Image Title

Search Results for one security standard:

Breaking Analysis: How Palo Alto Networks Became the Gold Standard of Cybersecurity


 

>> From "theCube" Studios in Palo Alto in Boston bringing you data-driven insights from "theCube" and ETR. This is "Breaking Analysis" with Dave Vellante. >> As an independent pure play company, Palo Alto Networks has earned its status as the leader in security. You can measure this in a variety of ways. Revenue, market cap, execution, ethos, and most importantly, conversations with customers generally. In CISO specifically, who consistently affirm this position. The company's on track to double its revenues in fiscal year 23 relative to fiscal year 2020. Despite macro headwinds, which are likely to carry through next year, Palo Alto owes its position to a clarity of vision and strong execution on a TAM expansion strategy through acquisitions and integration into its cloud and SaaS offerings. Hello and welcome to this week's "Wikibon Cube Insights" powered by ETR and this breaking analysis and ahead of Palo Alto Ignite the company's user conference, we bring you the next chapter on top of the last week's cybersecurity update. We're going to dig into the ETR data on Palo Alto Networks as we promised and provide a glimpse of what we're going to look for at "Ignite" and posit what Palo Alto needs to do to stay on top of the hill. Now, the challenges for cybersecurity professionals. Dead simple to understand. Solving it, not so much. This is a taxonomic eye test, if you will, from Optiv. It's one of our favorite artifacts to make the point the cybersecurity landscape is a mosaic of stovepipes. Security professionals have to work with dozens of tools many legacy combined with shiny new toys to try and keep up with the relentless pace of innovation catalyzed by the incredibly capable well-funded and motivated adversaries. Cybersecurity is an anomalous market in that the leaders have low single digit market shares. Think about that. Cisco at one point held 60% market share in the networking business and it's still deep into the 40s. Oracle captures around 30% of database market revenue. EMC and storage at its peak had more than 30% of that market. Even Dell's PC market shares, you know, in the mid 20s or even over that from a revenue standpoint. So cybersecurity from a market share standpoint is even more fragmented perhaps than the software industry. Okay, you get the point. So despite its position as the number one player Palo Alto might have maybe three maybe 4% of the total market, depending on what you use as your denominator, but just a tiny slice. So how is it that we can sit here and declare Palo Alto as the undisputed leader? Well, we probably wouldn't go that far. They probably have quite a bit of competition. But this CISO from a recent ETR round table discussion with our friend Eric Bradley, summed up Palo Alto's allure. We thought pretty well. The question was why Palo Alto Networks? Here's the answer. Because of its completeness as a platform, its ability to integrate with its own products or they acquire, integrate then rebrand them as their own. We've looked at other vendors we just didn't think they were as mature and we already had implemented some of the Palo Alto tools like the firewalls and stuff and we thought why not go holistically with the vendor a single throat to choke, if you will, if stuff goes wrong. And I think that was probably the primary driver and familiarity with the tools and the resources that they provided. Now here's another stat from ETR's Eric Bradley. He gave us a glimpse of the January survey that's in the field now. The percent of IT buyers stating that they plan to consolidate redundant vendors, it went from 34% in the October survey and now stands at 44%. So we fo we feel this bodes well for consolidators like Palo Alto networks. And the same is true from Microsoft's kind of good enough approach. It should also be true for CrowdStrike although last quarter we saw softness reported on in their SMB market, whereas interestingly MongoDB actually saw consistent strength from its SMB and its self-serve. So that's something that we're watching very closely. Now, Palo Alto Networks has held up better than most of its peers in the stock market. So let's take a look at that real quick. This chart gives you a sense of how well. It's a one year comparison of Palo Alto with the bug ETF. That's the cyber basket that we like to compare often CrowdStrike, Zscaler, and Okta. Now remember Palo Alto, they didn't run up as much as CrowdStrike, ZS and Okta during the pandemic but you can see it's now down unquote only 9% for the year. Whereas the cyber basket ETF is off 27% roughly in line with the NASDAQ. We're not showing that CrowdStrike down 44%, Zscaler down 61% and Okta off a whopping 72% in the past 12 months. Now as we've indicated, Palo Alto is making a strong case for consolidating point tools and we think it will have a much harder time getting customers to switch off of big platforms like Cisco who's another leader in network security. But based on the fragmentation in the market there's plenty of room to grow in our view. We asked breaking analysis contributor Chip Simington for his take on the technicals of the stock and he said that despite Palo Alto's leadership position it doesn't seem to make much difference these days. It's all about interest rates. And even though this name has performed better than its peers, it looks like the stock wants to keep testing its 52 week lows, but he thinks Palo Alto got oversold during the last big selloff. And the fact that the company's free cash flow is so strong probably keeps it at the one 50 level or above maybe bouncing around there for a while. If it breaks through that under to the downside it's ne next test is at that low of around one 40 level. So thanks for that, Chip. Now having get that out of the way as we said on the previous chart Palo Alto has strong opinions, it's founder and CTO, Nir Zuk, is extremely clear on that point of view. So let's take a look at how Palo Alto got to where it is today and how we think you should think about his future. The company was founded around 18 years ago as a network security company focused on what they called NextGen firewalls. Now, what Palo Alto did was different. They didn't try to stuff a bunch of functionality inside of a hardware box. Rather they layered network security functions on top of its firewalls and delivered value as a service through software running at the time in its own cloud. So pretty obvious today, but forward thinking for the time and now they've moved to a more true cloud native platform and much more activity in the public cloud. In February, 2020, right before the pandemic we reported on the divergence in market values between Palo Alto and Fort Net and we cited some challenges that Palo Alto was happening having transitioning to a cloud native model. And at the time we said we were confident that Palo Alto would make it through the knot hole. And you could see from the previous chart that it has. So the company's architectural approach was to do the heavy lifting in the cloud. And this eliminates the need for customers to deploy sensors on prem or proxies on prem or sandboxes on prem sandboxes, you know for instance are vulnerable to overwhelming attacks. Think about it, if you're a sandbox is on prem you're not going to be updating that every day. No way. You're probably not going to updated even every week or every month. And if the capacity of your sandbox is let's say 20,000 files an hour you know a hacker's just going to turn up the volume, it'll overwhelm you. They'll send a hundred thousand emails attachments into your sandbox and they'll choke you out and then they'll have the run of the house while you're trying to recover. Now the cloud doesn't completely prevent that but what it does, it definitely increases the hacker's cost. So they're going to probably hit some easier targets and that's kind of the objective of security firms. You know, increase the denominator on the ROI. All right, the next thing that Palo Alto did is start acquiring aggressively, I think we counted 17 or 18 acquisitions to expand the TAM beyond network security into endpoint CASB, PaaS security, IaaS security, container security, serverless security, incident response, SD WAN, CICD pipeline security, attack service management, supply chain security. Just recently with the acquisition of Cider Security and Palo Alto by all accounts takes the time to integrate into its cloud and SaaS platform called Prisma. Unlike many acquisitive companies in the past EMC was a really good example where you ended up with a kind of a Franken portfolio. Now all this leads us to believe that Palo Alto wants to be the consolidator and is in a good position to do so. But beyond that, as multi-cloud becomes more prevalent and more of a strategy customers tell us they want a consistent experience across clouds. And is going to be the same by the way with IoT. So of the next wave here. Customers don't want another stove pipe. So we think Palo Alto is in a good position to build what we call the security super cloud that layer above the clouds that brings a common experience for devs and operational teams. So of course the obvious question is this, can Palo Alto networks continue on this path of acquire and integrate and still maintain best of breed status? Can it? Will it? Does it even have to? As Holger Mueller of Constellation Research and I talk about all the time integrated suites seem to always beat best of breed in the long run. We'll come back to that. Now, this next graphic that we're going to show you underscores this question about portfolio. Here's a picture and I don't expect you to digest it all but it's a screen grab of Palo Alto's product and solutions portfolios, network cloud, network security rather, cloud security, Sassy, CNAP, endpoint unit 42 which is their threat intelligence platform and every imaginable security service and solution for customers. Well, maybe not every, I'm sure there's more to come like supply chain with the recent Cider acquisition and maybe more IoT beyond ZingBox and earlier acquisition but we're sure there will be more in the future both organic and inorganic. Okay, let's bring in more of the ETR survey data. For those of you who don't know ETR, they are the number one enterprise data platform surveying thousands of end customers every quarter with additional drill down surveys and customer round tables just an awesome SaaS enabled platform. And here's a view that shows net score or spending momentum on the vertical axis in provision or presence within the ETR data set on the horizontal axis. You see that red dotted line at 40%. Anything at or over that indicates a highly elevated net score. And as you can see Palo Alto is right on that line just under. And I'll give you another glimpse it looks like Palo Alto despite the macro may even just edge up a bit in the next survey based on the glimpse that Eric gave us. Now those colored bars in the bottom right corner they show the breakdown of Palo Alto's net score and underscore the methodology that ETR uses. The lime green is new customer adoptions, that's 7%. The forest green at 38% represents the percent of customers that are spending 6% or more on Palo Alto solutions. The gray is at that 40 or 8% that's flat spending plus or minus 5%. The pinkish at 5% is spending is down on Palo Alto network products by 6% or worse. And the bright red at only 2% is churn or defections. Very low single digit numbers for Palo Alto, that's a real positive. What you do is you subtract the red from the green and you get a net score of 38% which is very good for a company of Palo Alto size. And we'll note this is based on just under 400 responses in the ETR survey that are Palo Alto customers out of around 1300 in the total survey. It's a really good representation of Palo Alto. And you can see the other leading companies like CrowdStrike, Okta, Zscaler, Forte, Cisco they loom large with similar aspirations. Well maybe not so much Okta. They don't necessarily rule want to rule the world. They want to rule identity and of course the ever ubiquitous Microsoft in the upper right. Now drilling deeper into the ETR data, let's look at how Palo Alto has progressed over the last three surveys in terms of market presence in the survey. This view of the data shows provision in the data going back to October, 2021, that's the gray bars. The blue is July 22 and the yellow is the latest survey from October, 2022. Remember, the January survey is currently in the field. Now the leftmost set of data there show size a company. The middle set of data shows the industry for a select number of industries in the right most shows, geographic region. Notice anything, yes, Palo Alto up across the board relative to both this past summer and last fall. So that's pretty impressive. Palo Alto network CEO, Nikesh Aurora, stressed on the last earnings call that the company is seeing somewhat elongated deal approvals and sometimes splitting up size of deals. He's stressed that certain industries like energy, government and financial services continue to spend. But we would expect even a pullback there as companies get more conservative. But the point is that Nikesh talked about how they're hiring more sales pros to work the pipeline because they understand that they have to work harder to pull deals forward 'cause they got to get more approvals and they got to increase the volume that's coming through the pipeline to account for the possibility that certain companies are going to split up the deals, you know, large deals they want to split into to smaller bite size chunks. So they're really going hard after they go to market expansion to account for that. All right, so we're going to wrap by sharing what we expect and what we're going to probe for at Palo Alto Ignite next week, Lisa Martin and I will be hosting "theCube" and here's what we'll be looking for. First, it's a four day event at the MGM with the meat of the program on days two and three. That's day two was the big keynote. That's when we'll start our broadcasting, we're going for two days. Now our understanding is we've never done Palo Alto Ignite before but our understanding it's a pretty technically oriented crowd that's going to be eager to hear what CTO and founder Nir Zuk has to say. And as well CEO Nikesh Aurora and as in addition to longtime friend of "theCube" and current president, BJ Jenkins, he's going to be speaking. Wendy Whitmore runs Unit 42 and is going to be several other high profile Palo Alto execs, as well, Thomas Kurian from Google is a featured speaker. Lee Claridge, who is Palo Alto's, chief product officer we think is going to be giving the audience heavy doses of Prisma Cloud and Cortex enhancements. Now, Cortex, you might remember, came from an acquisition and does threat detection and attack surface management. And we're going to hear a lot about we think about security automation. So we'll be listening for how Cortex has been integrated and what kind of uptake that it's getting. We've done some, you know, modeling in from the ETR. Guys have done some modeling of cortex, you know looks like it's got a lot of upside and through the Palo Alto go to market machine, you know could really pick up momentum. That's something that we'll be probing for. Now, one of the other things that we'll be watching is pricing. We want to talk to customers about their spend optimization, their spending patterns, their vendor consolidation strategies. Look, Palo Alto is a premium offering. It charges for value. It's expensive. So we also want to understand what kind of switching costs are customers willing to absorb and how onerous they are and what's the business case look like? How are they thinking about that business case. We also want to understand and really probe on how will Palo Alto maintain best of breed as it continues to acquire and integrate to expand its TAM and appeal as that one-stop shop. You know, can it do that as we talked about before. And will it do that? There's also an interesting tension going on sort of changing subjects here in security. There's a guy named Edward Hellekey who's been in "theCube" before. He hasn't been in "theCube" in a while but he's a security pro who has educated us on the nuances of protecting data privacy, public policy, how it varies by region and how complicated it is relative to security. Because securities you technically you have to show a chain of custody that proves unequivocally, for example that data has been deleted or scrubbed or that metadata does. It doesn't include any residual private data that violates the laws, the local laws. And the tension is this, you need good data and lots of it to have good security, really the more the better. But government policy is often at odds in a major blocker to sharing data and it's getting more so. So we want to understand this tension and how companies like Palo Alto are dealing with it. Our customers testing public policy in courts we think not quite yet, our government's making exceptions and policies like GDPR that favor security over data privacy. What are the trade-offs there? And finally, one theme of this breaking analysis is what does Palo Alto have to do to stay on top? And we would sum it up with three words. Ecosystem, ecosystem, ecosystem. And we said this at CrowdStrike Falcon in September that the one concern we had was the pace of ecosystem development for CrowdStrike. Is collaboration possible with competitors? Is being adopted aggressively? Is Palo Alto being adopted aggressively by global system integrators? What's the uptake there? What about developers? Look, the hallmark of a cloud company which Palo Alto is a cloud security company is a thriving ecosystem that has entries into and exits from its platform. So we'll be looking at what that ecosystem looks like how vibrant and inclusive it is where the public clouds fit and whether Palo Alto Networks can really become the security super cloud. Okay, that's a wrap stop by next week. If you're in Vegas, say hello to "theCube" team. We have an unbelievable lineup on the program. Now if you're not there, check out our coverage on theCube.net. I want to thank Eric Bradley for sharing a glimpse on short notice of the upcoming survey from ETR and his thoughts. And as always, thanks to Chip Symington for his sharp comments. Want to thank Alex Morrison, who's on production and manages the podcast Ken Schiffman as well in our Boston studio, Kristen Martin and Cheryl Knight they help get the word out on social and of course in our newsletters, Rob Hoof, is our editor in chief over at Silicon Angle who does some awesome editing, thank you to all. Remember all these episodes they're available as podcasts. Wherever you listen, all you got to do is search "Breaking Analysis" podcasts. I publish each week on wikibon.com and silicon angle.com where you can email me at david.valante@siliconangle.com or dm me at D Valante or comment on our LinkedIn post. And please do check out etr.ai. They've got the best survey data in the enterprise tech business. This is Dave Valante for "theCube" Insights powered by ETR. Thanks for watching. We'll see you next week on "Ignite" or next time on "Breaking Analysis". (upbeat music)

