Image Title

Search Results for nancy wong:

Wayne Duso & Nancy Wang | AWS Storage Day 2022


 

>>Okay, we're back. My name is Dave Valante and this is the Cube's coverage of AWS storage day. You know, coming off of reinforc I wrote the, the cloud was a new layer of defense. In fact, the first line of defense in a cyber security strategy. And that brings new thinking and models for protecting data, data protection, specifically, traditionally thought of as backup and recovery, it's become a critical adjacency to security and a component of a comprehensive cybersecurity strategy. We're here in our studios outside of Boston with two cube alums, and we're gonna discuss this in other topics. Wayne do so is the vice president for AWS storage edge and data services, and Nancy Wong as general manager of AWS backup and data protection services, guys. Welcome. Great to see you again. Thanks for coming on. Of >>Course, always a pleasure, Dave. Good to >>See you, Dave. All right. So Wayne, let's talk about how organizations should be thinking about this term data protection. It's an expanding definition, isn't >>It? It is an expanding definition. They, last year we talked about data and the importance of data to companies. Every company is becoming a data company, you know, da the amount of data they generate, the amount of data they can use to create models, to do predictive analytics. And frankly, to find ways of innovating is, is grown rapidly. And, you know, there's this tension between access to all that data, right? Getting the value out of that data. And how do you secure that data? And so this is something we think about with customers all the time. So data durability, data protection, data resiliency, and, you know, trust in their data. If you think about running your organization on your data, trust in your data is so important. So, you know, you gotta trust where you're putting your data. You know, people who are putting their data on a platform need to trust that platform will in fact, ensure it's durability, security, resiliency. >>And, you know, we see ourselves AWS as a partner in securing their data, making their data dur durable, making their data resilient, right? So some of that responsibility is on us. Some of that is on so shared responsibility around data protection, data resiliency. And, you know, we think about forever, you know, the notion of, you know, compromise of your infrastructure, but more and more people think about the compromise of their data as data becomes more valuable. And in fact, data is a company's most valuable asset. We've talked about this before. Only second to their people. You know, the people that are most valuable asset, but right next to that is their data. So really important stuff. >>So Nancy, you talked to a lot of customers, but by the way, it always comes back to the data. We've saying this for years, haven't we? So you've got this expanding definition of data protection, you know, governance is in there. You, you think about access cetera. When you talk to customers, what are you hearing from them? How are they thinking about data protection? >>Yeah. So a lot of the customers that Wayne and I have spoken to often come to us seeking thought leadership about, you know, how do I solve this data challenge? How do I solve this data sprawl challenge, but also more importantly, tying it back to data protection and data resiliency is how do I make sure that data is secure, that it's protected against, let's say ransomware events, right. And continuously protected. So there's a lot of mental frameworks that come to mind and a very popular one that comes up in quite a few conversations is this cybersecurity framework, right? And from a data protection perspective is just as important to protect and recover your data as it is to be able to detect different events or be able to respond to those events. Right? So recently I was just having a conversation with a regulatory body of financial institutions in Europe, where we're designing a architecture that could help them make their data immutable, but also continuously protected. So taking a step back, that's really where I see AWS's role in that we provide a wide breadth of primitives to help customers build secure platforms and scaffolding so that they can focus on building the data protection, the data governance controls, and guardrails on top of that platform. >>And, and that's always been AWS's philosophy, you know, make sure that developers have access to those primitives and APIs so that they can move fast and, and essentially build their own if that that's in fact what they wanna do. And as you're saying, when data protection is now this adjacency to cyber security, but there's disaster recoveries in there, business continuance, cyber resilience, et cetera. So, so maybe you could pick up on that and sort of extend how you see AWS, helping customers build out those resilient services. >>Yeah. So, you know, two core pillars to a data protection strategy is around their data durability, which is really an infrastructure element. You know, it's, it's, it's, it's by and large the responsibility of the provider of that infrastructure to make sure that data's durable, cuz if it's not durable, everything else doesn't matter. And then the second pillar is really about data resiliency. So in terms of security, controls and governance, like these are really important, but these are shared responsibility. Like the customers working with us with the services that we provide are there to architect the design, it's really human factors and design factors that get them resiliency, >>Nancy, anything you would add to what Wayne just said. >>Yeah, absolutely. So customers tell us that they want always on data resiliency and data durability, right? So oftentimes in those conversations, three common themes come up, which is they want a centralized solution. They want to be able to transcribe their intent into what they end up doing with their data. And number three, they want something that's policy driven because once you centralize your policies, it's much better and easier to establish control and governance at an organizational level. So keeping that in mind with policy as our interface, there's two managed AWS solutions that I recommend you all check out in terms of data resiliency and data durability. Those are AWS backup, which is our centralized solution for managing protection recovery, and also provides an audit audit capability of how you protect your data across 15 different AWS services, as well as on-premises VMware and for customers whose mission critical data is contained entirely on disk. We also offer AWS elastic disaster recovery services, especially for customers who want to fail over their workloads from on premises to the cloud. >>So you can essentially centralize as a quick follow up, centralize the policy. And like I said, the intent, but you can support a federated data model cuz you're building out this massive, you know, global system, but you can take that policy and essentially bring it anywhere on the AWS cloud. Is that >>Right? Exactly. And actually one powerful integration I want to touch upon is that AWS backup is natively integrated with AWS organizations, which is our defacto multi account federated organization model for how AWS services work with customers, both in the cloud, on the edge, at the edge and on premises. >>So that's really important because as, as we talk about all the time on the cube, this notion of a, a decentralized data architecture data mesh, but the problem is how do you ensure governance and a federated model? So we're clearly moving in that direction. Wayne, I want to ask you about cyber as a board level discussion years ago, I interviewed Dr. Robert Gates, you know, former defense secretary and he sat on a number of boards and I asked him, you know, how important and prominent is security at the board level? Is it really a board level discussion? He said, absolutely. Every time we meet, we talk about cyber security, but not every company at the time, this was kind of early last decade was doing that. That's changed now. Ransomware is front and center. Hear about it all the time. What's AWS. What's your thinking on cyber as a board level discussion and specifically what are you guys doing around ran ransomware? >>Yeah. So, you know, malware in general, ransomware being a particular type of malware. Sure. It's a hot topic and it continues to be a hot topic. And whether at the board level, the C-suite level, I had a chance to listen to Dr. Gates a couple months ago and super motivational, but we think about ransomware and the same way that our customers do. Right? Cause all of us are subject to an incident. Nobody is immune to a ransomware incident. So we think very much the same way. And you, as Nancy said, along the lines of the, this framework, we really think about, you know, how do customers identify their critical access? How do they plan for protecting those assets, right? How do they make sure that they are in fact protected? And if they do detect the ransomware event and ransomware events come from a lot of different places, like there's not one signature, there's not one thumbprint, if you would for ransomware. >>So it's, it's, there's really a lot of vigilance that needs to be put in place, but a lot of planning that needs to be put in place. And once that's detected and a, a, we have to recover, you know, we know that we have to take an action and recover having that plan in place, making sure that your assets are fully protected and can be restored. As you know, ransomware is a insidious type of malware. You know, it sits in your system for a long time. It figures out what's going on, including your backup policies, your protection policies, and figures out how to get around those with some of the things that Nancy talked about in terms of air gaping, your capabilities, being able to, if you would scan your secondary, your backup storage for malware, knowing that it's a good copy. And then being able to restore from that known good copy in the event of an incident is critical. So we think about this for ourselves and the same way that we think about these for our customers. You gotta have a great plan. You gotta have great protection and you gotta be ready to restore in the case of an incident. And we wanna make sure we provide all the capabilities to do >>That. Yeah. So I'll glad you mentioned air gaping. So at the recent re reinforce, I think it was Kurt kufeld was speaking about ransomware and he didn't specifically mention air gaping. I had to leave. So I might have, I might have missed it cause I was doing the cube, but that's a, that's a key aspect. I'm sure there were, were things on the, on the deep dives that addressed air gaping, but Nancy look, AWS has the skills. It has the resources, you know, necessary to apply all these best practices and, you know, share those with customers. But, but what specific investments is AWS making to make the CISO's life easier? Maybe you could talk about that. >>Sure. So following on to your point about the reinforced keynote, Dave, right? CJ Boes talked about how the events of a ransomware, for example, incident or event can take place right on stage where you go from detect to respond and to recover. And specifically on the recovery piece, you mentioned AWS backup, the managed service that protects across 15 different AWS services, as well as on-premises VMware as automated recovery. And that's in part why we've decided to continue that investment and deliver AWS backup audit manager, which helps customers actually prove their posture against how their protection policies are actually mapping back to their organizational controls based on, for example, how they TA tag their data for mission criticality or how sensitive that data is. Right. And so turning to best practices, especially for ransomware events. Since this is very top of mind for a lot of customers these days is I will, will always try to encourage customers to go through game day simulations, for example, identifying which are those most critical applications in their environment that they need up and running for their business to function properly, for example, and actually going through the recovery plan and making sure that their staff is well trained or that they're able to go through, for example, a security orchestration automation, recovery solution, to make sure that all of their mission critical applications are back up and running in case of a ransomware event. >>Yeah. So I love the game day thing. I mean, we know, well just the, in the history of it, you couldn't even test things like disaster recovery, right? Because it was too dangerous with the cloud. You can test these things safely and actually plan out, develop a blueprint, test your blueprint. I love the, the, the game day >>Analogy. Yeah. And actually one thing I'd love to add is, you know, we talked about air gaping. I just wanna kind of tie up that statement is, you know, one thing that's really interesting about the way that the AWS cloud is architected is the identity access and management platform actually allows us to create identity constructs, that air gap, your data perimeter. So that way, when attackers, for example, are able to gain a foothold in your environment, you're still able to air gap your most mission critical and also crown jewels from being infiltrated. >>Mm that's key. Yeah. We've learned, you know, when paying the ransom is not a good strategy, right? Cuz most of the time, many times you don't even get your data back. Okay. So we, we're kind of data geeks here. We love data and we're passionate about it on the cube AWS and you guys specifically are passionate about it. So what excites you, Wayne, you start and then Nancy, you bring us home. What excites you about data and data protection and why? >>You know, we are data nerds. So at the end of the day, you know, there's this expressions we use all the time, but data is such a rich asset for all of us. And some of the greatest innovations that come out of AWS comes out of our analysis of our own data. Like we collect a lot of data on our operations and some of our most critical features for our customers come out of our analysis, that data. So we are data nerds and we understand how businesses view their data cuz we view our data the same way. So, you know, Dave security really started in the data center. It started with the enterprises. And if we think about security, often we talk about securing compute and securing network. And you know, if you, if you secured your compute, you secured your data generally, but we've separated data from compute so that people can get the value from their data no matter how they want to use it. And in doing that, we have to make sure that their data is durable and it's resilient to any sort of incident and event. So this is really, really important to us. And what do I get excited about? You know, again, thinking back to this framework, I know that we as thought leaders alongside our customers who also thought leaders in their space can provide them with the capabilities. They need to protect their data, to secure their data, to make sure it's compliant and always, always, always durable. >>You know, it's funny, you'd say funny it's it's serious actually. Steven Schmidt at reinforc he's the, the, the chief security officer at Amazon used to be the C C ISO of AWS. He said that Amazon sees quadrillions of data points a month. That's 15 zeros. Okay. So that's a lot of data. Nancy bring us home. What's what excites you about data and data protection? >>Yeah, so specifically, and this is actually drawing from conversations that I had with multiple ISV partners at AWS reinforc is the ability to derive value from secondary data, right? Because traditionally organizations have really seen that as a call center, right? You're producing secondary data because most likely you're creating backups of your mission critical workloads. But what if you're able to run analytics and insights and derive insights from that, that secondary data, right? Then you're actually able to let AWS do the undifferentiated heavy lifting of analyzing that secondary data state. So that way us customers or ISV partners can build value on the security layers above. And that is how we see turning cost into value. >>I love it. As you're taking the original premise of the cloud, taking away the under heavy lifting for, you know, D deploying, compute, storage, and networking now bringing up to the data level, the analytics level. So it continues. The cloud continues to expand. Thank you for watching the cubes coverage of AWS storage day 2022.

