrowdStrike, they exploded. And so what's in these many of these changes seem to be permanent sort of you're I guess, deeper down in the stack if you will, but you, you compliment these toolings with obviously the data protection approach the ransomware, the cloud data protection, air gaps, immutability. Maybe you could talk about how you fit in with the broader, you know, spate of tools. I mean, your, my eyes bleed when you look at all the security companies that are out there. >> Yeah for sure. You know, I'm just going to take it right back to the NIST cybersecurity framework and the five domains that you really need to focus on. Identify, protect, detect, respond, and recover, you know and until recently security practitioners and companies have really focused on on the protect, identify and protect, right and defend rather where they're focused on building, you know, moats and castles and making sure that they've got this, you know hard exterior to defend against attacks. I think there's been a shift over the past couple of years where companies have recognized that the focus needs to be on and respond and recover activities, right? Assuming that people are going to breach or near breach, your entities is a safe way to think about this and building up capabilities to detect those breaches and respond effectively to those breaches are what's key in implementing a successful cybersecurity program where Veeam fits into this since with our suite of products that that can help you through the recovery process, right? That last domain of the NIST cybersecurity framework it'll allow you to instantaneously. As I mentioned before, restore data in the event of a catastrophic breach. And I think it provides companies with the assurances that while they're protecting and building those Zero Trust components into their environments to protect against these pernicious and well-resourced adversaries there's the opportunity for them to recover very quickly using the VM suite of tools? >> Well, I see, I think there's an interesting dynamic here. You're pointing out Gil. There's not no longer is it that, you know, build a moat the Queen's leaving her castle. I always say, you know there is no hardened perimeter anymore. And so you've seen, you know, the shift obviously from hardware based firewalls and you I mentioned those other companies that are doing great but to me, it's all about these layers and response is a big in recovery is a huge part of that. So I'm seeing increasingly companies like Veeam is a critical part of that, that security cyber data protection, you know, ecosystem. I mean, to me it's just as important as the frontline pieces of even identity. And so you see those markets exploding. I think it's, there's a latent value that's building in companies like Veeam that are a key part of those that data protection layer you think about you know, defense strategies. It's not just you, the frontline it's maybe it's airstrikes, maybe it's, you know, C etcetera. And I see that this market is actually a huge opportunity for for organizations like yours. >> I think you're right. And I think the proof is in, you know in the pudding, in terms of how this company has grown and what we've delivered in version 11 of our suite, including, you know features like continuous data protection, we talked about that reliable ransomware protection support for AWS S3 Glacier and Azure archive the expanded incident recovery, and then support for disaster recovery and backup as a service. You know, what I found most interesting in my year here at Veeam is just how much our administrators the administrators in our company and our customers companies that are managing backups absolutely love our products that ease of use the instant backup capabilities and the support they receive from Veeam. It's almost cultish in terms of how our customers are using these products to defend themselves in today's pretty intense cyber threat environment. >> Well, and you talked about the NIST framework, and again big part of that is recovery, because we talked about earlier about, do you pay the ransom or not? Well, to the extent that I can actually recover from having all my data encrypted then I've got obviously a lot more leverage and in many ways, I mean, let's face it. We all know that it's not a matter of if it's, when you get infiltrated. And so to the extent that I can actually have systems that allow me to recover, I'm now in a much much stronger position in many respects, you know and CISOs again, will tell you this that's where we're shifting our investments >> Right. And you've got to do all of them. It's not just there's no silver bullet, but but that seems to me to be just a a misunderstood and undervalued part of the equation. And I think there's tremendous upside there for companies like yours. >> I think you're right. I think what I'll just add to that is the power of immutability, right? Just verifiably ensuring that your data has not changed because oftentimes you'll have attackers in these low and slow live off the land types of attacks change your data and affect its integrity with the Veeam suite of tools. You're able to provide for immutable or unchanged verifiable data and your backup strategy which is really the first step to recovery after a significant event. >> And that's key because a lot of times the hackers would go right after the backup Corpus you know, they'll sometimes start there is that all the data, you know, but if you can make that immutable and again, it, you know there's best practices there too, because, you know if you're not paying the cloud service for that immutability, if you stop paying then you lose that. So you have to be very careful about, you know how you know, who has access to that and you know what the policies are there, but again, you know you can put in, you know so a lot of this, as you know, is people in process. It's not just tech, so I'll give you the last word. I know you got to jump, but really appreciate.. >> Yeah, sure. >> You know, the only, the only thing that we didn't mention is user awareness and education. I think that is sort of the umbrella key focus principle for any successful cybersecurity program making sure your people understand, you know how to deal with phishing emails. You know, ransomware is a huge threat of our time at 90% of ransomware malware is delivered by phishing. So prepare your workforce to deal with phishing emails. And I think you'll save yourself quite a few headaches. >> It's great advice. I'm glad you mentioned that because because bad user behavior or maybe uninformed user behaviors is the more fair way to say it. It will trump good security every time. Gil, thanks so much for coming to the CUBE and and keep fighting the fight. Best of luck going forward. >> Great. Thank you, Dave. >> All right. And thank you for watching everybody. This is Dave Villante for the CUBEs continuous coverage VeeamON 2021, the virtual edition. We will be right back. (upbeat music)
SUMMARY :
and infrastructure to steal your data. Great to see you, Dave. So how do you see the landscape right now? about the opportunity to really apply And to your point about and I was surprised you mentioned and the bad guys will set and the ransom goes to a sanction density. And so, you know, you've got the key to combating and you know, most even your and to spin up your response teams, in the stack if you will, and the five domains that and you I mentioned those other companies and the support they receive from Veeam. Well, and you talked but but that seems to me to be is the power of immutability, right? and again, it, you know there's you know how to deal with phishing emails. and and keep fighting the fight. And thank you for watching everybody.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Dave Villante | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
Robert Gates | PERSON | 0.99+ |
25 years | QUANTITY | 0.99+ |
National Security Community | ORGANIZATION | 0.99+ |
FBI | ORGANIZATION | 0.99+ |
Washington DC | LOCATION | 0.99+ |
Gil Vega | PERSON | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Veeam | ORGANIZATION | 0.99+ |
90% | QUANTITY | 0.99+ |
Gil | PERSON | 0.99+ |
NIST | ORGANIZATION | 0.99+ |
2020 | DATE | 0.99+ |
Treasury Department | ORGANIZATION | 0.99+ |
CrowdStrike | ORGANIZATION | 0.99+ |
first step | QUANTITY | 0.99+ |
today | DATE | 0.98+ |
2021 | DATE | 0.98+ |
Okta Zscaler | ORGANIZATION | 0.98+ |
VeeamON | ORGANIZATION | 0.98+ |
Office 365 | TITLE | 0.98+ |
five domains | QUANTITY | 0.98+ |
Zero Trust | ORGANIZATION | 0.98+ |
Gates | PERSON | 0.97+ |
one | QUANTITY | 0.97+ |
over a year | QUANTITY | 0.97+ |
Secretary | PERSON | 0.97+ |
this morning | DATE | 0.96+ |
COVID | ORGANIZATION | 0.96+ |
RWS | ORGANIZATION | 0.95+ |
Ve | ORGANIZATION | 0.94+ |
Veeam | PERSON | 0.94+ |
Director | PERSON | 0.93+ |
Northeast | LOCATION | 0.9+ |
Veeam Gil | ORGANIZATION | 0.87+ |
Zero Trust Zero Trust | ORGANIZATION | 0.87+ |
CUBE | ORGANIZATION | 0.85+ |
Island Hopping | TITLE | 0.85+ |
first CISO | QUANTITY | 0.82+ |
United States government | ORGANIZATION | 0.8+ |
Defense Secretary | PERSON | 0.76+ |
past couple of years | DATE | 0.75+ |
United States | LOCATION | 0.74+ |
CISO | PERSON | 0.73+ |
number of years ago | DATE | 0.73+ |
version 11 | OTHER | 0.71+ |
while ago | DATE | 0.71+ |
SecOps | ORGANIZATION | 0.69+ |
Azure | ORGANIZATION | 0.68+ |
Azure | TITLE | 0.67+ |
S3 Glacier | TITLE | 0.63+ |
VeeamON | TITLE | 0.63+ |
Fort Knox | TITLE | 0.59+ |
CUBEs | ORGANIZATION | 0.57+ |
Jason Kent & Shreyans Mehta, Cequence Security | CUBE Conversation May 2021
>>Mhm Yes. Welcome to this cube conversation. I'm john Kerry host of the cube here in Palo alto California. We've got two great guests all the way from Ohio and here in the bay area with sequence securities is our focus on cloud growth companies. Sri and met a co founder and CTO of sequence security and Jason Kent hacker in residence at sequence security. We're gonna find out what that actually means in the second but this is a really important company in the sense of A P. I. S. As they are starting to be the connective tissue between systems and and data. Um you're starting to see more vulnerabilities, more risk but also more upside. So risk, reward is high. And anyone who's doing things in the cloud obviously deals with the A. P. I. So Trey and Jason. Thanks for let's keep conversation. >>Happy to be here >>guys. Let's let's talk about A P. I. Security. And but first before we get there trans what does sequence security do? What do you guys specifically build? And what do you sell >>sequences in the business protecting your web and um A P. I. S from various kinds of attacks? Uh We protect from business logic attacks, A P. I. Uh do your api inventory, uh also the detect and defend against things like a town taker. Where's fake account creation, scraping pretty much anything and everything. An application on a PDA is exposed to from from the Attackers. >>Jason. What do you what do you do there as hacker and residents? I also want to get your perspective on api security from the point of view of, you know, uh attack standpoint from a vector. How are people doing it? So first explain what you do and uh love the title hacker and residents. But also what does that actually mean from a security standpoint? >>Yeah. So we can't be in the business that we're in without having an adversarial approach to where our customers are deployed and how we look at them. So a lot of times I spend my time trying to be on the client's backdoors and and try to hit their A. P. I. S. With as many kinds of attacks that I can. It helps us understand how an attacker is going to approach a specific client as well as helps us tune for our machine learning models to make sure that we can defend against those kinds of things. Um as a hacker and residents, my mostly my position is client facing. But I do spend an awful lot of time being research and looking for the next api threat that's out there. >>You gotta stay ahead of the bad guys. But let's bring up some kind of cutting edge relevant topics. One is all over the news cycle. You heard peloton, very highly visible company, It represents that new breed of digital companies that have a new approach and it's absolutely doing very, very well. The new consumers like this product and you're seeing a lot more peloton, like companies out there that are leveraging technology, so they're fully integrated, they had an A. P. I. Issue recently. Um what does it mean? Is that, is that something we're gonna see more of these kind of leaks in these kind of vulnerabilities? What do you guys think about this political thing, >>You know, from an attacker's perspective as a really boring attack? Um, but it led to a huge amount of data leaking out. Same with, you know, the news has been been right with this lately, right, john Deere got hit. Um We've seen yet another credit bureau got hit right. Um and these attacks are coming off as fairly simple attacks that are dumping huge amounts of data, just proving that the FBI attack surface is really a great place to get a rich amount of data, but you have to have a good understanding of how the application works so you can spend a little bit of time on it. But once you've taken a look at how the data flows, you end up with, you know, pretty rich data set as an attacker. I go after them just by simply utilizing their products, utilizing the programs and understanding how they work. And then I drag out all the pieces that I think are going to be interesting and start plucking away at it. If I see a like a profile, for instance, that I can edit, I wonder can I edit someone else's profile. And this is how the peloton attack work. I'm logged in, I'm allowed to see my things, what other things can I see? And it turns out they can see everything. >>So we also saw a hack with clubhouse, which is the hot app now I think just opened up to android users, but they were simply calling it back and Agora, which is, you know, I've seen china, but once you've understood that the tokens work, once you understood what they were doing, you could essentially go in and figure things out. There seems to be like pretty like trivial stuff, but it gets exposed. No one kind of thinks it through. How does someone protect themselves against these things? Because that's the real issue, like just make it less secure. Our Api is gonna be more secure in the future. What can customers do about what do you guys to think about this? >>Yeah, but the reality is, I mean that's just uh too many babies out there. I mean if you see the transition that is happening and that is the transformation where it used to be like a one app or two apps before and now there are like hundreds and thousands of applications driven by the devops world, a child development and and what matters is, I mean the starting point really is you cannot protect what, you cannot see what used to be. Uh an up hosted in your data center is now being hosted in the cloud environments, in the virtual environments, in several less environments and coordinators, you name it, they're out there. So the key is really to understand your attack surface, that's your starting point. So you're you're tooling your applications need to uh I need to be able to provide that visibility that that that is needed to protect these applications and you can't rely just on your developers to do this for you. So you need a right tool that can secure these applications, >>Jason what's the steps that an attacker takes to uncover vulnerabilities? What goes through the mind of the attacker? Um I mean the old days you used to just do port scans and try to penetrate you get through the perimeter. Now with this no perimeter mindset, the surface area Schramm was talking about is huge. What what's going on the mind of the attacker here and the A P I S and vulnerabilities. >>So the very first thing that we do is we sign up for an account, we use the thing, right? We look at all the different endpoints. Um I've got scripts running in my attack tools that do things like show me comments uh in case the developer left some comments in there to tell me where things are. Um I basically I'm just going to poke around using it like a regular user, but in that I'm going to look for places. That makes sense to try to do an attack. So the login screen is a really easy thing. Everybody understands that you put in a user name, you put in a password, you can't go. What I'm gonna do is put in a bad username and a bad password. I'm gonna put in a good user name and a bad password and I'm gonna see what changes, what are the different things that your application is telling me. And so when we look at an application for flaws and ways to get to the data on the back end, all we're doing is seeing what data do you present me on standard use. And then I'm going to look at, well, how can I change these parameters or what are the things that I can change in my requests to get a different response? So in the early phases of an attack, Attackers are very difficult to a seat. Right. They just look like a regular user just doing regular things. It's when we decide. All right. I've found something that starts to get actually interesting and we start to try to pull data out. >>What are some of the common vulnerabilities and risks that you guys see in the A. P. I is when you look when you poke at them that people are are doing is that they're not really doing their homework. Doing good. Security designers are just more of tech risk. What's the most common vulnerabilities and risks? >>Well, so for me, I I've noticed a lot of the OAS KPI top 10, the first couple of things you see them on almost all applications, so broken object level authorization is the first one. It's mouthful. Um but basically all it is is I log onto the platform, I'm authorized to be there, but I can see someone else's stuff and that's exactly what happened in peloton. Um that and what we call insecure direct object reference where I don't have to be logged in, I can just make the request without any authentication and get information back. So those are pretty common areas um that you know people need to focus on, but there's a few others that are outside the top 10 that really make a lot more sense as a defender strains probably has a little better answer to me. >>Yeah. So um I'm like like we said um creating that inventories is key, but where are they being hostess? Another another aspect of things. So so when when Jason spoke about um like hackers are actually probing, trying to figure out what are the different entry points? It could be your production environment, it could be your QA environment staging environment and you're not even aware of, but once you've actually figured out those entry points, the next step of attack was like at peloton and and other places is really eggs filtering. Exfiltrate ng that that information. Right. Is it, is it the O P II information, ph I information um and and you don't want to exfiltrate as a hacker, just one person's information. You you're automating that business logic that is behind it ability to protect and defend against those kinds of attacks, giving that visibility, even though you might not have instrumented that application for for that kind of visibility is key. Once you are bubbling up those behaviors, then you can go ahead and and and protect from these kinds of attacks. And it could be about just simply enumerating through I. D. S. Uh that paladin might have or uh experience might have and just enumerate through that and exfiltrate the information behind it. So the tools need to be able to protect from those kinds of attacks out there. >>Yeah, I think I was actually on clubhouse when um that went down that hole enumerating through the I. D. S. Room I. D. S. And then the people just querying once they got an I. D. They essentially just sucked all the content out because they were just calling the back end. It was just like the most dumbest thing I've ever seen, but they didn't think about, I mean, you know, they were just rushing really fast. So So the question I have for transit and on a defense basis, people are going first party um with a P. I. S. A. P. I. First strategies because it's just some benefits there as we were talking about what do I need to do to protect myself? So I don't have that clubhouse problem or the pelton problem. Is there a Is there a playbook or is their software tools that I could use? How do I build? My apologies from day one and my principles around it to be good hygiene or good design? What's the what's the >>yeah. So aPI security is sort of a looking uh less known given that it's constantly evolving and changing. And the adoption of A P. S. Have gone up significantly. So what you need to start with effectively is the runtime security aspect of things. When a an aPI is live, how do I actually protected? And it ranges from simple syntactic protection things around people. Can can go ahead and break these ap is by providing sort of uh going after endpoints that you don't think exist anymore or going after certain functions by giving large values that they're not sort of coded to accept and so on so forth. Once you've done that runtime protection from a syntactic aspect, you also need to protect from a business logic aspect. I mean, mps will will expose uh information, interact with the customers and partners, what what business logic are they actually exposing and how can it be abused? Understanding that is another big aspects and then you can go ahead and protect from a runtime uh from a long time security perspective, once you've done that and understood that, well then you can start shifting lap things, invest in your uh sort of uh Dass tools or static analysis tools which can catch these things early so that they don't bubble up all the way, but none of them are actually silver bullets, right? So that you have a good uh time security tools, so I don't need to invest in dust or assessed whatever I have invested in my shift left aspect of things and uh and nothing will flow through. So you you need to start shifting left uh but covered all your bases properly, >>you can't shift left, there's nothing to shift from. I mean if you don't have that baseline foundation, what does that even mean to shift left and get that built into the Ci cd pipeline? So that's a great point. How does how does someone and some companies and teams set that foundation with the run time? Do you think it's a critical problem right now or most people are do a good job or they just get get lazy or just lose track of it or you know what, what's what's the common um, use case? Do you see behavior behaviorally inside these enterprises? >>Yeah. So what, what we're seeing is adoption of new technologies and environments um, and they're not um, well suited for the traditional way of doing that time. Security. Like if if you have an app running in your kubernetes environment, if you have an app running in in in a serval less environment, how do you actually protected with the traditional appliance based approach? So I think being able to get that visibility into these environments, understanding the the user behavior, how these applications are interacted with being able to differentiate from that uh, normal human behavior or even sometimes legitimate automation uh from from the malicious intents or or the the probing and the business logic attacks is key to understanding and defending these applications. >>Before we wrap up, I want to just get your expert opinion since you guys are both here around, you know, the next level of of innovation. Also you got cloud public cloud showed us a P. I. S are great. Now you're starting to see cloud operations, they call day two operations or whatever you call it A IOP. There's all kinds of buzz words are for it, but hybrid cloud and multi cloud, Edge five G. These are all basically pointing to distributed computing systems, basically distributed cloud. So that means more A P. I. Is gonna be out there. Um So in a way the surface area of a piece is increasing. What's your what's your view on this as a market? I mean, early days developing fast and what's, what's the, what's the landscape look like? What do you guys see from a attack and defense standpoint? >>Well, just from the attacker's perspective, you know, I see a lot more traffic going, what we call east west traffic, where it's traveling inside the application, it's a P is feeding a ps more data. Um, but what is really happening is we're trying to figure out how to hook third parties into our api is more and more. The john Deere attack was just simply their development api platform that they open up for other organizations to integrate with them. Um, you know, it's, it's very beneficial for John Deere to be able to say I planted this seed at an inch and a half of depth and later, uh, I harvested 280 bushels of corn off that acres. So I know that's perfect. I can feed that back to my seed guy. Well that kind of data flow that's going around from AP to AP means that there's far more attack surface and we're going to see it more and more. I I don't think that we're going to have less Ap is communicating in the near future. I think this is the foundation that we're building for what it's gonna look like for almost every business in the near term. >>I mean this is the plumbing of integration. I mean as people work with each other data transfer, data knowledge format, you mentioned syntax and all these basic things in computer science are coming to A PS which was supposed to be just a dumb pipe or just, you know, rest api those glory days now it's not there. They're basically, it's basically connections. >>Yeah. You're absolutely right. John, I mean like what Jason mentioned earlier, uh, in terms of the way the A. P. I. S are going to grow and the bad guys are going to go after it. You need to think like a bad guy, what are they going to go after? Uh, these assets that are going to be in the cloud, in your hybrid environment, in in your own prem environment. And, and it's, it's a flip of a switch where an internal API can be externally exposed or, or just a new api getting rolled out. So all those things you need to be able to protect, um, and get that visibility first and then being then protect these environments. >>That's awesome. You guys represent the new kind of company that's going to take advantage of the cloud scale and as people shift to the new structural change and people are re factoring security, This is an area that's going to be explosive in development. Obviously the upside is huge. Um Quickly before to end, you guys take a minute to give a plug for the company. Um This is pretty cool. I love love what you guys do. I think it's very relevant and cool at the same time. So sequence security. What are you guys doing funding hiring? What's the plug? Tell folks about it. >>Yeah. So uh we we we started about six years ago but we like starting in the the body defense space by focusing on obscenity ice. And from then we we've grown and we've grown significantly in terms of our customer base, the verticals that we're going after in financial retail social media, you name it, we are there because pretty much all these these uh articles depends on A. P. I. S. To interact with their customers. Uh We've we've raised our cities we last year we've we've grown our customer base. Uh Just in the last year when there was a lockdown people were all these retailers were transforming from brick and mortar to online. Social media also also grew and we grew with them. So >>Jason your thoughts. >>I think that sequence is his ability to scale out to any size environment. We've got a customer that does a billion and a half transactions a month. Um That are ap is from 1000 other clients of theirs. Being able to protect environments that are confusing and cloudy like that. Um Is really it makes what we do shine. We use a lot of machine learning models and ai in order to surface real problems. And we have a lot of great humans behind all of that, making sure that the bad guy maybe they're right now, but they're going away and we're going to keep them away. >>It's super, super awesome. I think it's a combination of more connections, distributed computing at large scale with a data problem. That's, that's playing out. You guys are solving great stuff and hey, you know when the cube studio ap I gets built, we're gonna need to call you guys up to to help us secure the cube data. >>Absolutely right. Absolutely. >>Hey, thanks for coming on the q Great uh, great insight and thanks for sharing about sequence. Appreciate you coming on, >>appreciate the time. >>Okay. It's a cube conversation here in Palo alto with remote guests. I'm john for your host. Thanks for watching. Yeah.