Published Date : Dec 11 2022

SUMMARY :

bringing you data-driven and of course the ever

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Alex MorrisonPERSON

0.99+

Edward HellekeyPERSON

0.99+

Eric BradleyPERSON

0.99+

Lisa MartinPERSON

0.99+

CiscoORGANIZATION

0.99+

Thomas KurianPERSON

0.99+

Dave VellantePERSON

0.99+

Lee ClaridgePERSON

0.99+

Rob HoofPERSON

0.99+

17QUANTITY

0.99+

October, 2021DATE

0.99+

Palo AltoORGANIZATION

0.99+

February, 2020DATE

0.99+

October, 2022DATE

0.99+

40QUANTITY

0.99+

MicrosoftORGANIZATION

0.99+

Dave ValantePERSON

0.99+

Wendy WhitmorePERSON

0.99+

SeptemberDATE

0.99+

OctoberDATE

0.99+

JanuaryDATE

0.99+

ZscalerORGANIZATION

0.99+

OktaORGANIZATION

0.99+

ForteORGANIZATION

0.99+

CrowdStrikeORGANIZATION

0.99+

Chip SimingtonPERSON

0.99+

52 weekQUANTITY

0.99+

Palo AltoORGANIZATION

0.99+

Cheryl KnightPERSON

0.99+

BJ JenkinsPERSON

0.99+

DellORGANIZATION

0.99+

July 22DATE

0.99+

6%QUANTITY

0.99+

EricPERSON

0.99+

VegasLOCATION

0.99+

Palo AltoLOCATION

0.99+

two daysQUANTITY

0.99+

one yearQUANTITY

0.99+

34%QUANTITY

0.99+

Chip SymingtonPERSON

0.99+

Kristen MartinPERSON

0.99+

7%QUANTITY

0.99+

40%QUANTITY

0.99+

27%QUANTITY

0.99+

44%QUANTITY

0.99+

61%QUANTITY

0.99+

38%QUANTITY

0.99+

Palo Alto NetworksORGANIZATION

0.99+

Nir ZukPERSON

0.99+

72%QUANTITY

0.99+

5%QUANTITY

0.99+

4%QUANTITY

0.99+

next weekDATE

0.99+

Constellation ResearchORGANIZATION

0.99+

Cider SecurityORGANIZATION

0.99+

four dayQUANTITY

0.99+

fiscal year 23DATE

0.99+

8%QUANTITY

0.99+

last quarterDATE

0.99+

david.valante@siliconangle.comOTHER

0.99+

Fort NetORGANIZATION

0.99+

GoogleORGANIZATION

0.99+

FirstQUANTITY

0.99+

Ken SchiffmanPERSON

0.99+

GDPRTITLE

0.99+

last fallDATE

0.99+

NASDAQORGANIZATION

0.99+

fiscal year 2020DATE

0.99+

threeQUANTITY

0.99+

more than 30%QUANTITY

0.99+

three wordsQUANTITY

0.99+

todayDATE

0.99+

OracleORGANIZATION

0.99+

FrankenORGANIZATION

0.99+

Breaking Analysis: We Have the Data…What Private Tech Companies Don’t Tell you About Their Business


 