Published Date : Aug 10 2022

SUMMARY :

Great to see you again. So Wayne, let's talk about how organizations should be thinking about this term data So data durability, data protection, data resiliency, and, you know, And, you know, we think about forever, you know, the notion of, you know, So Nancy, you talked to a lot of customers, but by the way, it always comes back to the data. about, you know, how do I solve this data challenge? And, and that's always been AWS's philosophy, you know, make sure that developers have access it's, it's, it's by and large the responsibility of the provider of that infrastructure to make sure that data's durable, how you protect your data across 15 different AWS services, as well as on-premises VMware And like I said, the intent, but you can support a federated data model cuz you're building both in the cloud, on the edge, at the edge and on premises. data mesh, but the problem is how do you ensure governance and a federated model? along the lines of the, this framework, we really think about, you know, how do customers identify you know, we know that we have to take an action and recover having that plan in place, you know, necessary to apply all these best practices and, And specifically on the recovery piece, you mentioned AWS backup, you couldn't even test things like disaster recovery, right? I just wanna kind of tie up that statement is, you know, one thing that's really interesting Cuz most of the time, many times you don't even get your data back. So at the end of the day, you know, there's this expressions we use What's what excites you about data and data protection? at AWS reinforc is the ability to derive value from secondary data, you know, D deploying, compute, storage, and networking now bringing up to the data level,

