Nancy Wang & Kate Watts | International Women's Day
>> Hello everyone. Welcome to theCUBE's coverage of International Women's Day. I'm John Furrier, host of theCUBE been profiling the leaders in the technology world, women in technology from developers to the boardroom, everything in between. We have two great guests promoting in from Malaysia. Nancy Wang is the general manager, also CUBE alumni from AWS Data Protection, and founder and board chair of Advancing Women in Tech, awit.org. And of course Kate Watts who's the executive director of Advancing Women in Tech.org. So it's awit.org. Nancy, Kate, thanks for coming all the way across remotely from Malaysia. >> Of course, we're coming to you as fast as our internet bandwidth will allow us. And you know, I'm just thrilled today that you get to see a whole nother aspect of my life, right? Because typically we talk about AWS, and here we're talking about a topic near and dear to my heart. >> Well, Nancy, I love the fact that you're spending a lot of time taking the empowerment to go out and help the industries and helping with the advancement of women in tech. Kate, the executive director it's a 501C3, it's nonprofit, dedicating to accelerating the careers of women in groups in tech. Can you talk about the organization? >> Yes, I can. So Advancing Women in Tech was founded in 2017 in order to fix some of the pathway problems that we're seeing on the rise to leadership in the industry. And so we specifically focus on supporting mid-level women in technical roles, get into higher positions. We do that in a few different ways through mentorship programs through building technical skills and by connecting people to a supportive community. So you have your peer network and then a vertical sort of relationships to help you navigate the next steps in your career. So to date we've served about 40,000 individuals globally and we're just looking to expand our reach and impact and be able to better support women in the industry. >> Nancy, talk about the creation, the origination story. How'd this all come together? Obviously the momentum, everyone in the industry's been focused on this for a long time. Where did AWIT come from? Advancing Women in Technology, that's the acronym. Advancing Women in Technology.org, where'd it come from? What's the origination story? >> Yeah, so AWIT really originated from this desire that I had, to Kate's point around, well if you look around right and you know, don't take my word for it, right? Look at stats, look at news reports, or just frankly go on your LinkedIn and see how many women in underrepresented groups are in senior technical leadership roles right out in the companies whose names we all know. And so that was my case back in 2016. And so when I first got the idea and back then I was actually at Google, just another large tech company in the valley, right? It was about how do we get more role models, how we get more, for example, women into leadership roles so they can bring up the next generation, right? And so this is actually part of a longer speech that I'm about to give on Wednesday and part of the US State Department speaker program. In fact, that's why Kate and I are here in Malaysia right now is working with over 200 women entrepreneurs from all over in Southeast Asia, including Malaysia Philippines, Vietnam, Borneo, you know, so many countries where having more women entrepreneurs can help raise the GDP right, and that fits within our overall mission of getting more women into top leadership roles in tech. >> You know, I was talking about Teresa Carlson she came on the program as well for this year this next season we're going to do. And she mentioned the decision between the US progress and international. And she's saying as much as it's still bad numbers, it's worse than outside the United States and needs to get better. Can you comment on the global aspect? You brought that up. I think it's super important to highlight that it's just not one area, it's a global evolution. >> Absolutely, so let me start, and I'd love to actually have Kate talk about our current programs and all of the international groups that we're working with. So as Teresa aptly mentioned there is so much work to be done not just outside the US and North Americas where typically tech nonprofits will focus, but rather if you think about the one to end model, right? For example when I was doing the product market fit workshop for the US State Department I had women dialing in from rice fields, right? So let me just pause there for a moment. They were holding their cell phones up near towers near trees just so that they can get a few minutes of time with me to do a workshop and how to accelerate their business. So if you don't call that the desire to propel oneself or accelerate oneself, not sure what is, right. And so it's really that passion that drove me to spend the next week and a half here working with local entrepreneurs working with policy makers so we can take advantage and really leverage that passion that people have, right? To accelerate more business globally. And so that's why, you know Kate will be leading our contingent with the United Nations Women Group, right? That is focused on women's economic empowerment because that's super important, right? One aspect can be sure, getting more directors, you know vice presidents into companies like Google and Amazon. But another is also how do you encourage more women around the world to start businesses, right? To reach economic and freedom independence, right? To overcome some of the maybe social barriers to becoming a leader in their own country. >> Yes, and if I think about our own programs and our model of being very intentional about supporting the learning development and skills of women and members of underrepresented groups we focused very much on providing global access to a number of our programs. For instance, our product management certification on Coursera or engineering management our upcoming women founders accelerator. We provide both access that you can get from anywhere. And then also very intentional programming that connects people into the networks to be able to further their networks and what they've learned through the skills online, so. >> Yeah, and something Kate just told me recently is these courses that Kate's mentioning, right? She was instrumental in working with the American Council on Education and so that our learners can actually get up to six college credits for taking these courses on product management engineering management, on cloud product management. And most recently we had our first organic one of our very first organic testimonials was from a woman's tech bootcamp in Nigeria, right? So if you think about the worldwide impact of these upskilling courses where frankly in the US we might take for granted right around the world as I mentioned, there are women dialing in from rice patties from other, you know, for example, outside the, you know corporate buildings in order to access this content. >> Can you think about the idea of, oh sorry, go ahead. >> Go ahead, no, go ahead Kate. >> I was going to say, if you can't see it, you can't become it. And so we are very intentional about ensuring that we have we're spotlighting the expertise of women and we are broadcasting that everywhere so that anybody coming up can gain the skills and the networks to be able to succeed in this industry. >> We'll make sure we get those links so we can promote them. Obviously we feel the same way getting the word out. I think a couple things I'd like to ask you guys cause I think you hit a great point. One is the economic advantage the numbers prove that diverse teams perform better number one, that's clear. So good point there. But I want to get your thoughts on the entrepreneurial equation. You mentioned founders and startups and there's also different makeups in different countries. It's not like the big corporations sometimes it's smaller business in certain areas the different cultures have different business sizes and business types. How do you guys see that factoring in outside the United States, say the big tech companies? Okay, yeah. The easy lower the access to get in education than stay with them, in other countries is it the same or is it more diverse in terms of business? >> So what really actually got us started with the US State Department was around our work with women founders. And I love for Kate to actually share her experience working with AWS startups in that capacity. But frankly, you know, we looked at the content and the mentor programs that were providing women who wanted to be executives, you know, quickly realize a lot of those same skills such as finding customers, right? Scaling your product and building channels can also apply to women founders, not just executives. And so early supporters of our efforts from firms such as Moderna up in Seattle, Emergence Ventures, Decibel Ventures in, you know, the Bay Area and a few others that we're working with right now. Right, they believed in the mission and really helped us scale out what is now our existing platform and offerings for women founders. >> Those are great firms by the way. And they also are very founder friendly and also understand the global workforce. I mean, that's a whole nother dimension. Okay, what's your reaction to all that? >> Yes, we have been very intentional about taking the product expertise and the learnings of women and in our network, we first worked with AWS startups to support the development of the curriculum for the recent accelerator for women founders that was held last spring. And so we're able to support 25 founders and also brought in the expertise of about 20 or 30 women from Advancing Women in Tech to be able to be the lead instructors and mentors for that. And so we have really realized that with this network and this individual sort of focus on product expertise building strong teams, we can take that information and bring it to folks everywhere. And so there is very much the intentionality of allowing founders allowing individuals to take the lessons and bring it to their individual circumstances and the cultures in which they are operating. But the product sense is a skill that we can support the development of and we're proud to do so. >> That's awesome. Nancy, I want to ask you some never really talk about data storage and AWS cloud greatness and goodness, here's different and you also work full-time at AWS and you're the founder or the chairman of this great organization. How do you balance both and do you get, they're getting behind you on this, Amazon is getting behind you on this. >> Well, as I say it's always easier to negotiate on the way in. But jokes aside, I have to say the leadership has been tremendously supportive. If you think about, for example, my leaders Wayne Duso who's also been on the show multiple times, Bill Vaas who's also been on the show multiple times, you know they're both founders and also operators entrepreneurs at heart. So they understand that it is important, right? For all of us, it's really incumbent on all of us who are in positions to do so, to create a pathway for more people to be in leadership roles for more people to be successful entrepreneurs. So, no, I mean if you just looked at LinkedIn they're always uploading my vote so they reach to more audiences. And frankly they're rooting for us back home in the US while we're in Malaysia this week. >> That's awesome. And I think that's a good culture to have that empowerment and I think that's very healthy. What's next for you guys? What's on the agenda? Take us through the activities. I know that you got a ton of things happening. You got your event out there, which is why you're out there. There's a bunch of other activities. I think you guys call it the Advancing Women in Tech week. >> Yes, this week we are having a week of programming that you can check out at Advancing Women in Tech.org. That is spotlighting the expertise of a number of women in our space. So it is three days of programming Tuesday, Wednesday and Thursday if you are in the US so the seventh through the ninth, but available globally. We are also going to be in New York next week for the event at the UN and are looking to continue to support our mentorship programs and also our work supporting women founders throughout the year. >> All right. I have to ask you guys if you don't mind get a little market data so you can share with us here at theCUBE. What are you hearing this year that's different in the conversation space around the topics, the interests? Obviously I've seen massive amounts of global acceleration around conversations, more video, things like this more stories are scaling, a lot more LinkedIn activity. It just seems like it's a lot different this year. Can you guys share any kind of current trends you're seeing relative to the conversations and topics being discussed across the the community? >> Well, I think from a needle moving perspective, right? I think due to the efforts of wonderful organizations including the Q for spotlighting all of these awesome women, right? Trailblazing women and the nonprofits the government entities that we work with there's definitely more emphasis on creating access and creating pathways. So that's probably one thing that you're seeing is more women, more investors posting about their activities. Number two, from a global trend perspective, right? The rise of women in security. I noticed that on your agenda today, you had Lena Smart who's a good friend of mine chief information security officer at MongoDB, right? She and I are actually quite involved in helping founders especially early stage founders in the security space. And so globally from a pure technical perspective, right? There's right more increasing regulations around data privacy, data sovereignty, right? For example, India's in a few weeks about to get their first data protection regulation there locally. So all of that is giving rise to yet another wave of opportunity and we want women founders uniquely positioned to take advantage of that opportunity. >> I love it. Kate, reaction to that? I mean founders, more pathways it sounds like a neural network, it sounds like AI enabled. >> Yes, and speaking of AI, with the rise of that we are also hearing from many community members the importance of continuing to build their skills upskill learn to be able to keep up with the latest trends. There's a lot of people wondering what does this mean for my own career? And so they're turning to organizations like Advancing Women in Tech to find communities to both learn the latest information, but also build their networks so that they are able to move forward regardless of what the industry does. >> I love the work you guys are doing. It's so impressive. I think the economic angle is new it's more amplified this year. It's always kind of been there and continues to be. What do you guys hope for by next year this time what do you hope to see different from a needle moving perspective, to use your word Nancy, for next year? What's the visual output in your mind? >> I want to see real effort made towards 50-50 representation in all tech leadership roles. And I'd like to see that happen by 2050. >> Kate, anything on your end? >> I love that. I'm going to go a little bit more touchy-feely. I want everybody in our space to understand that the skills that they build and that the networks they have carry with them regardless of wherever they go. And so to be able to really lean in and learn and continue to develop the career that you want to have. So whether that be at a large organization or within your own business, that you've got the potential to move forward on that within you. >> Nancy, Kate, thank you so much for your contribution. I'll give you the final word. Put a plug in for the organization. What are you guys looking for? Any kind of PSA you want to share with the folks watching? >> Absolutely, so if you're in a position to be a mentor, join as a mentor, right? Help elevate and accelerate the next generation of women leaders. If you're an investor help us invest in more women started companies, right? Women founded startups and lastly, if you are women looking to accelerate your career, come join our community. We have resources, we have mentors and who we have investors who are willing to come in on the ground floor and help you accelerate your business. >> Great work. Thank you so much for participating in our International Women's Day 23 program and we'd look to keep this going quarterly. We'll see you next year, next time. Thanks for coming on. Appreciate it. >> Thanks so much John. >> Thank you. >> Okay, women leaders here. >> Nancy: Thanks for having us >> All over the world, coming together for a great celebration but really highlighting the accomplishments, the pathways the investment, the mentoring, everything in between. It's theCUBE. Bring as much as we can. I'm John Furrier, your host. Thanks for watching.