>> From The Cube Studios in Palo Alto and Boston, bringing you data driven insights from The Cube at ETR. This is "Breaking Analysis" with Dave Vellante. >> The reverse momentum in tech stocks caused by rising interest rates, less attractive discounted cash flow models, and more tepid forward guidance, can be easily measured by public market valuations. And while there's lots of discussion about the impact on private companies and cash runway and 409A valuations, measuring the performance of non-public companies isn't as easy. IPOs have dried up and public statements by private companies, of course, they accentuate the good and they kind of hide the bad. Real data, unless you're an insider, is hard to find. Hello and welcome to this week's "Wikibon Cube Insights" powered by ETR. In this "Breaking Analysis", we unlock some of the secrets that non-public, emerging tech companies may or may not be sharing. And we do this by introducing you to a capability from ETR that we've not exposed you to over the past couple of years, it's called the Emerging Technologies Survey, and it is packed with sentiment data and performance data based on surveys of more than a thousand CIOs and IT buyers covering more than 400 companies. And we've invited back our colleague, Erik Bradley of ETR to help explain the survey and the data that we're going to cover today. Erik, this survey is something that I've not personally spent much time on, but I'm blown away at the data. It's really unique and detailed. First of all, welcome. Good to see you again. >> Great to see you too, Dave, and I'm really happy to be talking about the ETS or the Emerging Technology Survey. Even our own clients of constituents probably don't spend as much time in here as they should. >> Yeah, because there's so much in the mainstream, but let's pull up a slide to bring out the survey composition. Tell us about the study. How often do you run it? What's the background and the methodology? >> Yeah, you were just spot on the way you were talking about the private tech companies out there. So what we did is we decided to take all the vendors that we track that are not yet public and move 'em over to the ETS. And there isn't a lot of information out there. If you're not in Silicon (indistinct), you're not going to get this stuff. So PitchBook and Tech Crunch are two out there that gives some data on these guys. But what we really wanted to do was go out to our community. We have 6,000, ITDMs in our community. We wanted to ask them, "Are you aware of these companies? And if so, are you allocating any resources to them? Are you planning to evaluate them," and really just kind of figure out what we can do. So this particular survey, as you can see, 1000 plus responses, over 450 vendors that we track. And essentially what we're trying to do here is talk about your evaluation and awareness of these companies and also your utilization. And also if you're not utilizing 'em, then we can also figure out your sales conversion or churn. So this is interesting, not only for the ITDMs themselves to figure out what their peers are evaluating and what they should put in POCs against the big guys when contracts come up. But it's also really interesting for the tech vendors themselves to see how they're performing. >> And you can see 2/3 of the respondents are director level of above. You got 28% is C-suite. There is of course a North America bias, 70, 75% is North America. But these smaller companies, you know, that's when they start doing business. So, okay. We're going to do a couple of things here today. First, we're going to give you the big picture across the sectors that ETR covers within the ETS survey. And then we're going to look at the high and low sentiment for the larger private companies. And then we're going to do the same for the smaller private companies, the ones that don't have as much mindshare. And then I'm going to put those two groups together and we're going to look at two dimensions, actually three dimensions, which companies are being evaluated the most. Second, companies are getting the most usage and adoption of their offerings. And then third, which companies are seeing the highest churn rates, which of course is a silent killer of companies. And then finally, we're going to look at the sentiment and mindshare for two key areas that we like to cover often here on "Breaking Analysis", security and data. And data comprises database, including data warehousing, and then big data analytics is the second part of data. And then machine learning and AI is the third section within data that we're going to look at. Now, one other thing before we get into it, ETR very often will include open source offerings in the mix, even though they're not companies like TensorFlow or Kubernetes, for example. And we'll call that out during this discussion. The reason this is done is for context, because everyone is using open source. It is the heart of innovation and many business models are super glued to an open source offering, like take MariaDB, for example. There's the foundation and then there's with the open source code and then there, of course, the company that sells services around the offering. Okay, so let's first look at the highest and lowest sentiment among these private firms, the ones that have the highest mindshare. So they're naturally going to be somewhat larger. And we do this on two dimensions, sentiment on the vertical axis and mindshare on the horizontal axis and note the open source tool, see Kubernetes, Postgres, Kafka, TensorFlow, Jenkins, Grafana, et cetera. So Erik, please explain what we're looking at here, how it's derived and what the data tells us. >> Certainly, so there is a lot here, so we're going to break it down first of all by explaining just what mindshare and net sentiment is. You explain the axis. We have so many evaluation metrics, but we need to aggregate them into one so that way we can rank against each other. Net sentiment is really the aggregation of all the positive and subtracting out the negative. So the net sentiment is a very quick way of looking at where these companies stand versus their peers in their sectors and sub sectors. Mindshare is basically the awareness of them, which is good for very early stage companies. And you'll see some names on here that are obviously been around for a very long time. And they're clearly be the bigger on the axis on the outside. Kubernetes, for instance, as you mentioned, is open source. This de facto standard for all container orchestration, and it should be that far up into the right, because that's what everyone's using. In fact, the open source leaders are so prevalent in the emerging technology survey that we break them out later in our analysis, 'cause it's really not fair to include them and compare them to the actual companies that are providing the support and the security around that open source technology. But no survey, no analysis, no research would be complete without including these open source tech. So what we're looking at here, if I can just get away from the open source names, we see other things like Databricks and OneTrust . They're repeating as top net sentiment performers here. And then also the design vendors. People don't spend a lot of time on 'em, but Miro and Figma. This is their third survey in a row where they're just dominating that sentiment overall. And Adobe should probably take note of that because they're really coming after them. But Databricks, we all know probably would've been a public company by now if the market hadn't turned, but you can see just how dominant they are in a survey of nothing but private companies. And we'll see that again when we talk about the database later. >> And I'll just add, so you see automation anywhere on there, the big UiPath competitor company that was not able to get to the public markets. They've been trying. Snyk, Peter McKay's company, they've raised a bunch of money, big security player. They're doing some really interesting things in developer security, helping developers secure the data flow, H2O.ai, Dataiku AI company. We saw them at the Snowflake Summit. Redis Labs, Netskope and security. So a lot of names that we know that ultimately we think are probably going to be hitting the public market. Okay, here's the same view for private companies with less mindshare, Erik. Take us through this one. >> On the previous slide too real quickly, I wanted to pull that security scorecard and we'll get back into it. But this is a newcomer, that I couldn't believe how strong their data was, but we'll bring that up in a second. Now, when we go to the ones of lower mindshare, it's interesting to talk about open source, right? Kubernetes was all the way on the top right. Everyone uses containers. Here we see Istio up there. Not everyone is using service mesh as much. And that's why Istio is in the smaller breakout. But still when you talk about net sentiment, it's about the leader, it's the highest one there is. So really interesting to point out. Then we see other names like Collibra in the data side really performing well. And again, as always security, very well represented here. We have Aqua, Wiz, Armis, which is a standout in this survey this time around. They do IoT security. I hadn't even heard of them until I started digging into the data here. And I couldn't believe how well they were doing. And then of course you have AnyScale, which is doing a second best in this and the best name in the survey Hugging Face, which is a machine learning AI tool. Also doing really well on a net sentiment, but they're not as far along on that access of mindshare just yet. So these are again, emerging companies that might not be as well represented in the enterprise as they will be in a couple of years. >> Hugging Face sounds like something you do with your two year old. Like you said, you see high performers, AnyScale do machine learning and you mentioned them. They came out of Berkeley. Collibra Governance, InfluxData is on there. InfluxDB's a time series database. And yeah, of course, Alex, if you bring that back up, you get a big group of red dots, right? That's the bad zone, I guess, which Sisense does vis, Yellowbrick Data is a NPP database. How should we interpret the red dots, Erik? I mean, is it necessarily a bad thing? Could it be misinterpreted? What's your take on that? >> Sure, well, let me just explain the definition of it first from a data science perspective, right? We're a data company first. So the gray dots that you're seeing that aren't named, that's the mean that's the average. So in order for you to be on this chart, you have to be at least one standard deviation above or below that average. So that gray is where we're saying, "Hey, this is where the lump of average comes in. This is where everyone normally stands." So you either have to be an outperformer or an underperformer to even show up in this analysis. So by definition, yes, the red dots are bad. You're at least one standard deviation below the average of your peers. It's not where you want to be. And if you're on the lower left, not only are you not performing well from a utilization or an actual usage rate, but people don't even know who you are. So that's a problem, obviously. And the VCs and the PEs out there that are backing these companies, they're the ones who mostly are interested in this data. >> Yeah. Oh, that's great explanation. Thank you for that. No, nice benchmarking there and yeah, you don't want to be in the red. All right, let's get into the next segment here. Here going to look at evaluation rates, adoption and the all important churn. First new evaluations. Let's bring up that slide. And Erik, take us through this. >> So essentially I just want to explain what evaluation means is that people will cite that they either plan to evaluate the company or they're currently evaluating. So that means we're aware of 'em and we are choosing to do a POC of them. And then we'll see later how that turns into utilization, which is what a company wants to see, awareness, evaluation, and then actually utilizing them. That's sort of the life cycle for these emerging companies. So what we're seeing here, again, with very high evaluation rates. H2O, we mentioned. SecurityScorecard jumped up again. Chargebee, Snyk, Salt Security, Armis. A lot of security names are up here, Aqua, Netskope, which