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
NancyPERSON

0.99+

Nancy WongPERSON

0.99+

DavePERSON

0.99+

Steven SchmidtPERSON

0.99+

AWSORGANIZATION

0.99+

Dave ValantePERSON

0.99+

AmazonORGANIZATION

0.99+

EuropeLOCATION

0.99+

WaynePERSON

0.99+

BostonLOCATION

0.99+

15QUANTITY

0.99+

Kurt kufeldPERSON

0.99+

CJ BoesPERSON

0.99+

Nancy WangPERSON

0.99+

Robert GatesPERSON

0.99+

twoQUANTITY

0.99+

last yearDATE

0.99+

GatesPERSON

0.99+

first lineQUANTITY

0.99+

second pillarQUANTITY

0.99+

oneQUANTITY

0.99+

Wayne DusoPERSON

0.99+

bothQUANTITY

0.98+

15 zerosQUANTITY

0.98+

one thumbprintQUANTITY

0.98+

one signatureQUANTITY

0.97+

two core pillarsQUANTITY

0.96+

early last decadeDATE

0.96+

three common themesQUANTITY

0.95+

a monthQUANTITY

0.9+

secondQUANTITY

0.88+

couple months agoDATE

0.85+

Dr.PERSON

0.84+

two cubeQUANTITY

0.77+

VMwareTITLE

0.71+

Day 2022EVENT

0.71+

threeQUANTITY

0.66+

yearsDATE

0.65+

gameEVENT

0.57+

dayEVENT

0.52+

2022DATE

0.45+

CubeORGANIZATION

0.35+

Wayne Durso & Nancy Wang | AWS Storage Day 2022


 