SUMMARY :
in the technology world, that you get to see a whole nother aspect of time taking the empowerment to go on the rise to leadership in the industry. in the industry's been focused of the US State Department And she mentioned the decision and all of the international into the networks to be able to further in the US we might take for Can you think about the and the networks to be able The easy lower the access to get and the mentor programs Those are great firms by the way. and also brought in the or the chairman of this in the US while we're I know that you got a of programming that you can check I have to ask you guys if you don't mind founders in the security space. Kate, reaction to that? of continuing to build their skills I love the work you guys are doing. And I'd like to see that happen by 2050. and that the networks Any kind of PSA you want to and accelerate the next Thank you so much for participating All over the world,
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Kate | PERSON | 0.99+ |
Nancy | PERSON | 0.99+ |
Teresa | PERSON | 0.99+ |
Bill Vaas | PERSON | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Teresa Carlson | PERSON | 0.99+ |
John | PERSON | 0.99+ |
Malaysia | LOCATION | 0.99+ |
Kate Watts | PERSON | 0.99+ |
Nigeria | LOCATION | 0.99+ |
Nancy Wang | PERSON | 0.99+ |
Wayne Duso | PERSON | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
ORGANIZATION | 0.99+ | |
Moderna | ORGANIZATION | 0.99+ |
Wednesday | DATE | 0.99+ |
American Council on Education | ORGANIZATION | 0.99+ |
John Furrier | PERSON | 0.99+ |
Lena Smart | PERSON | 0.99+ |
2017 | DATE | 0.99+ |
Vietnam | LOCATION | 0.99+ |
Borneo | LOCATION | 0.99+ |
Emergence Ventures | ORGANIZATION | 0.99+ |
New York | LOCATION | 0.99+ |
2016 | DATE | 0.99+ |
United Nations Women Group | ORGANIZATION | 0.99+ |
Decibel Ventures | ORGANIZATION | 0.99+ |
US | LOCATION | 0.99+ |
United States | LOCATION | 0.99+ |
Southeast Asia | LOCATION | 0.99+ |
ORGANIZATION | 0.99+ | |
2050 | DATE | 0.99+ |
MongoDB | ORGANIZATION | 0.99+ |
US State Department | ORGANIZATION | 0.99+ |
next year | DATE | 0.99+ |
International Women's Day | EVENT | 0.99+ |
25 founders | QUANTITY | 0.99+ |
Seattle | LOCATION | 0.99+ |
North Americas | LOCATION | 0.99+ |
AWS Data Protection | ORGANIZATION | 0.99+ |
CUBE | ORGANIZATION | 0.99+ |
three days | QUANTITY | 0.99+ |
seventh | QUANTITY | 0.99+ |
Bay Area | LOCATION | 0.99+ |
both | QUANTITY | 0.99+ |
today | DATE | 0.99+ |
next week | DATE | 0.99+ |
30 women | QUANTITY | 0.98+ |
One aspect | QUANTITY | 0.98+ |
Thursday | DATE | 0.98+ |
this year | DATE | 0.98+ |
about 40,000 individuals | QUANTITY | 0.98+ |
this year | DATE | 0.98+ |
last spring | DATE | 0.98+ |
this week | DATE | 0.98+ |
Tuesday | DATE | 0.98+ |
Jeff Boudreau and Travis Vigil, Dell
(bright music) >> Okay, we're back. With Jeff and Travis Vigil to dig deeper into the news. Guys, again, good to see you. Travis, if you could, maybe before we get into the news, can you set the business context for us? What's going on out there? >> Yeah, thanks for that question, Dave. To set a little bit of the context when you look at the data protection market, Dell has been a leader in providing solutions to customers for going on nearly two decades now. We have tens of thousands of people using our appliances. We have multiple thousands of people using our latest, modern, simple power protect data manager software. And as Jeff mentioned, we have, you know, 1700 customers protecting 14 exabytes of data in the public clouds today. And that foundation gives us a unique vantage point. We talked to a lot of customers. And they're really telling us three things. They want simple solutions, they want us to help them modernize, and they want us as the highest priority, maintain that high degree of resiliency that they expect from our data protection solutions. So that's the backdrop to the news today. And as we go through the news, I think you'll agree that each of these announcements deliver on those pillars. And in particular, today we're announcing the PowerProtect Data Manager Appliance. We are announcing PowerProtect Cyber Recovery enhancements, and we are announcing enhancements to our APEX data storage services. >> Okay, so three pieces, let's dig to that. It's interesting appliance, everybody wants software but then you talk to customers and they're like, "Well, we actually want appliances because we just want to put it in and it works, and performs great." So what do we need to know about the appliance? What's the news there? >> Well, you know, part of the reason I gave you some of those stats to begin with is, that we have this strong foundation of experience, but also intellectual property. Components that we've taken, that have been battle tested in the market. And we've put them together in a new simple, integrated appliance that really combines the best of the target appliance capabilities, we have with that modern, simple software. And we've integrated it from the, you know, sort of taking all of those pieces, putting them together in a simple, easy-to-use and easy-to-scale interface for customers. >> So the premise that I've been putting forth for, you know, months now, probably well over a year, is that data protection is becoming an extension of your cybersecurity strategies. So I'm interested in your perspective on Cyber Recovery, your specific news that you have there? >> Yeah, you know, we are in addition to simplifying things via the appliance. We are providing solutions for customers no matter where they're deploying. And Cyber Recovery, especially, when it comes to cloud deployments, it's an increasing area of interest and deployment that we see with our customers. So what we're announcing today is that we're expanding our Cyber Recovery services to be available in Google Cloud. With this announcement, it means we're available in all three of the major Clouds. And it really provides customers the flexibility to cure their data no matter if they're running, you know, on premises, in a Colo, at the edge in the public cloud. And the other nice thing about this announcement is that you have the ability to use Google Cloud as a Cyber Recovery vault. That really allows customers to isolate critical data and they can recover that critical data from the vault back to on-premises or from that vault back to running their cyber protection, or their data protection solutions in the public cloud. >> I always involve my favorite Matt Baker here, It's not a zero-sum game, but this is a perfect example where there's opportunities for a company like Dell to partner with the public cloud provider. You've got capabilities that don't exist there. You've got the on-prem capabilities. We could talk about Edge all day, but that's a different topic. Okay so my other question, Travis, is how does this all fit into APEX? We hear a lot about APEX as a service it's sort of the new hot thing. What's happening there? What's the news around APEX? >> Yeah, we've seen incredible momentum with our APEX Solutions, since we introduced data protection options into them earlier this year. And we're really building on that momentum with this announcement being, you know, providing solutions that allow customers to consume flexibly. And so what we're announcing specifically is, that we're expanding APEX Data Storage Services to include a data protection option. And it's like with all APEX offers, it's a pay-as-you go solution. Really streamlines the process of customers purchasing, deploying, maintaining and managing their backup software. All a customer really needs to do is, you know, specify their base capacity, they specify their performance tier, they tell us do they want a one-year term, or a three-year term? And we take it from there. We get them up and running, so they can start deploying and consuming flexibly. And as with many of our APEX solutions, it's a simple user experience all exposed through a unified APEX console. >> Okay, so you're keeping a simple, like, I think large, medium, small, you know, we hear a lot about T-shirt sizes. I'm a big fan of that 'cause you guys should be smart enough to figure out, you know, based on my workload, what I need. How different is this? I wonder if you guys could address this, Jeff, maybe you can- >> So, I'll start and then, pitch me, you know, Travis, you jump in when I screw up here so... >> Awesome. >> So first I'd say we offer innovative Multi-cloud data protection solutions. We provide that deliver performance, efficiency and scale that our customers demand and require. We support as Travis at all the major public clouds. We have a broad ecosystem of workload support and I guess the great news is we're up to 80% more cost effective than any of the competition. >> 80%? >> 80%. >> That's a big number. Travis, what's your point of view on this? >> Yeah, I think number one, end-to-end data protection. We, we are that one stop shop that I talked about. Whether it's a simplified appliance, whether it's deployed in the cloud, whether it's at the edge, whether it's integrated appliances, target appliances, software we have solutions that span the gamut as a service. I mentioned the APEX solution as well. So really we can provide solutions that helps support customers and protect them, any workload, any cloud, anywhere that data lives, Edge core to cloud. The other thing that we're here, as a big differentiator for Dell and Jeff touched on this a little bit earlier, is our intelligent cyber resiliency. We have a unique combination in the market where we can offer immutability or protection against deletion as sort of that first line of defense. But we can also offer a second level of defense which is isolation, talking about data vaults or cyber vaults and Cyber Recovery. And more importantly, the intelligence that goes around that vault. It can look at detecting cyber-attacks, it can help customer speed time to recovery and really provides AI and ML to help early diagnosis of a cyber-attack and fast recovery should a cyber-attack occur. And you know, if you look at customer adoption of that solution specifically in the clouds, we have over 1300 customers utilizing PowerProtect Cyber Recovery. >> So I think it's fair to say that your, I mean your portfolio has obviously been a big differentiator whenever I talk to, you know your finance team, Michael Dell, et cetera that an end-to-end capability that that your ability to manage throughout the supply chain. We actually just did an event recently with you guys where you went into what you're doing to make infrastructure trusted. And so my take on that is, in a lot of respects, you're shifting, you know, the client's burden to your R&D, and now, they have a lot of work to do, so it's not like they can go home and just relax, but that's a key part of the partnership that I see. Jeff, I wonder if you could give us the final thoughts. >> Sure, Dell has a long history of being a trusted partner within IT, right? So we have unmatched capabilities, going back to your point, we have the broadest portfolio, we have, you know, we're a leader in every category that we participate and we have a broad deep breadth of portfolio. We have scale, we have innovation that is just unmatched. Within data protection itself, we have the trusted market leader, no if and or buts. We're a number one for both data protection software in appliances per IDC. And we were just named, for the 17th consecutive time the leader in the Gartner Magic Quadrant. So bottom line is customers can count on Dell. >> Yeah. And I think again, we're seeing the evolution of data protection. It's not like the last 10 years, it's really becoming an adjacency and really a key component of your cyber strategy. I think those two parts of the organization are coming together. So guys, really appreciate your time. Thanks for (indistinct). >> Thank you, sir. Thanks, Travis, good to see you. All right, in a moment, I'm going to come right back and summarize what we learned today, what actions you can take for your business. You're watching "The Future of Multicloud Data Protection" made possible by Dell and collaboration with the Cube, your leader in enterprise and emerging tech coverage, right back. (upbeat music) >> In our data driven world. Protecting data has never been more critical, to guard against everything from cyber incidents to unplanned outages. You need a cyber resilient multi-cloud data protection strategy. >> It's not a matter of if you're going to get hacked, it's a matter of when. And I want to know that I can recover and continue to recover each day. >> It is important to have a cyber security and a cyber resiliency plan