God has been around forever. I still can't believe it's in an Emerging Technology Survey But so many of these names fall in data and security again, which is why we decided to pick those out Dave. And on the lower side, Vena, Acton, those unfortunately took the dubious award of the lowest evaluations in our survey, but I prefer to focus on the positive. So SecurityScorecard, again, real standout in this one, they're in a security assessment space, basically. They'll come in and assess for you how your security hygiene is. And it's an area of a real interest right now amongst our ITDM community. >> Yeah, I mean, I think those, and then Arctic Wolf is up there too. They're doing managed services. You had mentioned Netskope. Yeah, okay. All right, let's look at now adoption. These are the companies whose offerings are being used the most and are above that standard deviation in the green. Take us through this, Erik. >> Sure, yet again, what we're looking at is, okay, we went from awareness, we went to evaluation. Now it's about utilization, which means a survey respondent's going to state "Yes, we evaluated and we plan to utilize it" or "It's already in our enterprise and we're actually allocating further resources to it." Not surprising, again, a lot of open source, the reason why, it's free. So it's really easy to grow your utilization on something that's free. But as you and I both know, as Red Hat proved, there's a lot of money to be made once the open source is adopted, right? You need the governance, you need the security, you need the support wrapped around it. So here we're seeing Kubernetes, Postgres, Apache Kafka, Jenkins, Grafana. These are all open source based names. But if we're looking at names that are non open source, we're going to see Databricks, Automation Anywhere, Rubrik all have the highest mindshare. So these are the names, not surprisingly, all names that probably should have been public by now. Everyone's expecting an IPO imminently. These are the names that have the highest mindshare. If we talk about the highest utilization rates, again, Miro and Figma pop up, and I know they're not household names, but they are just dominant in this survey. These are applications that are meant for design software and, again, they're going after an Autodesk or a CAD or Adobe type of thing. It is just dominant how high the utilization rates are here, which again is something Adobe should be paying attention to. And then you'll see a little bit lower, but also interesting, we see Collibra again, we see Hugging Face again. And these are names that are obviously in the data governance, ML, AI side. So we're seeing a ton of data, a ton of security and Rubrik was interesting in this one, too, high utilization and high mindshare. We know how pervasive they are in the enterprise already. >> Erik, Alex, keep that up for a second, if you would. So yeah, you mentioned Rubrik. Cohesity's not on there. They're sort of the big one. We're going to talk about them in a moment. Puppet is interesting to me because you remember the early days of that sort of space, you had Puppet and Chef and then you had Ansible. Red Hat bought Ansible and then Ansible really took off. So it's interesting to see Puppet on there as well. Okay. So now let's look at the churn because this one is where you don't want to be. It's, of course, all red 'cause churn is bad. Take us through this, Erik. >> Yeah, definitely don't want to be here and I don't love to dwell on the negative. So we won't spend as much time. But to your point, there's one thing I want to point out that think it's important. So you see Rubrik in the same spot, but Rubrik has so many citations in our survey that it actually would make sense that they're both being high utilization and churn just because they're so well represented. They have such a high overall representation in our survey. And the reason I call that out is Cohesity. Cohesity has an extremely high churn rate here about 17% and unlike Rubrik, they were not on the utilization side. So Rubrik is seeing both, Cohesity is not. It's not being utilized, but it's seeing a high churn. So that's the way you can look at this data and say, "Hm." Same thing with Puppet. You noticed that it was on the other slide. It's also on this one. So basically what it means is a lot of people are giving Puppet a shot, but it's starting to churn, which means it's not as sticky as we would like. One that was surprising on here for me was Tanium. It's kind of jumbled in there. It's hard to see in the middle, but Tanium, I was very surprised to see as high of a churn because what I do hear from our end user community is that people that use it, like it. It really kind of spreads into not only vulnerability management, but also that endpoint detection and response side. So I was surprised by that one, mostly to see Tanium in here. Mural, again, was another one of those application design softwares that's seeing a very high churn as well. >> So you're saying if you're in both... Alex, bring that back up if you would. So if you're in both like MariaDB is for example, I think, yeah, they're in both. They're both green in the previous one and red here, that's not as bad. You mentioned Rubrik is going to be in both. Cohesity is a bit of a concern. Cohesity just brought on Sanjay Poonen. So this could be a go to market issue, right? I mean, 'cause Cohesity has got a great product and they got really happy customers. So they're just maybe having to figure out, okay, what's the right ideal customer profile and Sanjay Poonen, I guarantee, is going to have that company cranking. I mean they had been doing very well on the surveys and had fallen off of a bit. The other interesting things wondering the previous survey I saw Cvent, which is an event platform. My only reason I pay attention to that is 'cause we actually have an event platform. We don't sell it separately. We bundle it as part of our offerings. And you see Hopin on here. Hopin raised a billion dollars during the pandemic. And we were like, "Wow, that's going to blow up." And so you see Hopin on the churn and you didn't see 'em in the previous chart, but that's sort of interesting. Like you said, let's not kind of dwell on the negative, but you really don't. You know, churn is a real big concern. Okay, now we're going to drill down into two sectors, security and data. Where data comprises three areas, database and data warehousing, machine learning and AI and big data analytics. So first let's take a look at the security sector. Now this is interesting because not only is it a sector drill down, but also gives an indicator of how much money the firm has raised, which is the size of that bubble. And to tell us if a company is punching above its weight and efficiently using its venture capital. Erik, take us through this slide. Explain the dots, the size of the dots. Set this up please. >> Yeah. So again, the axis is still the same, net sentiment and mindshare, but what we've done this time is we've taken publicly available information on how much capital company is raised and that'll be the size of the circle you see around the name. And then whether it's green or red is basically saying relative to the amount of money they've raised, how are they doing in our data? So when you see a Netskope, which has been around forever, raised a lot of money, that's why you're going to see them more leading towards red, 'cause it's just been around forever and kind of would expect it. Versus a name like SecurityScorecard, which is only raised a little bit of money and it's actually performing just as well, if not better than a name, like a Netskope. OneTrust doing absolutely incredible right now. BeyondTrust. We've seen the issues with Okta, right. So those are two names that play in that space that obviously are probably getting some looks about what's going on right now. Wiz, we've all heard about right? So raised a ton of money. It's doing well on net sentiment, but the mindshare isn't as well as you'd want, which is why you're going to see a little bit of that red versus a name like Aqua, which is doing container and application security. And hasn't raised as much money, but is really neck and neck with a name like Wiz. So that is why on a relative basis, you'll see that more green. As we all know, information security is never going away. But as we'll get to later in the program, Dave, I'm not sure in this current market environment, if people are as willing to do POCs and switch away from their security provider, right. There's a little bit of tepidness out there, a little trepidation. So right now we're seeing overall a slight pause, a slight cooling in overall evaluations on the security side versus historical levels a year ago. >> Now let's stay on here for a second. So a couple things I want to point out. So it's interesting. Now Snyk has raised over, I think $800 million but you can see them, they're high on the vertical and the horizontal, but now compare that to Lacework. It's hard to see, but they're kind of buried in the middle there. That's the biggest dot in this whole thing. I think I'm interpreting this correctly. They've raised over a billion dollars. It's a Mike Speiser company. He was the founding investor in Snowflake. So people watch that very closely, but that's an example of where they're not punching above their weight. They recently had a layoff and they got to fine tune things, but I'm still confident they they're going to do well. 'Cause they're approaching security as a data problem, which is probably people having trouble getting their arms around that. And then again, I see Arctic Wolf. They're not red, they're not green, but they've raised fair amount of money, but it's showing up to the right and decent level there. And a couple of the other ones that you mentioned, Netskope. Yeah, they've raised a lot of money, but they're actually performing where you want. What you don't want is where Lacework is, right. They've got some work to do to really take advantage of the money that they raised last November and prior to that. >> Yeah, if you're seeing that more neutral color, like you're calling out with an Arctic Wolf, like that means relative to their peers, this is where they should be. It's when you're seeing that red on a Lacework where we all know, wow, you raised a ton of money and your mindshare isn't where it should be. Your net sentiment is not where it should be comparatively. And then you see these great standouts, like Salt Security and SecurityScorecard and Abnormal. You know they haven't raised that much money yet, but their net sentiment's higher and their mindshare's doing well. So those basically in a nutshell, if you're a PE or a VC and you see a small green circle, then you're doing well, then it means you made a good investment. >> Some of these guys, I don't know, but you see these small green circles. Those are the ones you want to start digging into and maybe help them catch a wave. Okay, let's get into the data discussion. And again, three areas, database slash data warehousing, big data analytics and ML AI. First, we're going to look at the database sector. So Alex, thank you for bringing that up. Alright, take us through this, Erik. Actually, let me just say Postgres SQL. I got to ask you about this. It shows some funding, but that actually could be a mix of EDB, the company that commercializes Postgres and Postgres the open source database, which is a transaction system and kind of an open source Oracle. You see MariaDB is a database, but open source database. But the companies they've raised over $200 million and they filed an S-4. So Erik looks like this might be a little bit of mashup of companies and open source products. Help us understand this. >> Yeah, it's tough when you start dealing with the open source side and I'll be honest with you, there is a little bit of a mashup here. There are certain names here that are a hundred percent for profit companies. And then there are others that are obviously open source based like Redis is open source, but Redis Labs is the one trying to monetize the support around it. So you're a hundred percent accurate on this slide. I think one of the things here that's important to note though, is just how important open source is to data. If you're going to be going to any of these areas, it's going to be open source based to begin