SUMMARY :
all the way from Ohio and here in the bay area with sequence securities is our focus on And what do you sell sequences in the business protecting your web and um A P. from the point of view of, you know, uh attack standpoint from a vector. for our machine learning models to make sure that we can defend against What do you guys think about this political thing, just proving that the FBI attack surface is really a great place to get a rich amount of data, that the tokens work, once you understood what they were doing, you could essentially go in and figure things I mean the starting point really is you cannot protect what, Um I mean the old days you used to just do port So the very first thing that we do is we sign up for an account, we use the thing, What are some of the common vulnerabilities and risks that you guys see in the A. P. I is when you look when you poke at them that people are 10, the first couple of things you see them on almost all applications, so broken and and you don't want to exfiltrate as a hacker, just one person's information. like the most dumbest thing I've ever seen, but they didn't think about, I mean, you know, So what you need to start with effectively is the runtime security aspect of things. I mean if you don't have that baseline foundation, or the the probing and the business logic attacks is key to What do you guys see from a Well, just from the attacker's perspective, you know, I see a lot more traffic going, are coming to A PS which was supposed to be just a dumb pipe or just, you know, rest api those glory days So all those things you need to be able to protect, I love love what you guys do. Uh Just in the last year when there was a lockdown making sure that the bad guy maybe they're right now, but they're going away and and hey, you know when the cube studio ap I gets built, we're gonna need to call you guys up to Absolutely right. Appreciate you coming on, I'm john for your host.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Jason | PERSON | 0.99+ |
john Kerry | PERSON | 0.99+ |
John | PERSON | 0.99+ |
Ohio | LOCATION | 0.99+ |
Jason Kent | PERSON | 0.99+ |
May 2021 | DATE | 0.99+ |
FBI | ORGANIZATION | 0.99+ |
two apps | QUANTITY | 0.99+ |
280 bushels | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
Shreyans Mehta | PERSON | 0.99+ |
android | TITLE | 0.99+ |
first one | QUANTITY | 0.99+ |
Palo alto California | LOCATION | 0.99+ |
china | LOCATION | 0.99+ |
second | QUANTITY | 0.99+ |
Sri | PERSON | 0.99+ |
first | QUANTITY | 0.98+ |
both | QUANTITY | 0.98+ |
one app | QUANTITY | 0.98+ |
first couple | QUANTITY | 0.98+ |
Schramm | PERSON | 0.97+ |
first thing | QUANTITY | 0.97+ |
John Deere | ORGANIZATION | 0.96+ |
day one | QUANTITY | 0.96+ |
Palo alto | LOCATION | 0.95+ |
two great guests | QUANTITY | 0.95+ |
First strategies | QUANTITY | 0.95+ |
one person | QUANTITY | 0.94+ |
hundreds and thousands of applications | QUANTITY | 0.94+ |
a billion and a half transactions a month | QUANTITY | 0.94+ |
top 10 | QUANTITY | 0.93+ |
about six years ago | DATE | 0.93+ |
Trey | PERSON | 0.92+ |
Api | ORGANIZATION | 0.92+ |
first party | QUANTITY | 0.86+ |
top 10 | QUANTITY | 0.85+ |
john | PERSON | 0.85+ |
One | QUANTITY | 0.85+ |
an inch and | QUANTITY | 0.83+ |
1000 other clients | QUANTITY | 0.78+ |
I. D. S. | LOCATION | 0.78+ |
two | QUANTITY | 0.76+ |
A. P. I. | ORGANIZATION | 0.7+ |
john Deere | PERSON | 0.69+ |
babies | QUANTITY | 0.64+ |
Agora | TITLE | 0.63+ |
uh time | ORGANIZATION | 0.57+ |
minute | QUANTITY | 0.56+ |
A P. | ORGANIZATION | 0.52+ |
day | QUANTITY | 0.51+ |
john Deere | ORGANIZATION | 0.49+ |
OAS | ORGANIZATION | 0.47+ |
a half | QUANTITY | 0.47+ |
Bob Bender and Jim Shook, CUBE Conversation
>> Narrator: From the CUBE Studios in Palo Alto, in Boston. Connecting with thought leaders all around the world, this is a CUBE Conversation. >> Hi, everybody. Welcome to the special Cube Conversation. With COVID-19 hitting, organizations really had to focus on business resiliency, and we've got two great guests here to talk about that topic. Bob Bender's the chief technology officer at Founders Federal Credit Union. And he's joined by Jim Shook, who is the director of cybersecurity and compliance practice at Dell Technologies. Gentlemen, thanks for coming on the CUBE, great to see you. >> Thanks, Dave, great to see you, thank you. So, Bob, let's start with you, give us a little bit of background on Founders and your role. >> Founders Federal Credit Union is a financial institution that has about 225,000 members, serving them in 30 different locations, located in the Carolinas. I serve as chief technology officer bringing in the latest technology and cyber resilient direction for the company. >> Great. And Jim, talk about your role. Is this a new role that was precipitated by COVID or was this something that Dell has had for a while? Certainly relevant. >> It's actually been around for a while, Dave. The organization invested in this space going back about five years, I founded the cyber security and compliance practice. So really, my role is most of the time in the field with our customers, helping them to understand and solve their issues around the cyber resilience and cyber recovery field that we're talking about. But I also, to do that properly, spend a lot of time with organizations that are interested in that space. So it could be with an advisory partner, could be the FBI, might be a regulator, a particular group like Sheltered Harbor that we've worked with frequently. So it's just really, as you point out, taken off first with ransomware a couple of years ago, and then with the recent challenges from work from home in COVID. So we're really helping out a lot of our customers right now. >> Bob, I've talked privately to a number of CIOs and CSOs and many have said to me that when COVID hit that their business continuance was really much too (voice cuts out) Now, you guys actually started your journey way back in 2017. I wonder if you could take us back a few years and what were the trends that you were seeing that precipitated you to go on this journey? >> Well, I think we actually saw the malware, the horizon there. And I'll take you back a little further 'cause I just love that story is, when we looked at the relationship of Dell EMC, we talked to the 1% of the 1%, who is protecting their environment, their data capital, the new critical asset in our environment. And Dell EMC was the top of the line every time. When we looked at the environment and what it required, to put our assets under protection, again, we turned to Dell EMC and said, where do we need to go here? You look at this Mecklenburg County, you look at the city of Atlanta, you look at Boeing and I hate to use the examples, but some very large companies, some really experienced companies were susceptible to this malware attacks that we just knew ourself it was going to change us. So the horizon was moving fast and we had to as well. >> Well, you were in a highly regulated industry as well. How did that factor into the move? Well, you're exactly right. We had on our budget, our capital budget horizon, to do an air gap solution. We were looking at that. So the regulatory requirements were requiring that, the auditors were in every day talking about that. And we just kept framing that in what we were going to do in that environment. We wanted to make sure as we did this purpose built data bunker, that we looked at everything, talk to the experts, whether that was federal state regulation. You mentioned Sheltered Harbor, there's GDPR. All these things are changing how are we going to be able to sustain a forward look as we stand this environment up. And we also stood up a cyber security operations center. So we felt very confident in our Runbooks, in our incident response, that you would think that we would be ready to execute. I'll share with you that we reached out every which way and a friend called me and was actually in a live ransomware event and asked if I wanted to come on to their site to help them through that incident. We had some expertise on our staff that they did not possess at that time. So going into that environment, spending 30 hours of the last 72 hours of an attack we came back changed. We came back changed and went to our board and our executives and said, "We thought we knew what we were doing." But when you see the need to change from one to 10 servers recovery to 300 in 72 hours, we just realized that we had to change our plan. We turned to the investment we had already made and what we had looked at for some time, and said, "Dell EMC, we're ready to look at that "PowerProtect Cyber Recovery solution. "How can you stand this up very quickly?" >> So, Jim, Bob was saying that he looked at the 1% of the 1%, so these guys are early adopters, but anything you can add to that discussion in terms of what you saw precipitate the activity, let's go pre-COVID, certainly ransomware was part of that. Was that the big catalyst that you saw? >> It really was. So when we started the practice, it was following up on the Sony Pictures attack, which only hit Sony in that. But it was unique in that it was trying to destroy an organization as opposed to just steal their data. So we had financial industry really leading the way, the regulators in the financial industry saying, "Gosh, these attacks could happen here "and they would be devastating." So they led the way. And as our practice continued, 2016 became the year of ransomware and became more prevalent, with the attackers getting more sophisticated and being able to monetize their efforts more completely with things like cryptocurrencies. And so as we come around and start talking to Bob, he still was well ahead of the game. People were talking about these issues, starting to grow concerned, but didn't really understand what to do. And Dave, I know we'll get to this a little bit later, but even today, there's quite a bit of disconnect, many times between the business, understanding the risks of the business and then the technology, which really is the business now, but making those pieces fit together and understanding where you need to improve to secure against these risks is a difficult process. >> Well, I think I'd love to come back to Bob and try to understand how you pitch this to the board, if you will, how you made the business case. To Jim's point, the adversaries are highly capable. It's a lucrative business. I always talk to my kids about ROI numerator and denominator. If you can raise the denominator, that's going to lower the value. And that's the business that you're in is making it less attractive for the bad guys. But how did you present this to the board? Was it a board level discussion? >> It was, exactly. We brought Dell EMC PowerProtect Cyber Recovery solution to them and said, not only you're experiencing and seeing in the news daily, these attacks in our regions, but we have actually gone out into an environment and watch that attack play out. Not only that is when we stepped away, and we ran through some tabletops with them and we stepped away. And we said, "Are you okay? "Do you know how it got in? "Are you prepared to protect now and detect that again?" Within 30 days, they were hit again by the same ransomware attacks and hackers. So I hate to say this, but I probably fast forwarded on the business case and in the environment, the horizon around me, players, they made my case for me. So I really appreciated that top down approach. The board invested, the executive invested, they understood what was at risk. They understood that you don't have weeks to recover in the financial institution. You're dealing with hundreds of thousand transactions per second so it made my case. We had studied, we had talked to the experts. We knew what we wanted. We went to Dell EMC and said, "I have six months and here's my spend." And that's from equipment hitting our CoLOS and our data centers, standing it up, standing up the Runbooks and it's fully executed. And I wanted an environment that was not only holistic. We built it out to cover all of our data and that I could stand up the data center within that environment. I didn't need another backup solution. I needed a cyber recovery environment, a lifestyle change, if you would say. It's got to be different than your BCP/DR. While it inherits some of those relationships, we fund it with employees separately. We treated the incident response separately, and it is really benefited. And I think we've really grown. And we continue to stress that to educate ourselves not only at the board level, but a bottom up approach as well with the employees. 'cause they're a part of that human firewall as well. >> I think you've seen this where a lot of organizations, they do a checkbox on backup or as I was saying before, DR. But then in this world of digital, when a problem hits, it's like, "Oh-oh, we're not ready." So I wonder Jim, if we can get into this solution that Bob has been talking about the Dell EMC PowerProtect Cyber Recovery solution, there's a mouthful there. You got the power branding going on. What is that all about? Talk to us about the tech that's behind this. >> It's something that we've developed over time and really added to in our capability. So at its core, PowerProtect Cyber Recovery is going to protect your most critical data and applications so that if there is a cyber attack, a ransomware or destructive attack, they're safe from that attack. And you can take that data and recover the most important components of the business. And to do that, we do a number of things, Dave. The solution itself takes care of all these things. But number one is we isolate the data so that you can't get there from here. If you're a bad actor, even an insider, you can't get to the data because of how we've architected. And so we'll use that to update the critical applications and data. Then we'll lock that data down. People will use terms like immutability or retention lock. So we'll lock it down in that isolated environment, and then we'll analyze it. So it's one thing to be able to protect the data with the solution, it's another, to be able to say that what I have here in my data vault, in my air gapped isolated environment is clean. It's good data. And if there was an attack, I can use that to recover. And then of course over time, we've built out all the capabilities. We've made it easier to deploy, easier to manage. We have very sophisticated services for organizations that need them. And then we can do a much lighter touch for organizations that have a lot of their built in capabilities. At its core, it's a recover capability so that if there was an attack that was unfortunately successful, you don't lose your business. You're not at the mercy of the criminals to pay the ransom. You have this data and you can recover it. >> So Bob, talk to us about your objectives going into this. It's more than a project. It really is a transformation of your resiliency infrastructure, I'll call it. What were your objectives going in? A lot of companies are reacting, and it's like, you don't have time to really think. So what are the objectives? How long did it take? Paint a picture of the project and what it looked like, some of the high level milestones that you were able to achieve. >> Well, I think several times Dell EMC was able to talk us off the edge, where it really got complicated. The Foundation Services is just one of your more difficult conversations, one of the top three, definitely, patch management, notification, and how you're going to rehydrate that data, keeping that window very small to reduce that risk almost completely as you move. I think other area this apply is that we really wanted to understand our data. And I think we're on a road to achieving that. It was important that if we were going to put it into the vault, it had a purpose. And if we weren't going to put it in a vault, let's see why would we choose to do that? Why would we have this data? Why would we have this laying around? Because that's a story of our members, 225 stories. So their ability to move into financial security, that story is now ours to protect. Not only do we want to serve you in the services and the industry and make sure you achieve what you're trying to, but now we have that story about you that we have to protect just as passionately. And we had that. I think that was two of the biggest things. I think the third is that we wanted to make sure we could be successful moving forward. And I'll share with you that in the history of the credit union, we achieved one of the biggest projects here, in the last two years. That umbrella of the Cyber Recovery solution protection was immediate. We plugged in a significant project of our data capital and it's automatically covered. So I take that out of the vendor of responsibility, which is very difficult to validate, to hold accountable sometimes. And it comes back under our control into this purpose built data security and cyber resilient, business strategy. That's a business strategy for us is to maintain that presence. So everything new, we feel that we're sized, there's not going to be a rip and replace, a huge architectural change because we did have this as an objective at the very beginning. >> Tim, when you go into a project like this, what do you tell customers in terms of things that they really should be focused on to have a successful outcome? >> I'm going to say first that not everybody has a Bob Bender. So we have a lot of these conversations where we have to really start from the beginning and work through it with our customers. If you approach this the right way, it's really about the business. So what are the key processes for your business? It can be different from a bank than from a hospital than from a school point. So what are the key things that you do? And then what's the tech that supports that and underlies those processes? That's what we want to get into the vault. So we'll have those conversations early on. I think we have to help a lot of organizations through the risks too. So understand the risk landscape, why doing one or two little things aren't really going to protect you from the full spectrum of attackers. And then the third piece really is, where do we start? How do we get moving on this process? How do we get victory so that the board can understand and the business can understand, and we can continue to progress along the way? So it's always a bit of a journey, but getting that first step and getting some understanding there on the threat landscape, along with why we're doing this is very important. >> So, Bob, what about any speed bumps that you encountered? What were some of those? No project is ever perfect. What'd you run into? How'd you deal with it? >> Well, I would say the Foundation Services were major part of our time. So it really helped for Dell EMC to come and explain to us and look at that perimeter and how our data is brought into that and size that for us and make sure it's sustainable. So that is definitely, could be a speed bump that we had to overcome. But today, because of those lifts, those efforts invested the Runbooks, the increase in new products, new data as our business organically grows is a non-event. It's very plug and play and that's what we wanted from the start. Again, you go back to that conversation at 1% of the 1%, it's saying, who protects you? We followed that. We stayed with the partner we trusted, the horizon holistically has come back and paid for itself again and again. So speed bumps, we're just enjoying that we were early adapters. I don't want to throw anybody out there, but you look about two weeks ago, there was a major announcement about an attack that was successful. They got them with ransomware and the company paid the ransom. But it wasn't for the ransomware, it was for the data they stole so that they would delete it. That's again, why we wanted this environment is we needed time to react in the case that these malwares are growing much faster than we're capable of understanding how they're attacking. Now it's one, two punch, where's it going to be? Where is it going to end? We're not going to likely be patient zero, but we're also not going to have to be up at night worrying that there's a new strain out there. We have a little time now that we have this secure environment that we know has that air gap solution that was built with the regulatory consideration, with the legal considerations, with the data capital, with the review of malware and such. You can go back in time and say, "Scan to see if I have a problem. So again, the partnership is while we focus on our business, they're focusing on the strategy for the future. And that's what we need. We can't be in both places at once. >> How long did the project take from the point of which you agreed, signed the contract to where you felt like you were getting value out of the solution? >> Six months. >> Really? >> We were adamant. I'd put it off for a year and a half, that's two budget cycles basically is what it felt. And then I had to come back and ask for that money back because we felt so passionate that our data, our critical data didn't need to be at that risk any longer. So it was a very tight timeline. And again, product on prem within six months. And it was a lot of things going on there. So I just wasn't idle during that time. I was having a conversation with Dell EMC about our relationship and our contracts. Let's build that cyber resilience into the contract. Now we've got this, PowerProtect Cyber Recovery environment, let's build it here where you also agree to bring on extra hardware or product if I need that. Let's talk about me being on a technology advisory panel So I can tell you where the pricing of the regulations are going, so you can start to build that in. Let's talk about the executive board reporting of your products and how that can enable us. We're not just talking about cyber and protecting your data. We're talking about back then 60% of your keep the lights on IT person will spend with auditors, talking about how we were failing. This product helped us get ahead of that to now where we're data analytic. We're just analysts that can come back to the business table and say, "We can stand that up very quickly." Not only because of the hardware and the platform solution we have, but it is now covered with a cyber resilience of the the cyber security recovery platform. >> I want to ask you about analytics. Do you feel as though you've been able to go from what is generally viewed as a reactive mode into something that is more anticipatory or proactive using analytics? >> Well, I definitely do. We pull analytics daily and sometimes hourly to make sure we're achieving our KPIs. And looking at the KRIs, we do risk assessments from the industry to make sure if our controls layer of defenses are there, that they will still work what we stood up three years ago. So I definitely think we've gone from an ad hoc rip and replace approach to transformation into a more of a threat hunting type of approach. So our cyber security operation center, for us, is very advanced and is always looking for opportunities not only to improve, to do self-assessments, but we're very active. We're monetizing that with a CUSO arm of the credit union to go out and help others where we're successful, others that may not have that staff. It's very rewarding for us. And I hate to say it sometimes it's at their expense of being in-evolved in the event of a ransomware attack or a malware event. We learned so much the gaps we have, that we could take this back, create Runbooks and make the industry stronger against these types of attacks. >> Well, so Jim, you said earlier, not every company has a Bob Bender. How common is it that you're able to see customers go from that reactive mode into one that is proactive? Is that rare or is it increasingly common? It can't be a 100%, but what are you seeing as trends? >> It's more common now. You think of, again, back to Bob, that's three plus years ago, and he's been a tireless supporter and tireless worker in his industry and in his community, in the cyber area. And efforts like those of Bob's have helped so many other organizations I think, understand the risks and take further action. I think too, Bob talks about some of the challenges with getting started in that three year timeframe, PowerProtect Cyber Recovery has become more productized, our practice is more mature. We have more people, more help. We're still doing things out there that nobody else is touching. And so we've made it easier for organizations that have an interest in this area, to deploy and deploy quickly and to get quick value from their projects. So I think between that some of the ease of use, and then also there's more understanding, I think, of what the bad actors can do and those threats. This isn't about somebody maybe having an outage for a couple of hours. This is about the very existence of a business being threatened. That if you're attacked, you might not come back from it. And there've been some significant example that you might lose hundreds of millions of dollars. So as that awareness has grown, more and more people have come on board and been able to leverage learnings from people like Bob who started much earlier. >> Well, I can see the CFO saying, "Okay, I get it. "I have no choice where we're going to be attacked. "We know that, I got to buy the insurance. You got me." But I can see the CFO saying, "Is there any way we can "get additional value out of this? "Can we use it to improve our processes and cut our costs? "Can we monetize this in some way?" Bob, what's the reality there? Are you able to find other sources of value beyond just an insurance policy? >> Definitely, Dave you're exactly right. We're able to go out there and take these Runbooks and really start to educate what cyber resilience means and what air gap means, what are you required to do, and then what is your responsibility to do it. When you take these exercises that are offered and you go through them, and then you change that perspective and go through a live event with other folks that see that after 60 hours of folks being up straight, it really changes your view to understand that there's no finish line here. We're always going to be trying to improve the product and why not pick somebody that you're comfortable with and you trust. And I think that's the biggest win we have from this is that was a Dell EMC partnership with us. It is very comfortable fit. We moved from backup and recovery into cyber resilience and cybersecurity as a business strategy with that partner, with our partner Dell, and it hasn't failed us. It's a very comforting. We're talking about quality of life for the employee. You hear that, keep the lights on. And they've really turned into professionals to really understand what security means differently today and what that quality of data is. Reports, aren't just reports, they're data capital. The new currency today of the value we bring. So how are we going to use that? How are we going to monetize that? It's changing. And then I hate to jump ahead, but we had our perimeters at 1% of our workforce remote and all of a sudden COVID-19 takes on a different challenge. We thought we were doing really good and next, we had to move 50% of our employees out in five days. And because of that Dell EMC, holistic approach, we were protected every step of the way. We didn't lose any time saying, we bought the wrong control, the wrong hardware, the wrong software. It was a very comfortable approach. The Runbooks held us, our security posture stayed solid. It's been a very rewarding. >> Well, Bob, that was my next question, actually is because you've started the journey. >> Sorry. >> No, no, it's okay. Because you started the journey early, were you able to respond to COVID in a more fast sell manner? it sounds like you just went right in. But there's nuance there, because you've got now 50% or more of the workforce working at home, you got endpoint security to worry about. You got identity access management, and it sounds like you were, "No problem. "We've got this covered." Am I getting that right? >> You're exactly right, Dave. We test our endpoints daily. We make sure that we understand what residue of data is where. And when we saw that employee shift to a safe environment, our most consideration at that time, we felt very comfortable that the controls we had in place, again, Dell and their business partners who we are going to hold true and be solid. And we test those metrics daily. I get reports back telling me, what's missing in patch management, what's missing in a backup. I'll go back to keeping BCP and cyber security separate. In the vault, we take approach of recovery and systems daily. And now that goes from maybe a 2% testing rate almost to 100% annually. So again, to your point, COVID was a real setback. We just executed the same Runbooks we had been maturing all along. So it was very comfortable for employees and it was very comfortable for our IT structure. We did not feel any service delays or outages because of that. In a day, when you have to produce that data, secure that data, every minute of every day of every year, it's very comforting to know it's going to happen. You don't push that button and nothing happens. It's executed as planned. >> Jim, did you see a huge spike in demand for your services as a result of COVID and how did you handle it? You guys got a zillion customers, how did you respond and make sure that you were taking care of everybody? >> We really did see a big spike, Dave. I think there were a couple of things going on. As Bob points out, the security posture changes very quickly when you're sending people to work from home or people remotely, you've expanded or obliterated your parameter, you're not ready for it. And so security becomes even more important and more top of mind. So with PowerProtect Cyber Recovery, we can go in and we can protect those most critical applications. So organizations are really looking at their full security posture. What can we do better to detect and protect against these threats? And that's really important. For us, we're focusing on what happens when those fail? And with that extension and people going home, and then the threat actors getting even more active, the possibilities of those failures become more possible and the risks are just in front of everybody. So I think it was a combination of all of those things. Many, many customers came to us very quickly and said, "Tell us more about what you're doing here. "How does it fit into our infrastructure? "What does it protect us against? "How quickly can we deploy?" And so there has been a huge uptake in interest. And we're fortunate in that, as you pointed out early on, Dave, we invested early here. I'm five years into the practice. We've got a lot of people, very mature, very sophisticated in this area, a lot of passion among our team. And we can go take care of all those customers. >> Bob, if you had a mulligan, thinking about this project, what would you do differently if you had a chance to do it over? >> I think I would start earlier. I think that was probably the biggest thing I regret in that realizing you need to understand that you may not have the time you think you do. And luckily, we came to our senses, we executed and I got to say it was with common sense, comfortable products that we already understood. We didn't have to learn a whole new game plan. I don't worry about that. I don't worry about the sizing of the product 'cause we did it, I feel correctly going in and it fits us as we move forward. And we're growing at an increased rate that we may not expect. It's plug and play. Again, I would just say, stay involved, get involved, know that what we know today about malware and these attacks are only going to get more complicated. And that's where I need to spend my time, my group become experts there. Why I really cherish the Dell EMC relationship is from the very beginning, they've always been very passionate on delivering products that recover and protect and now are cyber resilient. I don't have to challenge that, you pay for what you get for. And I just got to say, I don't think there's much other than I would have started earlier. So start today, don't put it off. >> So you said earlier though, you're never done, you never are, in this industry. So what's your roadmap look like? Where do you want to go from here with this capability? >> I definitely want to keep educating my staff, keep training them, keep working with Dell. Again, I tell you they're such forward thinking as a company. They saved me that investment. So if you're looking at part of the investment, it's got to be, are you with a partner that's forward thinking? So we definitely want to mature this, challenge it, keep challenging, keep working with Dell and their products to deliver more. Again, we go to the federal and state regulatory requirements. You go to the Sheltered Harbor, the ACET testing from the NCUA regulators, just software asset management. You can keep on going down the line. This product, I hate to say it, it's like the iPhone. You think about how many products the iPhone has now made not relevant. I don't even own a flashlight, I don't think. This is what the Dell product line brings to me is that I can trust they're going to keep me relevant so I can stay at the business table and design products that help our members today. >> Jim, how about from Dell's perspective, the roadmap, without giving away any confidential information, where do you want to take this? We talk about air gaps. I remember watching that documentary Zero Days and hearing them say, "We got through an air gap. "No problem." So analytics obviously plays a role in this machine intelligence, machine learning, AI. Where does Dell want to take this capability? Where do you see that going? >> We've got some things in mind and then we're always going to listen to our customers and see where the regulations are going to. And thus far, we've been ahead of those with the help of people like Bob. I think where we have a huge advantage, Dave is with PowerProtect Cyber Recovery. It's a product. So we've got people who are dedicated to this full time. We have a maturity in the organization, in the field to deliver it and to service it. And having something as a product like that really enables us to have roadmaps and support and things that customers need to really make this effective for them. So as we look out on the product, and thanks for your reminder, I don't want to risk saying anything here I'm going to get in trouble for. We look at things in three paths. One is we want to increase the ability for our customers to consume the product. So they want it in different forms. They might want it in appliances, in the Cloud, virtual, all of those things are things that we've developed and continue to develop. They want more capabilities. So they want the product to do more things. They want it to be more secure, and keeping up. As you mentioned, machine learning with the analytics is a big key for us. Even more mundane things like operational information makes it easier to keep the vault secure and understand what's going on there without having to get into it all the time. So those are really valuable. And then our third point, really, we can't do everything. And so we have great partners, whether they're doing delivery, offering cyber recovery as a service or providing secure capabilities, like our relationship with Unisys. They have a stealth product that is a zero knowledge, zero trust product that helps us to secure some of the connections to the vault. We'll keep iterating on all of those things and being innovative in this space, working with the regulators, doing things. Bob's mentioned a couple of times, Sheltered Harbor. We've been working with them for two years to have our product endorsed to their specification. Something that nobody else is even touching. So we'll continue along all those paths, but really following our customer's lead in addition to maybe going some places that they haven't thought about before. >> It's great guys. I have to fear that when you talk to SecOps pros, you ask them what their biggest challenge is, and they'll say lack of talent, lack of skills. And so this is a great example, Jim, you're mentioning it, you've productized this. This is a great example of a technology company translating, IT labor costs into R&D. And removing those so customers can spend time running their business. Bob and Jim, thanks so much for coming on the CUBE. Great story. Really appreciate your time. >> Thank you, Dave. >> Thank you, Dave. >> Thanks, Bob. >> All right. And thank you everybody for watching. This is Dave Vellante for the CUBE. We'll see you next time. (instrumental music)
SUMMARY :
Narrator: From the CUBE on the CUBE, great to see you. to see you, thank you. bringing in the latest technology And Jim, talk about your role. But I also, to do that and many have said to me that So the horizon was moving fast the need to change from one to 10 Was that the big catalyst that you saw? and start talking to Bob, I always talk to my kids about ROI And we said, "Are you okay? You got the power branding going on. And to do that, we do a So Bob, talk to us about So I take that out of the aren't really going to protect you any speed bumps that So it really helped for Dell EMC to come and the platform solution we have, I want to ask you about analytics. We learned so much the gaps we have, How common is it that you're able to see and to get quick value But I can see the CFO saying, and really start to educate Well, Bob, that was my Am I getting that right? We make sure that we understand And we can go take care And I just got to say, So you said earlier it's got to be, are you with a partner perspective, the roadmap, in the field to deliver I have to fear that when And thank you everybody for watching.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Jim | PERSON | 0.99+ |
Bob | PERSON | 0.99+ |
FBI | ORGANIZATION | 0.99+ |
Jim Shook | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
Bob Bender | PERSON | 0.99+ |
two | QUANTITY | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
Sony | ORGANIZATION | 0.99+ |
50% | QUANTITY | 0.99+ |
Boeing | ORGANIZATION | 0.99+ |
Sheltered Harbor | ORGANIZATION | 0.99+ |
six months | QUANTITY | 0.99+ |
Unisys | ORGANIZATION | 0.99+ |
Tim | PERSON | 0.99+ |
60 hours | QUANTITY | 0.99+ |
iPhone | COMMERCIAL_ITEM | 0.99+ |
Palo Alto | LOCATION | 0.99+ |
72 hours | QUANTITY | 0.99+ |
100% | QUANTITY | 0.99+ |
third piece | QUANTITY | 0.99+ |
225 stories | QUANTITY | 0.99+ |
300 | QUANTITY | 0.99+ |
Mecklenburg County | LOCATION | 0.99+ |
Dell EMC | ORGANIZATION | 0.99+ |
two years | QUANTITY | 0.99+ |
one | QUANTITY | 0.99+ |
Zero Days | TITLE | 0.99+ |
Dell EMC | ORGANIZATION | 0.99+ |
Carolinas | LOCATION | 0.99+ |
Six months | QUANTITY | 0.99+ |
1% | QUANTITY | 0.99+ |
NCUA | ORGANIZATION | 0.99+ |
2016 | DATE | 0.99+ |
Sony Pictures | ORGANIZATION | 0.99+ |
today | DATE | 0.99+ |
third | QUANTITY | 0.99+ |
Atlanta | LOCATION | 0.99+ |
2% | QUANTITY | 0.99+ |
five years | QUANTITY | 0.99+ |
three paths | QUANTITY | 0.99+ |
a year and a half | QUANTITY | 0.99+ |
COVID-19 | OTHER | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
Founders Federal Credit Union | ORGANIZATION | 0.99+ |
Picking the Right Use Cases | Beyond.2020 Digital