in place, because the threat of cyber-attack are imminent. >> PowerProtects Data manager from Dell Technologies helps deliver the data protection and security confidence you would expect from a trusted we chose PowerProtect Data Manager because we've been on strategic partner with Dell Technologies, for roughly 20 years now. Our partnership with Dell Technologies has provided us with the ability to scale, and grow as we've transition from 10 billion in assets to 20 billion. >> With PowerProtect Data Manager, you can enjoy exceptional ease of use to increase your efficiency and reduce costs. >> Got installed it by myself, learn it by myself, with very intuitive >> While restoring a machine with PowerProtect Data Manager is fast. We can fully manage PowerProtect through the center. We can recover a whole machine in seconds. >> Data Manager offers innovation such as Transparent Snapshots to simplify virtual machine backups and it goes beyond backup and restore to provide valuable insights and to protected data, workloads and VMs. >> In our previous environment, it would take anywhere from three to six hours a night to do a single backup of each VM. Now we're backing up hourly and it takes two to three seconds with the Transparent Snapshots. >> With PowerProtect's Data Manager, you get the peace of mind knowing that your data is safe and available whenever you need it. >> Data is extreme important. We can't afford to lose any data. We need things just to work. >> Start your journey to modern data protection with Dell PowerProtect Data Manager. Visit dell.com/powerprotectdatamanager. >> We put forth the premise in our introduction that the worlds of data protection and cyber security must be more integrated. We said that data recovery strategies have to be built into security practices and procedures and by default, this should include modern hardware and software. Now in addition, to reviewing some of the challenges that customers face, which have been pretty well documented, we heard about new products that Dell Technologies is bringing to the marketplace. Specifically, address these customer concerns. There were three that we talked about today. First, the PowerProtect Data Manager Appliance, which is an integrated system. Taking advantage of Dell's history in data protection but adding new capabilities. And I want to come back to that in a moment. Second is Dell's PowerProtect Cyber Recovery for Google Cloud platform. This rounds out the big three public cloud providers for Dell, which joins AWS and Azure support. Now finally, Dell has made its target backup appliances available in APEX. You might recall earlier this year, we saw the introduction from Dell of APEX backup services. And then in May at Dell Technologies World, we heard about the introduction of APEX Cyber Recovery Services. And today, Dell is making its most popular backup appliances available in APEX. Now I want to come back to the PowerProtect Data Manager Appliance because it's a new integrated appliance. And I asked Dell off camera, really, what is so special about these new systems and what's really different from the competition because look, everyone offers some kind of integrated appliance. So I heard a number of items Dell talked about simplicity and efficiency and containers and Kubernetes. So I kind of kept pushing and got to what I think is the heart of the matter in two really important areas. One is simplicity. Dell claims that customers can deploy the system in half the time relative to the competition. So we're talking minutes to deploy and of course, that's going to lead to much simpler management. And the second real difference I heard, was backup and restore performance for VMware workloads. In particular, Dell has developed transparent snapshot capabilities to fundamentally change the way VMs are protected which leads to faster backup and restores with less impact on virtual infrastructure. Dell believes this new development is unique in the market, and claims that in its benchmarks, the new appliance was able to back up 500 virtual machines in 47% less time compared to a leading competitor. Now this is based on Dell benchmarks so hopefully these are things that you can explore in more detail with Dell to see if and how they apply to your business. So if you want more information go to the Data Protection page at Dell.com. You can find that at dell.com/dataprotection. And all the content here and all the videos are available on demand at thecube.net. Check out our series, on the blueprint for trusted infrastructure it's related and has some additional information. And go to siliconangle.com for all the news and analysis related to these and other announcements. This is Dave Vellante. Thanks for watching "The Future of Multi-cloud Protection." Made possible by Dell in collaboration with the Cube your leader in enterprise and emerging tech coverage. (upbeat music)
SUMMARY :
to dig deeper into the news. So that's the backdrop to the news today. let's dig to that. stats to begin with is, So the premise that I've been is that you have the to partner with the public cloud provider. needs to do is, you know, to figure out, you know, based pitch me, you know, Travis, and scale that our customers Travis, what's your point of view on this? And you know, if you So I think it's fair to say that your, going back to your point, we of the organization Thanks, Travis, good to see you. to guard against everything and continue to recover each day. It is important to from 10 billion in assets to 20 billion. to increase your efficiency We can fully manage and to protected data, workloads and VMs. three to six hours a night and available whenever you need it. We need things just to work. with Dell PowerProtect Data Manager. and got to what I think is the heart
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Dave Vellante | PERSON | 0.99+ |
Jeff | PERSON | 0.99+ |
Travis | PERSON | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
Dave | PERSON | 0.99+ |
Jeff Boudreau | PERSON | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
two | QUANTITY | 0.99+ |
47% | QUANTITY | 0.99+ |
Matt Baker | PERSON | 0.99+ |
10 billion | QUANTITY | 0.99+ |
three | QUANTITY | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
Travis Vigil | PERSON | 0.99+ |
one-year | QUANTITY | 0.99+ |
20 billion | QUANTITY | 0.99+ |
May | DATE | 0.99+ |
thecube.net | OTHER | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
1700 customers | QUANTITY | 0.99+ |
First | QUANTITY | 0.99+ |
second | QUANTITY | 0.99+ |
Second | QUANTITY | 0.99+ |
three seconds | QUANTITY | 0.99+ |
One | QUANTITY | 0.99+ |
The Future of Multi-cloud Protection | TITLE | 0.99+ |
each | QUANTITY | 0.99+ |
Michael Dell | PERSON | 0.99+ |
second level | QUANTITY | 0.99+ |
today | DATE | 0.99+ |
siliconangle.com | OTHER | 0.99+ |
both | QUANTITY | 0.99+ |
two parts | QUANTITY | 0.99+ |
dell.com/dataprotection | OTHER | 0.98+ |
dell.com/powerprotectdatamanager | OTHER | 0.98+ |
three pieces | QUANTITY | 0.98+ |
each day | QUANTITY | 0.98+ |
over 1300 customers | QUANTITY | 0.98+ |
each VM | QUANTITY | 0.98+ |
500 virtual machines | QUANTITY | 0.98+ |
first line | QUANTITY | 0.97+ |
Cube | ORGANIZATION | 0.97+ |
80% | QUANTITY | 0.97+ |
Gartner | ORGANIZATION | 0.97+ |
earlier this year | DATE | 0.96+ |
APEX | ORGANIZATION | 0.96+ |
thousands of people | QUANTITY | 0.96+ |
20 years | QUANTITY | 0.95+ |
three things | QUANTITY | 0.94+ |
tens of thousands of people | QUANTITY | 0.94+ |
up to 80% | QUANTITY | 0.91+ |
PowerProtect Data Manager | COMMERCIAL_ITEM | 0.9+ |
PowerProtect | COMMERCIAL_ITEM | 0.89+ |
three-year term | QUANTITY | 0.88+ |
Dell Technologies |The Future of Multicloud Data Protection is Here 11-14
>>Prior to the pandemic, organizations were largely optimized for efficiency as the best path to bottom line profits. Many CIOs tell the cube privately that they were caught off guard by the degree to which their businesses required greater resiliency beyond their somewhat cumbersome disaster recovery processes. And the lack of that business resilience has actually cost firms because they were unable to respond to changing market forces. And certainly we've seen this dynamic with supply chain challenges and there's a little doubt. We're also seeing it in the area of cybersecurity generally, and data recovery. Specifically. Over the past 30 plus months, the rapid adoption of cloud to support remote workers and build in business resilience had the unintended consequences of expanding attack vectors, which brought an escalation of risk from cybercrime. Well, security in the public clouds is certainly world class. The result of multi-cloud has brought with it multiple shared responsibility models, multiple ways of implementing security policies across clouds and on-prem. >>And at the end of the day, more, not less complexity, but there's a positive side to this story. The good news is that public policy industry collaboration and technology innovation is moving fast to accelerate data protection and cybersecurity strategies with a focus on modernizing infrastructure, securing the digital supply chain, and very importantly, simplifying the integration of data protection and cybersecurity. Today there's heightened awareness that the world of data protection is not only an adjacency to, but it's becoming a fundamental component of cybersecurity strategies. In particular, in order to build more resilience into a business, data protection, people, technologies, and processes must be more tightly coordinated with security operations. Hello and welcome to the future of Multi-Cloud Data Protection Made Possible by Dell in collaboration with the Cube. My name is Dave Ante and I'll be your host today. In this segment, we welcome into the cube, two senior executives from Dell who will share details on new technology announcements that directly address these challenges. >>Jeff Boudreau is the president and general manager of Dell's Infrastructure Solutions Group, isg, and he's gonna share his perspectives on the market and the challenges he's hearing from customers. And we're gonna ask Jeff to double click on the messages that Dell is putting into the marketplace and give us his detailed point of view on what it means for customers. Now, Jeff is gonna be joined by Travis Vhi. Travis is the senior Vice President of product management for ISG at Dell Technologies, and he's gonna give us details on the products that are being announced today and go into the hard news. Now, we're also gonna challenge our guests to explain why Dell's approach is unique and different in the marketplace. Thanks for being with us. Let's get right into it. We're here with Jeff Padre and Travis Behill. We're gonna dig into the details about Dell's big data protection announcement. Guys, good to see you. Thanks >>For coming in. Good to see you. Thank you for having us. >>You're very welcome. Right. Let's start off, Jeff, with the high level, you know, I'd like to talk about the customer, what challenges they're facing. You're talking to customers all the time, What are they telling you? >>Sure. As you know, we do, we spend a lot of time with our customers, specifically listening, learning, understanding their use cases, their pain points within their specific environments. They tell us a lot. Notice no surprise to any of us, that data is a key theme that they talk about. It's one of their most important, important assets. They need to extract more value from that data to fuel their business models, their innovation engines, their competitive edge. So they need to make sure that that data is accessible, it's secure in its recoverable, especially in today's world with the increased cyber attacks. >>Okay. So maybe we could get into some of those, those challenges. I mean, when, when you talk about things like data sprawl, what do you mean by that? What should people know? Sure. >>So for those big three themes, I'd say, you know, you have data sprawl, which is the big one, which is all about the massive amounts of data. It's the growth of that data, which is growing at an unprecedented rates. It's the gravity of that data and the reality of the multi-cloud sprawl. So stuff is just everywhere, right? Which increases that service a tax base for cyber criminals. >>And by gravity you mean the data's there and people don't wanna move it. >>It's everywhere, right? And so when it lands someplace, I think edge, core or cloud, it's there and that's, it's something we have to help our customers with. >>Okay, so just it's nuanced cuz complexity has other layers. What are those >>Layers? Sure. When we talk to our customers, they tell us complexity is one