with. And Neo4j is one I want to call out here. It's not one everyone's familiar with, but it's basically geographical charting database, which is a name that we're seeing on a net sentiment side actually really, really high. When you think about it's the third overall net sentiment for a niche database play. It's not as big on the mindshare 'cause it's use cases aren't as often, but third biggest play on net sentiment. I found really interesting on this slide. >> And again, so MariaDB, as I said, they filed an S-4 I think $50 million in revenue, that might even be ARR. So they're not huge, but they're getting there. And by the way, MariaDB, if you don't know, was the company that was formed the day that Oracle bought Sun in which they got MySQL and MariaDB has done a really good job of replacing a lot of MySQL instances. Oracle has responded with MySQL HeatWave, which was kind of the Oracle version of MySQL. So there's some interesting battles going on there. If you think about the LAMP stack, the M in the LAMP stack was MySQL. And so now it's all MariaDB replacing that MySQL for a large part. And then you see again, the red, you know, you got to have some concerns about there. Aerospike's been around for a long time. SingleStore changed their name a couple years ago, last year. Yellowbrick Data, Fire Bolt was kind of going after Snowflake for a while, but yeah, you want to get out of that red zone. So they got some work to do. >> And Dave, real quick for the people that aren't aware, I just want to let them know that we can cut this data with the public company data as well. So we can cross over this with that because some of these names are competing with the larger public company names as well. So we can go ahead and cross reference like a MariaDB with a Mongo, for instance, or of something of that nature. So it's not in this slide, but at another point we can certainly explain on a relative basis how these private names are doing compared to the other ones as well. >> All right, let's take a quick look at analytics. Alex, bring that up if you would. Go ahead, Erik. >> Yeah, I mean, essentially here, I can't see it on my screen, my apologies. I just kind of went to blank on that. So gimme one second to catch up. >> So I could set it up while you're doing that. You got Grafana up and to the right. I mean, this is huge right. >> Got it thank you. I lost my screen there for a second. Yep. Again, open source name Grafana, absolutely up and to the right. But as we know, Grafana Labs is actually picking up a lot of speed based on Grafana, of course. And I think we might actually hear some noise from them coming this year. The names that are actually a little bit more disappointing than I want to call out are names like ThoughtSpot. It's been around forever. Their mindshare of course is second best here but based on the amount of time they've been around and the amount of money they've raised, it's not actually outperforming the way it should be. We're seeing Moogsoft obviously make some waves. That's very high net sentiment for that company. It's, you know, what, third, fourth position overall in this entire area, Another name like Fivetran, Matillion is doing well. Fivetran, even though it's got a high net sentiment, again, it's raised so much money that we would've expected a little bit more at this point. I know you know this space extremely well, but basically what we're looking at here and to the bottom left, you're going to see some names with a lot of red, large circles that really just aren't performing that well. InfluxData, however, second highest net sentiment. And it's really pretty early on in this stage and the feedback we're getting on this name is the use cases are great, the efficacy's great. And I think it's one to watch out for. >> InfluxData, time series database. The other interesting things I just noticed here, you got Tamer on here, which is that little small green. Those are the ones we were saying before, look for those guys. They might be some of the interesting companies out there and then observe Jeremy Burton's company. They do observability on top of Snowflake, not green, but kind of in that gray. So that's kind of cool. Monte Carlo is another one, they're sort of slightly green. They are doing some really interesting things in data and data mesh. So yeah, okay. So I can spend all day on this stuff, Erik, phenomenal data. I got to get back and really dig in. Let's end with machine learning and AI. Now this chart it's similar in its dimensions, of course, except for the money raised. We're not showing that size of the bubble, but AI is so hot. We wanted to cover that here, Erik, explain this please. Why TensorFlow is highlighted and walk us through this chart. >> Yeah, it's funny yet again, right? Another open source name, TensorFlow being up there. And I just want to explain, we do break out machine learning, AI is its own sector. A lot of this of course really is intertwined with the data side, but it is on its own area. And one of the things I think that's most important here to break out is Databricks. We started to cover Databricks in machine learning, AI. That company has grown into much, much more than that. So I do want to state to you Dave, and also the audience out there that moving forward, we're going to be moving Databricks out of only the MA/AI into other sectors. So we can kind of value them against their peers a little bit better. But in this instance, you could just see how dominant they are in this area. And one thing that's not here, but I do want to point out is that we have the ability to break this down by industry vertical, organization size. And when I break this down into Fortune 500 and Fortune 1000, both Databricks and Tensorflow are even better than you see here. So it's quite interesting to see that the names that are succeeding are also succeeding with the largest organizations in the world. And as we know, large organizations means large budgets. So this is one area that I just thought was really interesting to point out that as we break it down, the data by vertical, these two names still are the outstanding players. >> I just also want to call it H2O.ai. They're getting a lot of buzz in the marketplace and I'm seeing them a lot more. Anaconda, another one. Dataiku consistently popping up. DataRobot is also interesting because all the kerfuffle that's going on there. The Cube guy, Cube alum, Chris Lynch stepped down as executive chairman. All this stuff came out about how the executives were taking money off the table and didn't allow the employees to participate in that money raising deal. So that's pissed a lot of people off. And so they're now going through some kind of uncomfortable things, which is unfortunate because DataRobot, I noticed, we haven't covered them that much in "Breaking Analysis", but I've noticed them oftentimes, Erik, in the surveys doing really well. So you would think that company has a lot of potential. But yeah, it's an important space that we're going to continue to watch. Let me ask you Erik, can you contextualize this from a time series standpoint? I mean, how is this changed over time? >> Yeah, again, not show here, but in the data. I'm sorry, go ahead. >> No, I'm sorry. What I meant, I should have interjected. In other words, you would think in a downturn that these emerging companies would be less interesting to buyers 'cause they're more risky. What have you seen? >> Yeah, and it was interesting before we went live, you and I were having this conversation about "Is the downturn stopping people from evaluating these private companies or not," right. In a larger sense, that's really what we're doing here. How are these private companies doing when it comes down to the actual practitioners? The people with the budget, the people with the decision making. And so what I did is, we have historical data as you know, I went back to the Emerging Technology Survey we did in November of 21, right at the crest right before the market started to really fall and everything kind of started to fall apart there. And what I noticed is on the security side, very much so, we're seeing less evaluations than we were in November 21. So I broke it down. On cloud security, net sentiment went from 21% to 16% from November '21. That's a pretty big drop. And again, that sentiment is our one aggregate metric for overall positivity, meaning utilization and actual evaluation of the name. Again in database, we saw it drop a little bit from 19% to 13%. However, in analytics we actually saw it stay steady. So it's pretty interesting that yes, cloud security and security in general is always going to be important. But right now we're seeing less overall net sentiment in that space. But within analytics, we're seeing steady with growing mindshare. And also to your point earlier in machine learning, AI, we're seeing steady net sentiment and mindshare has grown a whopping 25% to 30%. So despite the downturn, we're seeing more awareness of these companies in analytics and machine learning and a steady, actual utilization of them. I can't say the same in security and database. They're actually shrinking a little bit since the end of last year. >> You know it's interesting, we were on a round table, Erik does these round tables with CISOs and CIOs, and I remember one time you had asked the question, "How do you think about some of these emerging tech companies?" And one of the executives said, "I always include somebody in the bottom left of the Gartner Magic Quadrant in my RFPs. I think he said, "That's how I found," I don't know, it was Zscaler or something like that years before anybody ever knew of them "Because they're going to help me get to the next level." So it's interesting to see Erik in these sectors, how they're holding up in many cases. >> Yeah. It's a very important part for the actual IT practitioners themselves. There's always contracts coming up and you always have to worry about your next round of negotiations. And that's one of the roles these guys play. You have to do a POC when contracts come up, but it's also their job to stay on top of the new technology. You can't fall behind. Like everyone's a software company. Now everyone's a tech company, no matter what you're doing. So these guys have to stay in on top of it. And that's what this ETS can do. You can go in here and look and say, "All right, I'm going to evaluate their technology," and it could be twofold. It might be that you're ready to upgrade your technology and they're actually pushing the envelope or it simply might be I'm using them as a negotiation ploy. So when I go back to the big guy who I have full intentions of writing that contract to, at least I have some negotiation leverage. >> Erik, we got to leave it there. I could spend all day. I'm going to definitely dig into this on my own time. Thank you for introducing this, really appreciate your time today. >> I always enjoy it, Dave and I hope everyone out there has a great holiday weekend. Enjoy the rest of the summer. And, you know, I love to talk data. So anytime you want, just point the camera on me and I'll start talking data. >> You got it. I also want to thank the team at ETR, not only Erik, but Darren Bramen who's a data scientist, really helped prepare this data, the entire team over at ETR. I cannot tell you how much additional data there is. We are just scratching the surface in this "Breaking Analysis". So great job guys. I want to thank Alex Myerson. Who's on production and he manages the podcast. Ken Shifman as well, who's just coming back from VMware Explore. Kristen Martin and Cheryl Knight help get the word out on social media and in our newsletters. And Rob Hof is our editor in chief over at SiliconANGLE. Does some great editing for us. Thank you. All of you guys. Remember these episodes, they're all available as podcast, wherever you listen. All you got to do is just search "Breaking Analysis" podcast. I publish each week on wikibon.com and siliconangle.com. Or you can email me to get in touch david.vellante@siliconangle.com. You can DM me at dvellante or comment on my LinkedIn posts and please do check out etr.ai for the best survey data in the enterprise tech business. This is Dave Vellante for Erik Bradley and The Cube Insights powered by ETR. Thanks for watching. Be well. And we'll see you next time on "Breaking Analysis". (upbeat music)