[Music] okay we're back my name is dave vellante and this is thecube's coverage of aws storage day you know coming off of reinforce i wrote that the cloud was a new layer of defense in fact the first line of defense in a cyber security strategy that brings new thinking and models for protecting data data protection specifically traditionally thought of as backup and recovery it's become a critical adjacency to security and a component of a comprehensive cyber security strategy we're here in our studios outside of boston with two cube alums and we're going to discuss this and other topics wayne dusso is the vice president for aws storage edge and data services and nancy wong as general manager of aws backup and data protection services guys welcome great to see you again thanks for coming on of course always a pleasure dave good to see you dave all right so wayne let's talk about how organizations should be thinking about this term data protection it's an expanding definition isn't it it is an expanded definition dave last year we talked about uh data and the importance of data to companies every company um is becoming a data company uh you know the amount of data they generate uh the amount of data they can use to uh create models to do predictive analytics and frankly uh to find ways of innovating uh is is growing uh rapidly and you know there's this tension between access to all that data right getting the value out of that data and how do you secure that data and so this is something we think about with customers all the time so data durability data protection data resiliency and you know trust in their data if you think about running your organization on your data trust in your data is so important so you know you got to trust where you're putting your data you know people who are putting their data on a platform need to trust that platform will in fact ensure its durability security resiliency and you know we see ourselves uh aws as a partner uh in securing their data making their data they're built durable making their data resilient all right so some of that responsibility is on us some of that is on amazon responsibility around data protection data resiliency and you know um we think about forever you know the notion of um you know compromise of your infrastructure but more and more people think about the compromise of their data as data becomes more valuable in fact data is a company's most valuable asset we've talked about this before only second to their people you know the people who are the most valuable asset but right next to that is their data so really important stuff so nancy you talk to a lot of customers but by the way it always comes back to the data we've been saying this for years haven't we so you've got this expanding definition of data protection you know governance is in there you think about access etc when you talk to customers what are you hearing from them how are they thinking about data protection yeah so a lot of the customers that wayne and i have spoken to often come to us seeking thought leadership about you know how do i solve this data challenge how do i solve this data sprawl challenge but also more importantly tying it back to data protection and data resiliency is how do i make sure that data is secure that it's protected against let's say ransomware events right and continuously protected so there's a lot of mental frameworks that come to mind and a very popular one that comes up in quite a few conversations is in this cyber security framework right and from a data protection perspective it's just as important to protect and recover your data as it is to be able to detect different events or be able to respond to those events right so recently i was just having a conversation with a regulatory body of financial institutions in europe where we're designing a architecture that could help them make their data immutable but also continuously protected so taking a step back that's really where i see aws's role in that we provide a wide breadth of primitives to help customers build secure platforms and scaffolding so that they can focus on building the data protection the data governance controls and guardrails on top of that platform and that's always been aws philosophy make sure that developers have access to those primitives and apis so that they can move fast and essentially build their own if that that's in fact what they want to do and as you're saying when data protection is now this adjacency to cyber security but there's disaster recoveries in there business continuance cyber resilience etc so so maybe you could pick up on that and sort of extend how you see aws helping customers build out those resilient services yeah so you know two uh core pillars to a data protection strategy is around their data durability which is really an infrastructural element you know it's it's it's by and large the responsibility of the provided that infrastructure to make sure that data is durable because if it's not durable and everything else doesn't matter um and the second pillar is really about data resiliency so in terms of security controls and governance like these are really important but these are a shared responsibility like the customers working with us with the services that we provide are there to architect the design it's really human factors and design factors that get them resiliency nancy anything you would add to what wayne just said yeah absolutely so customers tell us that they want always on data resiliency and data durability right so oftentimes in those conversations three common themes come up which is they want a centralized solution they want to be able to transcribe their intent into what they end up doing with their data and number three they want something that's policy driven because once you centralize your policies it's much better and easier to establish control and governance at an organizational level so keeping that in mind with policy as our interface there's two managed aws solutions that i recommend you all check out in terms of data resiliency and data durability those are aws backup which is our centralized solution for managing protection recovery and also provides an audit audit capability of how you protect your data across 15 different aws services as well as on-premises vmware and for customers whose mission-critical data is contained entirely on disk we also offer aws elastic disaster recovery services especially for customers who want to fail over their workloads from on-premises to the cloud so you can essentially centralize as a quick follow-up centralize the policy and as you said the intent but you can support a federated data model because you're building out this massive you know global system but you can take that policy and essentially bring it anywhere on the aws cloud is that right exactly and actually one powerful integration i want to touch upon is that aws backup is natively integrated with aws organizations which is our de facto multi-account federated organization model for how aws services work with customers both in the cloud on the edge at the edge and on premises so that's really important because as we talk about all the time on the cube this notion of a decentralized data architecture data mesh but the problem is how do you ensure governance in a federated model so we're clearly moving in that direction when i want to ask you about cyber as a board level discussion years ago i interviewed dr robert gates you know former defense secretary and he sat on a number of boards and i asked him you know how important and prominent is security at the board level is it really a board level discussion he said absolutely every time we meet we talk about cyber security but not every company at the time this was kind of early last decade was doing that that's changed um now ransomware is front and center hear about it all the time what's aws what's your thinking on cyber as a board level discussion and specifically what are you guys doing around ransomware yeah so you know malware in general ransomware being a particular type of malware um it's a hot topic and it continues to be a hot topic and whether at the board level the c-suite level um i had a chance to listen to uh dr gates a couple months ago and uh it was super motivational um but we think about ransomware in the same way that our customers do right because all of us are subject to an incident nobody is uh uh immune to a ransomware incident so we think very much the same way and as nancy said along the lines of the nist framework we really think about you know how do customers identify their critical access how do they plan for protecting those assets right how do they make sure that they are in fact protected and if they do detect a ransomware event and ransomware events come from a lot of different places like there's not one signature there's not one thumb print if you would for ransomware so it's it's there's really a lot of vigilance uh that needs to be put in place but a lot of planning that needs to be put in place and once that's detected and a we have to recover you know we know that we have to take an action and recover having that plan in place making sure that your assets are fully protected and can be restored as you know ransomware is a insidious uh type of malware you know it sits in your system for a long time it figures out what's going on including your backup policies your protection policies and figures out how to get around those with some of the things that nancy talked about in terms of air gapping your capabilities being able to if you would scan your secondary your backup storage for malware knowing that it's a good copy and then being able to restore from that known good copy in the event of an incident is critical so we think about this for ourselves in the same way that we think about these for our customers you've got to have a great plan you've got to have great protection and you've got to be ready to restore in the case of an incident and we want to make sure we provide all the capabilities to do that yeah so i'm glad you mentioned air gapping so at the recent reinforce i think it was kurt kufeld was speaking about ransomware and he didn't specifically mention air gapping i had to leave so i might i might have missed it because i'm doing the cube but that's a that's a key aspect i'm sure there were things in the on the deep dives that addressed air gapping but nancy look aws has the skills it has the resources you know necessary to apply all these best practices and you know share those as customers but but what specific investments is aws making to make the cso's life easier maybe you could talk about that sure so following on to your point about the reinforced keynote dave right cj moses talked about how the events of a ransomware for example incident or event can take place right on stage where you go from detect to respond and to recover and specifically on the recover piece he mentioned aws backup the managed service that protects across 15 different aws services as well as on-premises vmware as automated recovery and that's in part why we've decided to continue that investment and deliver aws backup audit manager which helps customers actually prove their posture against how their protection policies are actually mapping back to their organizational controls based on for example how they tag their data for mission criticality or how sensitive that data is right and so turning to best practices especially for ransomware events since this is very top of mind for a lot of customers these days is i will always try to encourage customers to go through game day simulations for example identifying which are those most critical applications in their environment that they need up and running for their business to function properly for example and actually going through the recovery plan and making sure that their staff is well trained or that they're able to go through for example a security orchestration automation recovery solution to make sure that all of their mission critical applications are back up and running in case of a ransomware event yeah so i love the game date thing i mean we know well just in the history of it you couldn't even test things like disaster recovery be right because it was too dangerous with the cloud you can test these things safely and actually plan out develop a blueprint test your blueprint i love the the game day analogy yeah and actually one thing i love to add is you know we talked about air gapping i just want to kind of tie up that statement is you know one thing that's really interesting about the way that the aws cloud is architected is the identity access and management platform actually allows us to create identity constructs that air gap your data perimeter so that way when attackers for example are able to gain a foothold in your environment you're still able to air gap your most mission critical and also crown jewels from being infiltrated that's key yeah we've learned you know when paying the ransom is not a good strategy right because most of the time many times you don't even get your data back okay so we we're kind of data geeks here we love data um and we're passionate about it on the cube aws and you guys specifically are passionate about it so what excites you wayne you start and then nancy you bring us home what excites you about data and data protection and why you know we are data nerds uh so at the end of the day um you know there's there's expressions we use all the time but data is such a rich asset for all of us some of the greatest innovations that come out of aws comes out of our analysis of our own data like we collect a lot of data on our operations and some of our most critical features for our customers come out of our analysis that data so we are data nerds and we understand how businesses uh view their data because we view our data the same way so you know dave security really started in the data center it started with the enterprises and if we think about security often we talk about securing compute and securing network and you know if you if you secured your compute you secured your data generally but we've separated data from compute so that people can get the value from their data no matter how they want to use it and in doing that we have to make sure that their data is durable and it's resilient to any sort of incident event so this is really really important to us and what do i get excited about um you know again thinking back to this framework i know that we as thought leaders alongside our customers who also thought leaders in their space can provide them with the capabilities they need to protect their data to secure their data to make sure it's compliant and always always always durable you know it's funny you'd say it's not funny it's serious actually steven schmidt uh at reinforce he's the the chief security officer at amazon used to be the c c iso of aws he said that amazon sees quadrillions of data points a month that's 15 zeros okay so that's a lot of data nancy bring us home what's what excites you about data and data protection yeah so specifically and this is actually drawing from conversations that i had with multiple isv partners at aws reinforce is the ability to derive value from secondary data right because traditionally organizations have really seen that as a cost center right you're producing secondary data because most likely you're creating backups of your mission critical workloads but what if you're able to run analytics and insights and derive insights from that secondary data right then you're actually able to let aws do the undifferentiated heavy lifting of analyzing that secondary data as state so that way you as customers or isv partners can build value on the security layers above and that is how we see turning cost into value i love it you're taking the original premise of the cloud taking away the undifferentiated heavy lifting for you know deploying compute storage and networking now bringing up to the data level the analytics level so it continues the cloud continues to expand thank you for watching thecube's coverage of aws storage day 2022