>>Yeah, yeah. >>Welcome back, everyone. And let's get ready for session number two, which is all around picking the right use cases. We're going to take a look at how to make the most of your data driven journey through the lens of some instructive customer examples. So today we're joined by thought squads David Copay, who is a director of business value consulting like Daniel, who's a customer success manager and then engagement manager. Andrea Frisk, who not so long ago was actually a product manager. Canadian Tire, who are one of our customers. And she was responsible for the thoughts. What implementation? So we figured Who better to get involved? But yeah, let's Let's take it away, David. >>Thanks, Gina. Welcome, everybody. And Andrea Blake looking forward to this session with you. A zoo. We all know preparation early is key to success on Duin. Any project having the right team on sponsorship Thio, build and deploy. Ah, use case is critical being focused on three outcome that you have in mind both the business deliverables and then also the success criteria of how you're going to manage, uh, manage and define success. When you get there, Eyes really critical to to set you up in the right direction initially. So, Andrea, as as we mentioned, uh, you came from an organization that quite several use cases on thoughts about. So maybe you can talk us through some of those preparation steps that, yeah, that you went through and and share some insights on how folks can come prepare appropriately. >>Eso having the right team members makes such a difference. Executive support really helped the Canadian tire adoption spread. It gave the project presence and clout in leadership meetings and helped to drive change from the top down. We had clear goals and success criteria from our executive that we used to shape the go forward plan with training and frame the initial use case roadmap. One of the other key benefits over executive sponsor was that the reporting team for our initial use case rolled up by underhand. So there was a very clear directive for a rapid phase out of the old tools once thought Spot supported the same data story. And this is key because as you start to roll through use cases, you wanna realize the value. And if you're still executing the old the same time as the new. That's not gonna happen. As we expanded into areas where we were unfamiliar with the data in business utilization, we relied on the data experts and and users to inform what success would look like in the new use cases. We learned early on that those who got volunteer old and helping didn't always become the champions. That would help you drive value from the use case. Using the thoughts about it meant tables. We started to seek out users who are consistently logging in after an initial training, indicating their curiosity and appetite to learn more. We also looked for activities outside of just pin board views toe identify users that had the potential to build and guide new users as subject matter experts, not just in a data but in thought spot. This helps us find the right people to cultivate who were already excited about the potential of thought spot and could help us champion a use case. >>That's really helpful, great, great insight for someone who's been there and done that. Blake is as a customer success manager. Obviously, you approach many of the same situations, anything you'd like to add that >>I still along with the right team. My first question with any use cases. Why Why are we doing this? You've gathered all this data and now we want to use it. But But what for? When you get that initial response on Why this use case? Don't stop there. Keep asking Why keep digging? Keep digging. Keep digging. So what you're essentially trying to get at is what does the decision is that we will be made or potentially be made because of this use case. For example, let's say that we're looking at an expenses use case. What will be done with the insides gathered with this use case? Are those insights going? Thio change the expense approval process Now, Once you have that, why defined now it becomes a lot easier to define the success criteria. Success criteria they use. Face can sometimes be difficult to truly defined. But when you understand why it becomes much easier, so now you can document that success criteria. And the hard part at that point is to actually track that success over time, track the success of the use case, which is something that is easily miss but It's something that is incredibly useful to the overall initiative. >>Right measure. Measure the outcomes. You can't manage what you what? You can't what you don't measure right? As the old adage goes, and you know it's part of the business consulting team. That's really where we come in. Is helping customers really fundamentally define? How are we going to measure a success? Aziz. We move forward. Andi, I think you know, I think we've alluded to this a little bit in terms of that sort of ongoing nature of This is, you know, after the title of the session, eyes choosing the right news cases in the plural right? So it's very important to remember that this is not a single point in time event that happens once. This is a constant framework or process, because most organizations will find that there's many use cases, potentially dozens of use cases that thoughts what could be used for, and clearly you can't move forward with all of them. At the same time, eso. Another thing that our team helps customers walk through is what's the impact, the potential value, other particular use case. You know, you, Blake, you mentioned some of those outcomes, is it? Changing the expense processes it around? Reducing customer churn is an increasing speed toe insight and speak the market on defining those measurable outcomes that define the vertical axis here. The strategic importance off that use case. Um, but that's not the only dimension that you're gonna look at the East to deploy factors into that you could have the most valuable use case ever. But if it's going to take you to three years to get it implemented for various reasons, you're not really gonna start with that one, right? So the combination of east to deploy, aligned with the strategic importance or business value really gives you that road map of where to focus to prioritize on use cases. Eso again, Andrea, you've been through this, um, in your prior time at Canadian time. Maybe you can share some thoughts on how you approach that. >>Yeah. So our initial use case was a great launching platform because the merchandizing team had a huge amount across full engagement. So once we had the merchants on board, we started to plan or use case roadmap looking for other areas, and departments were thought spot had already started to spread by word of mouth and we where we felt there was a high strategic importance. As we started to scope these areas, the ease of deployment started to get more complicated. We struggled to get the right people engaged and didn't always have the top down support for resources in the new use case area. We wanted to maintain momentum with the adoption, but it was starting to feel like we were stalling out on the freeway. Then the strategic marketing team reached out and was really excited about getting into thought spot. This was an underserved team where when it came to data, they always had someone else running it for them, and they'd have to request reports and get the information in. Um, and our initial roadmap focused on the biggest impact areas where we could get the most users, and this team was not on the radar. But when we started to engage with them, we realized that this was gonna be an easy deployment. We already had the data and thought spot to support their needs, and it turned into such a great win because as a marketing team, they were so thrilled to have thought spot and to get the data when they needed it and wanted it. They continued to spread the word and let everyone know. But it also gave the project team a quick win to put some gas in the tank and keep us moving. So you want to plan your use case trajectory, but you also need to be willing to adapt to keep the momentum going. >>Yeah, no, that's a That's a really great point. So So Blake is a customer success manager. I'm sure you lived through some integration of this all the time. So any anything you wanted to add that >>Yes. So to Andrew's point, continuous delivery is key for technical folks out there were talking and agile methodology mindset versus a waterfall. So to show value, there's many different factors that air at play. You need to look at the overall business initiatives. We need to look at financial considerations. We need to look at different career objectives and also resource limitations. So when you start thinking about all those different factors, this becomes a mixture of art and science. So, for example, at the beginning of a project when thought spot is has just been purchased or whatever tool has just been purchased. You want to show immediate value to justify that purchase. So in order to show immediate value, you might want to look at a project or a use case that is tightly aligned to a business objective. Therefore, it shows value, and it has data that is ready to go without many different transformations. But as you move forward, you have to come up with a plan that is going to mix together these difficult use cases with the easier use cases and high business values cases versus the lower. So in order to do that, my most successful customers are evaluating those different business factors and putting those into place with an overall use case development plan. >>Really good feedback. That's great. Thank you. Thanks, Blake. Um, I think s a little bit of a reality check here. Right. So I think we all recognize that any technology implementation, um, is gonna have her bumps in the road. It's not gonna be smooth sailing all along the way. You know, we talk about people, process and technology. The technology wrote wrote roadblocks can be infrastructure related there could be some of the data quality issues that you're alluding to there. Like Onda, people in process fall into the sort of the cultural, uh, cultural cultural side of it. Blake, maybe you can spend a couple minutes going through. What? What if some of those bigger roadblocks that people may face on that, um, technical side on how they could both prepare for them and then address them as they come along? >>Yeah. So the most intimidating part of any business intelligence or analytics initiative is that it's going to put the data directly into the hands of the business users. And this is especially true with ocelot. So why this is intimidating is because it's going toe, lay bare and expose any data issues that exist. So this is going to lead to the most common objective that I hear to starting. Any new use case or any FBI initiative overall, which is our data isn't ready. And essentially that is fear of failure. So when data isn't ready and companies aren't ready to start these projects, what happens is to get around those data issues. There's a lot of patchwork that's happening, you know, this patchwork is necessary just to keep the wheels in motion just to keep things going. So what I mean by the patchwork is extracting the data from a source doing some manual manipulation, doing some manipulation directly within the within the database in order to satisfy those business users request. So this keeps things going, but it's not addressing the key issues that are in place now. While it's intimidating to start these initiatives, the beauty of starting these B I initiatives is it's going to force your company to address and fix these issues. And this, to me, is somewhere where thoughts what is a gigantic benefit? It's not something that we talk about necessarily or market, but thought Spot is really good at helping fix these data issues. And I say this for two reasons. One his data quality. So, with thoughts about you can run, searches directly against your most granular level data and find where those data issues exist, and now, especially with embrace, you're running it directly against the source. So thats what is going to really help you figure out those data quality issues. So as you develop a use case, we can uncover those data quality issues and address them accordingly. And second is data governance. So especially again with embrace and our cloud, our cloud structure is you are going to be bringing Companies are going to be bringing data sources from all over the place all into one source and into one logical view. And so traditionally, the problem with that is that your data and source a might be the theoretically the same data and source B. But the numbers are different. And so you have different versions of the truth. So what thoughts about helps you do is when you bring those sources together. Now you're gonna identify those issues, and now you're gonna be forced to address them. You're gonna be forced to address naming convention issues, business logic issues, which business logic translates to the technical logic toe transform that data and then also security and access. Who was actually able to see this data across these different data sources. So overall, the biggest objective eye here is our data isn't ready. But I challenge that. And I say that by taking on this initiative with thought spot, you were going to be directly addressing that issue and thoughts. What's going to help you fix it? >>Yeah, that's Ah, I'd love that observation that, you know, data quality issues. They're not gonna go away by themselves. And if thoughts, thoughts what could be part of the solution, then even better. So that's a That's a really great observation. Eso Andrea, looking at the sort of the cultural side of things the people in process, Um, what are some of the challenges that you've seen there that folks in the audience could that could learn from? >>Yeah. So think about the last time you learned a new system or tool. How long did it take you to get adjusted and get the performance you wanted from it? Maybe you hit the ground running, but maybe you still feel like you're not quite getting the most out of it. Everyone deals with change differently, and sometimes we get stuck in the change curve and never fully adapt. Companies air no different. Ah, lot of the roadblocks you may face are not only from individual struggling to get on board, but can be the result of an organizational culture that may not be used to change or managing it. Their external impacts on how we accept change such as Was there a clear message about the upcoming changes and impacts? Was there a communication channel for questions and concerns? Did individuals feel like their input was sought after and valued? Where there are multiple mediums, toe learn from was their time to learn? Organizational change is hard. And if there isn't a culture that allocates time and resources to training, then realizing success is gonna be an uphill battle. It will be harder to move people forward if they don't have the time to get comfortable and feel acclimated to the new way of doing things. Without the training and change support from the organization, you'll end up running the old and the new simultaneously, which we talked about not in our live supporting users, in both eyes going to negate that value. There were times at Canadian Tire where we really struggled to get key stakeholders engaged or to get leadership by it on the time of the resources that we're gonna be needed and committed Thio to make a use case successful. So gauging where people and the organization are in the change curve is the first step in moving them along the path towards acceptance and integration. So you'll wanna have an action plan to address the concerns and resistance and a way to solicit and channel feedback. >>Yeah, that's Zo great feedback. And I particularly like what you talked about sort of the old and the new because, you know, we've talked about success and measurement on value quite a bit in this session, and ultimately that's that's the goal, right? Is to live a Value s o. This is a framework that we found really helpful visit. Value Team is defining those success criteria really actually falls into two categories on the right hand side. Better decisions. Um, that's ultimately what you're looking to drive with thoughts about right. You're looking to get newer inside faster to be able to drive action and outcomes based on decisions that do. Maybe we're using your gut for previously on the words under that heading. They're going to change by organizations. So you know, those don't get too caught up on those, but it's really around defining, you know, one. Are those better decisions that you're looking to drive, Who what's the persona is gonna be making them one of their actually looking to accomplish when inside. So they're looking to get one of what are the actions they're going to take on those insights? And then how do we measure Thean pact of those actions that then provides us with the the foundation of a business case in our I, um, in parallel to that, it's important to remember that this use case is not just operating in a vacuum, right? Every organization has a Siri's off strategic transformational initiatives move to the cloud democratized data, etcetera. And to the extent that you can tie particular use cases into those key strategic initiatives, really elevates the importance off that use case outside of its own unique business case. In our calculation on Bazzaz several purposes, right, it raises the visibility project. It raises the visibility of the person championing project on. Do you know reality here is that every idea organization has tons of projects have taken invest in, but the ones they're gonna be more likely to invest in other ones that are tied to those strategic initiatives. So it increases the likelihood of getting the support and funding that you need to drive this forward um, that's really around defining the success success criteria upfront. Um, and >>what >>we find is a lot of organizations do that pretty well, and they've got a solid, really solid business case to move forward. But then over time, they kind of forget about that on. Do you know, a year down the line two years down the line, Maybe even, you know, three months, six months down the line. Maybe people have rotated through the business. People have come and gone, and you almost forget the benefit that you're driving, right? And so it's really important to not do that and keep an eye on and track Onda, look back and analyze and realize the value that use cases have driven on. Obviously, the structure of that and what you measure is gonna very significantly by escape. But it's really important there Thio to make sure that you're counting your success and measuring your success. Um, Andrea, I don't any any thoughts on that from from your past experience. >>Yeah, um, success will be different For each use case, 1 may be focused on reducing the time to insights in a fast competitive market, while another may be driven by a need to increase data fluency to reduce risk. The weighting of each of these criterias will shift and and the value perception should as well. Um, but one thing that we don't want to forget is to share your personal successes. So be proud of the work that you've done in the value it's created. Um, if you're a user who has taken advantage of thought spot and managed to grab a competitive edge by having faster in depth access to data, share that in your business reviews. If you're managing the adoption at your company, share your use case winds and user adoption stories. Your customer success team is here to help you articulate the value and leverage the great work being done in and because of thought spot. >>Yeah, long story short here. This benefits everybody. This is something that's easily overlooked and something that it ZZ not to do this to track adoption to define the r o I, but it benefits those benefits. Start spot benefits of customers. Everybody wins. When we do this, >>that's Ah, that's a great point. So, um, so if we talk about you know, as we wrap the session up. You know what can what can folks in the audience dio right now to start making some of this stuff happened? You know, you're Blake again, coming back to you in customer success. How have you and your role help customers take that next step and start executing on some of the things that we've talked about? >>Yeah. So to start off with, I would just say for each use case as much as possible, define the why and to find the success criteria. Just start off with those two, those two elements and over time that that process we'll get more and more refined and our goal within the CSCE or within within thoughts. But overall, not just the C s order is to enable all of our all of our customers to be able to do all these things on their own. And to be a successful, it's possible to be able to pick the right use cases to be able to execute those right use cases as effectively as possible. So we are here to help with that. CS is here to help with that. Your account executives here to help with that, we have use case workshops. We have our professional services team that can get in and help develop use cases. So lots of options available in goal. We all mutually benefit when we try to track towards thes best possible use cases. >>All right, that we're here to help. That's Ah, that's a great way. Thio, wrap up the session there. Thanks, Blake. For all of your thoughts and Andrea to hope everyone in the audience got some valuable insights here on how to choose the right news case and be successful with thoughts about, um, with that being, I'll hand it back over to you. >>Amazing. That was an awesome session. Thank you so much, guys. So our third session is up next, and we're going to be going Global s. Oh, hang on tight as we explore best practices from the extended ecosystem of cloud based analytics. >>Yeah,
SUMMARY :
We're going to take a look at how to make the most of your data driven journey through the lens of some instructive And Andrea Blake looking forward to this session with you. It gave the project presence and clout in leadership meetings and helped to drive Obviously, you approach many of the same situations, And the hard part at that point is to actually track look at the East to deploy factors into that you could have the most valuable use case ever. We already had the data and thought spot to support their needs, and it turned into such a great So any anything you wanted So in order to show immediate people in process fall into the sort of the cultural, uh, cultural cultural side of What's going to help you fix it? Yeah, that's Ah, I'd love that observation that, you know, data quality issues. Ah, lot of the roadblocks you may face are not only from individual struggling to get on board, And to the extent that you can tie particular use cases into those Obviously, the structure of that and what you measure is gonna very Your customer success team is here to help you This is something that's easily overlooked and something that it ZZ not to do this So, um, so if we talk about you know, And to be a successful, it's possible to be able to pick the right use cases to be thoughts about, um, with that being, I'll hand it back over to you. Thank you so much, guys.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Andrea | PERSON | 0.99+ |
Andrea Blake | PERSON | 0.99+ |
Gina | PERSON | 0.99+ |
Andrea Frisk | PERSON | 0.99+ |
David Copay | PERSON | 0.99+ |
David | PERSON | 0.99+ |
Andrew | PERSON | 0.99+ |
Blake | PERSON | 0.99+ |
Daniel | PERSON | 0.99+ |
two | QUANTITY | 0.99+ |
Siri | TITLE | 0.99+ |
third session | QUANTITY | 0.99+ |
two elements | QUANTITY | 0.99+ |
three years | QUANTITY | 0.99+ |
each | QUANTITY | 0.99+ |
Andi | PERSON | 0.99+ |
six months | QUANTITY | 0.99+ |
first question | QUANTITY | 0.99+ |
three months | QUANTITY | 0.99+ |
Thio | PERSON | 0.98+ |
two categories | QUANTITY | 0.98+ |
one | QUANTITY | 0.98+ |
two reasons | QUANTITY | 0.98+ |
today | DATE | 0.98+ |
both | QUANTITY | 0.98+ |
second | QUANTITY | 0.98+ |
single point | QUANTITY | 0.98+ |
FBI | ORGANIZATION | 0.98+ |
a year | QUANTITY | 0.97+ |
first step | QUANTITY | 0.97+ |
two years | QUANTITY | 0.97+ |
one source | QUANTITY | 0.97+ |
Aziz | PERSON | 0.97+ |
One | QUANTITY | 0.96+ |
both eyes | QUANTITY | 0.96+ |
one thing | QUANTITY | 0.93+ |
dozens of use cases | QUANTITY | 0.92+ |
each use case | QUANTITY | 0.88+ |
session | QUANTITY | 0.87+ |
Eso Andrea | PERSON | 0.78+ |
Canadian | LOCATION | 0.72+ |
three outcome | QUANTITY | 0.7+ |
Duin | ORGANIZATION | 0.66+ |
1 | QUANTITY | 0.63+ |
Canadian Tire | ORGANIZATION | 0.63+ |
once | QUANTITY | 0.61+ |
Thio | ORGANIZATION | 0.58+ |
Onda | ORGANIZATION | 0.57+ |
tons | QUANTITY | 0.55+ |
Bazzaz | ORGANIZATION | 0.52+ |
Spot | ORGANIZATION | 0.51+ |
cases | QUANTITY | 0.51+ |
Beyond.2020 | ORGANIZATION | 0.45+ |
couple | QUANTITY | 0.45+ |
number | OTHER | 0.37+ |
Kevin Heald & Steven Adelman, Novetta | AWS re:Invent 2020 Public Sector Day
>>from around the globe. It's the Cube with digital coverage of AWS reinvent 2020. Special coverage sponsored by AWS Worldwide Public sector. >>Welcome to the Cube. Virtual. This is our coverage of aws reinvent 2020. Specialized programming for worldwide public sector. I'm Lisa Martin. Got a couple of guests here from No. Veta, please welcome Steven Adelman, principal computer scientists, and Kevin Healed, vice president of Information Exploitation. Gentlemen, welcome to the Cube. >>Thank you. >>Thank you for having us. >>Alright, guys. So? So, Kevin, we're going to start with you. Give our audience an introduction to Nevada. What do you What do you guys do? Who are you? How do you play in the public sector Government space, >>right? Yeah. Thank you, Lisa. Eso, Nevada Nevada is a technology services company focused on government solutions. So primarily national security solutions. Eso think customers such as Doody, the intelligence community, FBI, law enforcement and things like that about 13 1300 employees worldwide, primarily in our in our field. Clear resource is, um, that really focused on cloud for solutions for our customers. So solving the tough mission challenges our customers have, so that could be in technology solutions such as Data Analytics A I M L i O T. Secure Workloads, full spectrum cyber Cobb video processing. Really anything that's a high end technology solution or something we do for the government. We have been a privilege. We have. It's a privilege to be a partner with AWS for for some time now. In fact, I think the first reinvent we may have been to Stephen was six years ago. Five years ago, two >>1012 or 13 >>s So we've we've we've been around for a while, really kind of enjoying it and certainly sad that we're missing an in person reinvent this year, but looking forward to doing it virtually so, we're actually advanced your partner with AWS with a machine learning and government competency. Andi really kind of thio pump the m l side of that. That was one of our first companies with compasses with AWS and led by a center of excellence that I have in my division that really focuses on machine learning and how we applied for the Michigan. And so, um, really, we focus on protecting the nation and protecting our activities in the country >>and on behalf of the country. We thank you, Steven. Give me a little bit of information from a double click perspective as computer scientists. What are some of the key challenges that no, that helps its customers to solve. And how do you do that with a W s? >>Yeah, Thank you. So really as, ah, company, that is is data first. So our initial love and and still are kind of strongest competency is in applying solutions to large data sets. And as you can imagine, uh, the bigger the data set them or compute you need the the more resource is you need and the flexibility from those resource is is truly important, which led us very early, as especially in the government space and public sector space to be in early. A doctor of cloud resource is because of the fact that, you know, rather than standing up a 200 node cluster at at many millions of dollars, we could we could spend up a W s resource is process a big data set, and then and then get the answers an analyst or on operator needed and then spin down. Those resource is when When when that kind of compute wasn't needed. And that is really, uh, kind of informed how we do our work Azaz Nevadans that that cloud infrastructure and now pushing into the edge compute space. Still kind of keeping those cloud best practices in play to get access to more data. That the two, the two biggest, I think revolutions that we've seen with regards to using data to inform business processes and missions has been that that cloud resource that allows us to do so much with so less and so much more flexibly and then the idea of cheap compute making it to the edge and the ability to apply sensors thio places where you know it would been a would have been, you know, operational cost prohibitive to do that and then, ironically, those air to things that aren't necessarily data analytics or machine learning focused but man, did they make it easier to collect that data and process that data and then get the answers back out. So that really has has has kind of, uh, shaped a lot of the way Nevada has grown as a company and how we serve our customers. >>So coming back over to you lets. One of the things that we've been talking about almost all year is just the acceleration in digital transformation and how much faster organizations, private sector, public sector need to innovate to stay relevant, to stay competitive. How do you are you working with government customers to help them innovate so quickly? >>You know, we're very fortunate that a set of customers that focuses actually innovation it's focuses. I rad on. Do you know we can't do the cool things we do without those customer relationships that really encourage us to, um, to try new things out and, quite frankly, fail quickly when we need Thio. And so, by establishing that relationship, what we've been able to do is to blend agile development. Actual acquisition with government requirements process, right? If if you know the typical stereotype of government work is it's this very stovepiped hard core acquisition process, right? And so we have been fortunate to instead try quick win kind of projects. And so one of the biggest things we do is partner with our government customers and try to find it difficult, um, challenged to solve over 6 to 12 month time, right? So instead of making this long four or five year acquisition cycles like show me, right. How can we solve this problem? And then we partner with the mission partner show success in six months show that we can do it with a smaller part of money, and then as we're able to actually make that happen, it expands in something bigger, broader, and then we kind of bringing together a coalition of the willing, if you will in the government and saying, Okay, are there other stakeholders to care about this problem, bring them on, bring their problems and bringing together? You know, we can't do that with some of the passionate people we have, like Stevens. A perfect example. When we talk about a car in the projects we're doing here, Stevens passion for this technology partner with our customers having these challenges and try to enhance what they're doing is a powerful combination. And then the last thing that we're able to is a company is we actually spend a decent amount of our own dollar dollars on I rad S O. R and D that we fund ourselves. And so, while finding those problems and spending government dollars in doing that. We also have spent our own dollars on machine learning Coyote sensor next Gen five g and things like that and how those compartment together partner together to go back to the government. >>Yeah, yeah, So I would even say, You know, there's this. There's a conventional wisdom that government is slow in plotting and a little bit behind commercial best practices. But there are There are pockets in growing pockets across the government, Um, where they're really they're really jumping ahead of, ah, lot of processes and getting in front of this curve and actually are quite innovative. And and because they kind of started off from behind, they could jump over a lot of kind of middle ground legacy technologies. And they're really innovating. As Kevin said with With With the card platform, we're partnering with um P E O Digital in the Air Force in South C, D. M and Air Force security forces as that kind of trifecta of stakeholders who all want toe kind of saw a mission problem and wanted to move forward quickly and leave the legacy behind and and really take a quantum leap forward. And if anything, they're they're driving us Thio, Innovate Mawr Thio Introduce more of those kind of modern back practices on bond. Nevada as a company loves to find those spots in the government sector where we've got those great partners who love what we're doing. And it's this great feedback loop where, um, where we can solve hard technical problems but then see them deployed to some really important and really cool and impactful missions. And we tend to recruit that that set that kind of nexus of people who want to both solve a really difficult problem but want to see it executed in a really impactful way as well. I mean, that really grates a great bond for us, and and I'm really excited to say that that a lot of the government it is really taking a move forward in this this this realm. And I think it's it's just good for our country and good for the missions that they support. >>Absolutely. And it's also surprising because, as you both said, you know, there is this expectation that government processes or lengthy, you know, laborious, um, not able to be turned around quickly. But as Kevin, you just said, you know helping customers. Government agencies get impact within 6 to 12 months versus 4 to 5 years. So you talked about Picard? Interesting name. Kevin. Tell me a little bit more about that technology and what it is that you guys deliver. That's unique. >>Well, honestly, it's probably best to start with Stephen. I can give you the high level. This is Stevens vision. I have to give him credit for that. And I will say way have lots of fun. Acronym. So it isn't Actually, it isn't backward. Um, right. Stephen doesn't actually stand for something. >>It stands for Platform for Integrated, a C three and Responsive for defense on >>Guy. You know >>that the Star Trek theme is the leg up from the last set of programs I had, >>which were >>my little ponies. So >>Oh, wow. That's a definite stuff in a different direction. Like >>it? Part of the great thing about working in the government is you get to name things, cool things, so but t get to your question eso So Picard really sprung out of this idea that I had a few years ago that the world but for our spaces, the Department of defense and the federal government was going to see a massive influx of the desire to consume sensors from from areas of responsibility, from installations and, frankly, from battlefields. Um, but they were gonna have to do it. In a way, um, uh, that presented some real challenges that you couldn't just kind of throw compute editor, throw traditional I t processes at it. You know, we have legacy sensors that are 40 years old sitting on installations. You know, old program, a logical controllers or facilities control systems that were written in cobalt in the seventies, right in the world are not even I, p based, most of them bond. Then on the other end of the spectrum, you have seven figure sensors that air, you know, throwing out megabits of second of data that are mounted to the back of jeeps. Right, That that air bouncing through the desert today. But we'll be bouncing through the jungle tomorrow, and you have to find all of those kind of in combined all of those together, um, and kind of create a cohesive data center for data set set for you know, the mission for, um, you know what we call a user to find common operating picture for a person. Thio kind of combine all of those different resource is and make it work for them. And so we found a great partner with security forces. Um, they realized that they wanted Thio to make a quantum leap forward. They had this idea that the next defender So there are there, like a military police outfit that the next defender was going to be a data driven defender and they were gonna have to win the information war war as much as they had to kind of dominate physical space. And they immediately got what we were trying to achieve, and it was just just great synergy. And then we've piled on some other elements, and we're really moving that platform forward to to kind of take every little bit of information we can get from the areas of responsibility and get it into a you know, your modern Data Lake, where they can extract information from all that data. >>Kevin, as the VP of information exploitation, that's a very interesting title. How are you helping government organizations to win the war on information? Leverage that information to make a big impact fast. >>Yeah. I mean, I think a lot of it is is that we try to break down the barriers between systems on data so that we can actually enable that data to fuse together to find and get insights into it. You know, as ML and I have become trendy topics, you know, they're very data hungry operations. And I think what Steven has done with the card and his team is really we want to be able to make those sensors seamless from a plug and play perspective that Aiken plug in a new sensor. It's a standards based, uh, interface that sends that data back so that we can and take it back to the user to find Operation Picture and make some decisions based off of that data. Um, you know, what's more is that data could even refused with more than the data that Stevens collecting off the sensors. It could be commercial data, other government data and I think is Davis. As Stephen said earlier, you have to get it back. And as long as you've gotten back in Labour's share with some of our mission partners, then you can do amazing things with it. And, you know, Stephen, I know you have some pretty cool ideas and what we're gonna do on the edge, right? How do we do some of this work of the edge where a sensor doesn't allow us to pull out that data back? >>Yeah, and and Thio follow on to what you were kind of referring to with regards to thio handling heterogeneous data from different sensors. Um, one of the main things that our government customers and we have seen is that there are a lot of historically there are a lot of vertical solutions where you know, the sensor, the platform, and then the data Laker kind of all part of this proprietary stack. And we quickly realized that that just doesn't work. And so one of the major thrust of that card platform was to make sure that we had ah, platform by which we could consume data through adapters from essentially any sensor speaking. Any protocol with any style data object, Whether that was an industry standard or a proprietary protocol, we could quickly interested and bring it into our Data lake. And then to pile on to what Kevin was talking about with compute. Right? So you have, uh, like, almost like a mass locks hierarchy of needs when it comes to cyber data or thio this coyote data or kind of unified data, Um, you know, you wanna turn it into basic information, alerts alarms, then you want to do reporting on it, or analytics or some some higher level workflow function. And then finally, you probably want to perform some analytics or some trending or sort of anomaly detection on it. And and that gets more computational e intensive each step of the way. And so you gotta You gotta build a platform that allows you to to both take some of that high level compute down to the edge, but also then bring some of that data up into the clouds where you could do that processing, and you have to have kind of fun jubilate e between that and so that hard platform allows you to kind of bring GP use and high processing units down to the edge and and make that work. Um, but then also and then as maybe even a first passive to rule out some of the most you know, some of the boring gated in the video Analytics platform. We call it Blue Sky and Blue Ocean. Right, so you're recording lots of video. That's not that interesting. How do you filter that out? So you're only sending the information The interesting video up eso You're not wasting bandwidth on stuff that just doesn't matter on DSO. It's It's a lot of kind of tuning these knobs and having a flexible enough platform that you could bring Compute down when you need it. And you could bring data up to compute on Big Cloud while you need it, and just kind of finding a way to tune that that that really does. I mean it. You know, that's a lot of words about how you do that. But what that comes to is flexible hardware and being able to apply those dev ops and C I. C D platform characteristics to that edge hardware and having a unified platform that allows you to kind of orchestrate your applications in your services all the way up and down your stack, from micro controllers to a big cloud instant creation. >>You make it sound so easy. Steven Kevin. Let's wrap it up with you in terms of like making impacts and going forward. We know the edge has exploded, even mawr, during this very interesting year. And that's going to be something that's probably going to stay, um, stay as a permanent impact or effect. What are some of the things that we can expect in 2021 in terms of how you're able to help government organizations capitalize on that, find things faster, make impact faster? >>Yeah. I mean, I think the cool thing we're seeing is that there's a lot more commoditization of sensors. There's a lot more censored information. And so let's use lighters. Example. We you know, things were getting cheaper, and so we can all of a sudden doom or or more things at the edge, and we ever would have expected. Right when you know Steven's team is integrating camera data and fence data from 40 years ago, you know, it's just saying on off it's not do anything fancy. But now we you know, you know, Stephen, I camera whether Metro you gave him before was, but the cost of light are has dropped so significantly that we can now then deploy that we can actually roll it out there and not being locked in their proprietary, uh, system. Um, so I see that being very powerful, you know? Also, I can see where you start having sensors interact with each other, right? So one sensor finds one thing and then a good example that we've started thio experiment with. And I think Steve, you could touch on it is using triggering a sensor, triggers a drone to actually investigate what's going on and then therefore, hybrid video back and then automatically can investigate instead of having to deploy a defender to actually see what happened at that. At that end, Points dio e don't know. There's it's amore detail you can provide there. >>Yeah, No. So exactly that Kevin. So So the power of the sensor is is something something old that that gives you very uninteresting Data like a one or a zero on on or off can detect something very specific and then do something kind of high speed, like task a drone to give you a visual assessment and then run object detection or facial recognition on, you know, do object detection to find a person and do facial recognition on that person to find out if that's a patrol walking through a field or a bad guy trying Thio invade your space. Um and so it's really the confluence and the gestalt of all of these sensors in the analytics working together, Um, that really creates the power from very simple, simple delivery. I think, um, there's this, You know, this idea that you know, ah 100 bytes of data is not that important. But when you put a million sensors giving you 100 bytes of data, you can truly find something extremely powerful. And then when you kind of and you make those interactions sing, um, it's amazing. Tow us the productivity that we can produce and the kind of fidelity of response that we can give thio actors in the space whether that's a defender trying to defend the base or a maintenance person trying thio proactively replace the fan or clean the fan on an H vac system. So So you know, you know, there isn't a fire at a base or for, uh, interesting enough. One of the things that we we've been able to achieve is we've taken maintenance data for helicopter engines and And we've been able to proactively say, Hey, you need to You need to take care of this part of the helicopter engine. Um and it saves money. It saves downtimes. It keeps the birds in the air. And it's a relatively simple algorithm that we were able to achieve. And we were able to do that with the maintenance people, bring them along in this endeavor and create analytics that they understood and could trust on DSO. I think that's really the power of this base. >>Tremendous power. I wish we had more time to to dig into it. Guys, thank you so much for sharing. Not just your insights, what nobody is doing but your passion for what you're doing and how you're making such an impact. Your passion is definitely palpable. Steven. Kevin, Thank you for joining me today. >>Thank you >>for my guests. I'm Lisa Martin. You're watching the Cube? Virtual. Yeah,
SUMMARY :
It's the Cube with digital coverage Got a couple of guests here from No. What do you What do you guys do? It's a privilege to be a partner with AWS for for some time now. And so, um, really, we focus on protecting the nation and protecting our activities And how do you do that with a W s? the bigger the data set them or compute you need the the more resource is you need So coming back over to you lets. And so one of the biggest things we do is partner with our government customers say that that a lot of the government it is really taking a move forward in this this this realm. And it's also surprising because, as you both said, you know, there is this expectation that I can give you the high level. So That's a definite stuff in a different direction. Part of the great thing about working in the government is you get to name things, cool things, How are you helping government organizations to win the war on information? on data so that we can actually enable that data to fuse together to find Yeah, and and Thio follow on to what you were kind of referring to with regards What are some of the things that we can expect in 2021 in terms of how But now we you know, And then when you kind of and you make those interactions sing, Kevin, Thank you for joining me today. Yeah,
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Steve | PERSON | 0.99+ |
Kevin | PERSON | 0.99+ |
Steven Adelman | PERSON | 0.99+ |
Stephen | PERSON | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
Steven | PERSON | 0.99+ |
Kevin Healed | PERSON | 0.99+ |
FBI | ORGANIZATION | 0.99+ |
4 | QUANTITY | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Stevens | PERSON | 0.99+ |
100 bytes | QUANTITY | 0.99+ |
2021 | DATE | 0.99+ |
40 years | QUANTITY | 0.99+ |
Doody | ORGANIZATION | 0.99+ |
two | QUANTITY | 0.99+ |
Steven Kevin | PERSON | 0.99+ |
Lisa | PERSON | 0.99+ |
Kevin Heald | PERSON | 0.99+ |
Star Trek | TITLE | 0.99+ |
six months | QUANTITY | 0.99+ |
five year | QUANTITY | 0.99+ |
one | QUANTITY | 0.99+ |
Michigan | LOCATION | 0.99+ |
four | QUANTITY | 0.99+ |
Nevada | LOCATION | 0.99+ |
tomorrow | DATE | 0.99+ |
six years ago | DATE | 0.99+ |
5 years | QUANTITY | 0.99+ |
6 | QUANTITY | 0.99+ |
12 months | QUANTITY | 0.99+ |
One | QUANTITY | 0.98+ |
Department of defense | ORGANIZATION | 0.98+ |
both | QUANTITY | 0.98+ |
today | DATE | 0.98+ |
Five years ago | DATE | 0.98+ |
Eso | ORGANIZATION | 0.98+ |
first | QUANTITY | 0.98+ |
Thio | PERSON | 0.98+ |
Picard | ORGANIZATION | 0.98+ |
about 13 1300 employees | QUANTITY | 0.97+ |
first companies | QUANTITY | 0.97+ |
this year | DATE | 0.97+ |
P E O Digital | ORGANIZATION | 0.96+ |
12 month | QUANTITY | 0.96+ |
seven figure | QUANTITY | 0.94+ |
Coyote | ORGANIZATION | 0.94+ |
40 years ago | DATE | 0.94+ |
one sensor | QUANTITY | 0.94+ |
each step | QUANTITY | 0.94+ |
over 6 | QUANTITY | 0.93+ |
Davis | PERSON | 0.92+ |
AWS Worldwide | ORGANIZATION | 0.91+ |
Azaz Nevadans | ORGANIZATION | 0.9+ |
Cube | COMMERCIAL_ITEM | 0.9+ |
few years ago | DATE | 0.89+ |
200 | QUANTITY | 0.89+ |
one thing | QUANTITY | 0.87+ |
lake | ORGANIZATION | 0.86+ |
Gen five g | COMMERCIAL_ITEM | 0.86+ |
seventies | DATE | 0.84+ |
Deepak Singh, AWS | AWS re:Invent 2020.