of their big themes. And specifically it's around data complexity. We talked about that growth and gravity of the data. We talk about multi-cloud complexity and we talk about multi-cloud sprawl. So multiple vendors, multiple contracts, multiple tool chains, and none of those work together in this, you know, multi-cloud world. Then that drives their security complexity. So we talk about that increased attack surface, but this really drives a lot of operational complexity for their teams. Think about we're lack consistency through everything. So people, process, tools, all that stuff, which is really wasting time and money for our customers. >>So how does that affect the cyber strategies and the, I mean, I've often said the ciso now they have this shared responsibility model, they have to do that across multiple clouds. Every cloud has its own security policies and, and frameworks and syntax. So maybe you could double click on your perspective on that. >>Sure. I'd say the big, you know, the big challenge customers have seen, it's really inadequate cyber resiliency. And specifically they're feeling, feeling very exposed. And today as the world with cyber tax being more and more sophisticated, if something goes wrong, it is a real challenge for them to get back up and running quickly. And that's why this is such a, a big topic for CEOs and businesses around the world. >>You know, it's funny, I said this in my open, I, I think that prior to the pandemic businesses were optimized for efficiency and now they're like, wow, we have to actually put some headroom into the system to be more resilient. You know, I you hearing >>That? Yeah, we absolutely are. I mean, the customers really, they're asking us for help, right? It's one of the big things we're learning and hearing from them. And it's really about three things, one's about simplifying it, two, it is really helping them to extract more value from their data. And then the third big, big piece is ensuring their data is protected and recoverable regardless of where it is going back to that data gravity and that very, you know, the multi-cloud world just recently, I don't know if you've seen it, but the global data protected, excuse me, the global data protection index gdp. >>I, Yes. Jesus. Not to be confused with gdpr, >>Actually that was released today and confirms everything we just talked about around customer challenges, but also it highlights an importance of having a very cyber, a robust cyber resilient data protection strategy. >>Yeah, I haven't seen the latest, but I, I want to dig into it. I think this, you've done this many, many years in a row. I like to look at the, the, the time series and see how things have changed. All right. At, at a high level, Jeff, can you kind of address why Dell and from your point of view is best suited? >>Sure. So we believe there's a better way or a better approach on how to handle this. We think Dell is uniquely positioned to help our customers as a one stop shop, if you will, for that cyber resilient multi-cloud data protection solution and needs. We take a modern, a simple and resilient approach. >>What does that mean? What, what do you mean by modern? >>Sure. So modern, we talk about our software defined architecture, right? It's really designed to meet the needs not only of today, but really into the future. And we protect data across any cloud and any workload. So we have a proven track record doing this today. We have more than 1700 customers that trust us to protect them more than 14 exabytes of their data in the cloud today. >>Okay, so you said modern, simple and resilient. What, what do you mean by simple? Sure. >>We wanna provide simplicity everywhere, going back to helping with the complexity challenge, and that's from deployment to consumption to management and support. So our offers will deploy in minutes. They are easy to operate and use, and we support flexible consumption models for whatever customer may desire. So traditional subscription or as a service. >>And when you, when you talk about resilient, I mean, I, I put forth that premise, but it's hard because people say, Well, that's gonna gonna cost us more. Well, it may, but you're gonna also reduce your, your risk. So what's your point of view on resilience? >>Yeah, I think it's, it's something all customers need. So we're gonna be providing a comprehensive and resilient portfolio of cyber solutions that are secured by design. We have some ver some unique capabilities and a combination of things like built in amenability, physical and logical isolation. We have intelligence built in with AI par recovery. And just one, I guess fun fact for everybody is we have our cyber vault is the only solution in the industry that is endorsed by Sheltered Harbor that meets all the needs of the financial sector. >>So it's interesting when you think about the, the NIST framework for cybersecurity, it's all about about layers. You're sort of bringing that now to, to data protection, correct? Yeah. All right. In a minute we're gonna come back with Travis and dig into the news. We're gonna take a short break. Keep it right there. Okay. We're back with Jeff and Travis Vhi to dig deeper into the news. Guys, again, good to see you. Travis, if you could, maybe you, before we get into the news, can you set the business context for us? What's going on out there? >>Yeah, thanks for that question, Dave. To set a little bit of the context, when you look at the data protection market, Dell has been a leader in providing solutions to customers for going on nearly two decades now. We have tens of thousands of people using our appliances. We have multiple thousands of people using our latest modern simple power protect data managers software. And as Jeff mentioned, we have, you know, 1700 customers protecting 14 exabytes of data in the public clouds today. And that foundation gives us a unique vantage point. We talked to a lot of customers and they're really telling us three things. They want simple solutions, they want us to help them modernize and they want us to add as the highest priority, maintain that high degree of resiliency that they expect from our data protection solutions. So tho that's the backdrop to the news today. And, and as we go through the news, I think you'll, you'll agree that each of these announcements deliver on those pillars. And in particular today we're announcing the Power Protect data manager appliance. We are announcing power protect cyber recovery enhancements, and we are announcing enhancements to our Apex data storage >>Services. Okay, so three pieces. Let's, let's dig to that. It's interesting appliance, everybody wants software, but then you talk to customers and they're like, Well, we actually want appliances because we just wanna put it in and it works, right? It performs great. So, so what do we need to know about the appliance? What's the news there? Well, >>You know, part of the reason I gave you some of those stats to begin with is that we have this strong foundation of, of experience, but also intellectual property components that we've taken that have been battle tested in the market. And we've put them together in a new simple integrated appliance that really combines the best of the target appliance capabilities we have with that modern simple software. And we've integrated it from the, you know, sort of taking all of those pieces, putting them together in a simple, easy to use and easy to scale interface for customers. >>So the premise that I've been putting forth for, you know, months now, probably well, well over a year, is that, that that data protection is becoming an extension of your, your cybersecurity strategies. So I'm interested in your perspective on cyber recovery, you specific news that you have there. >>Yeah, you know, we, we are, in addition to simplifying things via the, the appliance, we are providing solutions for customers no matter where they're deploying. And cyber recovery, especially when it comes to cloud deployments, is an increasing area of interest and deployment that we see with our customers. So what we're announcing today is that we're expanding our cyber recovery services to be available in Google Cloud with this announcement. It means we're available in all three of the major clouds and it really provides customers the flexibility to secure their data no matter if they're running, you know, on premises in a colo at the edge in the public cloud. And the other nice thing about this, this announcement is that you have the ability to use Google Cloud as a cyber recovery vault that really allows customers to isolate critical data and they can recover that critical data from the vault back to on premises or from that vault back to running their cyber cyber protection or their data protection solutions in the public cloud. >>I always invoke my, my favorite Matt Baker here. It's not a zero sum game, but this is a perfect example where there's opportunities for a company like Dell to partner with the public cloud provider. You've got capabilities that don't exist there. You've got the on-prem capabilities. We can talk about edge all day, but that's a different topic. Okay, so my, my other question Travis, is how does this all fit into Apex? We hear a lot about Apex as a service, it's sort of the new hot thing. What's happening there? What's the news around Apex? >>Yeah, we, we've seen incredible momentum with our Apex solutions since we introduced data protection options into them earlier this year. And we're really building on that momentum with this announcement being, you know, providing solutions that allow customers to consume flexibly. And so what we're announcing specifically is that we're expanding Apex data storage services to include a data protection option. And it's like with all Apex offers, it's a pay as you go solution really streamlines the process of customers purchasing, deploying, maintaining and managing their backup software. All a customer really needs to do is, you know, specify their base capacity, they specify their performance tier, they tell us do they want a a one year term or a three year term and we take it from there. We, we get them up and running so they can start deploying and consuming flexibly. And it's, as with many of our Apex solutions, it's a simple user experience all exposed through a unified Apex console. >>Okay. So it's you keeping it simple, like I think large, medium, small, you know, we hear a lot about t-shirt sizes. I I'm a big fan of that cuz you guys should be smart enough to figure out, you know, based on my workload, what I, what I need, how different is this? I wonder if you guys could, could, could address this. Jeff, maybe you can, >>You can start. Sure. I'll start and then pitch me, you know, Travis, you you jump in when I screw up here. So, awesome. So first I'd say we offer innovative multi-cloud data protection solutions. We provide that deliver performance, efficiency and scale that our customers demand and require. We support as Travis and all the major public clouds. We have a broad ecosystem of workload support and I guess the, the great news is we're up to 80% more cost effective than any of the competition. >>80%. 