Published Date : Aug 5 2022

**Summary and Sentiment Analysis are not been shown because of improper transcript**

ENTITIES

EntityCategoryConfidence
amazonORGANIZATION

0.99+

awsORGANIZATION

0.99+

kurt kufeldPERSON

0.99+

europeLOCATION

0.99+

last yearDATE

0.99+

bostonLOCATION

0.99+

wayne dussoPERSON

0.99+

steven schmidtPERSON

0.99+

Nancy WangPERSON

0.99+

twoQUANTITY

0.98+

Wayne DursoPERSON

0.98+

uh awsORGANIZATION

0.98+

first lineQUANTITY

0.97+

AWSORGANIZATION

0.97+

dave vellantePERSON

0.97+

davePERSON

0.97+

one signatureQUANTITY

0.97+

three common themesQUANTITY

0.96+

one thumbQUANTITY

0.96+

waynePERSON

0.96+

nancyPERSON

0.95+

second pillarQUANTITY

0.94+

15 zerosQUANTITY

0.94+

oneQUANTITY

0.92+

15 differentQUANTITY

0.92+

bothQUANTITY

0.92+

dr robert gatesPERSON

0.91+

secondQUANTITY

0.91+

a monthQUANTITY

0.9+

one thingQUANTITY

0.88+

vmwareTITLE

0.81+

a couple months agoDATE

0.81+

early last decadeDATE

0.8+

years agoDATE

0.78+

lot of customersQUANTITY

0.76+

lotQUANTITY

0.76+

15 differentQUANTITY

0.74+

a lot of customersQUANTITY

0.74+

dr gatesPERSON

0.67+

day 2022EVENT

0.65+

dataQUANTITY

0.63+

cubeORGANIZATION

0.63+

ransomwareTITLE

0.62+

nancyORGANIZATION

0.59+

threeQUANTITY

0.54+

Day 2022EVENT

0.53+

yearsQUANTITY

0.48+

coreQUANTITY

0.48+

nancy wongPERSON

0.47+

thecubePERSON

0.47+

cloudTITLE

0.36+

Nancy Wang, AWS | Women in Tech: International Women's Day


 