Published Date : Sep 7 2022

SUMMARY :

bringing you data driven it's called the Emerging Great to see you too, Dave, so much in the mainstream, not only for the ITDMs themselves It is the heart of innovation So the net sentiment is a very So a lot of names that we And then of course you have AnyScale, That's the bad zone, I guess, So the gray dots that you're rates, adoption and the all And on the lower side, Vena, Acton, in the green. are in the enterprise already. So now let's look at the churn So that's the way you can look of dwell on the negative, So again, the axis is still the same, And a couple of the other And then you see these great standouts, Those are the ones you want to but Redis Labs is the one And by the way, MariaDB, So it's not in this slide, Alex, bring that up if you would. So gimme one second to catch up. So I could set it up but based on the amount of time Those are the ones we were saying before, And one of the things I think didn't allow the employees to here, but in the data. What have you seen? the market started to really And one of the executives said, And that's one of the Thank you for introducing this, just point the camera on me We are just scratching the surface

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
ErikPERSON

0.99+

Alex MyersonPERSON

0.99+

Ken ShifmanPERSON

0.99+

Sanjay PoonenPERSON

0.99+

Dave VellantePERSON

0.99+

DavePERSON

0.99+

Erik BradleyPERSON

0.99+

November 21DATE

0.99+

Darren BramenPERSON

0.99+

AlexPERSON

0.99+

Cheryl KnightPERSON

0.99+

PostgresORGANIZATION

0.99+

DatabricksORGANIZATION

0.99+

NetskopeORGANIZATION

0.99+

AdobeORGANIZATION

0.99+

Rob HofPERSON

0.99+

FivetranORGANIZATION

0.99+

$50 millionQUANTITY

0.99+

21%QUANTITY

0.99+

Chris LynchPERSON

0.99+

19%QUANTITY

0.99+

Jeremy BurtonPERSON

0.99+

$800 millionQUANTITY

0.99+

6,000QUANTITY

0.99+

OracleORGANIZATION

0.99+

Redis LabsORGANIZATION

0.99+

November '21DATE

0.99+

ETRORGANIZATION

0.99+

FirstQUANTITY

0.99+

25%QUANTITY

0.99+

last yearDATE

0.99+

OneTrustORGANIZATION

0.99+

two dimensionsQUANTITY

0.99+

two groupsQUANTITY

0.99+

November of 21DATE

0.99+

bothQUANTITY

0.99+

BostonLOCATION

0.99+

more than 400 companiesQUANTITY

0.99+

Kristen MartinPERSON

0.99+

MySQLTITLE

0.99+

MoogsoftORGANIZATION

0.99+

The CubeORGANIZATION

0.99+

thirdQUANTITY

0.99+

GrafanaORGANIZATION

0.99+

H2OORGANIZATION

0.99+

Mike SpeiserPERSON

0.99+

david.vellante@siliconangle.comOTHER

0.99+

secondQUANTITY

0.99+

twoQUANTITY

0.99+

firstQUANTITY

0.99+

28%QUANTITY

0.99+

16%QUANTITY

0.99+

SecondQUANTITY

0.99+

Mitchell Hashimoto, HashiCorp | PagerDuty Summit 2019


 

>>from San Francisco. It's the Q covering pager duty Summit 2019. Brought to you by pager Duty. >>Hey, welcome back there. Ready, Geoffrey? Here with the cue, we're pager duty Summit in the historic Western St Francis Hotel, downtown San Francisco. I think they've outgrown the venue. The place is packed to the gills. Standing, rolling, the keynote Really excited of our next guest. Someone who's been to this industry for awhile really done some super cool creative things. He's given the closing keynote. We're happy to have him here right now. That's Mitchell Hashimoto from Hachiko. It's great to see you. >>Good to see you too. Thanks for having >>absolutely so just a quick overview before we get into it on hot chic or for the people in our familiar >>Sure, so hospitals a company that what we try to do is help people adopt cloud, but more, more realistically, Adolfo multi cloud and hybrid cloud the real world complexities. That cloud isn't just a technical landing point, but it's really way You deliver software. You want to deliver more applications, you want to connect them faster. You want to do this in an automated away infrastructure is code of all these modern practices way. Build a suite of tools Thio provisions secure, connect and run those applications for separate products that we sell that you could adopt separately. Good mix and match. That's That's what we've been doing for a long time. Based on open source Software, Way started purely as an open source community and have grown into an enterprise cos that's that's That's the elevator pitch. >>No, it's great, but it's a great story, >>right? Europe, Europe in Seattle got some access to some cloud infrastructure and really solve your own problem. Figured out other people of that problem and then really built a really cool, open source kind of based software company. >>Yeah, I mean, I think the amount of people that had the problem I was facing personally was orders of magnitude more than I expected. I've told other people we never expected to start even a business around this. It was just scratching and building technical solutions. But a CZ, as we sort of worked at startups, started talking a bigger and bigger companies. It just kept everyone kept saying, Yes, I have that problem and it's only grown since then, right surprising, >>and the complexity has only grown exponentially before. The you know, years ago, there was this bright, shiny new object called a W s. I mean, I love Bezos is great line that nobody even paid attention. You have six or seven years. They've got a head start and kind of this Russian. Now there's been a little bit of a fallback as people trying to figure out what to go where now it's hybrid cloud and horses for courses. So a lot of great complexity, which is nothing but good news for you. >>Absolutely. I told this story before, but our first year incorporated company I actually got hung up on by an analyst because I said way we're trying to solve a multi cloud problem and they said that's not a real problem when it will never be a real problem. They hung up on me on it was a bet, then, and and I think they're the expectation that was it was gonna be Eight of us is gonna be physical infrastructure and the physical infrastructure days were numbered. It was gonna get acts out. It was just gonna all go to eight of us and our conviction was that you would have both forever and or for a very long time. And then people like Azure, Google and others would pick up and and that's been true. But I think what we didn't expect, the complexity that got introduced with things like containers in Kubernetes because it's not like Clouded option finished in the next started It all came at once. So now Riel Cos they're dealing with the complexity of their still trying to move the clouds. They're trying to get more out of their physical infrastructure, trying to adopt kubernetes. Now people are starting to peck at them about server list. So there the complexity is is a bit crazy and review our job trying to simplify that adoption make you get the most out of >>right. And that was before you could get a piece of Ian where inside of AWS, get a get a piece of the Google Data Center inside your own data center. So it just continues to get crazier. >>Yes, yeah, So you're giving a closing keynote on a >>new project. You're working on fault, and it's an existing project. Justin cry. They're old, but but I think you talked about before we turn the cameras on. It's really more of a kind of an attitude in a and a point of view and a way to go after the problem. So I wonder if you could kind of dig into a little bit of What did you see? How did you decide to kind of turn the lens a little bit and reframe this challenge? Yeah, >>I think the big picture of story I'm trying to tell him the keynote is that everybody? Anything You look around the technical nontechnical, this table, that glass. Like everything you look at, it trickles back to the idea of one or a small group of people, and it takes an army to make it show up on this table. But it starts by somebody's vision, and everything was created by somebody. So I'm talking about vault, something we made and, you know, why don't we create it? And why do we make it the way we did? And you know, another thing I say is people ask, Why did you start hot record for having this vision? Something I constantly told myself was wine on me. I get someone's gonna do it. Why not make it? Could be anybody, like I'll give it a shot. Why not? And Bolt was that way. We Armand. I'm a co founder. Way took security classes in college, but we don't have a formal security background. We didn't work in security in industry. So the odds of us launching a security product that is so prevalent today whether you know it or not, it's behind the scenes very prevalent were stacked against us. How did that happen? And that's that's sort of what I've been going to talk about. >>Let's go. But do >>dive into a little bit on the security challenge because it's funny, right? Everyone always says, Right. Security's got to be baked in and you've got these complex infrastructure and everything's connected with AP eyes, the other people's applications and, oh yes, delivered through this little thing that you carry around. And maybe the network's not working well or the CPS running low are You're running iPhone five. And of course, it's not gonna work on most modern app. Yeah, bacon security always do, but that's easy to say. It's much harder to do, you know. Still, people want to build moats and castles and drawbridges, and that's just not gonna work anymore. >>Exactly. So you exactly hit upon the two major issues that we recognize there felt we recognize. One was that a lot of people were saying it. Very few people were doing it on. The reality was it was hard to do. Everyone knew theoretically what they should do. No one, no one thought. Oh yeah, saving somebody's personal information in plain text in the daytime. It's a good idea. Nobody thought that Everyone said it should be encrypted, but encryption is hard. So maybe one day, so no one was doing it. And then the other side of it was the people that were doing it where the world's largest companies, because the solutions were catered towards his mindset of of castle and moats, which works totally fine in a physical tradition environment but completely breaks down in a cloud world where there is no four perimeters anymore. It's >>still there, There. >>You're one AP I call away from opening everything to the Internet. So how do you protect this? And we've seen a lot of trends change towards zero Trust and ServiceMaster Mutual feel like there's a lot of stuff that happened way sort of jumped on that. >>Yeah, so So you're using, like, multi level encryption, and I've read a little bit on the website. It's way over my head, I think. But, you >>know, the basics are just making kryptonite. Christian makes security, cloud infrastructure, security approachable by anybody and a core philosophy. Our company, Hashi Hashi Hashi. My name means bridge, and that is a core part of our culture. Which is you can't just have, ah, theoretical thing or a shiny object and leave people hanging. You gotta give them a bridge, a path to get there, right? And so we say, with all our technology, one of the crawl, walk and run adoption periods and with security it's the same is that to say you're secure means something totally different everybody for a bank to be secure, it's a lot more than for a five person started to be secure. So how do you give somebody a solutions they could adopt? Check the security box for themselves at every path of the lake, and bald is one of the tools that way have individuals using it, and we have the world's largest companies, almost 10% of the global 2000 paying customers evolved many more open source users on its scales the entire spectrum. >>Wow. So you keep coming up >>with lots of new, uh, new projects as we get ready to flip the counter to 2020. What are some of the things you're thinking about? >>I think the big one, you know, that our focus is right now is service. Miss Vault is we're big enough company now where we always have teams working on every every one of our projects we have release is going out. The thing we've been talking about the most is the service mess thing. I think Cloud as a mainstream thing, Let's say, has has existed for seven or eight years. It's since it's been released. It's been over in almost 15 but as a thing that people have, that is a good idea. Seven or eight years and you know we've touched security. Now we've touched how infrastructures managed touch developers. I think a place that's been relatively untouched and has gotten by without anyone noticing has been networking and network security. They're they're really doing things the way they've always done things, and I think that's been okay because there's bigger fish to fry. But I think the time has come and networking as a bull's eye on it. And people are looking at What is networking mean in a cloud world and service mash appears to be the way that is gonna happen. Way have our own service mess solution called Council on Our Approaches Standard Hasta Corp. It's nothing new. It's We're gonna work with everything containers, kubernetes, viens physical infrastructure. We're gonna make it all work across multiple data centers. That is our approach service fashion, solving that challenge. >>What's the secret sauce? >>I mean, it's not that secret, right? >>It's just building. Just execute. Better understand that this header >>JD is the problem, right? Right, I said, This is our keynote a couple weeks ago that there are a lot of service messes out there, and nine out of 10 of them are solving a solution for a single environment, whether it's kubernetes or physical environment. And I think that's a problem. But it's not the problem. The problem to me is how do I get my kubernetes instances pods to communicate to my NSX service is on my physical infrastructure. That is the problem as people, whether that's temporary, not and they intend to move the communities or whatever. It's that's the reality. And how do you make that work? And that is what we're focused on solving that problem >>just every time I hear service mess. I think there was a company a while ago that sold the CSC. Probably like 2013. Didn't really get into That is a as a good, happy story. But they were early on the name. Yeah. Yeah. So last thing pager duty were Pedrie. What? You guys doing a page of duty? >>Sure. So we've been I've actually been a paying customer pager duty since before we even made this company in my previous job was a customer wear now, still customers. So we still use it internally. But in addition to that way, do integration across the board. So with terra form our infrastructure provisioning tool way have a way to manage all pager duty as code and as your complexion pager duty rises instead of clicking through a u. I being able to version and code everything and have that realize itself and how he works very valuable from like a service MASH consul standpoint. Hooking in the monitoring to the alerting of Pedro duty is a big thing that we do so tying those together. So it's very symbiotic. I love pager duty as a user and a partner. There's a lot here. >>Yeah, is pretty interesting slide when Jennifer put up in the keynote where it listed so many integration points with so many applications with on the outside looking in and you're like how you're integrating with spunk, that making how you're innovating with service. Now that doesn't make any sense. How Integrated was in Desperate. These were all kind of systems of record, but really, there's some really elegant integration points to make. This one plus one equals three opportunity between these applications. >>Yeah, I think it's very similar to the stuff we do with Walton Security. It's like the core permanence. Everybody needs him like with security. Everyone is an auto. Everyone needs traceability. Everyone needs access control. But rebuilding that functionality and every application is unrealistic. And paging and alerting an on call and events are the same thing. So it's you'd rather integrate and leverage those systems that make that your nexus for that specific functionality. And that's where Page duties. Awesome way. Step in, >>which was always great to catch up. Good luck on your keynote tomorrow. And really, it's a really amazing story to watch that you got You guys have built >>Well, thank you very much. >>All right. He's Mitchell. I'm Jeff. You're watching the cue. Were paid your duty, Simon in downtown San Francisco. Thanks for watching. We'll see you next time.