>>from around the globe. It's the Cube with digital coverage of AWS reinvent 2020 sponsored by Intel and AWS. Yeah, welcome back to the Cubes. Live coverage of AWS reinvent 2020. It's virtual this year over three weeks. Next three weeks we're here on the ground, covering all the live action. Hundreds of videos Walter Wall coverage were virtual not in person this year. So we're bringing all the interviews remote. We have Deepak Singh, vice president of Compute Services. A range of things within Amazon's world. He's the container guy. He knows all what's going on with open source. Deepak, great to see you again. Sorry, we can't be in person, but that's the best we could do. Thanks for coming on. And big keynote news all year all over the keynote. Your DNA is everywhere in the keynote. Thanks for coming on. >>Yeah. Now, no thanks for having me again. It's always great to be on the Cube. Unfortunately, not sitting in the middle of the floral arrangement, which I kind of miss. I know, but it waas great morning for us. We had a number of announcements in the container space and sort of adjacent to that in the developer and operator experience space about making it easy for people to adopt things like containers and serverless. So we're pretty excited about. And his keynote today and the rest agreement. >>It's interesting, You know, I've been following Amazon. Now start a three invent. I've been using Amazon since easy to started telling that garment that story. But you look like the mainstream market right now. This is a wake up call for Cloud. Um, mainly because the pandemic has been forced upon everybody. I talked to Andy about that he brought up in the keynote, but you start to get into the meat on the bone here. When you're saying OK, what does it really mean? The containers, the server Lis, Uh, the machine learning all kind of tied together with computers getting faster. So you see an absolute focus of infrastructures of service, which has been the bread and butter for Amazon web services. But now that kinda you know, connective tissue between where the machine learning kicks in. This is where I see containers and lambda and serve Earless really kicking ass and and really fill in the hole there because that's really been the innovation story and containers air all through that and the eks anywhere was to me the big announcement because it shows Amazon's wow vision of taking Amazon to the edge to the data center. This is a big important announcement. Could you explain E. K s anywhere? Because I think this is at the heart of where customers are looking to go to its where the puck is going. You're skating to where the puck is. Explain the importance of eks anywhere. >>Yeah, I'll actually step back. And I talked about a couple of things here on I think some of the other announcements you heard today like the smaller outposts, uh, you know, the one you and do you outpost skills are also part of that story. So I mean, if you look at it, AWS started thinking about what will it take for us to be successful in customers data centers a few years ago? Because customers still have data centers, they're still running there On our first step towards that Waas AWS in many ways benefits a lot from the way we build hardware. How what we do with nitro all the way to see C two instance types that we have. What we have a GPS on our post waas. Can we bring some of the core fundamental properties that AWS has into a customer data center, which then allowed PCs any KS and other AWS services to be run on output? Because that's how we run today. But what we started hearing from customers waas That was not enough for two reasons. One, not all of them have big data centers. They may want to run things on, you know, in a much smaller location. I like to think about things like oil rates of point of sale places, for they may have existing hardware that they still plan to use and intend to use for a very long time with the foundational building blocks easy to EBS. Those get difficult when we go on to hardware. That is not a W s hardware because be very much depend on that. But it containers we know it's possible. So we started thinking about what will it take for us to bring the best of AWS toe help customers run containers in their own data center, so I'll start with kubernetes, so with que binaries. People very often pick Kubernetes because they start continue rising inside their own data centers. And the best solution for them is Cuban Aires. So they learn it very well. They understand it, their organizations are built around it. But then they come to AWS and run any chaos. And while communities is communities, if you're running upstream, something that runs on Prem will run on AWS. They end up in two places in sort of two situations. One, they want to work with AWS. They want to get our support. They want to get our expertise second, most of them once they start running. Eks realized that we have a really nice operational posture of a D. K s. It's very reliable. It scales. They want to bring that same operational posture on Prem. So with the ts anywhere what we decided to do Waas start with the bits underlying eks. The eks destroyed that we announced today it's an open source communities distribution with some additional pieces that that we had some of the items that we use that can be run anywhere. They're not dependent on AWS. You don't even have be connected to a W s to use eks destro, but we will Patrick. We will updated. It's an open source project on get help. So that's a starting point that's available today. No, Over the next several months, what will add is all of the operational to link that we have from chaos, we will make available on premises so that people can operate the Cuban and these clusters on Prem just the way they do on AWS. And then we also announced the U. K s dashboard today which gives you visibility into our communities clusters on AWS, and we'll extend that so that any communities clusters you're running will end up on the dashboard to get a single view into what's going on. And that's the vision for eks anywhere, which is if you're running communities. We have our operational approach to running it. We have a set of tools that we're gonna that we have built. We want everybody to have access to the same tools and then moving from wherever you are to aws becomes super easy cause using the same tooling. We did something similar with the C s as well the DCs anywhere. But we did it a little bit differently. Where in the CSU was centralized control plane and all we want for you is to bring a CPU and memory. The demo for that actually runs in a bunch of raspberry PiS. So as long as you can install the C s agent and connect to an AWS region, you're good to go. So same problem. Different, slightly different solutions. But then we are customers fall into both buckets. So that's that's the general idea is when we say anywhere it means anywhere and we'll meet you there >>and then data centers running the case in the data center and cloud all good stuff. The other thing that came out I want you to explain is the importance of what Andy was getting to around this notion of the monolith versus Micro Services at one slightly put up. And that's where he was talking about Lambda and Containers for smaller compute loads. What does it mean? What was he talking about there? Explain what he means by that >>that Z kind of subtle and quite honestly, it's not unique to London containers. That's the way the world was going, except that with containers and with several functions with panda. You got this new small building blocks that allow you to do it that much better. So you know you can break your application off. In the smaller and smaller pieces, you can have teams that own each of those individual pieces each other pieces. Each of these services can be built using architecture that you secret, some of them makes sense. Purely service, land and media gateway. Other things you may want to run on the C s and target. Ah, third component. You may have be depending on open source ecosystem of applications. And there you may want to run in communities. So what you're doing is taking up what used to be one giant down, breaking up into a number of constituent pieces, each of which is built somewhat independently or at least can be. The problem now is how do you build the infrastructure where the platform teams of visibility in tow, what all the services are they being run properly? And also, how do you scale this within an organization, you can't train an entire organ. Communities overnight takes time similar with similarly with server list eso. That's kind of what I was talking about. That's where the world is going. And then to address that specific problem we announced AWS proton, uh, AWS program is essentially a service that allows you to bring all of these best practices together, allows the centralized team, for example, to decide what are the architectures they want to support. What are the tools that they want to support infrastructure escort, continuous delivery, observe ability. You know all the buzzwords, but that's where the world's going and then give them a single framework where they can deploy these and then the developers can come into self service. It's like I want to build a service using Lambda. I don't even learn how toe put it all together. I'm just gonna put my coat and pointed at this stock that might centralized team has built for me. All I need to do is put a couple of parameters, um, and I'm off to the races and not scale it to end, and it gives you the ability to manage also, So >>it's really kind of the building blocks pushing that out to the customer. I gotta ask you real quick on the proton. That's a fully managed service created best. Could you explain what that means for the developer customer? What's the bottom line? What's the benefit to >>them? So the biggest benefit of developers if they don't need to become an expert at every single technology out there, they can focus on writing application court, not have to learn how to crawl into structure and how pipelines are built and what are the best practices they could choose to do. So the developers, you know, modern and companies Sometimes developers wear two hats and the building off, the sort of underlying scaffolding and the and the build applications for application development. Now all you have to do is in writing an application code and then just go into a proton and say, This is architecture, that I'm going to choose your self, service it and then you're off to the races. If there's any underlying component that's changing, or any updates are coming on, put on it automatically take care off updates for you or give you a signal that says, Hey, the stock has to be updated first time to redeploy accord so you can do all of that in a very automated fashion. That's why everything is done. Infrastructures Gold. It's like a key, uh, infrastructure and told us, and continuous delivery of sort of key foundational principles off put on. And what they basically do is doing something that every company that we talked oh wants to do. But only a handful have the teams and the skill set to do that. It takes a lot of work and it takes ah lot of retraining. And now most companies don't need to do that. Or at least not in that here. So I think this is where the automation and manageability that brings makes life a lot easier. >>Yeah, a lot of drugs. No docker containers. They're very familiar with it. They want to use that. Whatever. Workflow. Quickly explain again to me so I can understand fully the benefit of the lamb container dynamic. Because what was the use case there? What's the problem that you solve? And what does it mean for the developer? What specifically is going on there? What's the What's the benefit? Why would I care? >>Yeah, eso I'll actually talked about one of the services that my team runs called it of your stature. AWS batch has a front time that's completely serverless. It's Lambda and FBI did play its back in the PCs running on the city right? That's the better the back end services run on their customers. Jobs in the running. Our customers are just like that. You know, we have many customers out there that are building services that are either completely service, but they fit that pattern. They are triggered by events. They're taking an event from something and then triggering a bunch of services or their triggering an action which is doing some data processing. And then they have these long running services, which almost universally in our running on containment. How do you bring all of this together into a single framework, as opposed to some people being experts on Lambda and some people being experts and containers? That's not how the real world works. So trying to put all of this because these teams do work together into a single framework was our goal, because that's what we see our customers doing, and I think they'll they'll do it. More related to that is the fact that Lambda now supports Dr Images containing images as a packaging format because a lot of companies have invested in tooling, toe build container images and our land. I can benefit from that as well. While customers get all the, you know, magic, The Lambda brings you >>a couple of years ago on this on the Cube. I shared this tweet out earlier in the week. Andy, we pressed and even services launches like, would you launch build Amazon on Lamb? Day says we probably would. And then he announced to me And he also I think you mentioned the keynote that half of Amazon's new APS are built on lambda. >>Yeah, that's good. This >>is a new generation of developers. >>Oh, absolutely. I mean, you should talk to the Lambda today also, but even like even in the container side, almost half of the new container customers that we have on AWS in 2020 have chosen target, which is serverless containers. They're not picking E c s or E. T. S and running at least two. They're running it on target the vast majority of those two PCs, but we see that trend on the container side as well, and actually it's accelerating. More and more and more new customers will pick target, then running containers on the city. >>Deepak, great to chat with you. I know you gotta go. Thanks for coming on our program. Breaking down the keynote analysis. You've got a great, um, focus area is only going to get hotter and grow faster and a lot more controversy and goodness coming at the same time. So congratulations. >>Thank you. And always good to be here. >>Thanks for coming on. This is the Cube Virtual. We are the Cube. Virtual. I'm John for your host. Thanks for watching.
SUMMARY :
Deepak, great to see you again. in the container space and sort of adjacent to that in the developer and operator experience I talked to Andy about that he brought up in the keynote, but you start to get into the meat on So that's that's the general idea is when we say anywhere it means anywhere and we'll meet you there to explain is the importance of what Andy was getting to around this notion of the monolith versus In the smaller and smaller pieces, you can have teams it's really kind of the building blocks pushing that out to the customer. So the biggest benefit of developers if they don't need to become an expert at every single technology out there, What's the problem that you solve? It's Lambda and FBI did play its back in the PCs running on the city right? And then he announced to me And he also I think you mentioned the keynote that half Yeah, that's good. almost half of the new container customers that we have on AWS in 2020 have I know you gotta go. And always good to be here. This is the Cube Virtual.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Andy | PERSON | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Deepak Singh | PERSON | 0.99+ |
2020 | DATE | 0.99+ |
Deepak | PERSON | 0.99+ |
Walter Wall | PERSON | 0.99+ |
today | DATE | 0.99+ |
first step | QUANTITY | 0.99+ |
John | PERSON | 0.99+ |
two situations | QUANTITY | 0.99+ |
one | QUANTITY | 0.99+ |
two PCs | QUANTITY | 0.99+ |
Lambda | TITLE | 0.99+ |
two reasons | QUANTITY | 0.99+ |
One | QUANTITY | 0.99+ |
Each | QUANTITY | 0.99+ |
two places | QUANTITY | 0.99+ |
London | LOCATION | 0.98+ |
FBI | ORGANIZATION | 0.98+ |
Hundreds of videos | QUANTITY | 0.98+ |
this year | DATE | 0.98+ |
Intel | ORGANIZATION | 0.97+ |
first time | QUANTITY | 0.97+ |
third component | QUANTITY | 0.97+ |
U. K | LOCATION | 0.97+ |
single framework | QUANTITY | 0.96+ |
each | QUANTITY | 0.96+ |
both buckets | QUANTITY | 0.96+ |
Cuban Aires | LOCATION | 0.96+ |
Cube | COMMERCIAL_ITEM | 0.95+ |
Cube Virtual | COMMERCIAL_ITEM | 0.95+ |
pandemic | EVENT | 0.94+ |
single | QUANTITY | 0.93+ |
Patrick | PERSON | 0.93+ |
over three weeks | QUANTITY | 0.93+ |
few years ago | DATE | 0.92+ |
aws | ORGANIZATION | 0.9+ |
second | QUANTITY | 0.9+ |
Compute Services | ORGANIZATION | 0.9+ |
Lambda | ORGANIZATION | 0.88+ |
couple of years ago | DATE | 0.87+ |
Kubernetes | TITLE | 0.87+ |
Next three weeks | DATE | 0.86+ |
two hats | QUANTITY | 0.82+ |
single technology | QUANTITY | 0.82+ |
EBS | ORGANIZATION | 0.81+ |
Prem | ORGANIZATION | 0.8+ |
months | DATE | 0.77+ |
The Lambda | TITLE | 0.76+ |
three | QUANTITY | 0.74+ |
C s | TITLE | 0.71+ |
least two | QUANTITY | 0.69+ |
Dave Brown, Amazon & Mark Lohmeyer, VMware | AWS re:Invent 2020
>>from >>around the globe. It's the Cube with digital coverage of AWS reinvent 2020 sponsored by Intel, AWS and our community partners. >>Hello and welcome back to the Cube Coverage of eight of us reinvent 2020 Virtual. I'm John for your host of the Cube. Normally we're in person this year. It's a virtual event. It is reinvent and cube virtual here. We got great interview here. Segment with VM ware and A W s. Two great guests. Keep both Cube alumni. Marc Lemire, senior vice president, general manager, The Cloud Services Business Unit VM Ware and Dave Brown, Vice president Elastic Compute Cloud easy to from Amazon Web services Gentlemen, great to see you guys. Thanks for coming on. >>Great. Thank you. Good to be back. >>Thanks. Great to be back. >>So you know, Dave, we love having you on because ec2 obviously is the core building block of a device. Once the power engine, it's the core product. And Mark, we were just talking a few months ago at VM World of momentum you guys have had on the business front. It's even mawr accelerated with co vid on the pandemic. Give us the update The partnership three years ago when Pat and Andy in San Francisco announced the partnership has been nothing but performance. Business performance, technical integration. Ah, lots happened. What's the update here for reinvent? >>Yeah, I guess the first thing I would say is look, you know, the partnership has has never been stronger. You know, as you said, uh, we announced the partnership and delivered the initial service three years ago. And I think since then, both companies have really been focused on innovating rapidly on behalf of our customers bringing together the best of the VM, or portfolio, and the best of, you know, the entire AWS. A set of capabilities. And so we've been incredibly pleased to be able to deliver those that value to our joint customers. And we look forward to continue to work very closely together. You know, across all aspects of our two companies toe continue to deliver more and more value to our joint customers. >>Well, I want to congratulate you guys at VM where, you know, we've been following that story from day one. I let a lot of people skeptical on the partnership. We were pretty bullish on it. We saw the value. It's been just been great Synergy day. I want to get your thoughts because, you know, I've always been riffing about enabling technologies and and the way it works is enabling technologies. Allow your partners to make more money, too. Right? So you guys do that with the C two, and I know that for a fact because we're doing well with our virtual event cloud, but are easy to bills are up, but who cares? We're doing well. This is the trend you guys are enabling partners, and VM Ware in particular, has a lot of customers that are on AWS. What's your perspective on all this? >>You know the part. The part maker system is so important for us, right? And we get from our customers. We have many customers who, you know, use VM ware in their own environment. They've been using it for years and years, um, true for many other software applications as well and other technologies. Andi, when they moved to AWS there very often. When you use those tools on those services on AWS is well and so you know, we we partner with many, many, many, many companies, and so it's a high priority for us. The VM Ware partnership, I think, is being sort of role model for us in terms of, you know, sitting out outside Sana goal back in 2016. I think it waas and, you know, delivering on that. Then continue to innovate on features over the last three years listening to our customers, bringing larger customers on board, giving them more advanced networking features, improving. You know that the instance types of being whereas utilizing to deliver value to their customers and most recently, obviously, with Outpost AWS outposts and parking with VM ware on VM are enabled outposts and bringing that to our customers and their own data centers. So we see the whole partner ecosystem is critically important. Way were spent a lot of time with VM and other partners on something that our customers really value. >>Mark, I want to get your thoughts on this because I was just riffing with Day Volonte about this. Um, heightened awareness with that covert 19 in the pandemic has kind of created, which is an accelerant of the value. And one >>of the >>things that's a parent is when you have this software driven and software defined kind of environment, whether it's in space or on premise or in the cloud. Um, it's the software that's driving everything, but you have to kind of components. You have the how do you operate something, And then how does the software works? So you know, it's the hand in the glove operators and software in the cloud really is becoming kind of the key things. You guys have been very successful as a company with I t operations, and now you're moving into the cloud. Can you share your thoughts on how VM Ware cloud on AWS takes that next level for your customers? So I think that's a key point that needs to be called that. What's your What's your thoughts on that? >>Yeah, I think you hit the nail on the head, and I think, you know, look, every company is on a journey to transform the level of capability they're able to offer to their customers and their employees, right? And a big part of that is how do they modernize their application environment? How do they how do they deliver new applications and services? And so this has been underway for for a while now. But if if anything, I think Cove, it has only accelerated. Um, the need for customers to be able to continue to go down that path. And so, you know, between VM ware in AWS, um, you know, we're looking to provide those customers a platform that allows them to accelerate their path to application, modernization and new services and capabilities. And, um, you know, Dave talked about the ecosystem and the importance of the ecosystem that AWS and I think you know, together. What we've been able to do if you sort of think about it, is, you know, bringing together this rich set of VM Ware services and capabilities. Um, that we've talked about before, as well as new VM Ware capabilities, for example, the ability to enable kubernetes based applications and services on top of this Corby, um or platform with Tan Xue. Right. So customers can get access to all of that is they go down this modernization path. But, you know, right next door in the same ese is 375 native AWS services that they can use together in conjunction, uh, with that environment. And so if you think about accelerating that journey right Being ableto rapidly migrate those VM ware based workloads into the AWS cloud. When you're in the AWS cloud, be able to modernize that environment using the VM Ware Tansu capability, the native AWS services and then the infrastructure that needs to come together to make that possible, for example, the network connectivity that needs to be enabled, um, to take advantage of some of those services together. Um, you know, we're really we're trying to accelerate our delivery of those capabilities so that we can help our customers accelerate the delivery of that application value thio to their customers. >>David want to get your thoughts on the trends If you speak to the customers out there at VM Ware, customers that are on the cloud because you know the sphere, for instance, very popular on the Ws Cloud with VM Ware Cloud as well as these new modern application trends like Tan Xue, Project Monterey is coming around the corner that was announced that VM world what trends do you see from the two perspective that you could share to the VM ware eight of his customers? What's the key wave right now that they should be riding on. >>Yeah, I think a few things, you know, we definitely are seeing an acceleration in customers Looking Thio looking to utilize humor on AWS You know, there was a lot of interest early on, really, over the last year, I think we've seen 140% growth in the service, which has been incredibly exciting for both of us and really shows that we we're providing customers with the service that works. You know, I think one of the key things that Mark called out just talking previously was just how simple it is for customers to move. You know, often moving to the cloud gets muddled with modernization, and it takes a long time because customers to kind of think about how do they actually make this move? Or are they stuck within their own facility on data center or they need to modernize? We moved to a different hyper visor with PM on AWS. You literally get that same environment on AWS, and so whether it's a a migration because you want to move out of your on premise facility, whether it's a migration because you want to grow and expand your facility without needing to. You know, build more data centers yourself Whether you're looking to build a d. R site on AWS on whether you looking just, you know, maybe build a new applications tank that you wanna build in a modern way, you know, using PMR in Tanzania and all the AWS services, all of those a positive we're seeing from customers. Um, you know, I think I think as the customers grow, the demand for features on being were in AWS grows as well. And we put out a number of important features to support customers that really, really large scale. And that's something that's being exciting. It's just some of the scale that we're seeing from very, very large being, we customers moving over to AWS. And so I think you know a key messages. If you have a Vienna installation today and you're thinking about moving to the cloud, it's really a little that needs to stop you in starting to move. It is is very simple to set up, and very little you have to do to your application stack to actually move it over. >>Mark, that's a great point. I want to get your thoughts on that in reaction toe. What? Dave just said Because this is kind of what you guys had said many years ago and also a VM world when we were chatting, disrupting operations just to stand up the clubs shouldn't be in place. It should be easy on you. Heard what Dave said. It's like you got >>a >>lot of cultures that are operating large infrastructure and they want to move to the cloud. But they got a mandate toe make everything. Is a services more cloud native coming. So, yeah, you gotta check off the VM where boxes and keep things running. But you gotta add more modern tooling mawr application pressure there. So there's a lot of pressure from the business units and the business models to say We gotta take advantage of the modern applications. How do you How do you look at that? >>Yeah, yeah, I mean, I think Look, making this a simple is possible is obviously a really important aspect of what we're trying Thio enable for our customers. Also, I think the speed is important, right? How you know, how can we enable them? Thio accelerate their ability to move to the cloud, but then also accelerate their ability Thio, um, deliver new services and capabilities that will differentiate their business. And then how do we, uh, kind of take some of the heavy lifting off the customers plate in terms of what it actually takes to operate and run the infrastructure and do so in a highly available way that they could depend upon for their business? And of course, delivering that full capabilities of service is a big part of that. You know, one of my when my favorite customer examples eyes a company called Stage Coach, uh, European based transportation company. And they run a network of Busses and trains, etcetera, and they actually decided to use VM. Tosto run one of their most mission critical applications, which is involved with basically scheduling, scheduling those systems right in the people that they know, the bus drivers in the train conductors etcetera. And so if you think about that application right, its's a mission critical application for them. It's also one that they need to be able to iterate involved and improve very quickly, and they were able to take advantage of a number of fairly unique capabilities of the joint service we built together to make that possible. Um, you know, the first thing that they did is they took advantage of something called stretch clusters. The M we're cloud on AWS stretch clusters Where, uh, we basically take that VM Ware environment and we stretch it. We stretch the network across to aws availability zones in the same region, Onda. Then they could basically run their applications on top of that that environment. And this is a really powerful capability because it ensures the highest levels of s L. A. For that application for four nines. In this case, if anything happens, Thio fail in one of those, uh, Aziz, we can automatically fail over and restart the application in the second ese on DSO provides this high level of availability, but they're also able to take advantage of that without on day one. Talk about keeping it simple without on day one, requiring any changes to the application of myself because that application knew how to work in the sphere. And so you know that I work in the sphere in the cloud and it can fail over on the sphere in the cloud on dso they were able to get there quickly. They're able Thio enable that application and now they're taking the next step. Which is how do I enhance and make that application even better, you know, leveraging some of the VM or capabilities also looking to take advantage of some of the native AWS capabilities. So I think that sort of speed, um you know that simplicity that helps helps customers down that path to delivering more value to their employees and their customers. That and we're really excited that were ableto offer that your customers >>just love the philosophy that both companies work back from the customer customer driven kind of mentality certainly key here to this partnership, and you can see the performance. But I think one of the differentiations that I love is that join integration thing engineering that you guys were doing together. I think that's a super valuable, differentiated VM where Dave, this is a key part of the relationship. You know, when I talked to Pat Gelsinger and and again back three years ago and he had Raghu from VM, Ware was like, This is different engineering together. What's your perspective from the West side when someone says, Yeah. Is that Riel? You know, it is easy to really kind of tied in there and his Amazon really doing joint engineering. What do you say to that? >>Oh, absolutely. Yeah, it's very real. I mean, it's been an incredible, incredible journey together, Right? Right, Right from the start, we were trying to work out how to do this back in 2016. You know, we were using some very new technology back then that we hadn't honestly released yet. Uh, the nitrous system, right? We started working with family and the nitrous system back in late 2016, and we only launched our first nitrous system enabled instance that reinvent 2017. And so we were, you know, for a year having being a run on the nitrous system, internally making sure that, you know, we would support their application and that VM Ware ran well on BC around. Well, on aws on, that's been ongoing. And, you know, the other thing I really enjoy about the relationship is learning how to best support each other's customers on on AWS and being where, and Mark is talking about stretch clusters and are being whereas, you know, utilizing the availability zones. We've done other things in terms of optimizing placement with across, you know, physical reaction in data centers. You know, Mark and the team have put forward requirements around, you know, different instance types and how they should perform invest in the Beamer environment. We've taken that back into our instance type definition and what we've released there. So it happens in a very, very low level. And I think it's both teams working together frequently, lots of meetings and then, you know, pushing each other. You know, honestly. And I think for the best experience or at the end of the day, for our joint customers. So it's been a great relationship. >>It helps when both companies are very fluent technically and pushing the envelope with technology. Both cultures, I know personally, are very strong technically, but they also customer centric. Uhm, Mark, I gotta put you on the spot on this question because this comes up every year this year more than ever. Um, is the question around VM ware on A W S and VM ware in general, and it's more of a general industry theme. But I wanna ask you because I think it relates to the US Um vm ware cloud on aws. Um, the number one question we get is how can I automate my I t operations? Because it's kind of a no brainer. Now it's kind of the genes out of the bottle. That's a mandate. But it's not always easy. Easy as it sounds to dio, you still got a lot to dio. Automation gets you level set to take advantage of some of these higher level services, and all customers want to get there fast. Ai i o t a lot of goodness in the cloud that you kinda gotta get there through kinda automating the based up first. So how did how are your customers? How are you guys helping customers automate their infrastructure operations? >>Yeah, I mean, Askew articulated right? This is a huge demand. The requirement from our customer base, right? Uh, long gone are the days that you wanna manually go into a u I and click around here, click there to make things happen, right? And so, um, you know, obviously, in addition to the core benefit of hey, we're delivering this whole thing is a service, and you don't have to worry about the hardware, the software, the life cycle all of that, Um you know, at a higher level of the stack, we're doing a lot of work to basically expose a very rich set of AP eyes. We actually have enabled that through something called the VM, or Cloud Developer center, where you can go and customer could go and understand all of the a p i s that we make available to that they can use to build on top of to effectively automated orchestrate their entire VM or cloud on AWS based infrastructure. And so that's an area we've we've invested a lot in. And at the end of the day, you know we want Thio. Both enable our customers to take their existing automation tooling that they might have been using on their VM ware based environment in their own data center. Obviously, all of that should continue to work is they bring that into the emcee aws. Um but now, once we're in AWS and we're delivering, this is a service in AWS. There's actually a higher level of automation, um that we can enable, and so you know everything that you can do through the VM or cloud console. Um, you can do through a P. I s So we've exposed roughly a piece that allow you to add or remove instance capacity ap eyes that allow you to configure the network FBI's that allow you toe effectively. Um, automate all aspects of sort of how you want Thio configure and pull together that infrastructure. Onda. You know, as Dave said, a lot of this, you know, came from some of those early just customer discussions where that was a very, very clear expectations. So, you know, we've we've been working hard. Thio make that possible. >>So can customers integrate native Cloud native technologies from AWS into APS running on VM ware cloud on any of us? >>Yeah. I mean, I'll give you one example for so we you know, we've been able to support for cloud formation right on top of the M C. Mehta best. And so that's, you know, one way that you can leverage these 80 best tools on top of on top of the m. C at best. Um and you know, as we talked about before, uh, you know everything on the VM ware in the VM ware service. We're exposing through those AP eyes. And then, of course, everything it best does has been built that way from the start. And so customers can work. Um, you know, seamlessly across those two environments. >>Great stuff. Great update. Final question for both of you. Uh, Dave will start with you. What's the unique advantages? When you people watching? That's gonna say, OK, I get it. I see the momentum. I've now got a thing about post pandemic growth strategies. I gotta fund the projects, so I'm either gonna retool while I'm waiting for the world to open up. Two. I got a tail wind. This is good for my business. I'm gonna take advantage of this. How do they modernize our application? What? The unique things with VM Ware Cloud on AWS. What's unique? What would you say? I >>mean, I think the big thing for me eyes the consistency, um, the other way that were built This between the the sphere on prime environment and the the sphere that you get on aws with BMC on aws. Um you know, when I think about modernization and honestly, any project that I do, we do it Amazon I don't like projects that required enormous amount of planning and then tooling. And then, you know, you've this massive waterfall stock project before you do anything meaningful. And what's so great about what we built here is you can start that migration almost immediately, start bringing a few applications over. And when you do that, you can start saying, Okay, where do we want to make improvements? But just by moving over to aws NBN were on AWS, you start to reap the benefits of being in the child right from day one. Many of the