80%, That's a big number, right? Travis, what's your point of view on this? Yeah, >>I, I think number one, end to end data protection. We, we are that one stop shop that I talked about. Whether it's a simplified appliance, whether it's deployed in the cloud, whether it's at the edge, whether it's integrated appliances, target appliances, software, we have solutions that span the gamut as a service. I mentioned the Apex solution as well. So really we can, we can provide solutions that help support customers and protect them, any workload, any cloud, anywhere that data lives edge core to cloud. The other thing that we hear as a, as a, a big differentiator for Dell and, and Jeff touched on on this a little bit earlier, is our intelligent cyber resiliency. We have a unique combination in, in the market where we can offer immutability or protection against deletion as, as sort of that first line of defense. But we can also offer a second level of defense, which is isolation, talking, talking about data vaults or cyber vaults and cyber recovery. And the, at more importantly, the intelligence that goes around that vault. It can look at detecting cyber attacks, it can help customers speed time to recovery and really provides AI and ML to help early diagnosis of a cyber attack and fast recovery should a cyber attack occur. And, and you know, if you look at customer adoption of that solution specifically in the clouds, we have over 1300 customers utilizing power protect cyber recovery. >>So I think it's fair to say that your, I mean your portfolio has obvious been a big differentiator whenever I talk to, you know, your finance team, Michael Dell, et cetera, that end to end capability that that, that your ability to manage throughout the supply chain. We actually just did a a, an event recently with you guys where you went into what you're doing to make infrastructure trusted. And so my take on that is you, in a lot of respects, you're shifting, you know, the client's burden to your r and d now they have a lot of work to do, so it's, it's not like they can go home and just relax, but, but that's a key part of the partnership that I see. Jeff, I wonder if you could give us the, the, the final thoughts. >>Sure. Dell has a long history of being a trusted partner with it, right? So we have unmatched capabilities. Going back to your point, we have the broadest portfolio, we have, you know, we're a leader in every category that we participate in. We have a broad deep breadth of portfolio. We have scale, we have innovation that is just unmatched within data protection itself. We have the trusted market leader, no, if and or buts, we're number one for both data protection software in appliances per idc and we would just name for the 17th consecutive time the leader in the, the Gartner Magic Quadrant. So bottom line is customers can count on Dell. >>Yeah, and I think again, we're seeing the evolution of, of data protection. It's not like the last 10 years, it's really becoming an adjacency and really a key component of your cyber strategy. I think those two parts of the organization are coming together. So guys, really appreciate your time. Thanks for Thank you sir. Thanks Travis. Good to see you. All right, in a moment I'm gonna come right back and summarize what we learned today, what actions you can take for your business. You're watching the future of multi-cloud data protection made possible by Dell and collaboration with the cube, your leader in enterprise and emerging tech coverage right back >>In our data driven world. Protecting data has never been more critical to guard against everything from cyber incidents to unplanned outages. You need a cyber resilient, multi-cloud data protection strategy. >>It's not a matter of if you're gonna get hacked, it's a matter of when. And I wanna know that I can recover and continue to recover each day. >>It is important to have a cyber security and a cyber resiliency plan in place because the threat of cyber attack are imminent. >>Power protects. Data manager from Dell Technologies helps deliver the data protection and security confidence you would expect from a trusted partner and market leader. >>We chose Power Protect Data Manager because we've been a strategic partner with Dell Technologies for roughly 20 years now. Our partnership with Dell Technologies has provided us with the ability to scale and grow as we've transitioned from 10 billion in assets to 20 billion. >>With Power Protect Data Manager, you can enjoy exceptional ease of use to increase your efficiency and reduce costs. >>Got installed it by myself, learned it by myself with very intuitive >>While restoring a machine with Power Protect Data Manager is fast. We can fully manage Power Protect through the center. We can recover a whole machine in seconds. >>Data Manager offers innovation such as Transparent snapshots to simplify virtual machine backups and it goes beyond backup and restore to provide valuable insights and to protected data workloads and VMs. >>In our previous environment, it would take anywhere from three to six hours at night to do a single backup of each vm. Now we're backing up hourly and it takes two to three seconds with the transparent snapshots. >>With Power Protects Data Manager, you get the peace of mind knowing that your data is safe and available whenever you need it. >>Data is extremely important. We can't afford to lose any data. We need things just to work. >>Start your journey to modern data protection with Dell Power Protect Data manager. Visit dell.com/power Protect Data Manager. >>We put forth the premise in our introduction that the worlds of data protection in cybersecurity must be more integrated. We said that data recovery strategies have to be built into security practices and procedures and by default this should include modern hardware and software. Now in addition to reviewing some of the challenges that customers face, which have been pretty well documented, we heard about new products that Dell Technologies is bringing to the marketplace that specifically address these customer concerns. There were three that we talked about today. First, the Power Protect Data Manager Appliance, which is an integrated system taking advantage of Dell's history in data protection, but adding new capabilities. And I want to come back to that in the moment. Second is Dell's Power Protect cyber recovery for Google Cloud platform. This rounds out the big three public cloud providers for Dell, which joins AWS and and Azure support. >>Now finally, Dell has made its target backup appliances available in Apex. You might recall earlier this year we saw the introduction from Dell of Apex backup services and then in May at Dell Technologies world, we heard about the introduction of Apex Cyber Recovery Services. And today Dell is making its most popular backup appliances available and Apex. Now I wanna come back to the Power Protect data manager appliance because it's a new integrated appliance. And I asked Dell off camera really what is so special about these new systems and what's really different from the competition because look, everyone offers some kind of integrated appliance. So I heard a number of items, Dell talked about simplicity and efficiency and containers and Kubernetes. So I kind of kept pushing and got to what I think is the heart of the matter in two really important areas. One is simplicity. >>Dell claims that customers can deploy the system in half the time relative to the competition. So we're talking minutes to deploy and of course that's gonna lead to much simpler management. And the second real difference I heard was backup and restore performance for VMware workloads. In particular, Dell has developed transparent snapshot capabilities to fundamentally change the way VMs are protected, which leads to faster backup and restores with less impact on virtual infrastructure. Dell believes this new development is unique in the market and claims that in its benchmarks the new appliance was able to back up 500 virtual machines in 47% less time compared to a leading competitor. Now this is based on Dell benchmarks, so hopefully these are things that you can explore in more detail with Dell to see if and how they apply to your business. So if you want more information, go to the data protectionPage@dell.com. You can find that at dell.com/data protection. And all the content here and other videos are available on demand@thecube.net. Check out our series on the blueprint for trusted infrastructure, it's related and has some additional information. And go to silicon angle.com for all the news and analysis related to these and other announcements. This is Dave Valante. Thanks for watching the future of multi-cloud protection made possible by Dell in collaboration with the Cube, your leader in enterprise and emerging tech coverage.
SUMMARY :
And the lack of that business And at the end of the day, more, not less complexity, Jeff Boudreau is the president and general manager of Dell's Infrastructure Solutions Group, Good to see you. Let's start off, Jeff, with the high level, you know, I'd like to talk about the So they need to make sure that that data data sprawl, what do you mean by that? So for those big three themes, I'd say, you know, you have data sprawl, which is the big one, which is all about the massive amounts it's something we have to help our customers with. Okay, so just it's nuanced cuz complexity has other layers. We talked about that growth and gravity of the data. So how does that affect the cyber strategies and the, And today as the world with cyber tax being more and more sophisticated, You know, it's funny, I said this in my open, I, I think that prior to the pandemic businesses that very, you know, the multi-cloud world just recently, I don't know if you've seen it, but the global data protected, Not to be confused with gdpr, Actually that was released today and confirms everything we just talked about around customer challenges, At, at a high level, Jeff, can you kind of address why Dell and from your point of We think Dell is uniquely positioned to help our customers as a one stop shop, if you will, It's really designed to meet the needs What, what do you mean by simple? We wanna provide simplicity everywhere, going back to helping with the complexity challenge, and that's from deployment So what's your point of view on resilience? Harbor that meets all the needs of the financial sector. So it's interesting when you think about the, the NIST framework for cybersecurity, it's all about about layers. And as Jeff mentioned, we have, you know, 1700 customers protecting 14 exabytes but then you talk to customers and they're like, Well, we actually want appliances because we just wanna put it in and it works, You know, part of the reason I gave you some of those stats to begin with is that we have this strong foundation of, So the premise that I've been putting forth for, you know, months now, probably well, well over a year, is an increasing area of interest and deployment that we see with our customers. it's sort of the new hot thing. All a customer really needs to do is, you know, specify their base capacity, I I'm a big fan of that cuz you guys should be smart enough to figure out, you know, based on my workload, We support as Travis and all the major public clouds. Travis, what's your point of view on of that solution specifically in the clouds, So I think it's fair to say that your, I mean your portfolio has obvious been a big differentiator whenever I talk to, We have the trusted market leader, no, if and or buts, we're number one for both data protection software in what we learned today, what actions you can take for your business. Protecting data has never been more critical to guard against that I can recover and continue to recover each day. It is important to have a cyber security and a cyber resiliency Data manager from Dell Technologies helps deliver the data protection and security We chose Power Protect Data Manager because we've been a strategic partner with With Power Protect Data Manager, you can enjoy exceptional ease of use to increase your efficiency We can fully manage Power Data Manager offers innovation such as Transparent snapshots to simplify virtual Now we're backing up hourly and it takes two to three seconds with the transparent With Power Protects Data Manager, you get the peace of mind knowing that your data is safe and available We need things just to work. Start your journey to modern data protection with Dell Power Protect Data manager. We put forth the premise in our introduction that the worlds of data protection in cybersecurity So I kind of kept pushing and got to what I think is the heart of the matter in two really Dell claims that customers can deploy the system in half the time relative to the
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Jeff | PERSON | 0.99+ |
Dave Valante | PERSON | 0.99+ |
Jeff Boudreau | PERSON | 0.99+ |
Travis | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
10 billion | QUANTITY | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
three | QUANTITY | 0.99+ |
Travis Behill | PERSON | 0.99+ |
First | QUANTITY | 0.99+ |
demand@thecube.net | OTHER | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
20 billion | QUANTITY | 0.99+ |
Dave Ante | PERSON | 0.99+ |
two | QUANTITY | 0.99+ |
Jeff Padre | PERSON | 0.99+ |
Sheltered Harbor | ORGANIZATION | 0.99+ |
Matt Baker | PERSON | 0.99+ |
more than 1700 customers | QUANTITY | 0.99+ |
May | DATE | 0.99+ |
Second | QUANTITY | 0.99+ |
1700 customers | QUANTITY | 0.99+ |
more than 14 exabytes | QUANTITY | 0.99+ |
Michael Dell | PERSON | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
One | QUANTITY | 0.99+ |
today | DATE | 0.99+ |
two senior executives | QUANTITY | 0.99+ |
three seconds | QUANTITY | 0.99+ |
second | QUANTITY | 0.99+ |
Apex | ORGANIZATION | 0.99+ |
each | QUANTITY | 0.99+ |
three pieces | QUANTITY | 0.99+ |
third | QUANTITY | 0.99+ |
two parts | QUANTITY | 0.99+ |
Today | DATE | 0.99+ |
six hours | QUANTITY | 0.99+ |
each day | QUANTITY | 0.99+ |
both | QUANTITY | 0.98+ |
over 1300 customers | QUANTITY | 0.98+ |