Published Date : Sep 24 2019

SUMMARY :

Brought to you by pager Duty. It's great to see you. Good to see you too. those applications for separate products that we sell that you could adopt separately. Europe, Europe in Seattle got some access to some cloud infrastructure and I was facing personally was orders of magnitude more than I expected. The you know, years ago, It was just gonna all go to eight of us and our conviction was that you And that was before you could get a piece of Ian where inside of AWS, So I wonder if you could kind of dig And you know, But do It's much harder to do, you know. So you exactly hit upon the two major issues that we recognize there felt So how do you protect this? you So how do you give somebody a solutions they could adopt? What are some of the things you're thinking about? I think the big one, you know, that our focus is right now is service. It's just building. And how do you make that work? I think there was a company a while ago that sold the CSC. Hooking in the monitoring to the alerting of Pedro points to make. It's like the core permanence. it's a really amazing story to watch that you got You guys have built We'll see you next time.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
JeffPERSON

0.99+

sixQUANTITY

0.99+

MitchellPERSON

0.99+

2013DATE

0.99+

SimonPERSON

0.99+

SevenQUANTITY

0.99+

San FranciscoLOCATION

0.99+

sevenQUANTITY

0.99+

JenniferPERSON

0.99+

iPhone fiveCOMMERCIAL_ITEM

0.99+

seven yearsQUANTITY

0.99+

AWSORGANIZATION

0.99+

2020DATE

0.99+

eight yearsQUANTITY

0.99+

GeoffreyPERSON

0.99+

Mitchell HashimotoPERSON

0.99+

eightQUANTITY

0.99+

GoogleORGANIZATION

0.99+

first yearQUANTITY

0.99+

nineQUANTITY

0.99+

two major issuesQUANTITY

0.99+

10QUANTITY

0.98+

todayDATE

0.98+

bothQUANTITY

0.98+

oneQUANTITY

0.98+

IanPERSON

0.98+

five personQUANTITY

0.98+

nexusORGANIZATION

0.97+

SeattleLOCATION

0.97+

ChristianORGANIZATION

0.97+

Walton SecurityORGANIZATION

0.97+

OneQUANTITY

0.97+

AdolfoORGANIZATION

0.97+

ServiceMaster MutualORGANIZATION

0.97+

one dayQUANTITY

0.96+

Google Data CenterORGANIZATION

0.96+

Miss VaultORGANIZATION

0.94+

BezosPERSON

0.94+

JustinPERSON

0.94+

Eight of usQUANTITY

0.94+

EuropeLOCATION

0.93+

TrustORGANIZATION

0.91+

four perimetersQUANTITY

0.91+

almost 10%QUANTITY

0.9+

zeroQUANTITY

0.89+

KubernetesTITLE

0.89+

single environmentQUANTITY

0.89+

PedroPERSON

0.87+

ArmandORGANIZATION

0.86+

ThioORGANIZATION

0.86+

HashiPERSON

0.86+

years agoDATE

0.85+

Summit 2019EVENT

0.84+

Europe,LOCATION

0.84+

HashiCorpPERSON

0.84+

couple weeks agoDATE

0.83+

Council on Our Approaches Standard Hasta Corp.ORGANIZATION

0.83+

Riel CosPERSON

0.83+

BoltPERSON

0.81+

2000 paying customersQUANTITY

0.8+

three opportunityQUANTITY

0.79+

RussianOTHER

0.79+

NSXORGANIZATION

0.74+

PedriePERSON

0.73+

pagerEVENT

0.73+

15QUANTITY

0.72+

tomorroDATE

0.68+

HotelLOCATION

0.68+

AzureTITLE

0.68+

WesternLOCATION

0.64+

coveringEVENT

0.64+

PagerDuty Summit 2019EVENT

0.62+

HachikoORGANIZATION

0.58+

agoDATE

0.54+

St FrancisORGANIZATION

0.51+

Kamal Shah, StackRox | Sumo Logic Illuminate 2019


 