things Mark called out about infrastructure management and that sort of thing. But then you get to modernize off to that as well. And so just the richness in terms of, you know, being where a tan xue and then the you know, I think it's more than 200 AWS services. Now you get to bring all that into your application stack, but at a time at a at a at a cadence or time that really matters to you. But you could get going immediately, and I think that's the thing that customers ready need to do if you find yourself in a situation you know, with just how much the world's changed in the last year. Looking Thio. Modernize your applications deck, Looking for the cost benefits. Looking to maybe get out of the data center. Um, it's a relatively easy both forward and just put in a couple of engineers a couple of technicians on to actually starting to do the process. I think you'll be very surprised at how much progress you can actually make in a short amount of time. >>Mark, you're in charge of the Cloud Services business unit at VM Ware CPM. Where cloud on AWS successful more to do a lot of action kubernetes cloud native automation and the list goes on and on. What are the most unique advantages that you guys have? What would you say? >>Yeah, I mean, I would maybe just build on Dave's comments a bit. I think you know, if you look at it through the customer lens three ability to reiterate and the ability to move quickly and not being forced into sort of a one size fits all model, right? And so there may be certain applications that they run into VM, and they want to run into VM forever. Great. We could enable that there might be other applications that they want to move from a VM into a container, remove into kubernetes and do that in a very seamless way. And we can enable that with, uh, with Tan Xue, right? By the way, they may wanna actually many applications. They're gonna require, uh, complex composite applications that have some aspects of it running in communities, other aspects running on VMS. You know, other aspects connecting to some native AWS services. And so, you know, we could enable those types of, you know, incremental value that's delivered very, very quickly that allows them at the end of the day to move, move fast on behalf of their own customers and deliver more about it to them. So I think this this sort of philosophy, right that Dave talked about I think is is one of the really important things we've tried to focus on, um, together. But, you know, on behalf of our joint customers and you know that that sort of capabilities just gets richer and richer. Overtime right. Both of us are continuing to innovate, and both of us will continue to think about how we bring those services together as we innovate in our respective areas and how they need to link together as part of this This intense solution. Um, so, uh, you know that I think that you're gonna see us continue to invest, continue to move quickly. Um, continue to respond to what our customers together are asking us. Thio enable for them. >>Well, really appreciate the insight. Thanks for coming on this cube virtual, um, segment. Um, virtualization has hit the cube where we have multiple virtual stages out there at reinvent on the site. Obviously, it's a virtual event over three weeks, so it's a little bit not four days or three days. It's three weeks. So, um, if you're watching this, check out the site. Tons of good V o D. The executive leaderships Check out the keynotes that air there. It's awesome. Big news. Of course. Check out the cube coverage, but I have one final final question is you guys are leaders in the industry and within your companies, and we're virtual this year. You gotta manage your teams. You still gotta go to work every day. You gotta operate your business is a swell as work with customers. What have you guys learned? And can you share any, um, advice or observations of how to be effective as a leader, a za manager, and as a customer interface point for your companies? >>Well, I I think, uh, let me go first, then Mark Mark and had some things, you know, I think we're moving to certainly in the last year, specifically with covert. You know, we've we've we've just passed out. I think we just passed out seven months off, being remote now on, obviously doing reinvent as well. Um, it zits certainly taken some adjusting. I think we've done relatively well, um, with, you know, going virtual. We were well prepared at Amazon to go virtual, but from a leadership point of view, you know, making sure that you have been some positives, right? So for one, I have I have teams all over the world, and, uh, being virtually actually helped a lot with that. You know, everybody is virtually all on the same stage. It's not like we have a group of us in Seattle and a few others scattered around the world. Everybody's on the same cold now. on that has the same you know, be able to listen to in the same way. But I better think a lot about sort of just my own time. Personally, in the time that my team spends, I think it's been very easy for us. Thio run a little too hot waken start a little too early and run a little too late in the evenings on DSO, making sure that we protect that time. And then, obviously, from a customer point of view, you know, we found that customers are very willing to engage virtually as well around the world s Oh, that's something we've been able to utilize very well to continue to have. You know what we call our executive briefing center and do those sorts of things customer meetings on in some ways. You know, without the plane trip on either side to the other side of the world, you're able to do more of those and stay even more in contact with your customers. So it's been it's been a lot of adjustment for us. I think we've done well. I think you know, a zay said. We've had a look at Are we keeping it balanced because I think it's very easy to get out of balance and just from a time point of view. But I think I'm sure it'll show. It'll change again as the world goes back to normal. But in many ways, I think we've learned a lot of valuable lessons that I hope in some cases don't go away. I think well will probably be more virtual going forward. So that's what a bit of from my side >>creating. Yeah. Confronting hot people run hard. You can, you know, miss misfire on that and burnout gonna stay, Stay tuned. Mark your thoughts. Is leader customers defeating employees? Customers? >>Yeah. I mean, in many ways, I would say similar experience. I think, uh, I mean, if you sort of think back, right, uh, it's in many ways amazing that within the course of literally a week, right, I think about some of the BMR experience we went from, uh, you know, 90 95% of our employees, at least in the US, working in an office right to immediately all working from home. And, uh, you know, I think having the technology is available to make that possible and really? For the most part, without skipping a beat. Um, it is pretty pretty amazing, right? Um and then, you know, I think from a productivity perspective, in many ways, you know, it z increased productivity. Right? Um, they have mentioned the ability engage customers much more easily you think about in the past, you would have taken a flight to Europe to maybe meet with, you know, 5 to 10 customers and spent an entire week. And now you can do that in, you know, in the morning, right? Um, and the way we sort of engaged our teams, I think in many ways, um, sort of online, uh, can create a very, very rich experience, right? In a way to bring people together across many locations in a much more seamless way than if maybe part of the team is there in the office. And some other part of the team is trying toe connect in through resume or something else. A little bit of a fragmented experience. But if everyone's on the same platform, regardless of where you are e think we've seen some benefits from that. >>It's interesting. You see virtualization. What that did to the servers created cloud, you know. Hey, Productivity. >>You also have to be careful. You don't run those servers too hot. You >>gotta have a cooling. You got the cooling Eso I You know, this is really an interesting, you know, social, uh, equation Global phenomenon of productivity Cloud. Combined with this notion of virtual changes, the workloads, the work flows, the workplace and the workforce, right, The future work. So I think, you know, we're watching this closely. I know you guys have both had great success from the pandemic with this new pressure on the cloud, because it's a new model, a new way to do things, So we'll keep watching it. Thanks for the insight. Thanks for coming on and and enjoy the rest of reinvent. >>Great. Thank >>you. Great to be here. >>Okay, this the cubes coverage. I'm John for your host of Cuban, remember? Go to the reinvent site. Three weeks of great virtual content over this month, Of course. Cube coverage for three weeks. Stay tuned off. All the analysis and a lot of great thought leadership in the industry commentary. Stay with us throughout the month. Thank you. Yeah,
SUMMARY :
It's the Cube with digital coverage of AWS great to see you guys. Good to be back. Great to be back. So you know, Dave, we love having you on because ec2 obviously is the core building block of a device. and the best of, you know, the entire AWS. This is the trend you guys are enabling so you know, we we partner with many, many, many, many companies, and so it's a high priority for us. Mark, I want to get your thoughts on this because I was just riffing with Day Volonte about this. You have the how do you operate something, and I think you know, together. customers that are on the cloud because you know the sphere, for instance, very popular on the Ws Yeah, I think a few things, you know, we definitely are seeing an acceleration in customers Dave just said Because this is kind of what you guys had said many years ago and also a VM world when we were chatting, How do you How do you look Which is how do I enhance and make that application even better, you know, certainly key here to this partnership, and you can see the performance. And so we were, you know, for a year having being a run on the nitrous system, a lot of goodness in the cloud that you kinda gotta get there through kinda automating hardware, the software, the life cycle all of that, Um you know, at a higher level of the stack, And so that's, you know, one way that you can leverage these 80 best tools on top of on top What would you say? And so just the richness in terms of, you know, being where a tan xue and then that you guys have? I think you know, And can you share any, um, advice or observations on that has the same you know, be able You can, you know, miss misfire on that and But if everyone's on the same platform, regardless of where you are e cloud, you know. You also have to be careful. So I think, you know, we're watching this closely. Great. Great to be here. All the analysis and a lot of great thought leadership in the industry commentary.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Dave | PERSON | 0.99+ |
David | PERSON | 0.99+ |
Michael | PERSON | 0.99+ |
Marc Lemire | PERSON | 0.99+ |
Chris O'Brien | PERSON | 0.99+ |
Verizon | ORGANIZATION | 0.99+ |
Hilary | PERSON | 0.99+ |
Mark | PERSON | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
Ildiko Vancsa | PERSON | 0.99+ |
John | PERSON | 0.99+ |
Alan Cohen | PERSON | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
John Troyer | PERSON | 0.99+ |
Rajiv | PERSON | 0.99+ |
Europe | LOCATION | 0.99+ |
Stefan Renner | PERSON | 0.99+ |
Ildiko | PERSON | 0.99+ |
Mark Lohmeyer | PERSON | 0.99+ |
JJ Davis | PERSON | 0.99+ |
IBM | ORGANIZATION | 0.99+ |
Beth | PERSON | 0.99+ |
Jon Bakke | PERSON | 0.99+ |
John Farrier | PERSON | 0.99+ |
Boeing | ORGANIZATION | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Dave Nicholson | PERSON | 0.99+ |
Cassandra Garber | PERSON | 0.99+ |
Peter McKay | PERSON | 0.99+ |
Cisco | ORGANIZATION | 0.99+ |
Dave Brown | PERSON | 0.99+ |
Beth Cohen | PERSON | 0.99+ |
Stu Miniman | PERSON | 0.99+ |
John Walls | PERSON | 0.99+ |
Seth Dobrin | PERSON | 0.99+ |
Seattle | LOCATION | 0.99+ |
5 | QUANTITY | 0.99+ |
Hal Varian | PERSON | 0.99+ |
JJ | PERSON | 0.99+ |
Jen Saavedra | PERSON | 0.99+ |
Michael Loomis | PERSON | 0.99+ |
Lisa | PERSON | 0.99+ |
Jon | PERSON | 0.99+ |
Rajiv Ramaswami | PERSON | 0.99+ |
Stefan | PERSON | 0.99+ |
Sanjay Poonen, VMware & Matt Garman, Amazon | AWS re:Invent 2020
>>from around the globe. It's the Cube with digital coverage of AWS reinvent 2020 sponsored by Intel, AWS and our community partners. Everyone welcome back to the cubes coverage of a Davis reinvent 2020. It's a virtual conference this year. This is the Cube virtual. I'm John for your host. We're not in person this year. We're doing it remote because of the pandemic, but it's gonna be wall to wall coverage for three weeks. We've got you covered. And we got a great interview signature interview here with Two Cube alumni's Matt Garment, vice president of sales and marketing at AWS, formerly head of the C two and, of course, Sanjay Poon in CEO of VM Ware. Both distinguished guests and alumni of the Cube. Good to see you, Sanjay. Matt. Thanks for coming on. Uh, let's just jump into it. How are you guys doing? >>Great. Exciting. Excited for reinvent and, uh, excited for the conversation. So thanks for having us on. >>Yeah, I'm great to be here. We are allowed to be 6 ft away from each other, so I came in, but super excited about the partnership. Matt and I have been friends for several years on. You were so excited about another reinvent, the different circumstances doing all virtual. But it's a fantastic partnership. >>You know, I look forward to reinvent one of my most favorite times of the year, and it's also kind of stressful because it's backs up against Thanksgiving. And but, you know, you get through it, you have your turkey and you do the Friday and you guys probably Kino, perhaps, and all things going on and then you go to Vegas is a few celebration. We're not doing it this year. Three weeks eso There's gonna be a lot of big content in the first week, and we're gonna roll that out. We're gonna cover it, But it's gonna be a different celebrations so mad. I know you're in front center on this, Uh, just real quick. What are what do you expect people to be doing on the system? What's your expectations and how is this all going to play out? >>Yeah, you know, it's gonna be different, but I think we have Justus much exciting news as ever. And, you know, it's gonna be over a three week period. I think it actually gives people an opportunity to Seymour things. I think a lot of times we heard from, uh, from customers before was they love the excitement of being in Vegas, and we're not gonna be able to exactly replicate that, but But we have a lot of exciting things planned, and it'll enables customers to get two more sessions Seymour of the content and really see more of the exciting things that are coming out of AWS. And there's a lot s over the three weeks I encourage folks toe to dive in and really learn things is a This is the opportunity for customers to learn about the cloud and and some really cool things coming out. We're excited. >>Well, congratulations on all the business performs. I know that there's been a tailwind with the pandemic as people wanna go faster and smarter with cloud and on premise and Sanjay, you guys have a great results as well. Before I get into some of my point. Of course, I have a lot of I know we don't a lot of time, but I want to get a nup date on the relationship we covered in three years ago when, uh, Andy Jassy and team came down to San Francisco with Pat Gelsinger, Raghu, Sanjay. All this went down. There were skeptics. Relationship has proven to be quite strong and successful for both parties because you guys take a minute so you will start with you and talk about the relationship update. Where you guys at, What's the status? The relationship people want to know. >>Yeah, I think John, the relationship is going really well. Uh, it's rooted in first off, a clear understanding that there's value for customers. Um, this is the best of the public cloud in the private cloud in a hybrid cloud journey. And then, secondly, a deep engineering effort. This wasn't a Barney announcement. We both decided Matt in his previous role, was running a lot of the engineering efforts. Uh, we were really keen to make this a deep engineering effort, and often when we have our connected Cube ers, we're doing one little later this afternoon. I often can't tell when a Amazon personal speaking when a VM ware person speaking we're so connected both the engineering and then the go to market efforts. And I think after the two or three years that the the solution has had to just state and now we have many, many customers started to get real value. The go to market side of the operations really starting take off. So we're very excited about it. It is the preferred and the best offering. We think in the market, Um, and for Vienna, where customers. We message it as the best place for Vienna workload that's running on V sphere to move into Amazon. >>Matt, what's your take on the relationship update from your >>standpoint, I agree with Sanjay. I think it's been it's been fantastic. I think like you said, some folks were skeptical when we first announced it. But But, you know, we knew that there was something there and I think as we've gotten even deeper into this partnership, Onda figured out how we can continue Thio integrate more deeply both with on Prem and into the cloud. Our customers have really guided us and I think that's that's enabled us to further strengthen that partnership, and customers continue to get more excited when they see how easy it is to move and operate their VM where in their V sphere workloads inside of a W S on how it integrates well with the AWS environment, Um on they can still use all of the same functions and capabilities that they they built their business on the inside of the sphere. We're seeing bigger and bigger customers really just embrace us, and the partnerships only grown stronger. I think you know, Sanjay and I, we do joint sales calls together. I think that the business has really, really grown. It's been it's been a fantastic partnership. >>I was talking about that yesterday with being where in eight of us teams members as well. I want to get your thoughts on this cultural fit. Sanjay mentioned e think the engineering cultures air there. The also the corporate culture, both customer focused. Remember Andy Jassy told me, Hey, we're customer focused like you're making big. You make big, big statements Public Cloud and now he goes toe hybrid. He's very reactive to the customers and this is a cultural thing for me, was an VM where what are the customers saying to you now? What are you working backwards from this year? Because there's a lot to work backwards from. You got the pandemic. You got clear trends around at modernization automation under the covers, if you will. And you got VM Ware successful software running on their cloud on AWS. You got other customers. Matt, what's the big trends right now that are highlighted in your in your world? >>Yeah, it's a good question. And I think you know, it really does highlight the strength of this this hybrid model, I think, you know, pre pandemic. We had huge numbers of customers, obviously kind of looking at the cloud, but some of the largest enterprises in the world, in the more traditional enterprises, they really weren't doing a lot, you know, they were tipping their toes in, and some of the forward leaning enterprises were being really aggressive about getting into the cloud. But, you know, many people were just, you know, kind of hesitant or kind of telling, saying, Yes, we'll go learn about the cloud. I think as soon as the pandemic hit, we're really starting to see some of those more traditional enterprises realize it's a business imperative for them. Toe have ah, big cloud strategy and to move there quickly, and I I think our partnership with VM Ware and the VMC offering really is allowing many of these large enterprises to do that. And we see we see big traditional enterprise is really accelerating that move into the cloud. It gives them the business agility they need that allows them to operate their environment in uncertain world that allows them to operate remotely on DSO. We're seeing all of those trends, and I think I think we're going to continue to see the acceleration of our joint business. >>Sanjay, your thoughts. Virtualization has hit ah, whole nother level. It's not like server virtualization like it's cultural, it's societal. What's your take? >>Yeah, I think you know, virtualization is that fabric that connects the private cloud to the public cloud. It's the basis for a lot of the public cloud infrastructure. So when we listen to customers, I think the first kind of misconception we had to help them with was that it had to be choice between one or the other and being able to take Vienna Cloud, which was basically compute storage networking management and put that into the bare metal capabilities of AWS, an engineer deep into the stack and all the services that Matt and the engineering team were able to provide to us now allows that sort of application that sitting on premise to move like a house on wheels into a W s. And that's a beautiful experience we've even shown in in conferences, like a virtual reality moving of a workload, throwing a workload into a W s and a W s catches it. It's a good metaphor in a good way to think of those things that VM were like like the most playing the customers like like the emotional moves nicely. But then the other a misconception we had thio kind of illustrate to our customers was that you could once you were there, uh, let's take that metaphor. The house and wheels renovate the house with all the I think there's probably $200 services that Amazon AWS has. Um, all of a I data services be I I o t. Whatever. You have all the things that Andy and Matt kind of talk about in any of the reinvents. You get to participate and build on those services so it has. It's not like you take this there, and then it's sort of a dead end. You get to modernize your app after you migrated. So this migrate and modernize motion is something that we really start to reinforce with our customers, and it doesn't matter which one you do. First, you may modernize first and then migrate or migrate first and modernize. And in the modernized parts we've also made some significant investments and containers and Tan Xue. We could talk about that at this time and optimizing that for both the private cloud world and the public cloud world like Amazon. >>You know, Matt, this is something that we're talking about a lot this week. These few weeks with reinvent going on this everything is a service trend has a lot of things under it, like automation. Higher level services. One of the critics would say, Three years ago, when this announcement relationship between VM Ware enables came out was, Oh, Amazon's is going to steal all of their customers and VM we're screwed. Turns out that's not the case. You guys are both winning and rising. Tide floats all boats because VM Ware has an operator kind of market. People are operating their business with VM ware and they're adding higher level services with Cloud native, So it Xan overall win, so that was proven false. So clearly the new trend You guys are gaining a large enterprises that wanna go faster, have that existing operator kind of legacy stuff or pre conditions of the enterprise like VM ware. So how do you guide the technology teams and how do you look at this? Because this is where customers are like saying, Hey, I cannot operate my business house on wheels, modernize it in real time, come out a covert with the growth strategy and go faster your interview on all that. >>So I think you're exactly right. I think we see a lot of customers who see I don't want to necessarily lose what I have. I want to add on top of that, And so whether that's adding machine learning and kind of figuring out how they can take their data from various different data silos and put them into a large data lake and gets the machine learning insights on top of that, whether they want to do analytics, um, whether they want to d i o T. Whether they want to modernize two containers, I think there's there's a whole bunch of ways in which customers are looking at that. But you're absolutely right. It's not a I'm gonna go from a to B. It's I'm gonna take a and add B to it and, um, we see that's that's over and over again. I think what we've seen from customers doing it and, um and they're really taking advantage of that, right? And I think customers see all the announcements that we're making a reinvent over the next three weeks, and they wanna be able to take advantage of those things right? It's it's they want to be able to add that onto their production environment. They want to take a lot of the benefits they've gotten from their VM Ware environment, but also add some of these innovations from AWS. And I think that Z that really is what we focus on is what our engineering teams focus on. You know, we have joint engineering efforts to figure out how we can bridge that gap, right, so that they BMR environments can very easily reach into their A W s environment and take advantage of all the new services and offerings that we have there. So, um, that's that's exactly what our joint teams really pushed together. >>Sanjay, I wanna get your thoughts on this and we talk. Two years ago, we had a conversation with Cuba. I ask you since this is a great move for VM Ware because it simplifies the messaging and clears up the whole cloud strategy. And you had said something that I'm gonna bring this back today. You said it's not just simplifying the messaging to customers about what we're gonna do in the cloud. It's going to simplify their life is gonna make things easier. Have them set up for better bitterness. Goodness down the road. Can you take him in to explain what that what that goodness was? What came out of the simplicity of the messaging, the simplicity of solution? Where are we now? How does that all kind of Italian together? Can you take him in to explain that? >>Yeah, I think when the history books are written, John, um, this partnership will be one of the most seminal partnerships because from VM Ware's perspective, maybe a little from Amazon Let Matt talk about if you feel the same way. This is a headwind turning into a tailwind. I think that's sort of narrative that VM ware in Amazon were competing each others that maybe was the early story. In the early days of A W s Progress and VM, we're trying to build our own public cloud and then divesting that, uh, Mats, a Stanford grad. I'm a Harvard grad. So one day there'll be a case study. I think in both schools about how this partnership we have a strong partnership with deadlines, sometimes joke. That's a little bit of an arranged marriage we don't have. We didn't have much saying that because AMC Bardhyl so that's an important partnership. But this one we have to work hard to create. And I tell our customers, Del on AWS are top partners. And as you think about what we've been able to do here, the simplicity to the customer for you, as you describe this, is being able to really lower cost of ownership in any process, in terms of how they're building and migrating APs to be the best optimization of hardware, software and services. And the more you could make that better, simpler, cheaper through software and through the movement to the cloud. Um, I think customers benefit, and then you know, Of course, the innovation machine of both companies. Uh, Amazon's really building. I mean, every time I go to read and I'm just amazed at the Yeah, I think it's a near 200 services that they're building in all of these rich layers. All of those developers, services and, I don't know, two million customers. The whatever number of people that have it reinvent this year get to participate on top of all the applications and the virtualization infrastructure we built over the 20 years of our history. Uh eh. So I hope, you know, as we continue do this, this is all now, but customers success large and small customers being able to. And I'm very gratified to three years since we announced this that we're getting very good customer traction. And for us, that's gonna be a key focus to the reinvent, uh, presence we >>have at their show. It really just goes to show you when you built, when you invest in relationships up and down the spectrum from engineering Ah, product and executive. It kind of does pay off. Congratulations to you guys on that matter. I want to get your thoughts on where this kind of going because you're talking about the messaging from VM ware in the execution that comes behind it is the best, you know, Private public cloud hybrid cloud success. There's momentum there. What are the customers saying to you when you look at customer proof points? Um, what do you point to? Because you're now in charge of sales and marketing, you have to take now the installed base of Amazon Web services, which is you got the Debs and startups and, you know, cloud scale to large enterprises. Now you got the postcode growth. Go fast, cloud scale. You've got a huge customer base. You've got a target. These guys, you gotta bring this solution. What are they saying about the VM ware AWS success? Can you share some? Some >>days I'd be happy to, I think I mean, look, this this is what gets, uh, us excited. I know Sanjay gets just as excited about this. It's and it's really it's resonating across our customer base. You know, there's folks like S and P Global who's a large enterprise, right? They had, uh, they had a hardware procurement cycle. They were looking at them on front of implementation and they looked at a WSMV I'm wearing. They said, Look, we want to migrate. All of our applications want to migrate. Everything we have into the cloud, I think it was 150 critical financial applications that they seamlessly migrated with zero downtime Now all running on BMC in the cloud. Um, you look at governments, right? We have thing folks like the Scottish government on many government customers. We have folks that are like Penny Mac and regulated industries. Um, that really took critical parts of their application. Andi seamlessly migrated them to to A W S and BMC, and they looked at us. And when we talk to these customers, we really say, like, where is the best place for us to run these v sphere workloads? And, um and the great thing is we have a consistent message. We we know that it's the right that that aws nbn where's the best place to run those VCR workloads in the cloud? And so as we see enterprises as we see regulated industries as we see governments really looking to modernize and take advantage of the cloud, we're seeing them move whole swaths of their applications. And this is not just small parts. These are the critical really mission critical applications that they know that they need to get out flexibility on, and they want to get that agility. And so, um, you know, there's been a broad swath of customers like that that have really moved large large pieces of their application in date of us. So it's been fun to see. >>And John, if I might add to that what we've also sought to do is pick some of those great customers like the ones that Matt talked about and put them on stage. Uh, VM world. In previous, we had Freddie Mac and we had, you know, I h s market and these are good examples in the few that Matt talked about. So I'm super excited. I expect there'll be many more reinvent we did. Some also be in world. So we're getting these big customers to talk about this because then you get the 10 phenomenon. Everyone wants to come to this, tend to be able to participate in that momentum. The other thing I'm super excited about it started off as a US phenomenon. Just the U s customers, but I'm starting to see riel interest from European and a p J customers. Asia Pacific customers in countries Australia, Japan, U. K, France, Germany. So this becomes a global phenomenon where customers understand that this doesn't have to be just the U. S centric customers that are participating. And then that was, for me a very key objective because the early customers always gonna start in the Geo where, um, you know, there's the most resonance with the public cloud. But now we're starting to see this really take off in many parts of the world. >>Yeah, that's a great point at something we can talk about another conversation. Maybe we will bring you guys into some of our live check ins throughout the three weeks we're doing here. Reinvent. But this global regional approach Matt has been hugely successful. Um, we're on Amazon. We have Q breaches because by default, we're on top of Amazon. You're seeing companies build on top of Amazon. Look a snowflake. The largest I po in the history of Wall Street behind VM Ware. They run Amazon, right? And I will probably have other clouds to down the road. But the point is you guys are enabling this. >>Yeah, global. And it's it is one of the things that we hear from customers that they that they love about running in the cloud is that, you know, think about if you had Teoh, you know you mentioned snowflake. Imagine if your snowflake and you have to go build data centers everywhere. If you had to go roll out toe to Europe and then you have to build data centers in Germany and then you have to build data centers and the U. K. And then you had to go build data centers in Australia like that would be an enormous cost and complexity, and they probably wouldn't do it frankly, at their early stage, Um, you know, now they just they spin up another stack and their ableto serve their customers anywhere around the world. And we're seeing that from our VM or customers where, you know, they actually are spinning up brand new vmc clusters, uh, where they weren't able to do it before, where they either had toe operate from a single stack. Um, now they're able to say, you know what? I'd love to have Ah, vm or stack in Australia, and they're able to get that up and running quickly. And so I do think that this is actually enabling new business it z, enabling customers to think about. How do they put their computer environment close to where their end users are or where they need that computer environment to be sometime just close to end users? Sometimes it's for data residency requirements, but it really kind of enables customers to do that. Where think about in a cove in world, if you have to go launch a data center in a new country, you probably just I mean, maybe it wouldn't even be possible to do that way are today. And now it's just FBI calls. So >>I mean, your point about going slows in an option. The imperative we have, you know, even expression here inside silicon and on the Cube team. Is there a problem? Yes. Is it important? Yes. What are the consequences if you don't solve the problem? Can you quantify those consequences? And then you gotta look at solutions and look at the timing. So you got timing. You got cost. You got the consequences of not doing it. And speed all those things. No. No one's gonna roll out of data center in six months if they if they tried so again, Cloud. And I'm trying to come into play here. You gotta operate something. It's a hand in the glove, its's. I'm seeing the cream rise to the top with covert. You're seeing real examples of riel scale riel value problems that you solve that important that have consequences that can be quantified. I mean, it's simple. Is that >>you know, John, I was gonna say, in addition to this via McLeod on aws were also pretty, you know, prominent AWS customer for some of our services. So some of the services that we've seen accelerate through Covic Are these distributed workforce security capabilities? Eso we resume internally, that obviously runs on AWS. But then surrounding that with workspace one and carbon like to secure the laptop that goes home. Those services of us running A W. S two. So this is one of those places where we're grateful that we could run those cloud services because we're also just like Snowflake and Zoom and others. Many of the services that we build that our SAS type services run on Amazon, and that reinforces the partnership for us. Almost like a SAS customer. >>Well, gentlemen, really appreciate your insight. As always, a great conversation. We could go for another hour. You guys with leaders of your organizations, you're at the front lines as managing through the pandemic will have you guys come into our check ins throughout the three weeks now here during reinvent from or commentary. But I'd like to end this segment by sharing. In your opinion, what is the most important thing that the audience should pay attention to this year at Reinvent? I know there's a lot of things going on. It's three weeks, not four days. It's so it's longer, but still there's a lot of announcements, man, on your side vm where you got the moment and you got your announcements. What should customers pay attention to this reinvent Virtual 2020. >>So, do you wanna go first? >>No, man, it's your show. You go first. E >>I would encourage folks toe Really think about and plan the three weeks out. This this is the opportunity to really dive in and learn. Right? Reinvent is as as many of you know, this This is just a different type of conference. It's not American Conference. This is a learning conference, and and even virtually that doesn't change. And so I encourage. Look across the broad swath of things that we're doing. Learn about machine learning and what we're doing in that space. Learn about the new compute capabilities or container capabilities. Learn about you know what, what is most relevant to your business if you're looking about. Hey, I have an on premise data center, and I'm looking about how I extend into the cloud. There's a lot of new capabilities around BMC and AWS that makes sense, but there's also a lot of cool announcements around just other services. Um, that could be interesting. We have a ton of customers. They're giving talks. And learning from other customers is often the best way to really understand how you can get the most value out of the cloud. And so I encourage folks toe really kind of block that time. I think it's easy when your remote to get distracted by, you know, watching Netflix or answering emails or things like that. But this is this is a great opportunity to block that schedule. Find the time that you have to really spend time and dive into the sessions because we have a ton of great content on a lot of really cool launches coming up. >>Yeah, I'm just very quickly. I would like one of things I love about Amazon's culture and were similar. VM Ware is that sort of growth mindset. Learn it all and I'm looking forward myself personally to going to reinvent university. This is three weeks of learning, uh, listening to many of those those things. I learned a ton and I've tried to have my own sort of mindset of have being a learn it all as opposed to know it. Also these air incredible sessions and I would also reinforce what Matt said which is going find pure customers of yours that are in your same vertical. We're seeing enormous success in the key verticals Vienna plays in which itself called financial services public sector healthcare manufacturing, CPG retail. I mean, whatever it is so and many of those customers will be, uh, you know, doing virtual talks or we have case studies of use cases because often these sort of birds of a feather allow you to then plan your migration of modernization journey in a similar >>fashion, Matt Sanjay, always great to get the leaders of the two biggest companies in our world A, W s and VM where to share their perspectives. Uh, this year is gonna be different. I'm looking forward to, you know, really kinda stepping up and leaning into the virtual because, you know, we're gonna do three weeks of cube coverage. We have, like, special coverage days, Tuesday, Wednesday, Thursday for each of the three weeks that we're in. And we're gonna try to make this fun as possible. Keep everyone engaged on tryto navigate, help people navigate through the virtual world. So looking forward to having you guys back on and and sharing. Thanks for coming. I appreciate it. Thank you very much. Okay, this is the cubes. Virtual coverage of virtual reinvent 2020. I'm John for your host. Stay with us. Silicon angle dot com. The cube will be checking in with our live coverage in and out of the sessions and stay with us for more wall to wall coverage. Thanks for watching. Yeah,