Solutions Group | ORGANIZATION | 0.98+ |
three things | QUANTITY | 0.98+ |
dell.com/power | OTHER | 0.98+ |
Jesus | PERSON | 0.98+ |
Gartner | ORGANIZATION | 0.98+ |
thousands of people | QUANTITY | 0.97+ |
The Future of Multicloud Data Protection is Here FULL EPISODE V3
>>Prior to the pandemic, organizations were largely optimized for efficiency as the best path to bottom line profits. Many CIOs tell the cube privately that they were caught off guard by the degree to which their businesses required greater resiliency beyond their somewhat cumbersome disaster recovery processes. And the lack of that business resilience has actually cost firms because they were unable to respond to changing market forces. And certainly we've seen this dynamic with supply chain challenges and there's a little doubt. We're also seeing it in the area of cybersecurity generally, and data recovery. Specifically. Over the past 30 plus months, the rapid adoption of cloud to support remote workers and build in business resilience had the unintended consequences of expanding attack vectors, which brought an escalation of risk from cyber crime. Well, security in the public clouds is certainly world class. The result of multi-cloud has brought with it multiple shared responsibility models, multiple ways of implementing security policies across clouds and on-prem. >>And at the end of the day, more, not less complexity, but there's a positive side to this story. The good news is that public policy industry collaboration and technology innovation is moving fast to accelerate data protection and cybersecurity strategies with a focus on modernizing infrastructure, securing the digital supply chain, and very importantly, simplifying the integration of data protection and cybersecurity. Today there's heightened awareness that the world of data protection is not only an adjacency to, but it's becoming a fundamental component of cybersecurity strategies. In particular, in order to build more resilience into a business, data protection, people, technologies, and processes must be more tightly coordinated with security operations. Hello and welcome to the future of Multi-Cloud Data Protection Made Possible by Dell in collaboration with the Cube. My name is Dave Valante and I'll be your host today. In this segment, we welcome into the Cube, two senior executives from Dell who will share details on new technology announcements that directly address these challenges. >>Jeff Boudreaux is the president and general manager of Dell's Infrastructure Solutions Group, isg, and he's gonna share his perspectives on the market and the challenges he's hearing from customers. And we're gonna ask Jeff to double click on the messages that Dell is putting into the marketplace and give us his detailed point of view on what it means for customers. Now Jeff is gonna be joined by Travis Vhi. Travis is the senior Vice President of product management for ISG at Dell Technologies, and he's gonna give us details on the products that are being announced today and go into the hard news. Now, we're also gonna challenge our guests to explain why Dell's approach is unique and different in the marketplace. Thanks for being with us. Let's get right into it. We're here with Jeff Padro and Travis Behill. We're gonna dig into the details about Dell's big data protection announcement. Guys, good to see you. Thanks >>For coming in. Good to see you. Thank you for having us. >>You're very welcome. Right. Let's start off, Jeff, with a high level, you know, I'd like to talk about the customer, what challenges they're facing. You're talking to customers all the time, What are they telling you? >>Sure. As you know, we do, we spend a lot of time with our customers, specifically listening, learning, understanding their use cases, their pain points within their specific environments. They tell us a lot. Notice no surprise to any of us, that data is a key theme that they talk about. It's one of their most important, important assets. They need to extract more value from that data to fuel their business models, their innovation engines, their competitive edge. So they need to make sure that that data is accessible, it's secure in its recoverable, especially in today's world with the increased cyber attacks. >>Okay. So maybe we could get into some of those, those challenges. I mean, when, when you talk about things like data sprawl, what do you mean by that? What should people know? Sure. >>So for those big three themes, I'd say, you know, you have data sprawl, which is the big one, which is all about the massive amounts of data. It's the growth of that data, which is growing at an unprecedented rates. It's the gravity of that data and the reality of the multi-cloud sprawl. So stuff is just everywhere, right? Which increases that service a tax base for cyber criminals. >>And and by gravity you mean the data's there and people don't wanna move it. >>It's everywhere, right? And so when it lands someplace, I think edge, core or cloud, it's there and that's, it's something we have to help our customers with. >>Okay, so just it's nuanced cuz complexity has other layers. What, what are those >>Layers? Sure. When we talk to our customers, they tell us complexity is one of their big themes. And specifically it's around data complexity. We talked about that growth and gravity of the data. We talk about multi-cloud complexity and we talk about multi-cloud sprawl. So multiple vendors, multiple contracts, multiple tool chains, and none of those work together in this, you know, multi-cloud world. Then that drives their security complexity. So we talk about that increased attack surface, but this really drives a lot of operational complexity for their teams. Think about we're a lack consistency through everything. So people, process, tools, all that stuff, which is really wasting time and money for our customers. >>So how does that affect the cyber strategies and the, I mean, I've often said the ciso now they have this shared responsibility model, they have to do that across multiple clouds. Every cloud has its own security policies and, and frameworks and syntax. So maybe you could double click on your perspective on that. >>Sure. I'd say the big, you know, the big challenge customers have seen, it's really inadequate cyber resiliency. And specifically they're feeling, feeling very exposed. And today as the world with cyber tax being more and more sophisticated, if something goes wrong, it is a real challenge for them to get back up and running quickly. And that's why this is such a, a big topic for CEOs and businesses around the world. >>You know, it's funny, I said this in my open, I, I think that prior to the pandemic businesses were optimized for efficiency and now they're like, Wow, we have to actually put some headroom into the system to be more resilient. You know, I you hearing >>That? Yeah, we absolutely are. I mean, the customers really, they're asking us for help, right? It's one of the big things we're learning and hearing from them. And it's really about three things, one's about simplifying it, two, it's really helping them to extract more value from their data. And then the third big, big piece is ensuring their data is protected and recoverable regardless of where it is going back to that data gravity and that very, you know, the multicloud world just recently, I don't know if you've seen it, but the global data protected, excuse me, the global data protection index gdp. >>I, Yes. Jesus. Not to be confused with gdpr, >>Actually that was released today and confirms everything we just talked about around customer challenges, but also it highlights an importance of having a very cyber, a robust cyber resilient data protection strategy. >>Yeah, I haven't seen the latest, but I, I want to dig into it. I think this is, you've done this many, many years in a row. I like to look at the, the, the time series and see how things have changed. All right. At, at a high level, Jeff, can you kind of address why Dell and from your point of view is best suited? >>Sure. So we believe there's a better way or a better approach on how to handle this. We think Dell is uniquely positioned to help our customers as a one stop shop, if you will, for that cyber resilient multi-cloud data protection solution in needs. We take a modern, a simple and resilient approach, >>But what does that mean? What, what do you mean by modern? >>Sure. So modern, we talk about our software defined architecture, right? It's really designed to meet the needs not only of today, but really into the future. And we protect data across any cloud in any workload. So we have a proven track record doing this today. We have more than 1700 customers that trust us to protect them more than 14 exabytes of their data in the cloud today. >>Okay, so you said modern, simple and resilient. What, what do you mean by simple? Sure. >>We wanna provide simplicity everywhere, going back to helping with the complexity challenge, and that's from deployment to consumption to management and support. So our offers will deploy in minutes. They are easy to operate and use, and we support flexible consumption models for whatever the customer may desire. So traditional subscription or as a service. >>And when you, when you talk about resilient, I mean, I, I put forth that premise, but it's hard because people say, Well, that's gonna gonna cost us more. Well, it may, but you're gonna also reduce your, your risk. So how, what's your point of view on resilience? >>Yeah, I think it's, it's something all customers need. So we're gonna be providing a comprehensive and resilient portfolio of cyber solutions that are secured by design. We have some ver some unique capabilities in a combination of things like built in amenability, physical and logical isolation. We have intelligence built in with AI par recovery and just one, I guess fun fact for everybody is we have our cyber vault is the only solution in the industry that is endorsed by Sheltered Harbor that meets all the needs of the financial sector. >>So it's interesting when you think about the, the NIST framework for cyber security, it's all about about layers. You're sort of bringing that now to, to data protection, correct? Yeah. All right. In a minute we're gonna come back with Travis and dig into the news. We're gonna take a short break. Keep it right there. Okay. We're back with Jeff and Travis Vehill to dig deeper into the news. Guys, again, good to see you. Travis, if you could, maybe you, before we get into the news, can you set the business context for us? What's going on out there? >>Yeah, thanks for that question, Dave. To set a little bit of the context, when you look at the data protection market, Dell has been a leader in providing solutions to customers for going on nearly two decades now. We have tens of thousands of people using our appliances. We have multiple thousands of people using our latest modern simple power protect data managers software. And as Jeff mentioned, we have, you know, 1700 customers protecting 14 exabytes of data in the public clouds today. And that foundation gives us a unique vantage point. We talked to a lot of customers and they're really telling us three things. They want simple solutions, they want us to help them modernize and they want us to add as the highest priority, maintain that high degree of resiliency that they expect from our data protection solutions. So tho that's the backdrop to the news today. And, and as we go through the news, I think you'll, you'll agree that each of these announcements deliver on those pillars. And in particular today we're announcing the Power Protect data manager appliance. We are announcing power protect cyber recovery enhancements, and we are announcing enhancements to our Apex data storage >>Services. Okay, so three pieces. Let's, let's dig to that. It's interesting appliance, everybody wants software, but then you talk to customers and they're like, Well, we actually want appliances because we just wanna put it in and it works, right? Performs great. So, so what do we need to know about the appliance? What's the news there? Well, >>You know, part of the reason I gave you some of those stats to begin with is that we have at this strong foundation of, of experience, but also intellectual property components that we've taken that have been battle tested in the market. And we've put them together in a new simple integrated appliance that really combines the best of the target appliance capabilities we have with that modern simple software. And we've integrated it from the, you know, sort of taking all of those pieces, putting them together