>> Narrator: From Burlingame, California, it's the Cube, covering Sumo Logic Illuminate 2019. Brought to you by Sumo Logic. >> Hey welcome back everybody! Jeff Frick here with the Cube, we're at the Sumo Logic Illuminate conference, it's at the Hyatt San Francisco Airport. About 700, 800 people, full house in the keynote earlier today, all about operational process monitoring, all this crazy data is being kicked out of the Cloud and IoT and all these crazy next-gen applications. We're excited to have a very close friend of mine, CEO of a very hot company, Kamal Shah, the CEO of StackRox. Kamal, great to see you! >> Thank you, and great to be here, Jeff! >> Absolutely! So for folks that aren't familiar with StackRox, give us the overview. >> Sure, so in a nutshell, we do Kubernetes Security, and so as we've heard all day today, enterprises are deploying microservices, containers, Kubernetes, and we do security for your cloud data infrastructure. >> So how does security work for Kubernetes versus security for other things? >> Yeah, so the use cases for security, or the mission for the security team is the same, right? You got to harden your environment to prevent the bad guys from getting in. >> And, you have to make sure, despite your best efforts, if somebody does break in, then you catch them before they do any damage, right? But the how you do security has to evolve for the cloud data stack, right? It has to understand the containers are immutable affirm all infrastructure, you have to understand that it's not just about the container, but it's also about the orchestrator, and specifically Kubernetes, and it's also about making sure that you seamlessly integrate with dev ops processes, automation and workflow. So it requires a fundamentally different approach to security than traditional security tools. >> So you know, we talk a lot about the increasing attack area that's offered by IoT, right? And increasing attack area that's offered by all those API's and all these interconnected applications, but I've never heard anyone really talk about containers or orchestration as kind of a new attack surface. Did we just stop paying attention? Is that something you're seeing happen? >> Yeah it's something that is starting to emerge, and we've seen some high-profile breachers at a large next generation electric car company, and a large shopping site where misconfigurations led to security breaches in the Kubernetes' environment, and Kubernetes' ecosystem also did a Cube security audit, and so I think we're going to start to hear a lot more, because there's more and more applications are being deployed in production. It's creating a new attack area, and as the old saying goes, the predators go where there's food in the system. >> And so if you're not proactive about it, I think it's going to really hurt as you deploy containers in Kubernetes. >> Right, so we hear over and over and over again about breaches because people misconfigure stuff. That just seems to happen, whether it's a database or this, that, and the other. And I think we can pretty much safely assume everyone's going to get breached if they haven't got breached already, 'cause we hear about it all the time. How do you catch them fast, limit the damage and try not to have too much vulnerabilities? >> Exactly, so the use cases for what we do at Kubernetes are the same. Right? Its vulnerability management, it's configuration management, and we just did a study around the state of container in Kubernetes security and misconfigeration was the number one concern. Because the reality is that Kubernetes, there are a lot of knobs. And each knob has multiple options, so if you're not careful you can really misconfigure your environment and make it so much easier for attackers. >> Right, right. >> And it's precisely what happened at the two examples I sighted earlier. So a misconfigerations is important, runtime security is important, and also compliance. Let's not forget about compliance, right. You have to make sure that you meet your PCI, HIPAA, NIST, and CIS benchmark standards for this cloud native stock. >> So what we're seeing is that these are all becoming very, very important and as a result, it's increasing awareness as Kubernetes gets more prominent. >> Right, and then they are creating and tearing down hundreds, thousands, millions of these things at a nidicolous pace. >> I mean exactly. Kubernetes came out of Google, they open sourced it, and it's really what allows you to deploy, manage, containers at scale. Apparently, they manage hundreds of millions of container a day using Kubernetes, it's incredible. >> Jeff: Oh yeah, I saw a statistic that Google launches 4 billion containers per week. That was from a presentation, actually from a 451 analyst from like 2 years ago. So one can only imagine the scale. >> We are also seeing not quite 4 billion containers per week, but we are seeing thousands, and tens of thousands of containers at scale at companies everywhere. They are all deployed in production, and now they are waking up to security. The good news here is that they are waiting for breaches to happen before they solve the problem. There's still a lack of awareness, and what Sumo Logic has done today with the announcement around continued intelligence for Kubernetes just increases the awareness around, hey we have to solve observability, which is logs, metrics, and tracing, which is what Sumo does, and security for your cloud native infrastructures. >> Yeah, I mean the automation is so important, right? You can't do any of this stuff with this exponential growth of data, exponential growth of pushes, of new code releases. There's so many pieces in this, so automation is a huge piece of the puzzle. >> Automation is paramount and with this new infrastructure there aren't enough security people to solve this. So security has to become everybody's responsibility. And the only way we are going to solve this is to automate it. It also has to integrate with your DebOps processes and automation and work flows. If you don't, then the DebOps body is going to reject the security organ, right? So it has to be seamless in the way you deploy it. >> It's interesting you say that because we go to RSA, forty thousand people, more vendor than you can count, it bulges Moscone to the absolute edges. Everyone says over and over that security has to be baked in the entire process from beginning to end, it's not a bolt on and can never be successful as a bolt on. So it surprises me to hear you say that still a lot of people are kind of behind the curve. >> Well I mean if you think about I, even though they say that, right? In a traditional model of the application you go to spend 6 months building it and then you can go spend a couple of weeks or month hardening and putting security around it. But when you are launching applications every 6 hours, you can spend 6 days addressing security, so it has to be built in. And speaking of RSA, if you recall, last year the big talk at RSA was around AI, right. Everything was AI driven security. My prediction, my bold prediction for this RSA is it's going to be all around Kubernetes security. >> Yeah, well it's applied AI. Applied AI for Kubernetes. >> Exactly. >> And that's what you need. I always feel for the SISO just walking the floor at RSA going, "Where do I begin? I mean where do I spend my money, how do I prioritize?" It's kind of like an insurance problem. You can't insure to the nth degree. You got to have a budget, but how do you deploy your assets? It's got to be super, super confusing. >> It really is. I think what your seeing is that SISO's are relying on their DEV and IT ops teams, right? They are partnering with the VP of platform, the VP of infrastructure, the VP engineering, because when you think about this new world security is really, the ownership of security is now shifting from the information's security teams to DevOps teams. So security teams still drive policy, and they still want to make sure they do the trust and verify, but the implementation of the security is now being owned by DevOps teams. So its a big cultural shift that's going on in organizations today. SISO's have to realize that it's no longer just them, but they have to partner with their DevOps counterparts to effectively address security for this cloud native stock. >> Right, so tell us a little bit about the relationship with Sumo. How do the applications work together? What's the solution look like when the 2 solutions are brought together. >> So Sumo has been a great partner. We have several joint customers. The simplest way to think about this is that Sumo does observability for Kubernetes, so that's logs, metrics, and tracing, and we do security from Kubernetes. We are the yin to their yang. What we do is we have taken all the intelligence we get from security and we feed it into the Sumo dashboard. Sumo customers get a single pane of glass, not just for the observability data, but also for their security violations, weather its for vulnerability, weathers it's for configuration or if it's for runtime threats, right? You get it all in one single place. >> Right. So I just want to get your take on kind of this rise of the momentum behind Hybrid Cloud that we've seen recently. Big announcement at Google Cloud show, with Anthos. Big announcement between VMware and Amazon. It always kind of swings back and forth. It was all in to public cloud and now there's a little bit of a pullback in Hybrid, but that's terrific for you. The fact of the matter is workload should run where they should run, they don't really care it's what's appropriate. Horses for courses, right? >> Precisely so, we see the shift from public cloud to Multi-cloud, and then from Multi-cloud to Hybrid cloud. The underlying infrastructure that makes that a reality are containers and Kubernetes, right? And that's why we've seen this tremendous momentum on Kubernetes. What we are seeing is customers that want to give their Dev teams that flexibility to pick their favorite cloud, or to do it on premises, their private clouds. But they want to make it in a single security solution that gets integrated no matter where you run your infrastructure and that's integrated back to your Sumo dashboard. So you have visibility across all Dev teams, all your application infrastructure, regardless of where they are running. There is one security standard that gets implemented. That is really, that's the future. You don't want to be beholden to a one claw provider, you want flexibility, you want choice. Kubernetes allows you to do that. >> Well and the whole thing becomes more autotomized, right, with autonomic memory, autonomic compute, autonomic store, throw that on an IoT and Edges and now you're starting to distribute all those pieces all over the place, which is going to happen. >> Kamal: It is going to happen for sure. >> All right, looking forward I can't believe we're almost through 2019, it still shocks me everyday I look at the calendar, but what are some of your priorities looking forward? What are you guys working on? What do you see coming down the pipe? >> Yes, so you touches on a couple of these. So today, is a lot of talk around Kubernete. We are seeing Kubernetes also get deployed in IoT and edge devices, we are also seeing they are being used to manage serve-less infrastructure. So we are going to continue to evolve as Kubernetes evolves. The other big trend that we are seeing in the market today is around service mesh. People talk a lot about Istio and Linkerd and using service mesh as your policy framework to drive consistent policies across applications, so that's another area where we are innovating very rapidly and that will become, I think, more and more real in enterprise deployments over 2020. >> Well, congratulations Kamal to you and the team. I think you picked a good horse to ride on, I should say ship, right, with Kubernetes. Thanks for taking a few minutes. >> No, thank you for having me. I can officially say now that I've checked off one of my professional bucket-list items, which is to be on the Cube with an old friend. So thank you for having me. >> Check that box man. All right, he's Kamal, I'm Jeff, you're watching the Cube. Were at Sumo Logic Illuminate from the Hyatt San Francisco Airport. Thanks for watching, see you next time.

Published Date : Sep 11 2019

SUMMARY :

Brought to you by Sumo Logic. it's at the Hyatt San Francisco Airport. So for folks that aren't familiar Kubernetes, and we do security for You got to harden your environment But the how you do security has to evolve So you know, we talk a lot about Yeah it's something that is starting to emerge, I think it's going to really hurt as you deploy How do you catch them fast, limit the damage Exactly, so the use cases for what we do You have to make sure that you meet your PCI, HIPAA, So what we're seeing is that these are all becoming Right, and then they are creating and tearing down they open sourced it, and it's really what allows you to So one can only imagine the scale. and what Sumo Logic has done today with the announcement so automation is a huge piece of the puzzle. So it has to be seamless in the way you deploy it. So it surprises me to hear you say that still a lot and then you can go spend a couple of weeks or month Applied AI for Kubernetes. You got to have a budget, but how do you deploy your assets? of infrastructure, the VP engineering, because when you the relationship with Sumo. We are the yin to their yang. The fact of the matter is workload should run where they Multi-cloud, and then from Multi-cloud to Hybrid cloud. Well and the whole thing becomes more autotomized, right, Yes, so you touches on a couple of these. Well, congratulations Kamal to you and the team. So thank you for having me. Thanks for watching, see you next time.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
JeffPERSON

0.99+

AmazonORGANIZATION

0.99+

6 daysQUANTITY

0.99+

2 solutionsQUANTITY

0.99+

Kamal ShahPERSON

0.99+

thousandsQUANTITY

0.99+

Jeff FrickPERSON

0.99+

6 monthsQUANTITY

0.99+

GoogleORGANIZATION

0.99+

2019DATE

0.99+

KamalPERSON

0.99+

StackRoxPERSON

0.99+

forty thousand peopleQUANTITY

0.99+

Sumo LogicORGANIZATION

0.99+

last yearDATE

0.99+

SumoORGANIZATION

0.99+

two examplesQUANTITY

0.99+

Burlingame, CaliforniaLOCATION

0.99+

IstioORGANIZATION

0.99+

SISOORGANIZATION

0.99+

LinkerdORGANIZATION

0.99+

StackRoxORGANIZATION

0.99+

VMwareORGANIZATION

0.99+

each knobQUANTITY

0.98+

2 years agoDATE

0.98+

About 700, 800 peopleQUANTITY

0.98+

todayDATE

0.97+

Sumo Logic IlluminateEVENT

0.97+

single security solutionQUANTITY

0.96+

Hyatt San Francisco AirportLOCATION

0.96+

one security standardQUANTITY

0.96+

oneQUANTITY

0.96+

451 analystQUANTITY

0.95+

KubernetesTITLE

0.94+

millionsQUANTITY

0.94+

4 billion containers per weekQUANTITY

0.94+

2020DATE

0.93+

hundreds of millions of container a dayQUANTITY

0.93+

tens of thousands of containersQUANTITY

0.93+

CloudTITLE

0.92+

KuberneteTITLE

0.91+

4 billion containers per weekQUANTITY

0.91+

single paneQUANTITY

0.9+

DebOpsORGANIZATION

0.87+

Kubernetes SecurityTITLE

0.85+

RSAORGANIZATION

0.85+

hundreds, thousandsQUANTITY

0.83+

Sumo Logic IlluminateORGANIZATION

0.82+

Kubernetes'TITLE

0.81+

KubernetesORGANIZATION

0.8+

IlluminateTITLE

0.79+

earlier todayDATE

0.76+

DevOpsORGANIZATION

0.76+

one claw providerQUANTITY

0.75+

6 hoursQUANTITY

0.75+

CubeORGANIZATION

0.73+

RSATITLE

0.73+

single placeQUANTITY

0.71+

Hybrid CloudTITLE

0.71+

nth degreeQUANTITY

0.71+

one concernQUANTITY

0.71+