SUMMARY :
It's the Cube with digital coverage So thanks for having us on. We are allowed to be 6 ft away from each other, And but, you know, you get through it, you have your turkey and you do the Friday and you guys Yeah, you know, it's gonna be different, but I think we have Justus much exciting news as go faster and smarter with cloud and on premise and Sanjay, you guys have a great results as well. both the engineering and then the go to market efforts. I think you know, Sanjay and I, And you got VM Ware successful software running on their cloud on AWS. And I think you know, it really does highlight the strength of this this hybrid What's your take? kind of illustrate to our customers was that you could once you were there, uh, So how do you guide the technology teams and how do you look at this? advantage of all the new services and offerings that we have there. I ask you since this is a great move for VM And the more you could make that better, What are the customers saying to you when you look at customer proof points? And so, um, you know, there's been a broad swath of customers like that that have because the early customers always gonna start in the Geo where, um, you know, there's the most resonance with the public But the point is you guys are enabling this. love about running in the cloud is that, you know, think about if you had Teoh, you know you mentioned snowflake. I'm seeing the cream rise to the top with Many of the services that we build that our SAS type services run on Amazon, through the pandemic will have you guys come into our check ins throughout the three weeks now here during No, man, it's your show. And learning from other customers is often the best way to really understand how you can get of those customers will be, uh, you know, doing virtual talks or we have case studies of use cases So looking forward to having you guys back on and and sharing.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
John | PERSON | 0.99+ |
Matt | PERSON | 0.99+ |
Sanjay | PERSON | 0.99+ |
Sanjay Poon | PERSON | 0.99+ |
Matt Garment | PERSON | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Andy Jassy | PERSON | 0.99+ |
Pat Gelsinger | PERSON | 0.99+ |
Sanjay Poonen | PERSON | 0.99+ |
Australia | LOCATION | 0.99+ |
Europe | LOCATION | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Germany | LOCATION | 0.99+ |
Andy | PERSON | 0.99+ |
France | LOCATION | 0.99+ |
$200 | QUANTITY | 0.99+ |
Matt Sanjay | PERSON | 0.99+ |
two | QUANTITY | 0.99+ |
Japan | LOCATION | 0.99+ |
Vegas | LOCATION | 0.99+ |
Raghu | PERSON | 0.99+ |
6 ft | QUANTITY | 0.99+ |
FBI | ORGANIZATION | 0.99+ |
San Francisco | LOCATION | 0.99+ |
U. K | LOCATION | 0.99+ |
Matt Garman | PERSON | 0.99+ |
eight | QUANTITY | 0.99+ |
150 critical financial applications | QUANTITY | 0.99+ |
both parties | QUANTITY | 0.99+ |
three weeks | QUANTITY | 0.99+ |
four days | QUANTITY | 0.99+ |
VM Ware | ORGANIZATION | 0.99+ |
three years | QUANTITY | 0.99+ |
both | QUANTITY | 0.99+ |
both schools | QUANTITY | 0.99+ |
U. K. | LOCATION | 0.99+ |
Three years ago | DATE | 0.99+ |
Two years ago | DATE | 0.99+ |
VMC | ORGANIZATION | 0.99+ |
Seymour | PERSON | 0.99+ |
BMC | ORGANIZATION | 0.99+ |
yesterday | DATE | 0.99+ |
both companies | QUANTITY | 0.99+ |
Three weeks | QUANTITY | 0.99+ |
VMware | ORGANIZATION | 0.99+ |
one | QUANTITY | 0.99+ |
Ken Holtz and Benito Lopez, Red Hat | Kubecon + CloudNativeCon NA 2020
from around the globe it's thecube with coverage of kubecon and cloudnativecon north america 2020 virtual brought to you by red hat the cloud native computing foundation and ecosystem partners welcome to thecube's coverage of kubecon and cloudnativecon 2020 the virtual edition i'm lisa martin i've got a couple of guests with me here today please welcome ken holtz the principal partner manager for red hat hey ken and welcome to the cube hi lisa thank you and benito lopez is also joining us senior manager of business development and the solutions provider services provider vertical excuse me f5 from f5 hi benito how are how are you i'm good you're in san francisco thank you all right yes we're all very socially distanced so guys kubecon cloudnativecon the virtual version here still the opportunity to engage with a lot of leaders in the community folks interested let's go ahead and start with you as we look at this very dynamic environment in which we are all living and working organizations are under even more pressure to deliver the information and the services and the experiences that customers demand internal customers external customers i know f5 is known for load balancing and load balancing is one of those tools that can certainly help with that but talk to us about what's kind of going on what's new in that respect from fbi's perspective we have evolved into an adaptive application services company what do i mean by adaptive application services it's the ability to scale secure and protect application applications wherever they may recite whether they're in the far edge whether in the cloud whether they're on premises and the ability to also observe the the analytics and telemetry emanating from those applications to be able to act upon what we see in that space so when we talk about service based architecture it's all about no longer being reliant on a in the on a single vendor on a monolithic application set of services or on what they call a vertical stack appliance service based architecture means you want it to be a scalable architecture whereby you can add the dock subtract um different types of network functions in 5g so the way this is going to be depend the the key enabler for a services-based architecture is going to be container based services whereby services will no longer just be applications are going to be disaggregated into micro services right in container clusters and f5's role here is to be able to scale and secure that traffic into a service provider environment more importantly our role is to turn a container-based architecture which is not service provider grade into a service provider-grade architecture which means we can actually see the services provide specific protocols into that container cluster and more importantly um scale and secure and apply the right policies within a containerized environment again containers is all about a service base is part of a service based architecture and containers today especially on kubernetes need a service provider grade platform of which we provide that market all right so kubernetes seeing a lot of activity with telco customers what are some of the challenges major we'll stick with you for another few seconds here what are some of the challenges that you're seeing that you're helping customers to work through well one is the first challenge is how do you make kubernetes telco great that's the first challenge so what f5 does is we actually um act as the ingress and egress point into kubernetes environment whereby we see telco as we were able to scale and secure telco specific protocols that kubernetes today um does not support and we work closely with red hat in that space um together with their open shift architecture to open shift platform cut we work with red hat today uh with um uh with respect to the openshift platform and that helps the service provider have a telco cloud-like platform that is um scalable that is secure and that is highly performant and low-latent all right so speaking of red hat let's bring ken into the conversation here kind of same question for you as we look at the activity uh in telco with respect to kubernetes let's talk to some of the ways that that red hat is helping customers address some of the challenges so that they can leverage that technology to to really move their businesses forward especially in such a dynamic environment right now thanks lisa so red hat has a goal of ensuring our openshift platform is ready and hardened enough to enable telco workloads for our 5g platform while we work with other partners f5 has been one of our key partners in this particular space for the first time openshift networking is natively integrating seamlessly with the commercial load balancer from f5 making it ready for telco 5g this is a co-engineered co-developed solution a new piece of software that we've implemented together oven kubernetes is enterprise and service provider ready we believe ovn will help significantly with latency overall and this is an evolution we have our first implementation of this now and we're working now on making this even more cloud-native which means making it more performant more resilient and even more capable and ready for telco grade requirements so can continuing on with you for a second in terms of how you're working together with customers to maybe customize or adapt the technologies can you talk to me a little bit about some of the customer feedback like some of those challenges that they're facing in today's environment which as we know is so dynamic and probably going to be for a while what's the customer like influence in terms of the partnership and the code development well so my focus at red hat is on partnership and the ecosystem partner management team allows red hat to meet the needs of a growing number of red hat partners the team serves as a partner's single point of contact for product questions roadmap updates engineering interlocks and general guidance for how to partner with red hat and with open source communities to achieve their business goals so uh we we're we're helping the end customers through our tight partnership imagine a lot of collaboration there so benito let's talk from your perspective from f5's perspective on the partnership and the collaboration that you have together and with your customers to help them be successful well ecosystems partnerships are going to be critical for our success as a company and more importantly as service providers today especially as i mentioned earlier around with respect to us they migrate and transform their networks from 4g to 5g um the architecture is going to horizontalize it's going to require a telcograde type of infrastructure manager a telcograde os and at the same time it's going to require a telco grade um and security platform and therefore red hat with its um them with them being what we call as a leader in open source and open and containers with their openshift platform we see them as a vital partner in working with service providers to transform their networks into a teleco great containerized environment right so as they migrate into um as they migrate from just software virtualization to containerization which is going to be critical for 5g um red hat is a key partner for us to work with to ensure that their network is their containerized network is telego-grade and highly performant and secure excellent thanks and ken back to you i know the audience would like to hear kind of some more specifics on the collaboration between you guys and also kind of beyond what they can see what's coming down the pipe in terms of open source projects or kind of beyond that yeah so some of some examples of our work together uh would include joint roadmap alignment uh we're very closely tied together on on the roadmap front early pre-pre-ga enablement early access to code and we have a goal of achieving certification here so we'd like to to achieve certification which provides assurance of compatibility and support avoids vendor lock-in and dispels any security concerns that customers may have excellent well guys anything else that you want to add here to the audience that is attending this virtual edition of kubecon cloud nativecon 2020 benito to you well i'd like to just say that as you migrate to as your network begins to transform and you are looking at the containerized architecture f5 and red hat are your best partners to have that telco grade architecture infrastructure in place i like that both statement very well put ken less thoughts from you i think benito said it best and i just wanted to say thanks a lot for having having us and this has been fun excellent guys thank you for sharing what's going on with the f5 red hat partnership how you're helping customers in telco with kubernetes the challenges there to alleviate ken bonito thanks for joining me on thecube today thank you thank you for my guests i'm lisa martin and you're watching thecube you
**Summary and Sentiment Analysis are not been shown because of improper transcript**
ENTITIES
Entity | Category | Confidence |
---|---|---|
san francisco | LOCATION | 0.99+ |
ken holtz | PERSON | 0.99+ |
Benito Lopez | PERSON | 0.99+ |
telco | ORGANIZATION | 0.99+ |
Ken Holtz | PERSON | 0.99+ |
lisa | PERSON | 0.99+ |
lisa martin | PERSON | 0.99+ |
first challenge | QUANTITY | 0.99+ |
today | DATE | 0.99+ |
ken | PERSON | 0.98+ |
benito lopez | PERSON | 0.98+ |
both | QUANTITY | 0.98+ |
benito | PERSON | 0.98+ |
Red Hat | ORGANIZATION | 0.97+ |
red hat | ORGANIZATION | 0.97+ |
red hat | ORGANIZATION | 0.97+ |
kubecon | ORGANIZATION | 0.97+ |
first time | QUANTITY | 0.97+ |
north america | LOCATION | 0.96+ |
one | QUANTITY | 0.95+ |
f5 | ORGANIZATION | 0.95+ |
2020 | DATE | 0.94+ |
fbi | ORGANIZATION | 0.94+ |
kubernetes | ORGANIZATION | 0.94+ |
first implementation | QUANTITY | 0.92+ |
teleco | ORGANIZATION | 0.85+ |
CloudNativeCon | EVENT | 0.83+ |
ken bonito | PERSON | 0.82+ |
cloudnativecon | ORGANIZATION | 0.82+ |
benito | ORGANIZATION | 0.79+ |
few | QUANTITY | 0.79+ |
Kubecon | ORGANIZATION | 0.79+ |
single vendor | QUANTITY | 0.75+ |
couple of guests | QUANTITY | 0.73+ |
second | QUANTITY | 0.73+ |
NA 2020 | EVENT | 0.72+ |
5g | QUANTITY | 0.7+ |
single point | QUANTITY | 0.69+ |
f5 red | COMMERCIAL_ITEM | 0.65+ |
telcograde os | COMMERCIAL_ITEM | 0.64+ |
5g | COMMERCIAL_ITEM | 0.57+ |
telco grade | ORGANIZATION | 0.54+ |
cloudnativecon | EVENT | 0.53+ |
computing | ORGANIZATION | 0.52+ |
f5 | TITLE | 0.5+ |
4g | QUANTITY | 0.44+ |
5g | OTHER | 0.43+ |
Kubernetes on Any Infrastructure Top to Bottom Tutorials for Docker Enterprise Container Cloud
>>all right, We're five minutes after the hour. That's all aboard. Who's coming aboard? Welcome everyone to the tutorial track for our launchpad of them. So for the next couple of hours, we've got a SYRIZA videos and experts on hand to answer questions about our new product, Doctor Enterprise Container Cloud. Before we jump into the videos and the technology, I just want to introduce myself and my other emcee for the session. I'm Bill Milks. I run curriculum development for Mirant us on. And >>I'm Bruce Basil Matthews. I'm the Western regional Solutions architect for Moran Tissue esa and welcome to everyone to this lovely launchpad oven event. >>We're lucky to have you with us proof. At least somebody on the call knows something about your enterprise Computer club. Um, speaking of people that know about Dr Enterprise Container Cloud, make sure that you've got a window open to the chat for this session. We've got a number of our engineers available and on hand to answer your questions live as we go through these videos and disgusting problem. So that's us, I guess, for Dr Enterprise Container Cloud, this is Mirant asses brand new product for bootstrapping Doctor Enterprise Kubernetes clusters at scale Anything. The airport Abu's? >>No, just that I think that we're trying Thio. Uh, let's see. Hold on. I think that we're trying Teoh give you a foundation against which to give this stuff a go yourself. And that's really the key to this thing is to provide some, you know, many training and education in a very condensed period. So, >>yeah, that's exactly what you're going to see. The SYRIZA videos we have today. We're going to focus on your first steps with Dr Enterprise Container Cloud from installing it to bootstrapping your regional child clusters so that by the end of the tutorial content today, you're gonna be prepared to spin up your first documentary prize clusters using documented prize container class. So just a little bit of logistics for the session. We're going to run through these tutorials twice. We're gonna do one run through starting seven minutes ago up until I guess it will be ten fifteen Pacific time. Then we're gonna run through the whole thing again. So if you've got other colleagues that weren't able to join right at the top of the hour and would like to jump in from the beginning, ten. Fifteen Pacific time. We're gonna do the whole thing over again. So if you want to see the videos twice, you got public friends and colleagues that, you know you wanna pull in for a second chance to see this stuff, we're gonna do it all. All twice. Yeah, this session. Any any logistics I should add, Bruce that No, >>I think that's that's pretty much what we had to nail down here. But let's zoom dash into those, uh, feature films. >>Let's do Edmonds. And like I said, don't be shy. Feel free to ask questions in the chat or engineers and boosting myself are standing by to answer your questions. So let me just tee up the first video here and walk their cost. Yeah. Mhm. Yes. Sorry. And here we go. So our first video here is gonna be about installing the Doctor Enterprise Container Club Management cluster. So I like to think of the management cluster as like your mothership, right? This is what you're gonna use to deploy all those little child clusters that you're gonna use is like, Come on it as clusters downstream. So the management costs was always our first step. Let's jump in there >>now. We have to give this brief little pause >>with no good day video. Focus for this demo will be the initial bootstrap of the management cluster in the first regional clusters to support AWS deployments. The management cluster provides the core functionality, including identity management, authentication, infantry release version. The regional cluster provides the specific architecture provided in this case, eight of us and the Elsie um, components on the UCP Cluster Child cluster is the cluster or clusters being deployed and managed. The deployment is broken up into five phases. The first phase is preparing a big strap note on this dependencies on handling with download of the bridge struck tools. The second phase is obtaining America's license file. Third phase. Prepare the AWS credentials instead of the adduce environment. The fourth configuring the deployment, defining things like the machine types on the fifth phase. Run the bootstrap script and wait for the deployment to complete. Okay, so here we're sitting up the strap node, just checking that it's clean and clear and ready to go there. No credentials already set up on that particular note. Now we're just checking through AWS to make sure that the account we want to use we have the correct credentials on the correct roles set up and validating that there are no instances currently set up in easy to instance, not completely necessary, but just helps keep things clean and tidy when I am perspective. Right. So next step, we're just going to check that we can, from the bootstrap note, reach more antis, get to the repositories where the various components of the system are available. They're good. No areas here. Yeah, right now we're going to start sitting at the bootstrap note itself. So we're downloading the cars release, get get cars, script, and then next, we're going to run it. I'm in. Deploy it. Changing into that big struck folder. Just making see what's there. Right now we have no license file, so we're gonna get the license filed. Oh, okay. Get the license file through the more antis downloads site, signing up here, downloading that license file and putting it into the Carisbrook struck folder. Okay, Once we've done that, we can now go ahead with the rest of the deployment. See that the follow is there. Uh, huh? That's again checking that we can now reach E C two, which is extremely important for the deployment. Just validation steps as we move through the process. All right, The next big step is valid in all of our AWS credentials. So the first thing is, we need those route credentials which we're going to export on the command line. This is to create the necessary bootstrap user on AWS credentials for the completion off the deployment we're now running an AWS policy create. So it is part of that is creating our Food trucks script, creating the mystery policy files on top of AWS, Just generally preparing the environment using a cloud formation script you'll see in a second will give a new policy confirmations just waiting for it to complete. Yeah, and there is done. It's gonna have a look at the AWS console. You can see that we're creative completed. Now we can go and get the credentials that we created Today I am console. Go to that new user that's being created. We'll go to the section on security credentials and creating new keys. Download that information media Access key I D and the secret access key. We went, Yeah, usually then exported on the command line. Okay. Couple of things to Notre. Ensure that you're using the correct AWS region on ensure that in the conflict file you put the correct Am I in for that region? I'm sure you have it together in a second. Yes. Okay, that's the key. Secret X key. Right on. Let's kick it off. Yeah, So this process takes between thirty and forty five minutes. Handles all the AWS dependencies for you, and as we go through, the process will show you how you can track it. Andi will start to see things like the running instances being created on the west side. The first phase off this whole process happening in the background is the creation of a local kind based bootstrapped cluster on the bootstrap node that clusters then used to deploy and manage all the various instances and configurations within AWS. At the end of the process, that cluster is copied into the new cluster on AWS and then shut down that local cluster essentially moving itself over. Okay. Local clusters boat just waiting for the various objects to get ready. Standard communities objects here Okay, so we speed up this process a little bit just for demonstration purposes. Yeah. There we go. So first note is being built the best in host. Just jump box that will allow us access to the entire environment. Yeah, In a few seconds, we'll see those instances here in the US console on the right. Um, the failures that you're seeing around failed to get the I. P for Bastian is just the weight state while we wait for a W s to create the instance. Okay. Yes. Here, beauty there. Okay. Mhm. Okay. Yeah, yeah. Okay. On there. We got question. Host has been built on three instances for the management clusters have now been created. We're going through the process of preparing. Those nodes were now copying everything over. See that? The scaling up of controllers in the big Strap cluster? It's indicating that we're starting all of the controllers in the new question. Almost there. Yeah. Yeah, just waiting for key. Clark. Uh huh. Start to finish up. Yeah. No. What? Now we're shutting down control this on the local bootstrap node on preparing our I. D. C. Configuration. Fourth indication, soon as this is completed. Last phase will be to deploy stack light into the new cluster the last time Monitoring tool set way Go stack like to plan It has started. Mhm coming to the end of the deployment Mountain. Yeah, America. Final phase of the deployment. Onda, We are done. Okay, You'll see. At the end they're providing us the details of you. I log in so there's a keeper clogging. You can modify that initial default password is part of the configuration set up with one documentation way. Go Councils up way can log in. Yeah, yeah, thank you very much for watching. >>Excellent. So in that video are wonderful field CTO Shauna Vera bootstrapped up management costume for Dr Enterprise Container Cloud Bruce, where exactly does that leave us? So now we've got this management costume installed like what's next? >>So primarily the foundation for being able to deploy either regional clusters that will then allow you to support child clusters. Uh, comes into play the next piece of what we're going to show, I think with Sean O'Mara doing this is the child cluster capability, which allows you to then deploy your application services on the local cluster. That's being managed by the ah ah management cluster that we just created with the bootstrap. >>Right? So this cluster isn't yet for workloads. This is just for bootstrapping up the downstream clusters. Those or what we're gonna use for workings. >>Exactly. Yeah. And I just wanted to point out, since Sean O'Mara isn't around, toe, actually answer questions. I could listen to that guy. Read the phone book, and it would be interesting, but anyway, you can tell him I said that >>he's watching right now, Crusoe. Good. Um, cool. So and just to make sure I understood what Sean was describing their that bootstrap er knows that you, like, ran document fresh pretender Cloud from to begin with. That's actually creating a kind kubernetes deployment kubernetes and Docker deployment locally. That then hits the AWS a p i in this example that make those e c two instances, and it makes like a three manager kubernetes cluster there, and then it, like, copies itself over toe those communities managers. >>Yeah, and and that's sort of where the transition happens. You can actually see it. The output that when it says I'm pivoting, I'm pivoting from my local kind deployment of cluster AP, I toothy, uh, cluster, that's that's being created inside of AWS or, quite frankly, inside of open stack or inside of bare metal or inside of it. The targeting is, uh, abstracted. Yeah, but >>those air three environments that we're looking at right now, right? Us bare metal in open staff environments. So does that kind cluster on the bootstrap er go away afterwards. You don't need that afterwards. Yeah, that is just temporary. To get things bootstrapped, then you manage things from management cluster on aws in this example? >>Yeah. Yeah. The seed, uh, cloud that post the bootstrap is not required anymore. And there's no, uh, interplay between them after that. So that there's no dependencies on any of the clouds that get created thereafter. >>Yeah, that actually reminds me of how we bootstrapped doctor enterprise back in the day, be a temporary container that would bootstrap all the other containers. Go away. It's, uh, so sort of a similar, similar temporary transient bootstrapping model. Cool. Excellent. What will convict there? It looked like there wasn't a ton, right? It looked like you had to, like, set up some AWS parameters like credentials and region and stuff like that. But other than that, that looked like heavily script herbal like there wasn't a ton of point and click there. >>Yeah, very much so. It's pretty straightforward from a bootstrapping standpoint, The config file that that's generated the template is fairly straightforward and targeted towards of a small medium or large, um, deployment. And by editing that single file and then gathering license file and all of the things that Sean went through, um, that that it makes it fairly easy to script >>this. And if I understood correctly as well that three manager footprint for your management cluster, that's the minimum, right. We always insist on high availability for this management cluster because boy do not wanna see oh, >>right, right. And you know, there's all kinds of persistent data that needs to be available, regardless of whether one of the notes goes down or not. So we're taking care of all of that for you behind the scenes without you having toe worry about it as a developer. >>No, I think there's that's a theme that I think will come back to throughout the rest of this tutorial session today is there's a lot of there's a lot of expertise baked him to Dr Enterprise Container Cloud in terms of implementing best practices for you like the defaulter, just the best practices of how you should be managing these clusters, Miss Seymour. Examples of that is the day goes on. Any interesting questions you want to call out from the chap who's >>well, there was. Yeah, yeah, there was one that we had responded to earlier about the fact that it's a management cluster that then conduce oh, either the the regional cluster or a local child molester. The child clusters, in each case host the application services, >>right? So at this point, we've got, in some sense, like the simplest architectures for our documentary prize Container Cloud. We've got the management cluster, and we're gonna go straight with child cluster. In the next video, there's a more sophisticated architecture, which will also proper today that inserts another layer between those two regional clusters. If you need to manage regions like across a BS, reads across with these documents anything, >>yeah, that that local support for the child cluster makes it a lot easier for you to manage the individual clusters themselves and to take advantage of our observation. I'll support systems a stack light and things like that for each one of clusters locally, as opposed to having to centralize thumb >>eso. It's a couple of good questions. In the chat here, someone was asking for the instructions to do this themselves. I strongly encourage you to do so. That should be in the docks, which I think Dale helpfully thank you. Dale provided links for that's all publicly available right now. So just head on in, head on into the docks like the Dale provided here. You can follow this example yourself. All you need is a Mirante license for this and your AWS credentials. There was a question from many a hear about deploying this toe azure. Not at G. Not at this time. >>Yeah, although that is coming. That's going to be in a very near term release. >>I didn't wanna make promises for product, but I'm not too surprised that she's gonna be targeted. Very bracing. Cool. Okay. Any other thoughts on this one does. >>No, just that the fact that we're running through these individual pieces of the steps Well, I'm sure help you folks. If you go to the link that, uh, the gentleman had put into the chat, um, giving you the step by staff. Um, it makes it fairly straightforward to try this yourselves. >>E strongly encourage that, right? That's when you really start to internalize this stuff. OK, but before we move on to the next video, let's just make sure everyone has a clear picture in your mind of, like, where we are in the life cycle here creating this management cluster. Just stop me if I'm wrong. Who's creating this management cluster is like, you do that once, right? That's when your first setting up your doctor enterprise container cloud environment of system. What we're going to start seeing next is creating child clusters and this is what you're gonna be doing over and over and over again. When you need to create a cluster for this Deb team or, you know, this other team river it is that needs commodity. Doctor Enterprise clusters create these easy on half will. So this was once to set up Dr Enterprise Container Cloud Child clusters, which we're going to see next. We're gonna do over and over and over again. So let's go to that video and see just how straightforward it is to spin up a doctor enterprise cluster for work clothes as a child cluster. Undocumented brands contain >>Hello. In this demo, we will cover the deployment experience of creating a new child cluster, the scaling of the cluster and how to update the cluster. When a new version is available, we begin the process by logging onto the you I as a normal user called Mary. Let's go through the navigation of the U I so you can switch. Project Mary only has access to development. Get a list of the available projects that you have access to. What clusters have been deployed at the moment there. Nan Yes, this H Keys Associate ID for Mary into her team on the cloud credentials that allow you to create access the various clouds that you can deploy clusters to finally different releases that are available to us. We can switch from dark mode to light mode, depending on your preferences, Right? Let's now set up semester search keys for Mary so she can access the notes and machines again. Very simply, had Mississippi key give it a name, we copy and paste our public key into the upload key block. Or we can upload the key if we have the file available on our local machine. A simple process. So to create a new cluster, we define the cluster ad management nodes and add worker nodes to the cluster. Yeah, again, very simply, you go to the clusters tab. We hit the create cluster button. Give the cluster name. Yeah, Andi, select the provider. We only have access to AWS in this particular deployment, so we'll stick to AWS. What's like the region in this case? US West one release version five point seven is the current release Onda Attach. Mary's Key is necessary Key. We can then check the rest of the settings, confirming the provider Any kubernetes c r D r I p address information. We can change this. Should we wish to? We'll leave it default for now on. Then what components? A stack light I would like to deploy into my Custer. For this. I'm enabling stack light on logging on Aiken. Sit up the retention sizes Attention times on. Even at this stage, at any customer alerts for the watchdogs. E consider email alerting which I will need my smart host details and authentication details. Andi Slack Alerts. Now I'm defining the cluster. All that's happened is the cluster's been defined. I now need to add machines to that cluster. I'll begin by clicking the create machine button within the cluster definition. Oh, select manager, Select the number of machines. Three is the minimum. Select the instant size that I'd like to use from AWS and very importantly, ensure correct. Use the correct Am I for the region. I commend side on the route device size. There we go, my three machines obviously creating. I now need to add some workers to this custom. So I go through the same process this time once again, just selecting worker. I'll just add to once again, the AM is extremely important. Will fail if we don't pick the right, Am I for a boon to machine in this case and the deployment has started. We can go and check on the bold status are going back to the clusters screen on clicking on the little three dots on the right. We get the cluster info and the events, so the basic cluster info you'll see pending their listen cluster is still in the process of being built. We kick on, the events will get a list of actions that have been completed This part of the set up of the cluster. So you can see here we've created the VPC. We've created the sub nets on We've created the Internet gateway. It's unnecessary made of us and we have no warnings of the stage. Yeah, this will then run for a while. We have one minute past waken click through. We can check the status of the machine bulls as individuals so we can check the machine info, details of the machines that we've assigned, right? Mhm Onda. See any events pertaining to the machine areas like this one on normal? Yeah. Just watch asked. The community's components are waiting for the machines to start. Go back to Custer's. Okay, right. Because we're moving ahead now. We can see we have it in progress. Five minutes in new Matt Gateway on the stage. The machines have been built on assigned. I pick up the U. S. Thank you. Yeah. There we go. Machine has been created. See the event detail and the AWS. I'd for that machine. Mhm. No speeding things up a little bit. This whole process and to end takes about fifteen minutes. Run the clock forward, you'll notice is the machines continue to bold the in progress. We'll go from in progress to ready. A soon as we got ready on all three machines, the managers on both workers way could go on and we could see that now we reached the point where the cluster itself is being configured. Mhm, mhm. And then we go. Cluster has been deployed. So once the classes deployed, we can now never get around our environment. Okay, Are cooking into configure cluster We could modify their cluster. We could get the end points for alert alert manager on See here The griffon occupying and Prometheus are still building in the background but the cluster is available on you would be able to put workloads on it the stretch to download the cube conflict so that I can put workloads on it. It's again three little dots in the right for that particular cluster. If the download cube conflict give it my password, I now have the Q conflict file necessary so that I can access that cluster Mhm all right Now that the build is fully