(upbeat music) >> Hey, everyone. Welcome to theCUBE's coverage of the International Women's Showcase for 2022. I'm your host, Lisa Martin. I'm pleased to welcome Nancy Wong, the general manager of Data Protection and Governance at AWS to the program. Nancy, it's great to have you. >> Thanks so much for having me Lisa, and you know, I really hope that this is hopefully the last year that we'll be celebrating International Women's Day all virtually. >> I agree. I agree. Well, we're going in that right direction globally. So let's cross our fingers. Talk to me a little bit about your role at AWS and what you do there. >> Sure. So as a GM of AWS Data Protection and Governance, a lot of, we tackle quite a few problems that our biggest customers face, right? When they think about, "How do I manage my data?" Right. Especially in this digital world. And speaking of the pandemic, how much data has been generated by consumers, by devices, by systems, by servers? How do you protect all of that data? Right. Especially we hear about cyber crime, cyber attacks. Right. Data breaches. It's really important to make sure that all of our customers have a coherent strategy around not just management, right, but also protection and really how you govern your data. Right. And there's just so many awesome conversations that my team and I have had lately with CSOs or chief technology officers on this topic, as it evolves. >> Data protection is so critical. It's one of my favorite topics to talk about, cybersecurity as well. Talk to me about what it means though if we keep this at a bit of a different level to be an operator within the the big ecosystem that is AWS. >> Yeah. And that's actually one of the the favorite aspects of my role. Right. Which is, you know, I get to innovate every day on behalf of my customers. For example, I love having one-on-one dialogues. I love having architecture conversations where we brainstorm. Right. And so those type of conversations help inform how we deliver and develop products. And so in an operator role, right, for the the women in the audience today, is it really gives you that perspective into not just how, what type of products do you want to build that delight your customers but also from an engineering. Right. And a bottom line perspective of, well how do you make this happen? Right. How do you fund this? And how do you plan out your development milestones? >> What are, tell me a little bit about your background and then what makes women in technology such an important initiative for you to stand behind? >> Absolutely. So I'm so proud today to see that the number of women or the percentage of women enrolled at engineering curriculums just continue to rise. Right. And especially as someone who went through an engineering degree in her undergraduate studies, that was not always the case. Right. So oftentimes, you know, I would look around the classroom and be the only woman on the lab bench or only woman in a CS classroom. And so when you have roles in tech, specifically, that require an undergraduate degree in computer science or a degree in engineering, that helps to, or that only serves to really reduce the population of eligible candidates. Right. Who then, if you look at that pool of eligible candidates who then you can invest and accelerate through the career ladder to become leaders in tech, well that's where you may end up with a representation issue. Right. And that's why we have, for example, so few women leaders in tech that we can look up to as role models. And that's really the problem or the gap that I'm very passionate about solving. And also, Lisa, I'm really excited to tell you a little bit more about advancing women in tech, which is a 501c3 nonprofit organization that I started to tackle this exact problem. >> Talk to me about that, cause it's one of the things that you bring up is, you know, we always say when we're having conversations like this, we can't be what we can't see. We need to be able to see those female leaders. To your point, there aren't a ton in comparison to the male leaders. So talk to me about advancing women in technology, why you founded this, and what you guys are accomplishing. >> Absolutely. So it's been such a personal journey as well. Just starting this organization called Advancing Women In Tech because I started it in 2017. Right. So when I really was, you know, just starting out as a product manager, I was at another big tech company at the time. And what I really realized, right, is looking around you know, I had so many, for example, bosses, managers, peer leaders, who were really invested in growing me as a product manager and growing my tech and career. And this is right after I'd made the transition from the federal government into big tech. What that said though, looking around, there weren't that many women tech leaders that I could look up to, or get coffee, or just have a mentoring conversation. And quickly I realized, well, it's not so much that women can't do it. Right. It's the fact that we're not advancing enough women into leadership roles. And so really we have to look at why that is. Right. And we, you know, from a personal perspective, one contribution towards that angle is upskilling. Right. So if you think about what skills one needs as one climbs a career ladder, whether that's your first people management role, or your first manager manager's role, or obviously for bigger leaders when they start managing thousands, tens of thousands of individuals, well all of that requires different skills. And so learning those skills about how to manage people, how to motivate your teams effectively, super, super important. And of course on the other side, and one that I'm, you know, near to dear to me is that of mentorship and executive sponsorship because you can have all the skills in the world, right. And especially with digital learning and AWIT is very involved with Coursera and AWS in producing and making those resources readily available and accessible. Well, if you don't have those opportunities, if you don't have mentors and sponsors who are well to push you or give you a step ladder to those roles, well you're still not going to get there. Right. And so, that's why actually, if you look at the AWIT mission, it's really those two pillars working very closely together to help advance women into leadership roles. >> The idea of mentorship and sponsorship is so critical. And I think a lot of people don't understand the difference between a mentor and a sponsor. How do you define that difference and how do you bring them into the organization so that they can be mentors and sponsors? >> Yeah, absolutely. And there's, you know, these two terms are often used today so interchangeably that I do get a lot of questions around, well, what is the difference? Right. And how does, let's say a mentor become a sponsor? So, maybe just taking a few steps back, right. When you have let's say questions around compensation or, "Hey I have some job offers, which ones do I consider?" And you ask someone a question or advice, well that person's likely your mentor. Right? And typically a mentor is someone who you can ask those questions on a repeated basis. Who's very accessible to you. Well, a sponsor takes that a few steps forward in the sense that they are sponsoring you into a role or into a project or initiative that you on your own may not be able to achieve. And by doing so, I think what really differentiates a sponsor from a mentor is that the sponsor will actually put their own reputation on the line. Right. They're using their own political capital in order to make sure that you get into that role, you get into that room. Right. And that's why it's so key, for example, especially if you have that relationship already with a person who's your mentor, you're able to ask questions or advice from, to convert them into a sponsor so that you can accelerate your career. >> Great definition, description, and great recommendations for converting mentors to sponsors. You know, I only learned the difference about a mentor and a sponsor a few years ago at another women in tech event that I was hosting. And I thought, "It's brilliant. It makes perfect sense." We need more people to understand the difference, the synergies, and how to promote mentors to sponsors. Talk to me now about advancing women in tech plus the power of AWS. How are they helping this nonprofit to really accelerate? >> Sure. So from an organization perspective, right, there's many women, for example, across the the tech companies who are part of Advancing Women In Tech, obviously Amazon of course as an employee has a very large community within who's part of AWIT. But we also have members across the tech industry from startups to VC firms to of course, Google, Microsoft, and Netflix. You name it. With that said, you know, what AWS has done with AWIT is actually very special in the sense that if you go to the Coursera platform, coursera.org/awit you can see our two Coursera specializations. Four courses each that go through the real world product management fundamentals. Or the business side, the technical skills, and even interviewing for mid-career product management roles. And the second specialization, which I'm super excited to share today, is actually geared towards getting folks ramped up and prepared to successfully pass the Cloud Practitioner's Exam, which is one of the industry recognized standards about understanding the AWS Cloud and being functional in the AWS Cloud. This summer, of course, and I'm sharing kind of a sneak peek announcement that I'll be making tomorrow with the University of Pennsylvania, is that we're kicking off a program for the masters of CIS program, or the Computer Information Systems Master students, to actually go through this Coursera specialization, which is produced by AWIT, sponsored by AWS, and AWS Training and Certifications has so generously donated exam vouchers for these students so that they can then go on and be certified in the AWS Cloud. So that's one just really cool collaboration that we are doing between AWS and AWIT to get more qualified folks in the door in tech jobs, and hopefully at jobs in AWS. >> That's a great collaboration. What are some of the goals in terms of metrics, the number of women that you want to get into the program and complete the program? What are some of those on your radar? >> Absolutely. So one of the reasons, of course, that the Master's of CIS Program, the University of Pennsylvania caught my eye, not withstanding, I graduated from there, but also that just the statistics of women enrolled. Right. So what's really notable about this program is it's entirely online, which as a university creating a Master's degree fully online, well, it takes a ton of resources from the university, from the faculty. And what's really special about these students is that they're already full-time adult professionals, which means that they're working a full-time job, they might be taking care of family obligations, and they're still finding time to advance themselves, to acquire a Master's degree in CS. And best of all, 42% of these students are women. Right. And so that's a number that is multiples of what we're finding in engineering curriculums today. And so my theory is, well if you go to a student population that is over 40%, 42 to be exact percent women, and enable these women to be certified in AWS Cloud, to have direct interview prep and mentorship from AWS software development leaders, well, that greatly increases their chances of getting a full-time role, right, at AWS. Right. At which then we can help them advance their careers to further and further roles in software development. >> So is this curriculum also open to women who aren't currently in tech to be able to open the door for them to get into tech and STEM fields? >> Absolutely. And so in my bad and remiss in mentioning, which is students of this Master's in CS Program are actually students not from tech already. So they're not in a tech field. And they did not have a degree in CS or even engineering as part of their undergraduate studies. So it's truly folks who are outside of tech, that are 42% women, that we're getting into the tech industry with this collaboration between AWS, AWIT, and the University of Pennsylvania. >> That's outstanding to get them in from completely different fields into tech. >> Absolutely. >> How do you help women have the confidence to say, "I want to try this." Cause if we think about every company today is a tech company. It's a data company. It has to be to be competitive. You know, the pandemic taught us that everything we're able to do online and digitally, for example, but how do you help women get the confidence to say, "Okay, I'm going to go from a completely different field into tech." >> Absolutely. So if we, you know, define tech of course as big tech or, you know, now the main companies, right, I myself made that transition, which is why it is a topic near and dear to me because I can personally speak to my journey because I didn't start my career out in tech. Right. Yes. I studied engineering. But with that said, my first full-time job out of college was with the federal government because I wanted to go and build healthdata.gov, right, which gave folks a lot of access to the healthcare data, roles, right, that existed within the U.S. government and the CMS, NIH, you know, CDC, so on and so forth. But that was quite a big change from then taking a product management job at Google. Right. And so how did I make that change? Well, a lot of it came from, you know, the mentors that I had. Right. What I call my personal board of directors who gave me that confidence. And sure, I mean even today, I still have imposter syndrome where, you know, I think, "Am I good enough." Right. "Should I be leading this organization," right, "of data protection and governance." But I think what it boils down to is, you know, inner confidence. Right. And goes back to those two pillars of having the right skills and also the right mentors and sponsors who are willing to help sponsor you into those opportunities and help sponsor you to success. >> Absolutely. Great advice and recommendations. Thanks for sharing your background, Nancy, it's outstanding to see where you started to where you are now and also to what you're enabling for so many other females to get into tech with the AWIT program combined with AWS and UPenn. Exciting stuff. Can't wait to talk to you next year to see where you guys go from here. >> Absolutely Lisa. And what I'm really looking forward to sharing with you next year is the personal testimonials of other women who have gone through the AWIT, the AWS, the UPenn Program and have gotten their tech jobs and also promotions. >> That sounds like a great thing to look forward to. I'm looking forward to that. Nancy, thanks so much for your time and the insight that you shared. >> Thanks so much for having me, Lisa. >> My pleasure. For Nancy Wong, I'm Lisa Martin. You're watching theCUBE's coverage of the International Women's Showcase 2022. (upbeat music)