in a simple, easy to use and easy to scale interface for customers. >>So the premise that I've been putting forth for, you know, months now, probably well, well over a year, is that, that that data protection is becoming an extension of your, your cybersecurity strategies. So I'm interested in your perspective on cyber recovery. You, you have specific news that you have there? >>Yeah, you know, we, we are, in addition to simplifying things via the, the appliance, we are providing solutions for customers no matter where they're deploying. And cyber recovery, especially when it comes to cloud deployments, is an increasing area of interest and deployment that we see with our customers. So what we're announcing today is that we're expanding our cyber recovery services to be available in Google Cloud with this announcement. It means we're available in all three of the major clouds and it really provides customers the flexibility to secure their data no matter if they're running, you know, on premises in a colo at the edge in the public cloud. And the other nice thing about this, this announcement is that you have the ability to use Google Cloud as a cyber recovery vault that really allows customers to isolate critical data and they can recover that critical data from the vault back to on-premises or from that vault back to running their cyber cyber protection or their data protection solutions in the public cloud. >>I always invoke my, my favorite Matt Baker here. It's not a zero sum game, but this is a perfect example where there's opportunities for a company like Dell to partner with the public cloud provider. You've got capabilities that don't exist there. You've got the on-prem capabilities. We could talk about edge all day, but that's a different topic. Okay, so Mike, my other question Travis, is how does this all fit into Apex? We hear a lot about Apex as a service, it's sort of the new hot thing. What's happening there? What's the news around Apex? >>Yeah, we, we've seen incredible momentum with our Apex solutions since we introduced data protection options into them earlier this year. And we're really building on that momentum with this announcement being, you know, providing solutions that allow customers to consume flexibly. And so what we're announcing specifically is that we're expanding Apex data storage services to include a data protection option. And it's like with all Apex offers, it's a pay as you go solution really streamlines the process of customers purchasing, deploying, maintaining and managing their backup software. All a customer really needs to do is, you know, specify their base capacity, they specify their performance tier, they tell us do they want a a one year term or a three year term and we take it from there. We, we get them up and running so they can start deploying and consuming flexibly. And it's, as with many of our Apex solutions, it's a simple user experience all exposed through a unified Apex console. >>Okay. So it's you keeping it simple, like I think large, medium, small, you know, we hear a lot about t-shirt sizes. I I'm a big fan of that cuz you guys should be smart enough to figure out, you know, based on my workload, what I, what I need, how different is this? I wonder if you guys could, could, could address this. Jeff, maybe you can, >>You can start. Sure. I'll start and then pitch me, you know, Travis, you you jump in when I screw up here. So, awesome. So first I'd say we offer innovative multi-cloud data protection solutions. We provide that deliver performance, efficiency and scale that our customers demand and require. We support as Travis at all the major public clouds. We have a broad ecosystem of workload support and I guess the, the great news is we're up to 80% more cost effective than any of the competition. >>80%. 80%, That's a big number, right. Travis, what's your point of view on this? Yeah, >>I, I think number one, end to end data protection. We, we are that one stop shop that I talked about. Whether it's a simplified appliance, whether it's deployed in the cloud, whether it's at the edge, whether it's integrated appliances, target appliances, software, we have solutions that span the gamut as a service. I mentioned the Apex solution as well. So really we can, we can provide solutions that help support customers and protect them, any workload, any cloud, anywhere that data lives edge core to cloud. The other thing that we hear as a, as a, a big differentiator for Dell and, and Jeff touched on on this a little bit earlier, is our intelligent cyber resiliency. We have a unique combination in, in the market where we can offer immutability or protection against deletion as, as sort of that first line of defense. But we can also offer a second level of defense, which is isolation, talking, talking about data vaults or cyber vaults and cyber recovery. And the, at more importantly, the intelligence that goes around that vault. It can look at detecting cyber attacks, it can help customers speed time to recovery and really provides AI and ML to help early diagnosis of a cyber re attack and fast recovery should a cyber attack occur. And, and you know, if you look at customer adoption of that solution specifically in the clouds, we have over 1300 customers utilizing power protect cyber recovery. >>So I think it's fair to say that your, I mean your portfolio has obvious been a big differentiator whenever I talk to, you know, your finance team, Michael Dell, et cetera, that end to end capability that that, that your ability to manage throughout the supply chain. We actually just did a a, an event recently with you guys where you went into what you're doing to make infrastructure trusted. And so my take on that is you, in a lot of respects, you're shifting, you know, the client's burden to your r and d now they have a lot of work to do, so it's, it's not like they can go home and just relax, but, but that's a key part of the partnership that I see. Jeff, I wonder if you could give us the, the, the final thoughts. >>Sure. Dell has a long history of being a trusted partner with it, right? So we have unmatched capabilities. Going back to your point, we have the broadest portfolio, we have, you know, we're a leader in every category that we participate in. We have a broad deep breadth of portfolio. We have scale, we have innovation that is just unmatched within data protection itself. We are the trusted market leader, no if and or bots, we're number one for both data protection software in appliances per idc. And we would just name for the 17th consecutive time the leader in the, the Gartner Magic Quadrant. So bottom line is customers can count on Dell. >>Yeah, and I think again, we're seeing the evolution of, of data protection. It's not like the last 10 years, it's really becoming an adjacency and really a key component of your cyber strategy. I think those two parts of the organization are coming together. So guys, really appreciate your time. Thanks for Thank you sir. Thanks Dave. Travis, good to see you. All right, in a moment I'm gonna come right back and summarize what we learned today, what actions you can take for your business. You're watching the future of multi-cloud data protection made possible by Dell and collaboration with the cube, your leader in enterprise and emerging tech coverage right back >>In our data driven world. Protecting data has never been more critical to guard against everything from cyber incidents to unplanned outages. You need a cyber resilient, multi-cloud data protection strategy. >>It's not a matter of if you're gonna get hacked, it's a matter of when. And I wanna know that I can recover and continue to recover each day. >>It is important to have a cyber security and a cyber resiliency plan in place because the threat of cyber attack are imminent. >>Power protects. Data manager from Dell Technologies helps deliver the data protection and security confidence you would expect from a trusted partner and market leader. >>We chose Power Protect Data Manager because we've been a strategic partner with Dell Technologies for roughly 20 years now. Our partnership with Dell Technologists has provided us with the ability to scale and grow as we've transitioned from 10 billion in assets to 20 billion. >>With Power Protect Data Manager, you can enjoy exceptional ease of use to increase your efficiency and reduce costs. >>Got installed it by myself, learned it by myself with very intuitive >>While restoring a machine with Power Protect Data Manager is fast. We can fully manage Power Protect through the center. We can recover a whole machine in seconds. >>Data Manager offers innovation such as Transparent snapshots to simplify virtual machine backups and it goes beyond backup and restore to provide valuable insights and to protected data workloads and VMs. >>In our previous environment, it would take anywhere from three to six hours at night to do a single backup of each vm. Now we're backing up hourly and it takes two to three seconds with the transparent snapshots. >>With Power Protects Data Manager, you get the peace of mind knowing that your data is safe and available whenever you need it. >>Data is extremely important. We can't afford to lose any data. We need things just to work. >>Start your journey to modern data protection with Dell Power Protect Data manager. Visit dell.com/power Protect Data Manager. >>We put forth the premise in our introduction that the world's of data protection in cybersecurity must be more integrated. We said that data recovery strategies have to be built into security practices and procedures and by default this should include modern hardware and software. Now in addition to reviewing some of the challenges that customers face, which have been pretty well documented, we heard about new products that Dell Technologies is bringing to the marketplace that specifically address these customer concerns. There were three that we talked about today. First, the Power Protect Data Manager Appliance, which is an integrated system taking advantage of Dell's history in data protection, but adding new capabilities. And I want to come back to that in the moment. Second is Dell's Power Protect cyber recovery for Google Cloud platform. This rounds out the big three public cloud providers for Dell, which joins AWS and and Azure support. >>Now finally, Dell has made its target backup appliances available in Apex. You might recall earlier this year we saw the introduction from Dell of Apex backup services and then in May at Dell Technologies world, we heard about the introduction of Apex Cyber Recovery Services. And today Dell is making its most popular backup appliances available and Apex. Now I wanna come back to the Power Protect data manager appliance because it's a new integrated appliance. And I asked Dell off camera really what is so special about these new systems and what's really different from the competition because look, everyone offers some kind of integrated appliance. So I heard a number of items, Dell talked about simplicity and efficiency and containers and Kubernetes. So I kind of kept pushing and got to what I think is the heart of the matter in two really important areas. One is simplicity. >>Dell claims that customers can deploy the system in half the time relative to the competition. So we're talking minutes to deploy and of course that's gonna lead to much simpler management. And the second real difference I heard was backup and restore performance for VMware workloads. In particular, Dell has developed transparent snapshot capabilities to fundamentally change the way VMs are protected, which leads to faster backup and restores with less impact on virtual infrastructure. Dell believes this new development is unique in the market and claims that in its benchmarks the new appliance was able to back up 500 virtual machines in 47% less time compared to a leading competitor. Now this is based on Dell benchmarks, so hopefully these are things that you can explore in more detail with Dell to see if and how they apply to your business. So if you want more information, go to the data protectionPage@dell.com. You can find that at dell.com/data protection. And all the content here and other videos are available on demand@thecube.net. Check out our series on the blueprint for trusted infrastructure, it's related and has some additional information. And go to silicon angle.com for all the news and analysis related to these and other announcements. This is Dave Valante. Thanks for watching the future of multi-cloud protection made possible by Dell in collaboration with the Cube, your leader in enterprise and emerging tech coverage.