completed, we can check out cluster info on. We can see that Allow the satellite components have been built. All the storage is there, and we have access to the CPU. I So if we click into the cluster, we can access the UCP dashboard, right? Shit. Click the signing with Detroit button to use the SSO on. We give Mary's possible to use the name once again. Thing is, an unlicensed cluster way could license at this point. Or just skip it on. There. We have the UCP dashboard. You can see that has been up for a little while. We have some data on the dashboard going back to the console. We can now go to the griffon, a data just being automatically pre configured for us. We can switch and utilized a number of different dashboards that have already been instrumented within the cluster. So, for example, communities cluster information, the name spaces, deployments, nodes. Mhm. So we look at nodes. If we could get a view of the resource is utilization of Mrs Custer is very little running in it. Yeah. General dashboard of Cuba navies cluster one of this is configurable. You can modify these for your own needs, or add your own dashboards on de scoped to the cluster. So it is available to all users who have access to this specific cluster, all right to scale the cluster on to add a notice. A simple is the process of adding a mode to the cluster, assuming we've done that in the first place. So we go to the cluster, go into the details for the cluster we select, create machine. Once again, we need to be ensure that we put the correct am I in and any other functions we like. You can create different sized machines so it could be a larger node. Could be bigger disks and you'll see that worker has been added from the provisioning state on shortly. We will see the detail off that worker as a complete to remove a note from a cluster. Once again, we're going to the cluster. We select the node would like to remove. Okay, I just hit delete On that note. Worker nodes will be removed from the cluster using according and drawing method to ensure that your workouts are not affected. Updating a cluster. When an update is available in the menu for that particular cluster, the update button will become available. And it's a simple as clicking the button, validating which release you would like to update to. In this case, the next available releases five point seven point one. Here I'm kicking the update by in the background We will coordinate. Drain each node slowly go through the process of updating it. Andi update will complete depending on what the update is as quickly as possible. Girl, we go. The notes being rebuilt in this case impacted the manager node. So one of the manager nodes is in the process of being rebuilt. In fact, to in this case, one has completed already on In a few minutes we'll see that there are great has been completed. There we go. Great. Done. Yeah. If you work loads of both using proper cloud native community standards, there will be no impact. >>Excellent. So at this point, we've now got a cluster ready to start taking our communities of workloads. He started playing or APs to that costume. So watching that video, the thing that jumped out to me at first Waas like the inputs that go into defining this workload cost of it. All right, so we have to make sure we were using on appropriate am I for that kind of defines the substrate about what we're gonna be deploying our cluster on top of. But there's very little requirements. A so far as I could tell on top of that, am I? Because Docker enterprise Container Cloud is gonna bootstrap all the components that you need. That s all we have is kind of kind of really simple bunch box that we were deploying these things on top of so one thing that didn't get dug into too much in the video. But it's just sort of implied. Bruce, maybe you can comment on this is that release that Shawn had to choose for his, uh, for his cluster in creating it. And that release was also the thing we had to touch. Wanted to upgrade part cluster. So you have really sharp eyes. You could see at the end there that when you're doing the release upgrade enlisted out a stack of components docker, engine, kubernetes, calico, aled, different bits and pieces that go into, uh, go into one of these commodity clusters that deploy. And so, as far as I can tell in that case, that's what we mean by a release. In this sense, right? It's the validated stack off container ization and orchestration components that you know we've tested out and make sure it works well, introduction environments. >>Yeah, and and And that's really the focus of our effort is to ensure that any CVS in any of the stack are taken care of that there is a fixes air documented and up streamed to the open stack community source community, um, and and that, you know, then we test for the scaling ability and the reliability in high availability configuration for the clusters themselves. The hosts of your containers. Right. And I think one of the key, uh, you know, benefits that we provide is that ability to let you know, online, high. We've got an update for you, and it's fixes something that maybe you had asked us to fix. Uh, that all comes to you online as your managing your clusters, so you don't have to think about it. It just comes as part of the product. >>You just have to click on Yes. Please give me that update. Uh, not just the individual components, but again. It's that it's that validated stack, right? Not just, you know, component X, y and Z work. But they all work together effectively Scalable security, reliably cool. Um, yeah. So at that point, once we started creating that workload child cluster, of course, we bootstrapped good old universal control plane. Doctor Enterprise. On top of that, Sean had the classic comment there, you know? Yeah. Yeah. You'll see a little warnings and errors or whatever. When you're setting up, UCP don't handle, right, Just let it do its job, and it will converge all its components, you know, after just just a minute or two. But we saw in that video, we sped things up a little bit there just we didn't wait for, you know, progress fighters to complete. But really, in real life, that whole process is that anything so spend up one of those one of those fosters so quite quite quick. >>Yeah, and and I think the the thoroughness with which it goes through its process and re tries and re tries, uh, as you know, and it was evident when we went through the initial ah video of the bootstrapping as well that the processes themselves are self healing, as they are going through. So they will try and retry and wait for the event to complete properly on. And once it's completed properly, then it will go to the next step. >>Absolutely. And the worst thing you could do is panic at the first warning and start tearing things that don't don't do that. Just don't let it let it heal. Let take care of itself. And that's the beauty of these manage solutions is that they bake in a lot of subject matter expertise, right? The decisions that are getting made by those containers is they're bootstrapping themselves, reflect the expertise of the Mirant ISS crew that has been developing this content in these two is free for years and years now, over recognizing humanities. One cool thing there that I really appreciate it actually that it adds on top of Dr Enterprise is that automatic griffon a deployment as well. So, Dr Enterprises, I think everyone knows has had, like, some very high level of statistics baked into its dashboard for years and years now. But you know our customers always wanted a double click on that right to be able to go a little bit deeper. And Griffon are really addresses that it's built in dashboards. That's what's really nice to see. >>Yeah, uh, and all of the alerts and, uh, data are actually captured in a Prometheus database underlying that you have access to so that you are allowed to add new alerts that then go out to touch slack and say hi, You need to watch your disk space on this machine or those kinds of things. Um, and and this is especially helpful for folks who you know, want to manage the application service layer but don't necessarily want to manage the operations side of the house. So it gives them a tool set that they can easily say here, Can you watch these for us? And Miran tas can actually help do that with you, So >>yeah, yeah, I mean, that's just another example of baking in that expert knowledge, right? So you can leverage that without tons and tons of a long ah, long runway of learning about how to do that sort of thing. Just get out of the box right away. There was the other thing, actually, that you could sleep by really quickly if you weren't paying close attention. But Sean mentioned it on the video. And that was how When you use dark enterprise container cloud to scale your cluster, particularly pulling a worker out, it doesn't just like Territo worker down and forget about it. Right? Is using good communities best practices to cordon and drain the No. So you aren't gonna disrupt your workloads? You're going to just have a bunch of containers instantly. Excellent crash. You could really carefully manage the migration of workloads off that cluster has baked right in tow. How? How? Document? The brass container cloud is his handling cluster scale. >>Right? And And the kubernetes, uh, scaling methodology is is he adhered to with all of the proper techniques that ensure that it will tell you. Wait, you've got a container that actually needs three, uh, three, uh, instances of itself. And you don't want to take that out, because that node, it means you'll only be able to have to. And we can't do that. We can't allow that. >>Okay, Very cool. Further thoughts on this video. So should we go to the questions. >>Let's let's go to the questions >>that people have. Uh, there's one good one here, down near the bottom regarding whether an a p I is available to do this. So in all these demos were clicking through this web. You I Yes, this is all a p. I driven. You could do all of this. You know, automate all this away is part of the CSC change. Absolutely. Um, that's kind of the point, right? We want you to be ableto spin up. Come on. I keep calling them commodity clusters. What I mean by that is clusters that you can create and throw away. You know, easily and automatically. So everything you see in these demos eyes exposed to FBI? >>Yeah. In addition, through the standard Cube cuddle, Uh, cli as well. So if you're not a programmer, but you still want to do some scripting Thio, you know, set up things and deploy your applications and things. You can use this standard tool sets that are available to accomplish that. >>There is a good question on scale here. So, like, just how many clusters and what sort of scale of deployments come this kind of support our engineers report back here that we've done in practice up to a Zeman ia's like two hundred clusters. We've deployed on this with two hundred fifty nodes in a cluster. So were, you know, like like I said, hundreds, hundreds of notes, hundreds of clusters managed by documented press container fall and then those downstream clusters, of course, subject to the usual constraints for kubernetes, right? Like default constraints with something like one hundred pods for no or something like that. There's a few different limitations of how many pods you can run on a given cluster that comes to us not from Dr Enterprise Container Cloud, but just from the underlying kubernetes distribution. >>Yeah, E. I mean, I don't think that we constrain any of the capabilities that are available in the, uh, infrastructure deliveries, uh, service within the goober Netease framework. So were, you know, But we are, uh, adhering to the standards that we would want to set to make sure that we're not overloading a node or those kinds of things, >>right. Absolutely cool. Alright. So at this point, we've got kind of a two layered our protection when we are management cluster, but we deployed in the first video. Then we use that to deploy one child clustering work, classroom, uh, for more sophisticated deployments where we might want to manage child clusters across multiple regions. We're gonna add another layer into our architectural we're gonna add in regional cluster management. So this idea you're gonna have the single management cluster that we started within the first video. On the next video, we're gonna learn how to spin up a regional clusters, each one of which would manage, for example, a different AWS uh, US region. So let me just pull out the video for that bill. We'll check it out for me. Mhm. >>Hello. In this demo, we will cover the deployment of additional regional management. Cluster will include a brief architectures of you how to set up the management environment, prepare for the deployment deployment overview and then just to prove it, to play a regional child cluster. So, looking at the overall architecture, the management cluster provides all the core functionality, including identity management, authentication, inventory and release version. ING Regional Cluster provides the specific architecture provider in this case AWS on the LCN components on the D you speak Cluster for child cluster is the cluster or clusters being deployed and managed? Okay, so why do you need a regional cluster? Different platform architectures, for example aws who have been stack even bare metal to simplify connectivity across multiple regions handle complexities like VPNs or one way connectivity through firewalls, but also help clarify availability zones. Yeah. Here we have a view of the regional cluster and how it connects to the management cluster on their components, including items like the LCN cluster Manager we also Machine Manager were held. Mandel are managed as well as the actual provider logic. Mhm. Okay, we'll begin by logging on Is the default administrative user writer. Okay, once we're in there, we'll have a look at the available clusters making sure we switch to the default project which contains the administration clusters. Here we can see the cars management cluster, which is the master controller. And you see, it only has three nodes, three managers, no workers. Okay, if we look at another regional cluster similar to what we're going to deploy now, also only has three managers once again, no workers. But as a comparison, here's a child cluster This one has three managers, but also has additional workers associate it to the cluster. All right, we need to connect. Tell bootstrap note. Preferably the same note that used to create the original management plaster. It's just on AWS, but I still want to machine. All right. A few things we have to do to make sure the environment is ready. First thing we're going to see go into route. We'll go into our releases folder where we have the kozberg struck on. This was the original bootstrap used to build the original management cluster. Yeah, we're going to double check to make sure our cube con figures there once again, the one created after the original customers created just double check. That cute conflict is the correct one. Does point to the management cluster. We're just checking to make sure that we can reach the images that everything is working. A condom. No damages waken access to a swell. Yeah. Next we're gonna edit the machine definitions. What we're doing here is ensuring that for this cluster we have the right machine definitions, including items like the am I. So that's found under the templates AWS directory. We don't need to edit anything else here. But we could change items like the size of the machines attempts. We want to use that The key items to ensure where you changed the am I reference for the junta image is the one for the region in this case AWS region for utilizing this was no construct deployment. We have to make sure we're pointing in the correct open stack images. Yeah, okay. Set the correct and my save file. Now we need to get up credentials again. When we originally created the bootstrap cluster, we got credentials from eight of the U. S. If we hadn't done this, we would need to go through the u A. W s set up. So we're just exporting the AWS access key and I d. What's important is CAAs aws enabled equals. True. Now we're sitting the region for the new regional cluster. In this case, it's Frankfurt on exporting our cube conflict that we want to use for the management cluster. When we looked at earlier Yeah, now we're exporting that. Want to call the cluster region Is Frank Foods Socrates Frankfurt yet trying to use something descriptive It's easy to identify. Yeah, and then after this, we'll just run the bootstrap script, which will complete the deployment for us. Bootstrap of the regional cluster is quite a bit quicker than the initial management clusters. There are fewer components to be deployed. Um, but to make it watchable, we've spent it up. So we're preparing our bootstrap cluster on the local bootstrap node. Almost ready on. We started preparing the instances at W s and waiting for that bastard and no to get started. Please. The best you nerd Onda. We're also starting to build the actual management machines they're now provisioning on. We've reached the point where they're actually starting to deploy. Dr. Enterprise, this is probably the longest face. Yeah, seeing the second that all the nerds will go from the player deployed. Prepare, prepare. Yeah, You'll see their status changes updates. He was the first night ready. Second, just applying second already. Both my time. No waiting from home control. Let's become ready. Removing cluster the management cluster from the bootstrap instance into the new cluster running the date of the U. S. All my stay. Ah, now we're playing Stockland. Switch over is done on. Done. Now I will build a child cluster in the new region very, very quickly to find the cluster will pick. Our new credential has shown up. We'll just call it Frankfurt for simplicity a key and customs to find. That's the machine. That cluster stop with three managers. Set the correct Am I for the region? Yeah, Do the same to add workers. There we go test the building. Yeah. Total bill of time Should be about fifteen minutes. Concedes in progress. It's going to expect this up a little bit. Check the events. We've created all the dependencies, machine instances, machines, a boat shortly. We should have a working cluster in Frankfurt region. Now almost a one note is ready from management. Two in progress. Yeah, on we're done. Clusters up and running. Yeah. >>Excellent. So at this point, we've now got that three tier structure that we talked about before the video. We got that management cluster that we do strapped in the first video. Now we have in this example to different regional clustering one in Frankfurt, one of one management was two different aws regions. And sitting on that you can do Strap up all those Doctor enterprise costumes that we want for our work clothes. >>Yeah, that's the key to this is to be able to have co resident with your actual application service enabled clusters the management co resident with it so that you can, you know, quickly access that he observation Elson Surfboard services like the graph, Ana and that sort of thing for your particular region. A supposed to having to lug back into the home. What did you call it when we started >>the mothership? >>The mothership. Right. So we don't have to go back to the mother ship. We could get >>it locally. Yeah, when, like to that point of aggregating things under a single pane of glass? That's one thing that again kind of sailed by in the demo really quickly. But you'll notice all your different clusters were on that same cluster. Your pain on your doctor Enterprise Container Cloud management. Uh, court. Right. So both your child clusters for running workload and your regional clusters for bootstrapping. Those child clusters were all listed in the same place there. So it's just one pane of glass to go look for, for all of your clusters, >>right? And, uh, this is kind of an important point. I was, I was realizing, as we were going through this. All of the mechanics are actually identical between the bootstrapped cluster of the original services and the bootstrapped cluster of the regional services. It's the management layer of everything so that you only have managers, you don't have workers and that at the child cluster layer below the regional or the management cluster itself, that's where you have the worker nodes. And those are the ones that host the application services in that three tiered architecture that we've now defined >>and another, you know, detail for those that have sharp eyes. In that video, you'll notice when deploying a child clusters. There's not on Lee. A minimum of three managers for high availability management cluster. You must have at least two workers that's just required for workload failure. It's one of those down get out of work. They could potentially step in there, so your minimum foot point one of these child clusters is fine. Violence and scalable, obviously, from a >>That's right. >>Let's take a quick peek of the questions here, see if there's anything we want to call out, then we move on to our last want to my last video. There's another question here about, like where these clusters can live. So again, I know these examples are very aws heavy. Honestly, it's just easy to set up down on the other us. We could do things on bare metal and, uh, open stack departments on Prem. That's what all of this still works in exactly the same way. >>Yeah, the, uh, key to this, especially for the the, uh, child clusters, is the provision hers? Right? See you establish on AWS provision or you establish a bare metal provision or you establish a open stack provision. Or and eventually that list will include all of the other major players in the cloud arena. But you, by selecting the provision or within your management interface, that's where you decide where it's going to be hosted, where the child cluster is to be hosted. >>Speaking off all through a child clusters. Let's jump into our last video in the Siri's, where we'll see how to spin up a child cluster on bare metal. >>Hello. This demo will cover the process of defining bare metal hosts and then review the steps of defining and deploying a bare metal based doctor enterprise cluster. So why bare metal? Firstly, it eliminates hyper visor overhead with performance boost of up to thirty percent. Provides direct access to GP use, prioritize for high performance wear clothes like machine learning and AI, and supports high performance workloads like network functions, virtualization. It also provides a focus on on Prem workloads, simplifying and ensuring we don't need to create the complexity of adding another opera visor. Lay it between so continue on the theme Why Communities and bare metal again Hyper visor overhead. Well, no virtualization overhead. Direct access to hardware items like F p G A s G p us. We can be much more specific about resource is required on the nodes. No need to cater for additional overhead. Uh, we can handle utilization in the scheduling. Better Onda we increase the performances and simplicity of the entire environment as we don't need another virtualization layer. Yeah, In this section will define the BM hosts will create a new project will add the bare metal hosts, including the host name. I put my credentials I pay my address the Mac address on then provide a machine type label to determine what type of machine it is for later use. Okay, let's get started. So well again. Was the operator thing. We'll go and we'll create a project for our machines to be a member off helps with scoping for later on for security. I begin the process of adding machines to that project. Yeah. So the first thing we had to be in post, Yeah, many of the machine A name. Anything you want, que experimental zero one. Provide the IAP my user name type my password. Okay. On the Mac address for the common interface with the boot interface and then the i p m I i p address These machines will be at the time storage worker manager. He's a manager. Yeah, we're gonna add a number of other machines on will. Speed this up just so you could see what the process looks like in the future. Better discovery will be added to the product. Okay. Okay. Getting back there we have it are Six machines have been added, are busy being inspected, being added to the system. Let's have a look at the details of a single note. Yeah, you can see information on the set up of the node. Its capabilities? Yeah. As well as the inventory information about that particular machine. I see. Okay, let's go and create the cluster. Yeah, So we're going to deploy a bare metal child cluster. The process we're going to go through is pretty much the same as any other child cluster. So we'll credit custom. We'll give it a name, but if it were selecting bare metal on the region, we're going to select the version we want to apply. No way. We're going to add this search keys. If we hope we're going to give the load. Balancer host I p that we'd like to use out of dress range on update the address range that we want to use for the cluster. Check that the sea ideal blocks for the Cuban ladies and tunnels are what we want them to be. Enable disabled stack light. Yeah, and soothe stack light settings to find the cluster. And then, as for any other machine, we need to add machines to the cluster. Here. We're focused on building communities clusters, so we're gonna put the count of machines. You want managers? We're gonna pick the label type manager and create three machines is the manager for the Cuban eighties. Casting Okay thing. We're having workers to the same. It's a process. Just making sure that the worker label host level are I'm sorry. On when Wait for the machines to deploy. Let's go through the process of putting the operating system on the notes validating and operating system deploying doctor identifies Make sure that the cluster is up and running and ready to go. Okay, let's review the bold events waken See the machine info now populated with more information about the specifics of things like storage and of course, details of a cluster etcetera. Yeah, yeah, well, now watch the machines go through the various stages from prepared to deploy on what's the cluster build? And that brings us to the end of this particular demo. You can see the process is identical to that of building a normal child cluster we got our complaint is complete. >>All right, so there we have it, deploying a cluster to bare metal. Much the same is how we did for AWS. I guess maybe the biggest different stepwise there is there is that registration face first, right? So rather than just using AWS financials toe magically create PM's in the cloud. You got a point out all your bare metal servers to Dr Enterprise between the cloud and they really come in, I guess three profiles, right? You got your manager profile with a profile storage profile which has been labeled as allocate. Um, crossword cluster has appropriate, >>right? And And I think that the you know, the key differentiator here is that you have more physical control over what, uh, attributes that love your cat, by the way, uh, where you have the different attributes of a server of physical server. So you can, uh, ensure that the SSD configuration on the storage nodes is gonna be taken advantage of in the best way the GP use on the worker nodes and and that the management layer is going to have sufficient horsepower to, um, spin up to to scale up the the environments, as required. One of the things I wanted to mention, though, um, if I could get this out without the choking much better. Um, is that Ah, hey, mentioned the load balancer and I wanted to make sure in defining the load balancer and the load balancer ranges. Um, that is for the top of the the cluster itself. That's the operations of the management, uh, layer integrating with your systems internally to be able to access the the Cube Can figs. I I p address the, uh, in a centralized way. It's not the load balancer that's working within the kubernetes cluster that you are deploying. That's still cube proxy or service mesh, or however you're intending to do it. So, um, it's kind of an interesting step that your initial step in building this, um and we typically use things like metal L B or in gen X or that kind of thing is to establish that before we deploy this bear mental cluster so that it can ride on top of that for the tips and things. >>Very cool. So any other thoughts on what we've seen so far today? Bruce, we've gone through all the different layers. Doctor enterprise container clouds in these videos from our management are regional to our clusters on aws hand bear amount, Of course, with his dad is still available. Closing thoughts before we take just a very short break and run through these demos again. >>You know, I've been very exciting. Ah, doing the presentation with you. I'm really looking forward to doing it the second time, so that we because we've got a good rhythm going about this kind of thing. So I'm looking forward to doing that. But I think that the key elements of what we're trying to convey to the folks out there in the audience that I hope you've gotten out of it is that will that this is an easy enough process that if you follow the step by steps going through the documentation that's been put out in the chat, um, that you'll be able to give this a go yourself, Um, and you don't have to limit yourself toe having physical hardware on prim to try it. You could do it in a ws as we've shown you today. And if you've got some fancy use cases like, uh, you you need a Hadoop And and, uh, you know, cloud oriented ai stuff that providing a bare metal service helps you to get there very fast. So right. Thank you. It's been a pleasure. >>Yeah, thanks everyone for coming out. So, like I said we're going to take a very short, like, three minute break here. Uh, take the opportunity to let your colleagues know if they were in another session or they didn't quite make it to the beginning of this session. Or if you just want to see these demos again, we're going to kick off this demo. Siri's again in just three minutes at ten. Twenty five a. M. Pacific time where we will see all this great stuff again. Let's take a three minute break. I'll see you all back here in just two minutes now, you know. Okay, folks, that's the end of our extremely short break. We'll give people just maybe, like one more minute to trickle in if folks are interested in coming on in and jumping into our demo. Siri's again. Eso For those of you that are just joining us now I'm Bill Mills. I head up curriculum development for the training team here. Moran Tous on Joining me for this session of demos is Bruce. Don't you go ahead and introduce yourself doors, who is still on break? That's cool. We'll give Bruce a minute or two to get back while everyone else trickles back in. There he is. Hello, Bruce. >>How'd that go for you? Okay, >>Very well. So let's kick off our second session here. I e just interest will feel for you. Thio. Let it run over here. >>Alright. Hi. Bruce Matthews here. I'm the Western Regional Solutions architect for Marantz. Use A I'm the one with the gray hair and the glasses. Uh, the handsome one is Bill. So, uh, Bill, take it away. >>Excellent. So over the next hour or so, we've got a Siris of demos that's gonna walk you through your first steps with Dr Enterprise Container Cloud Doctor Enterprise Container Cloud is, of course, Miranda's brand new offering from bootstrapping kubernetes clusters in AWS bare metal open stack. And for the providers in the very near future. So we we've got, you know, just just over an hour left together on this session, uh, if you joined us at the top of the hour back at nine. A. M. Pacific, we went through these demos once already. Let's do them again for everyone else that was only able to jump in right now. Let's go. Our first video where we're gonna install Dr Enterprise container cloud for the very first time and use it to bootstrap management. Cluster Management Cluster, as I like to describe it, is our mother ship that's going to spin up all the other kubernetes clusters, Doctor Enterprise clusters that we're gonna run our workloads on. So I'm gonna do >>I'm so excited. I can hardly wait. >>Let's do it all right to share my video out here. Yeah, let's do it. >>Good day. The focus for this demo will be the initial bootstrap of the management cluster on the first regional clusters. To support AWS deployments, the management cluster provides the core functionality, including identity management, authentication, infantry release version. The regional cluster provides the specific architecture provided in this case AWS and the Elsom components on the UCP cluster Child cluster is the cluster or clusters being deployed and managed. The deployment is broken up into five phases. The first phase is preparing a bootstrap note on its dependencies on handling the download of the bridge struck tools. The second phase is obtaining America's license file. Third phase. Prepare the AWS credentials instead of the ideas environment, the fourth configuring the deployment, defining things like the machine types on the fifth phase, Run the bootstrap script and wait for the deployment to complete. Okay, so here we're sitting up the strap node. Just checking that it's clean and clear and ready to go there. No credentials already set up on that particular note. Now, we're just checking through aws to make sure that the account we want to use we have the correct credentials on the correct roles set up on validating that there are no instances currently set up in easy to instance, not completely necessary, but just helps keep things clean and tidy when I am perspective. Right. So next step, we're just gonna check that we can from the bootstrap note, reach more antis, get to the repositories where the various components of the system are available. They're good. No areas here. Yeah, right now we're going to start sitting at the bootstrap note itself. So we're downloading the cars release, get get cars, script, and then next we're going to run it. Yeah, I've been deployed changing into that big struck folder, just making see what's there right now we have no license file, so we're gonna get the license filed. Okay? Get the license file through more antis downloads site signing up here, downloading that license file and putting it into the Carisbrook struck folder. Okay, since we've done that, we can now go ahead with the rest of the deployment. Yeah, see what the follow is there? Uh huh. Once again, checking that we can now reach E C two, which is extremely important for the deployment. Just validation steps as we move through the process. Alright. Next big step is violating all of our AWS credentials. So the first thing is, we need those route credentials which we're going to export on the command line. This is to create the necessary bootstrap user on AWS credentials for the completion off the deployment we're now running in AWS policy create. So it is part of that is creating our food trucks script. Creating this through policy files onto the AWS, just generally preparing the environment using a cloud formation script, you'll see in a second, I'll give a new policy confirmations just waiting for it to complete. And there is done. It's gonna have a look at the AWS console. You can see that we're creative completed. Now we can go and get the credentials that we created. Good day. I am console. Go to the new user that's being created. We'll go to the section on security credentials and creating new keys. Download that information media access Key I. D and the secret access key, but usually then exported on the command line. Okay, Couple of things to Notre. Ensure that you're using the correct AWS region on ensure that in the conflict file you put the correct Am I in for that region? I'm sure you have it together in a second. Okay, thanks. Is key. So you could X key Right on. Let's kick it off. So this process takes between thirty and forty five minutes. Handles all the AWS dependencies for you. Um, as we go through, the process will show you how you can track it. Andi will start to see things like the running instances being created on the AWS side. The first phase off this whole process happening in the background is the creation of a local kind based bootstrapped cluster on the bootstrap node that clusters then used to deploy and manage all the various instances and configurations within AWS at the end of the process. That cluster is copied into the new cluster on AWS and then shut down that local cluster essentially moving itself over. Yeah, okay. Local clusters boat. Just waiting for the various objects to get ready. Standard communities objects here. Yeah, you mentioned Yeah. So we've speed up this process a little bit just for demonstration purposes. Okay, there we go. So first note is being built the bastion host just jump box that will allow us access to the entire environment. Yeah, In a few seconds, we'll see those instances here in the US console on the right. Um, the failures that you're seeing around failed to get the I. P for Bastian is just the weight state while we wait for AWS to create the instance. Okay. Yeah. Beauty there. Movies. Okay, sketch. Hello? Yeah, Okay. Okay. On. There we go. Question host has been built on three instances for the management clusters have now been created. Okay, We're going through the process of preparing. Those nodes were now copying everything over. See that scaling up of controllers in the big strapped cluster? It's indicating that we're starting all of the controllers in the new question. Almost there. Right? Okay. Just waiting for key. Clark. Uh huh. So finish up. Yeah. No. Now we're shutting down. Control this on the local bootstrap node on preparing our I. D. C configuration, fourth indication. So once this is completed, the last phase will be to deploy stack light into the new cluster, that glass on monitoring tool set, Then we go stack like deployment has started. Mhm. Coming to the end of the deployment mountain. Yeah, they were cut final phase of the deployment. And we are done. Yeah, you'll see. At the end, they're providing us the details of you. I log in. So there's a key Clark log in. Uh, you can modify that initial default possible is part of the configuration set up where they were in the documentation way. Go Councils up way can log in. Yeah. Yeah. Thank you very much for watching. >>All right, so at this point, what we have we got our management cluster spun up, ready to start creating