Published Date : Mar 9 2022

SUMMARY :

of the International me Lisa, and you know, Talk to me a little bit about your role And speaking of the pandemic, Talk to me about what it means though And how do you plan out really excited to tell you that you bring up is, you know, and one that I'm, you and how do you bring them so that you can accelerate your career. the synergies, and how to in the sense that if you go the number of women that you that the Master's of CIS Program, between AWS, AWIT, and the That's outstanding to get them in have the confidence to say, and the CMS, NIH, you know, it's outstanding to see where you started with you next year and the insight that you shared. of the International

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
AWSORGANIZATION

0.99+

NancyPERSON

0.99+

Lisa MartinPERSON

0.99+

Nancy WongPERSON

0.99+

Nancy WongPERSON

0.99+

GoogleORGANIZATION

0.99+

AWITORGANIZATION

0.99+

MicrosoftORGANIZATION

0.99+

Nancy WangPERSON

0.99+

thousandsQUANTITY

0.99+

LisaPERSON

0.99+

2017DATE

0.99+

NetflixORGANIZATION

0.99+

NIHORGANIZATION

0.99+

AmazonORGANIZATION

0.99+

University of PennsylvaniaORGANIZATION

0.99+

University of PennsylvaniaORGANIZATION

0.99+

firstQUANTITY

0.99+

42QUANTITY

0.99+

42%QUANTITY

0.99+

Four coursesQUANTITY

0.99+

two termsQUANTITY

0.99+

International Women's DayEVENT

0.99+

twoQUANTITY

0.99+

next yearDATE

0.99+

CDCORGANIZATION

0.99+

second specializationQUANTITY

0.99+

last yearDATE

0.99+

tomorrowDATE

0.99+

todayDATE

0.99+

over 40%QUANTITY

0.98+

oneQUANTITY

0.98+

AWS Data Protection and GovernanceORGANIZATION

0.98+

This summerDATE

0.98+

two pillarsQUANTITY

0.97+

CourseraTITLE

0.97+

U.S. governmentORGANIZATION

0.96+

UPennORGANIZATION

0.96+

tens of thousandsQUANTITY

0.94+

Advancing Women In TechORGANIZATION

0.94+

first peopleQUANTITY

0.93+

AWS Training and CertificationsORGANIZATION

0.93+

CourseraORGANIZATION

0.93+

eachQUANTITY

0.93+

pandemicEVENT

0.92+

Data Protection and GovernanceORGANIZATION

0.9+

theCUBEORGANIZATION

0.89+

CloudTITLE

0.89+

few years agoDATE

0.88+

International Women's Showcase 2022EVENT

0.88+

International Women's Showcase for 2022EVENT

0.86+

AWITTITLE

0.82+

Satish Lakshmanan & Nancy Wang | AWS Storage Day 2021


 