work clusters. So just a couple of points to clarify there to make sure everyone caught that, uh, as advertised. That's darker. Enterprise container cloud management cluster. That's not rework loans. are gonna go right? That is the tool and you're gonna use to start spinning up downstream commodity documentary prize clusters for bootstrapping record too. >>And the seed host that were, uh, talking about the kind cluster dingy actually doesn't have to exist after the bootstrap succeeds eso It's sort of like, uh, copies head from the seed host Toothy targets in AWS spins it up it then boots the the actual clusters and then it goes away too, because it's no longer necessary >>so that bootstrapping know that there's not really any requirements, Hardly on that, right. It just has to be able to reach aws hit that Hit that a p I to spin up those easy to instances because, as you just said, it's just a kubernetes in docker cluster on that piece. Drop note is just gonna get torn down after the set up finishes on. You no longer need that. Everything you're gonna do, you're gonna drive from the single pane of glass provided to you by your management cluster Doctor enterprise Continue cloud. Another thing that I think is sort of interesting their eyes that the convict is fairly minimal. Really? You just need to provide it like aws regions. Um, am I? And that's what is going to spin up that spending that matter faster. >>Right? There is a mammal file in the bootstrap directory itself, and all of the necessary parameters that you would fill in have default set. But you have the option then of going in and defining a different Am I different for a different region, for example? Oh, are different. Size of instance from AWS. >>One thing that people often ask about is the cluster footprint. And so that example you saw they were spitting up a three manager, um, managing cluster as mandatory, right? No single manager set up at all. We want high availability for doctrine Enterprise Container Cloud management. Like so again, just to make sure everyone sort of on board with the life cycle stage that we're at right now. That's the very first thing you're going to do to set up Dr Enterprise Container Cloud. You're going to do it. Hopefully exactly once. Right now, you've got your management cluster running, and they're gonna use that to spend up all your other work clusters Day today has has needed How do we just have a quick look at the questions and then lets take a look at spinning up some of those child clusters. >>Okay, e think they've actually been answered? >>Yeah, for the most part. One thing I'll point out that came up again in the Dail, helpfully pointed out earlier in surgery, pointed out again, is that if you want to try any of the stuff yourself, it's all of the dogs. And so have a look at the chat. There's a links to instructions, so step by step instructions to do each and every thing we're doing here today yourself. I really encourage you to do that. Taking this out for a drive on your own really helps internalizing communicate these ideas after the after launch pad today, Please give this stuff try on your machines. Okay, So at this point, like I said, we've got our management cluster. We're not gonna run workloads there that we're going to start creating child clusters. That's where all of our work and we're gonna go. That's what we're gonna learn how to do in our next video. Cue that up for us. >>I so love Shawn's voice. >>Wasn't that all day? >>Yeah, I watched him read the phone book. >>All right, here we go. Let's now that we have our management cluster set up, let's create a first child work cluster. >>Hello. In this demo, we will cover the deployment experience of creating a new child cluster the scaling of the cluster on how to update the cluster. When a new version is available, we begin the process by logging onto the you I as a normal user called Mary. Let's go through the navigation of the u I. So you can switch Project Mary only has access to development. Uh huh. Get a list of the available projects that you have access to. What clusters have been deployed at the moment there. Man. Yes, this H keys, Associate ID for Mary into her team on the cloud credentials that allow you to create or access the various clouds that you can deploy clusters to finally different releases that are available to us. We can switch from dark mode to light mode, depending on your preferences. Right. Let's now set up some ssh keys for Mary so she can access the notes and machines again. Very simply, had Mississippi key give it a name. We copy and paste our public key into the upload key block. Or we can upload the key if we have the file available on our machine. A very simple process. So to create a new cluster, we define the cluster ad management nodes and add worker nodes to the cluster. Yeah, again, very simply, we got the clusters tab we had to create cluster button. Give the cluster name. Yeah, Andi, select the provider. We only have access to AWS in this particular deployment, so we'll stick to AWS. What's like the region in this case? US West one released version five point seven is the current release Onda Attach. Mary's Key is necessary key. We can then check the rest of the settings, confirming the provider any kubernetes c r D a r i p address information. We can change this. Should we wish to? We'll leave it default for now and then what components of stack light? I would like to deploy into my custom for this. I'm enabling stack light on logging, and I consider the retention sizes attention times on. Even at this stage, add any custom alerts for the watchdogs. Consider email alerting which I will need my smart host. Details and authentication details. Andi Slack Alerts. Now I'm defining the cluster. All that's happened is the cluster's been defined. I now need to add machines to that cluster. I'll begin by clicking the create machine button within the cluster definition. Oh, select manager, Select the number of machines. Three is the minimum. Select the instant size that I'd like to use from AWS and very importantly, ensure correct. Use the correct Am I for the region. I convinced side on the route. Device size. There we go. My three machines are busy creating. I now need to add some workers to this cluster. So I go through the same process this time once again, just selecting worker. I'll just add to once again the am I is extremely important. Will fail if we don't pick the right. Am I for a Clinton machine? In this case and the deployment has started, we can go and check on the bold status are going back to the clusters screen on clicking on the little three dots on the right. We get the cluster info and the events, so the basic cluster info you'll see pending their listen. Cluster is still in the process of being built. We kick on, the events will get a list of actions that have been completed This part of the set up of the cluster. So you can see here. We've created the VPC. We've created the sub nets on. We've created the Internet Gateway. It's unnecessary made of us. And we have no warnings of the stage. Okay, this will then run for a while. We have one minute past. We can click through. We can check the status of the machine balls as individuals so we can check the machine info, details of the machines that we've assigned mhm and see any events pertaining to the machine areas like this one on normal. Yeah. Just last. The community's components are waiting for the machines to start. Go back to customers. Okay, right. Because we're moving ahead now. We can see we have it in progress. Five minutes in new Matt Gateway. And at this stage, the machines have been built on assigned. I pick up the U S. Yeah, yeah, yeah. There we go. Machine has been created. See the event detail and the AWS. I'd for that machine. No speeding things up a little bit this whole process and to end takes about fifteen minutes. Run the clock forward, you'll notice is the machines continue to bold the in progress. We'll go from in progress to ready. A soon as we got ready on all three machines, the managers on both workers way could go on and we could see that now we reached the point where the cluster itself is being configured mhm and then we go. Cluster has been deployed. So once the classes deployed, we can now never get around. Our environment are looking into configure cluster. We could modify their cluster. We could get the end points for alert Alert Manager See here the griffon occupying and Prometheus are still building in the background but the cluster is available on You would be able to put workloads on it at this stage to download the cube conflict so that I can put workloads on it. It's again the three little dots in the right for that particular cluster. If the download cube conflict give it my password, I now have the Q conflict file necessary so that I can access that cluster. All right, Now that the build is fully completed, we can check out cluster info on. We can see that all the satellite components have been built. All the storage is there, and we have access to the CPU. I. So if we click into the cluster, we can access the UCP dashboard, click the signing with the clock button to use the SSO. We give Mary's possible to use the name once again. Thing is an unlicensed cluster way could license at this point. Or just skip it on. Do we have the UCP dashboard? You could see that has been up for a little while. We have some data on the dashboard going back to the console. We can now go to the griffon. A data just been automatically pre configured for us. We can switch and utilized a number of different dashboards that have already been instrumented within the cluster. So, for example, communities cluster information, the name spaces, deployments, nodes. Um, so we look at nodes. If we could get a view of the resource is utilization of Mrs Custer is very little running in it. Yeah, a general dashboard of Cuba Navies cluster. What If this is configurable, you can modify these for your own needs, or add your own dashboards on de scoped to the cluster. So it is available to all users who have access to this specific cluster. All right to scale the cluster on to add a No. This is simple. Is the process of adding a mode to the cluster, assuming we've done that in the first place. So we go to the cluster, go into the details for the cluster we select, create machine. Once again, we need to be ensure that we put the correct am I in and any other functions we like. You can create different sized machines so it could be a larger node. Could be bigger group disks and you'll see that worker has been added in the provisioning state. On shortly, we will see the detail off that worker as a complete to remove a note from a cluster. Once again, we're going to the cluster. We select the node we would like to remove. Okay, I just hit delete On that note. Worker nodes will be removed from the cluster using according and drawing method to ensure that your workloads are not affected. Updating a cluster. When an update is available in the menu for that particular cluster, the update button will become available. And it's a simple as clicking the button validating which release you would like to update to this case. This available releases five point seven point one give you I'm kicking the update back in the background. We will coordinate. Drain each node slowly, go through the process of updating it. Andi update will complete depending on what the update is as quickly as possible. Who we go. The notes being rebuilt in this case impacted the manager node. So one of the manager nodes is in the process of being rebuilt. In fact, to in this case, one has completed already. Yeah, and in a few minutes, we'll see that the upgrade has been completed. There we go. Great. Done. If you work loads of both using proper cloud native community standards, there will be no impact. >>All right, there. We haven't. We got our first workload cluster spun up and managed by Dr Enterprise Container Cloud. So I I loved Shawn's classic warning there. When you're spinning up an actual doctor enterprise deployment, you see little errors and warnings popping up. Just don't touch it. Just leave it alone and let Dr Enterprises self healing properties take care of all those very transient temporary glitches, resolve themselves and leave you with a functioning workload cluster within victims. >>And now, if you think about it that that video was not very long at all. And that's how long it would take you if someone came into you and said, Hey, can you spend up a kubernetes cluster for development development A. Over here, um, it literally would take you a few minutes to thio Accomplish that. And that was with a W s. Obviously, which is sort of, ah, transient resource in the cloud. But you could do exactly the same thing with resource is on Prem or resource is, um physical resource is and will be going through that later in the process. >>Yeah, absolutely one thing that is present in that demo, but that I like to highlight a little bit more because it just kind of glides by Is this notion of, ah, cluster release? So when Sean was creating that cluster, and also when when he was upgrading that cluster, he had to choose a release. What does that didn't really explain? What does that mean? Well, in Dr Enterprise Container Cloud, we have released numbers that capture the entire staff of container ization tools that will be deploying to that workload costume. So that's your version of kubernetes sed cor DNs calico. Doctor Engineer. All the different bits and pieces that not only work independently but are validated toe work together as a staff appropriate for production, humanities, adopted enterprise environments. >>Yep. From the bottom of the stack to the top, we actually test it for scale. Test it for CVS, test it for all of the various things that would, you know, result in issues with you running the application services. And I've got to tell you from having, you know, managed kubernetes deployments and things like that that if you're the one doing it yourself, it can get rather messy. Eso This makes it easy. >>Bruce, you were staying a second ago. They I'll take you at least fifteen minutes to install your release. Custer. Well, sure, but what would all the other bits and pieces you need toe? Not just It's not just about pressing the button to install it, right? It's making the right decision. About what components work? Well, our best tested toe be successful working together has a staff? Absolutely. We this release mechanism and Dr Enterprise Container Cloud. Let's just kind of package up that expert knowledge and make it available in a really straightforward, fashionable species. Uh, pre Confederate release numbers and Bruce is you're pointing out earlier. He's got delivered to us is updates kind of transparent period. When when? When Sean wanted toe update that cluster, he created little update. Custer Button appeared when an update was available. All you gotta do is click. It tells you what Here's your new stack of communities components. It goes ahead. And the straps those components for you? >>Yeah, it actually even displays at the top of the screen. Ah, little header That says you've got an update available. Do you want me to apply? It s o >>Absolutely. Another couple of cool things. I think that are easy to miss in that demo was I really like the on board Bafana that comes along with this stack. So we've been Prometheus Metrics and Dr Enterprise for years and years now. They're very high level. Maybe in in previous versions of Dr Enterprise having those detailed dashboards that Ravana provides, I think that's a great value out there. People always wanted to be ableto zoom in a little bit on that, uh, on those cluster metrics, you're gonna provides them out of the box for us. Yeah, >>that was Ah, really, uh, you know, the joining of the Miranda's and Dr teams together actually spawned us to be able to take the best of what Morantes had in the open stack environment for monitoring and logging and alerting and to do that integration in in a very short period of time so that now we've got it straight across the board for both the kubernetes world and the open stack world. Using the same tool sets >>warm. One other thing I wanna point out about that demo that I think there was some questions about our last go around was that demo was all about creating a managed workplace cluster. So the doctor enterprise Container Cloud managers were using those aws credentials provisioned it toe actually create new e c two instances installed Docker engine stalled. Doctor Enterprise. Remember all that stuff on top of those fresh new VM created and managed by Dr Enterprise contain the cloud. Nothing unique about that. AWS deployments do that on open staff doing on Parramatta stuff as well. Um, there's another flavor here, though in a way to do this for all of our long time doctor Enterprise customers that have been running Doctor Enterprise for years and years. Now, if you got existing UCP points existing doctor enterprise deployments, you plug those in to Dr Enterprise Container Cloud, uh, and use darker enterprise between the cloud to manage those pre existing Oh, working clusters. You don't always have to be strapping straight from Dr Enterprises. Plug in external clusters is bad. >>Yep, the the Cube config elements of the UCP environment. The bundling capability actually gives us a very straightforward methodology. And there's instructions on our website for exactly how thio, uh, bring in import and you see p cluster. Um so it it makes very convenient for our existing customers to take advantage of this new release. >>Absolutely cool. More thoughts on this wonders if we jump onto the next video. >>I think we should move press on >>time marches on here. So let's Let's carry on. So just to recap where we are right now, first video, we create a management cluster. That's what we're gonna use to create All our downstream were closed clusters, which is what we did in this video. Let's maybe the simplest architectures, because that's doing everything in one region on AWS pretty common use case because we want to be able to spin up workload clusters across many regions. And so to do that, we're gonna add a third layer in between the management and work cluster layers. That's gonna be our regional cluster managers. So this is gonna be, uh, our regional management cluster that exists per region that we're going to manage those regional managers will be than the ones responsible for spending part clusters across all these different regions. Let's see it in action in our next video. >>Hello. In this demo, we will cover the deployment of additional regional management. Cluster will include a brief architectural overview, how to set up the management environment, prepare for the deployment deployment overview, and then just to prove it, to play a regional child cluster. So looking at the overall architecture, the management cluster provides all the core functionality, including identity management, authentication, inventory and release version. ING Regional Cluster provides the specific architecture provider in this case, AWS on the L C M components on the d you speak cluster for child cluster is the cluster or clusters being deployed and managed? Okay, so why do you need original cluster? Different platform architectures, for example AWS open stack, even bare metal to simplify connectivity across multiple regions handle complexities like VPNs or one way connectivity through firewalls, but also help clarify availability zones. Yeah. Here we have a view of the regional cluster and how it connects to the management cluster on their components, including items like the LCN cluster Manager. We also machine manager. We're hell Mandel are managed as well as the actual provider logic. Okay, we'll begin by logging on Is the default administrative user writer. Okay, once we're in there, we'll have a look at the available clusters making sure we switch to the default project which contains the administration clusters. Here we can see the cars management cluster, which is the master controller. When you see it only has three nodes, three managers, no workers. Okay, if we look at another regional cluster, similar to what we're going to deploy now. Also only has three managers once again, no workers. But as a comparison is a child cluster. This one has three managers, but also has additional workers associate it to the cluster. Yeah, all right, we need to connect. Tell bootstrap note, preferably the same note that used to create the original management plaster. It's just on AWS, but I still want to machine Mhm. All right, A few things we have to do to make sure the environment is ready. First thing we're gonna pseudo into route. I mean, we'll go into our releases folder where we have the car's boot strap on. This was the original bootstrap used to build the original management cluster. We're going to double check to make sure our cube con figures there It's again. The one created after the original customers created just double check. That cute conflict is the correct one. Does point to the management cluster. We're just checking to make sure that we can reach the images that everything's working, condone, load our images waken access to a swell. Yeah, Next, we're gonna edit the machine definitions what we're doing here is ensuring that for this cluster we have the right machine definitions, including items like the am I So that's found under the templates AWS directory. We don't need to edit anything else here, but we could change items like the size of the machines attempts we want to use but the key items to ensure where changed the am I reference for the junta image is the one for the region in this case aws region of re utilizing. This was an open stack deployment. We have to make sure we're pointing in the correct open stack images. Yeah, yeah. Okay. Sit the correct Am I save the file? Yeah. We need to get up credentials again. When we originally created the bootstrap cluster, we got credentials made of the U. S. If we hadn't done this, we would need to go through the u A. W s set up. So we just exporting AWS access key and I d. What's important is Kaz aws enabled equals. True. Now we're sitting the region for the new regional cluster. In this case, it's Frankfurt on exporting our Q conflict that we want to use for the management cluster when we looked at earlier. Yeah, now we're exporting that. Want to call? The cluster region is Frankfurt's Socrates Frankfurt yet trying to use something descriptive? It's easy to identify. Yeah, and then after this, we'll just run the bootstrap script, which will complete the deployment for us. Bootstrap of the regional cluster is quite a bit quicker than the initial management clusters. There are fewer components to be deployed, but to make it watchable, we've spent it up. So we're preparing our bootstrap cluster on the local bootstrap node. Almost ready on. We started preparing the instances at us and waiting for the past, you know, to get started. Please the best your node, onda. We're also starting to build the actual management machines they're now provisioning on. We've reached the point where they're actually starting to deploy Dr Enterprise, he says. Probably the longest face we'll see in a second that all the nodes will go from the player deployed. Prepare, prepare Mhm. We'll see. Their status changes updates. It was the first word ready. Second, just applying second. Grady, both my time away from home control that's become ready. Removing cluster the management cluster from the bootstrap instance into the new cluster running a data for us? Yeah, almost a on. Now we're playing Stockland. Thanks. Whichever is done on Done. Now we'll build a child cluster in the new region very, very quickly. Find the cluster will pick our new credential have shown up. We'll just call it Frankfurt for simplicity. A key on customers to find. That's the machine. That cluster stop with three manages set the correct Am I for the region? Yeah, Same to add workers. There we go. That's the building. Yeah. Total bill of time. Should be about fifteen minutes. Concedes in progress. Can we expect this up a little bit? Check the events. We've created all the dependencies, machine instances, machines. A boat? Yeah. Shortly. We should have a working caster in the Frankfurt region. Now almost a one note is ready from management. Two in progress. On we're done. Trust us up and running. >>Excellent. There we have it. We've got our three layered doctor enterprise container cloud structure in place now with our management cluster in which we scrap everything else. Our regional clusters which manage individual aws regions and child clusters sitting over depends. >>Yeah, you can. You know you can actually see in the hierarchy the advantages that that presents for folks who have multiple locations where they'd like a geographic locations where they'd like to distribute their clusters so that you can access them or readily co resident with your development teams. Um and, uh, one of the other things I think that's really unique about it is that we provide that same operational support system capability throughout. So you've got stack light monitoring the stack light that's monitoring the stack light down to the actual child clusters that they have >>all through that single pane of glass that shows you all your different clusters, whether their workload cluster like what the child clusters or usual clusters from managing different regions. Cool. Alright, well, time marches on your folks. We've only got a few minutes left and I got one more video in our last video for the session. We're gonna walk through standing up a child cluster on bare metal. So so far, everything we've seen so far has been aws focus. Just because it's kind of easy to make that was on AWS. We don't want to leave you with the impression that that's all we do, we're covering AWS bare metal and open step deployments as well documented Craftsman Cloud. Let's see it in action with a bare metal child cluster. >>We are on the home stretch, >>right. >>Hello. This demo will cover the process of defining bare metal hosts and then review the steps of defining and deploying a bare metal based doctor enterprise cluster. Yeah, so why bare metal? Firstly, it eliminates hyper visor overhead with performance boost of up to thirty percent provides direct access to GP use, prioritize for high performance wear clothes like machine learning and AI, and support high performance workouts like network functions, virtualization. It also provides a focus on on Prem workloads, simplifying and ensuring we don't need to create the complexity of adding another hyper visor layer in between. So continuing on the theme Why communities and bare metal again Hyper visor overhead. Well, no virtualization overhead. Direct access to hardware items like F p g A s G p, us. We can be much more specific about resource is required on the nodes. No need to cater for additional overhead. We can handle utilization in the scheduling better Onda. We increase the performance and simplicity of the entire environment as we don't need another virtualization layer. Yeah, In this section will define the BM hosts will create a new project. Will add the bare metal hosts, including the host name. I put my credentials. I pay my address, Mac address on, then provide a machine type label to determine what type of machine it is. Related use. Okay, let's get started Certain Blufgan was the operator thing. We'll go and we'll create a project for our machines to be a member off. Helps with scoping for later on for security. I begin the process of adding machines to that project. Yeah. Yeah. So the first thing we had to be in post many of the machine a name. Anything you want? Yeah, in this case by mental zero one. Provide the IAP My user name. Type my password? Yeah. On the Mac address for the active, my interface with boot interface and then the i p m i P address. Yeah, these machines. We have the time storage worker manager. He's a manager. We're gonna add a number of other machines on will speed this up just so you could see what the process. Looks like in the future, better discovery will be added to the product. Okay, Okay. Getting back there. We haven't Are Six machines have been added. Are busy being inspected, being added to the system. Let's have a look at the details of a single note. Mhm. We can see information on the set up of the node. Its capabilities? Yeah. As well as the inventory information about that particular machine. Okay, it's going to create the cluster. Mhm. Okay, so we're going to deploy a bare metal child cluster. The process we're going to go through is pretty much the same as any other child cluster. So credit custom. We'll give it a name. Thank you. But he thought were selecting bare metal on the region. We're going to select the version we want to apply on. We're going to add this search keys. If we hope we're going to give the load. Balancer host I p that we'd like to use out of the dress range update the address range that we want to use for the cluster. Check that the sea idea blocks for the communities and tunnels are what we want them to be. Enable disabled stack light and said the stack light settings to find the cluster. And then, as for any other machine, we need to add machines to the cluster. Here we're focused on building communities clusters. So we're gonna put the count of machines. You want managers? We're gonna pick the label type manager on create three machines. Is a manager for the Cuban a disgusting? Yeah, they were having workers to the same. It's a process. Just making sure that the worker label host like you are so yes, on Duin wait for the machines to deploy. Let's go through the process of putting the operating system on the notes, validating that operating system. Deploying Docker enterprise on making sure that the cluster is up and running ready to go. Okay, let's review the bold events. We can see the machine info now populated with more information about the specifics of things like storage. Yeah, of course. Details of a cluster, etcetera. Yeah, Yeah. Okay. Well, now watch the machines go through the various stages from prepared to deploy on what's the cluster build, and that brings us to the end of this particular do my as you can see the process is identical to that of building a normal child cluster we got our complaint is complete. >>Here we have a child cluster on bare metal for folks that wanted to play the stuff on Prem. >>It's ah been an interesting journey taken from the mothership as we started out building ah management cluster and then populating it with a child cluster and then finally creating a regional cluster to spread the geographically the management of our clusters and finally to provide a platform for supporting, you know, ai needs and and big Data needs, uh, you know, thank goodness we're now able to put things like Hadoop on, uh, bare metal thio in containers were pretty exciting. >>Yeah, absolutely. So with this Doctor Enterprise container cloud platform. Hopefully this commoditized scooping clusters, doctor enterprise clusters that could be spun up and use quickly taking provisioning times. You know, from however many months to get new clusters spun up for our teams. Two minutes, right. We saw those clusters gets better. Just a couple of minutes. Excellent. All right, well, thank you, everyone, for joining us for our demo session for Dr Enterprise Container Cloud. Of course, there's many many more things to discuss about this and all of Miranda's products. If you'd like to learn more, if you'd like to get your hands dirty with all of this content, police see us a training don Miranda's dot com, where we can offer you workshops and a number of different formats on our entire line of products and hands on interactive fashion. Thanks, everyone. Enjoy the rest of the launchpad of that >>thank you all enjoy.
SUMMARY :
So for the next couple of hours, I'm the Western regional Solutions architect for Moran At least somebody on the call knows something about your enterprise Computer club. And that's really the key to this thing is to provide some, you know, many training clusters so that by the end of the tutorial content today, I think that's that's pretty much what we had to nail down here. So the management costs was always We have to give this brief little pause of the management cluster in the first regional clusters to support AWS deployments. So in that video are wonderful field CTO Shauna Vera bootstrapped So primarily the foundation for being able to deploy So this cluster isn't yet for workloads. Read the phone book, So and just to make sure I understood The output that when it says I'm pivoting, I'm pivoting from on the bootstrap er go away afterwards. So that there's no dependencies on any of the clouds that get created thereafter. Yeah, that actually reminds me of how we bootstrapped doctor enterprise back in the day, The config file that that's generated the template is fairly straightforward We always insist on high availability for this management cluster the scenes without you having toe worry about it as a developer. Examples of that is the day goes on. either the the regional cluster or a We've got the management cluster, and we're gonna go straight with child cluster. as opposed to having to centralize thumb So just head on in, head on into the docks like the Dale provided here. That's going to be in a very near term I didn't wanna make promises for product, but I'm not too surprised that she's gonna be targeted. No, just that the fact that we're running through these individual So let's go to that video and see just how We can check the status of the machine bulls as individuals so we can check the machine the thing that jumped out to me at first Waas like the inputs that go into defining Yeah, and and And that's really the focus of our effort is to ensure that So at that point, once we started creating that workload child cluster, of course, we bootstrapped good old of the bootstrapping as well that the processes themselves are self healing, And the worst thing you could do is panic at the first warning and start tearing things that don't that then go out to touch slack and say hi, You need to watch your disk But Sean mentioned it on the video. And And the kubernetes, uh, scaling methodology is is he adhered So should we go to the questions. Um, that's kind of the point, right? you know, set up things and deploy your applications and things. that comes to us not from Dr Enterprise Container Cloud, but just from the underlying kubernetes distribution. to the standards that we would want to set to make sure that we're not overloading On the next video, we're gonna learn how to spin up a Yeah, Do the same to add workers. We got that management cluster that we do strapped in the first video. Yeah, that's the key to this is to be able to have co resident with So we don't have to go back to the mother ship. So it's just one pane of glass to the bootstrapped cluster of the regional services. and another, you know, detail for those that have sharp eyes. Let's take a quick peek of the questions here, see if there's anything we want to call out, then we move on to our last want all of the other major players in the cloud arena. Let's jump into our last video in the Siri's, So the first thing we had to be in post, Yeah, many of the machine A name. Much the same is how we did for AWS. nodes and and that the management layer is going to have sufficient horsepower to, are regional to our clusters on aws hand bear amount, Of course, with his dad is still available. that's been put out in the chat, um, that you'll be able to give this a go yourself, Uh, take the opportunity to let your colleagues know if they were in another session I e just interest will feel for you. Use A I'm the one with the gray hair and the glasses. And for the providers in the very near future. I can hardly wait. Let's do it all right to share my video So the first thing is, we need those route credentials which we're going to export on the command That is the tool and you're gonna use to start spinning up downstream It just has to be able to reach aws hit that Hit that a p I to spin up those easy to instances because, and all of the necessary parameters that you would fill in have That's the very first thing you're going to Yeah, for the most part. Let's now that we have our management cluster set up, let's create a first We can check the status of the machine balls as individuals so we can check the glitches, resolve themselves and leave you with a functioning workload cluster within exactly the same thing with resource is on Prem or resource is, All the different bits and pieces And I've got to tell you from having, you know, managed kubernetes And the straps those components for you? Yeah, it actually even displays at the top of the screen. I really like the on board Bafana that comes along with this stack. the best of what Morantes had in the open stack environment for monitoring and logging So the doctor enterprise Container Cloud managers were Yep, the the Cube config elements of the UCP environment. More thoughts on this wonders if we jump onto the next video. Let's maybe the simplest architectures, of the regional cluster and how it connects to the management cluster on their components, There we have it. that we provide that same operational support system capability Just because it's kind of easy to make that was on AWS. Just making sure that the worker label host like you are so yes, It's ah been an interesting journey taken from the mothership Enjoy the rest of the launchpad
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Mary | PERSON | 0.99+ |
Sean | PERSON | 0.99+ |
Sean O'Mara | PERSON | 0.99+ |
Bruce | PERSON | 0.99+ |
Frankfurt | LOCATION | 0.99+ |
three machines | QUANTITY | 0.99+ |
Bill Milks | PERSON | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
first video | QUANTITY | 0.99+ |
second phase | QUANTITY | 0.99+ |
Shawn | PERSON | 0.99+ |
first phase | QUANTITY | 0.99+ |
Three | QUANTITY | 0.99+ |
Two minutes | QUANTITY | 0.99+ |
three managers | QUANTITY | 0.99+ |
fifth phase | QUANTITY | 0.99+ |
Clark | PERSON | 0.99+ |
Bill Mills | PERSON | 0.99+ |
Dale | PERSON | 0.99+ |
Five minutes | QUANTITY | 0.99+ |
Nan | PERSON | 0.99+ |
second session | QUANTITY | 0.99+ |
Third phase | QUANTITY | 0.99+ |
Seymour | PERSON | 0.99+ |
Bruce Basil Matthews | PERSON | 0.99+ |
Moran Tous | PERSON | 0.99+ |
five minutes | QUANTITY | 0.99+ |
hundreds | QUANTITY | 0.99+ |