(upbeat music) >> Hi everybody, we're here in downtown Seattle covering AWS storage day. My name is Dave Vellante with the Cube, and we're really excited. We're going to talk about rethinking data protection in the 2020s. I'm here with Nancy Wong, who is the general manager of AWS backup, and Satish Lakshmanan, the director of storage business development at AWS. Folks, welcome. Good to see you again. So let's talk about the evolution of data protection. You've got three major disruptors going on. There's obviously the data explosion. We talk about that all the time, but there's cloud has changed the way people are thinking about data protection and now you've got cyber. What's AWS's point of view on all this. >> Great question, Dave. You know, in my role as the global head of storage business development and solution architecture for storage, I have the privilege of working with customers all around the globe, in every geography and every segment. And we recently talked to thousands of customers and we did a survey for about 5,000 customers. And many of them told us that they expect to see a ransomware attack once every 11 seconds. So it's top of mind for almost every customer so much so that if you remember earlier this year, the white house issued an executive order, you know, making the nation aware of across public and private sector about cybersecurity and the need for, for, for us to be prepared. Customers as a result, largely think of not only ransomware protection, but also recovery. And they have largely allocated budgets across every geography to make sure that they're well protected. And in the, in the event of an attack, they can recover from it. That's where Nancy's, you know, data protection services and backup services come into play. And maybe she'll add a few comments about how she approaches it from a technology perspective. >> Yeah, sure. Thanks, Satish yeah, as a general manager of AWS backup and our data protection services, it's really my team and my charter to help our customers centralize, automate, and also protect themselves from attacks like ransomware. Right? And so for example, you know, across our many services today we offer AWS backup as a secondary data collection and management across our many AWS regions and also across the aid of many AWS accounts that a single customer must manage, right. And if you recall having multiple copies of your data exist in backups is a core part of any customers ransomware protection strategy. And lastly, I just want to say something that we just launched recently called AWS backup audit manager also helps you operationalize and monitor your backups against any ransomware attack. >> So, the adversary, obviously, as we know, was well-equipped and they're quite sophisticated. And anybody who has inside access can become a ransomware attacker because of things like ransomware as a service. So, what are you specifically doing to address ransomware? >> Yeah. So, in talking to several thousand of our customers, what we have learned is customers are typically vulnerable in one or more of three scenarios, right? The first scenario is when they're not technically ready. What that means is either their software patches are not up to date, or they have too many manual processes that really prevent them from being prepared for defending against an attack. The second is typically around a lack of awareness. These are situations where IT administrators leveraging cloud-based services are recognizing that, or not recognizing per se, that they're easy to instances, Lambda instances have public access and same applies to S3 buckets. And the third is lack of governance and governance based practices. The way we are educating our customers training in enabling them and empowering them, because it's a shared security model, is really through our well-architected framework. That's the way we shared best practices that we have learned across all our customers, across our industries. And we enable it and empower them to not only identify areas of vulnerability, but also be able to recover in the event of an attack. Nancy. >> Yeah, and to add to that right, our team, and now my team and I, for example, watch every ransomware incident and because it really informs the way that we plan our product roadmap and deliver features that help our customers protect, detect, and also recover from ransomware. So there's an ebook out there, suggest you go check it out, of securing your cloud environment against ransomware attacks. And aside from the technical maintenance suggestions that Satish provided, as well as the security awareness suggestions, there's really two things that I usually tell customers who come to me with ransomware questions. Which is one, right, don't rely on the good will of your ransomware attacker to restore your data. Because I mean, just studies show over 90% of ransom payers actually don't successfully recover all of their data because, hey, what if they don't give you the full decryption utility? Or what if your backups are not restorable? Right? So, rather than relying on that good will, make sure that you have a plan in place where you can recover from backups in case you get ransomed. Right? And two, is make sure that in addition to just taking backups, which obviously, you know, as a GM of AWS backup, I would highly recommend you do, right. Is make sure that those backups are actually restorable, right? Do game day testing, make sure that it's configured properly because you'd be surprised at the, just the number and the sheer percentage of customers who when, let's say the attack happens, actually find that they don't have a good set of data to recover their businesses from. >> I believe it. Backup is, one thing as they say, recovery is everything. So you've got the AWS well-architected framework. How does that fit in, along with the AWS data protection services into this whole ransomware discussion? >> Yeah, absolutely. You know, the AWS wall architected framework actually has four design approaches that I usually share with customers that are very relevant to the ransomware conversation. And one is, you know, anticipate where that ransomware attack may come from. Right? And two, make sure that you write down your approaches whereby you can solve for that ransomware attack, right? Three, just like I advocate my teams and customers to do, right. Then look back on what you've written down as your approach and reflect back on what are the best practices or lessons learned that you can gain from that exercise. And make sure as part four, is you consistently plan game days where you can go through these various scenario tests or ransomware game day attacks. And lastly, just as a best practice is ransomware recovery and protection isn't just the role of IT Professionals like us, right. It's really important to also include HR, professional, legal professionals. Frankly, anyone in a business who might come and be compromised by ransomware attack, and make sure that they're involved in your response. And so Satish, I'd love to hear as well, how you communicate to customers and what best practices you offer them. >> Yeah, thanks Nancy. I think in addition to the fantastic points you made, Nancy, Dave, the well architected framework has been built on eight to 10 years worth of customer engagements across all segments and verticals. And essentially it's a set of shared best practices, tools, training, and methodology that we, you know, exchange with customers in order to help them be more prepared to fight ransomware attacks and be able to recover from them. Recently, there've been some enhancements made where we have put industry or use case specific lenses to the well architected framework. For example, for customers looking to build IOT applications, customers who are trying to use server less and Lambda functions, customers who may be within the financial services or healthcare life sciences, where to go, looking to understand best practices from other people who've implemented, you know, some of the technologies that Nancy talked about. In addition, as I talked about earlier, training and enablement is extremely critical to make sure that if companies don't have the skillset, we are basically giving them the skillset to be able to defend. So we do a lot of hands-on labs. Lastly, the well architected framework tool has been integrated into the console, and it gives customers who are essentially managing the workloads, the ability to look at access permissions, ability to look at what risks they have through malware and ransomware detection techniques. Machine learning capability is built into all the services that are native to AWS that allow them to then react to them. If companies don't have the skills, we have a vast network of partners who can help them basically implement the right technologies. And they can always reach out to our technical account manager for additional information as well. >> I love the best practice discussion. For customers, it's a journey. I mean, CSOs tell us their one problem is lack of talent and so they need help. So, last question is what can people expect from AWS? You're the experts. In particular, how you can help them recover from ransomware? >> Yeah, and that conversation is ever evolving, right? As hackers get more sophisticated then clearly we have to get more sophisticated as well. And so one of our mental models that we often share with customers is defense in depth, right? So if you consider all of the layers, including all of the constructs that exist natively on AWS, right? The first layer is through identity access management constructs. So building a trust radius around your workloads, around your applications, whereby you can deny permissions or access permissions to individuals who are not authorized to access your mission critical applications, right. Then beyond that first layer of defense, the second layer should be automated monitoring or observability. For example, if individuals were to penetrate within your security perimeter, and often times I, you know, that could be done through a delayed response where it gives your CSO or your security operations team, the ability to react to such a unauthorized access, for example. And so the third line of defense is if someone were to penetrate both first layer, as well as the second layer, is actually through backups. And this is where it goes back to what I was mentioning earlier is make sure that your backups are ready and able to be restored and have the RTO and SLA guarantees that help your business remain functional even after an attack. >> Excellent. Guys, we got to go. I love that, zero trust layer defenses, got to have the observability in the analytics and then the last resort RTO, and of course, RPO. Guys, thanks so much, really appreciate your insights. >> Good to see you. >> Thank you for watching. Keep it right there for more great content from AWS storage day. (upbeat music)

Published Date : Sep 2 2021

SUMMARY :

We talk about that all the time, that they expect to see and also across the aid So, the adversary, that they're easy to instances, make sure that you have a plan in place How does that fit in, and make sure that they're the ability to look at access permissions, I love the best practice discussion. the ability to react to in the analytics Thank you for watching.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
NancyPERSON

0.99+

AWSORGANIZATION

0.99+

Nancy WongPERSON

0.99+

Dave VellantePERSON

0.99+

SatishPERSON

0.99+

Satish LakshmananPERSON

0.99+

DavePERSON

0.99+

eightQUANTITY

0.99+

Nancy WangPERSON

0.99+

first layerQUANTITY

0.99+

2020sDATE

0.99+

oneQUANTITY

0.99+

third lineQUANTITY

0.99+

thirdQUANTITY

0.99+

bothQUANTITY

0.99+

second layerQUANTITY

0.99+

first scenarioQUANTITY

0.99+

ThreeQUANTITY

0.99+

twoQUANTITY

0.99+

two thingsQUANTITY

0.99+

10 yearsQUANTITY

0.99+

secondQUANTITY

0.98+

over 90%QUANTITY

0.98+

about 5,000 customersQUANTITY

0.98+

one problemQUANTITY

0.97+

LambdaTITLE

0.97+

three scenariosQUANTITY

0.96+

todayDATE

0.95+

earlier this yearDATE

0.93+

thousands of customersQUANTITY

0.9+

one thingQUANTITY

0.89+

downtown SeattleLOCATION

0.87+

four design approachesQUANTITY

0.84+

S3TITLE

0.82+

single customerQUANTITY

0.79+

part fourOTHER

0.75+

zero trust layerQUANTITY

0.74+

thousandQUANTITY

0.7+

white houseORGANIZATION

0.7+

CubeORGANIZATION

0.7+

three major disruptorsQUANTITY

0.69+

once every 11 secondsQUANTITY

0.66+

Storage DayEVENT

0.61+

2021DATE

0.5+