SUMMARY :
And the lack of that business And at the end of the day, more, not less complexity, Jeff Boudreaux is the president and general manager of Dell's Infrastructure Solutions Group, Good to see you. Let's start off, Jeff, with a high level, you know, I'd like to talk about the So they need to make sure that that data data sprawl, what do you mean by that? So for those big three themes, I'd say, you know, you have data sprawl, which is the big one, which is all about the massive amounts of it's something we have to help our customers with. What, what are those We talked about that growth and gravity of the data. So how does that affect the cyber strategies and the, And today as the world with cyber tax being more and more sophisticated, You know, it's funny, I said this in my open, I, I think that prior to the pandemic businesses that very, you know, the multicloud world just recently, I don't know if you've seen it, but the global data protected, Not to be confused with gdpr, Actually that was released today and confirms everything we just talked about around customer challenges, At, at a high level, Jeff, can you kind of address why Dell and from your point of view is best suited? We think Dell is uniquely positioned to help our customers as a one stop shop, if you will, It's really designed to meet the needs What, what do you mean by simple? We wanna provide simplicity everywhere, going back to helping with the complexity challenge, and that's from deployment So how, what's your point of view on resilience? Harbor that meets all the needs of the financial sector. So it's interesting when you think about the, the NIST framework for cyber security, it's all about about layers. the context, when you look at the data protection market, Dell has been a leader in providing solutions but then you talk to customers and they're like, Well, we actually want appliances because we just wanna put it in and it works, You know, part of the reason I gave you some of those stats to begin with is that we have at this strong foundation of, So the premise that I've been putting forth for, you know, months now, probably well, well over a year, it really provides customers the flexibility to secure their data no matter if they're running, you know, it's sort of the new hot thing. All a customer really needs to do is, you know, specify their base capacity, I I'm a big fan of that cuz you guys should be smart enough to figure out, you know, based on my workload, We support as Travis at all the major public clouds. Travis, what's your point of view on of that solution specifically in the clouds, So I think it's fair to say that your, I mean your portfolio has obvious been a big differentiator whenever I talk to, We are the trusted market leader, no if and or bots, we're number one for both data protection software in what we learned today, what actions you can take for your business. Protecting data has never been more critical to guard against that I can recover and continue to recover each day. It is important to have a cyber security and a cyber resiliency Data manager from Dell Technologies helps deliver the data protection and security We chose Power Protect Data Manager because we've been a strategic partner with With Power Protect Data Manager, you can enjoy exceptional ease of use to increase your efficiency We can fully manage Power Data Manager offers innovation such as Transparent snapshots to simplify virtual Now we're backing up hourly and it takes two to three seconds with the transparent With Power Protects Data Manager, you get the peace of mind knowing that your data is safe and available We need things just to work. Start your journey to modern data protection with Dell Power Protect Data manager. We put forth the premise in our introduction that the world's of data protection in cybersecurity So I kind of kept pushing and got to what I think is the heart of the matter in two really Dell claims that customers can deploy the system in half the time relative to the
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Jeff | PERSON | 0.99+ |
Dave Valante | PERSON | 0.99+ |
Jeff Boudreaux | PERSON | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
Travis | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
Mike | PERSON | 0.99+ |
20 billion | QUANTITY | 0.99+ |
Travis Behill | PERSON | 0.99+ |
three | QUANTITY | 0.99+ |
Jeff Padro | PERSON | 0.99+ |
10 billion | QUANTITY | 0.99+ |
Matt Baker | PERSON | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
Sheltered Harbor | ORGANIZATION | 0.99+ |
Travis Vehill | PERSON | 0.99+ |
Michael Dell | PERSON | 0.99+ |
second | QUANTITY | 0.99+ |
demand@thecube.net | OTHER | 0.99+ |
May | DATE | 0.99+ |
more than 14 exabytes | QUANTITY | 0.99+ |
more than 1700 customers | QUANTITY | 0.99+ |
1700 customers | QUANTITY | 0.99+ |
Second | QUANTITY | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
two senior executives | QUANTITY | 0.99+ |
First | QUANTITY | 0.99+ |
three pieces | QUANTITY | 0.99+ |
today | DATE | 0.99+ |
two parts | QUANTITY | 0.99+ |
two | QUANTITY | 0.99+ |
six hours | QUANTITY | 0.99+ |
both | QUANTITY | 0.99+ |
third | QUANTITY | 0.99+ |
three seconds | QUANTITY | 0.99+ |
One | QUANTITY | 0.99+ |
Today | DATE | 0.99+ |
over 1300 customers | QUANTITY | 0.99+ |
Solutions Group | ORGANIZATION | 0.99+ |
Apex | ORGANIZATION | 0.98+ |
three things | QUANTITY | 0.98+ |
500 virtual machines | QUANTITY | 0.98+ |
each | QUANTITY | 0.98+ |
20 years | QUANTITY | 0.98+ |
80% | QUANTITY | 0.98+ |
The Future of Multicloud Data Protection is Here FULL EPISODE V1
>> Prior to the pandemic, organizations were largely optimized for efficiency as the best path to bottom line profits. Many CIOs tell theCUBE privately that they were caught off guard by the degree to which their businesses required greater resiliency beyond their somewhat cumbersome disaster recovery processes. And the lack of that business resilience has actually cost firms because they were unable to respond to changing market forces. And certainly, we've seen this dynamic with supply chain challenges. And there's a little doubt we're also seeing it in the area of cybersecurity generally, and data recovery specifically. Over the past 30 plus months, the rapid adoption of cloud to support remote workers and build in business resilience had the unintended consequences of expanding attack vectors, which brought an escalation of risk from cybercrime. While security in the public cloud is certainly world class, the result of multicloud has brought with it multiple shared responsibility models, multiple ways of implementing security policies across clouds and on-prem. And at the end of the day, more, not less, . But there's a positive side to this story. The good news is that public policy, industry collaboration and technology innovation is moving fast to accelerate data protection and cybersecurity strategies with a focus on modernizing infrastructure, securing the digital supply chain, and very importantly, simplifying the integration of data protection and cybersecurity. Today, there's heightened awareness that the world of data protection is not only an adjacency to, but is becoming a fundamental component of cybersecurity strategies. In particular, in order to build more resilience into a business, data protection people, technologies and processes must be more tightly coordinated with security operations. Hello, and welcome to "The Future of Multicloud Data Protection" made possible by Dell in collaboration with theCUBE. My name is Dave Vellante and I'll be your host today. In this segment, we welcome into theCUBE two senior executives from Dell who will share details on new technology announcements that directly address these challenges. Jeff Boudreau is the President and General Manager of Dell's Infrastructure Solutions Group, ISG, and he's going to share his perspectives on the market and the challenges he's hearing from customers. And we're going to ask Jeff to double click on the messages that Dell is putting into the marketplace and give us his detailed point of view on what it means for customers. Now, Jeff is going to be joined by Travis Vigil. Travis is the Senior Vice-President of Product Management for ISG at Dell Technologies, and he's going to give us details on the products that are being announced today and go into the hard news. Now, we're also going to challenge our guests to explain why Dell's approach is unique and different in the marketplace. Thanks for being with us. Let's get right into it. (upbeat music) We're here with Jeff Boudreau and Travis Vigil, and we're going to dig into the details about Dell's big data protection announcement. Guys, good to see you. Thanks for coming in. >> Good to see you. Thank you for having us. >> You're very welcome. Alright, let's start off Jeff, with the high level. You know, I'd like to talk about the customer, what challenges they're facing? You're talking to customers all the time. What are they telling you? >> Sure, as you know, we spend a lot of time with our customers, specifically listening, learning, understanding their use cases, their pain points within their specific environments. They tell us a lot. No surprise to any of us that data is a key theme that they talk about. It's one of their most important assets. They need to extract more value from that data to fuel their business models, their innovation engines, their competitive edge. So, they need to make sure that that data is accessible, it's secure and its recoverable, especially in today's world with the increased cyber attacks. >> Okay, so maybe we could get into some of those challenges. I mean, when you talk about things like data sprawl, what do you mean by that? What should people know? >> Sure, so for those big three themes, I'd say, you have data sprawl, which is the big one, which is all about the massive amounts of data. It's the growth of that data, which is growing at unprecedented rates. It's the gravity of that data and the reality of the multicloud sprawl. So stuff is just everywhere, right? Which increases that surface as attack space for cyber criminals. >> And by gravity, you mean the data's there and people don't want to move it. >> It's everywhere, right? And so when it lands someplace, think Edge, Core or Cloud, it's there. And it's something we have to help our customers with. >> Okay, so it's nuanced 'cause complexity has other layers. What are those layers? >> Sure. When we talk to our customers, they tell us complexity is one of their big themes. And specifically it's around data complexity. We talked about that growth and gravity of the data. We talk about multicloud complexity and we talk about multicloud sprawl. So multiple vendors, multiple contracts, multiple tool chains, and none of those work together in this multicloud world. Then that drives their security complexity. So, we talk about that increased attack surface. But this really drives a lot of operational complexity for their teams. Think about we're lacking consistency through everything. So people, process, tools, all that stuff, which is really wasting time and money for our customers. >> So, how does that affect the cyber strategies and the, I mean, I've often said the Cisco, now they have this shared responsibility model. They have to do that across multiple clouds. Every cloud has its own security policies and frameworks and syntax. So, maybe you could double click on your perspective on that. >> Sure. I'd say the big challenge customers have seen, it's really inadequate cyber resiliency and specifically, they're feeling very exposed. And today as the world with cyber attacks being more and more sophisticated, if something goes wrong, it is a real challenge for them to get back up and running quickly. And that's why this is such a big topic for CEOs and businesses around the world. You know, it's funny. I said this in my open. I think that prior to the pandemic businesses were optimized for efficiency, and now they're like, "Wow, we have to actually put some headroom into the system to be more resilient." You know, are you hearing that? >> Yeah, we absolutely are. I mean, the customers really, they're asking us for help, right? It's one of the big things we're learning and hearing from them. And it's really about three things. One's about simplifying IT. Two, it's really helping them to extract more value from their data. And then the third big piece is ensuring their data is protected and recoverable regardless of where it is going back to that data gravity and that very, you know, the multicloud world. Just recently, I don't know if you've seen it, but the Global Data Protected, excuse me, the Global Data Protection Index. >> GDPI. >> Yes. Jesus. >> Not to be confused with GDPR. >> Actually, that was released today and confirms everything we just talked about around customer challenges. But also it highlights at an importance of having a very cyber, a robust cyber resilient data protection strategy. >> Yeah, I haven't seen the latest, but I want to dig into it. I think this, I've done this many, many years in a row. I'd like to look at the time series and see how things have changed. All right. At a high level, Jeff, can you kind of address why Dell, from your point of view is best suited? >> Sure. So, we believe there's a better way or a better approach on how to handle this. We think Dell is uniquely positioned to help our customers as a one stop shop, if you will, for that cyber resilient multicloud data protection solution and needs. We take a modern, a simple and resilient approach. >> What does that mean? What do you mean by modern? >> Sure. So modern, we talk about our software defined architecture. Right? It's really designed to meet the needs not only of today, but really into the future. And we protect data across any cloud and any workload. So, we have a proven track record doing this today. We have more than 1,700 customers that trust us to protect more than 14 exabytes of their data in the cloud today. >> Okay, so you said modern, simple and resilient. What do you mean by simple? >> Sure. We want to provide simplicity everywhere, going back to helping with the complexity challenge. And that's from deployment to consumption, to management and support. So, our offers will deploy in minutes. They are easy to operate and use, and we support flexible consumption models for whatever the customer may desire. So, traditional subscription or as a service. >> And when you talk about resilient, I mean, I put forth that premise, but it's hard because people say, "Well, that's going to cost us more. Well, it may, but you're going to also reduce your risk." So, what's your point of view on resilience? >> Yeah, I think it's something all customers need. So, we're going to be providing a comprehensive and resilient portfolio of cyber solutions that are secure by design. And we have some unique capabilities and a combination of things like built in immutability, physical and logical isolation. We have intelligence built in with AI part recovery. And just one, I guess fun fact for everybody is we have, our cyber vault is the only solution in the industry that is endorsed by Sheltered Harbor that meets all the needs of the financial sector. >> So it's interesting when you think about the NIST framework for cybersecurity. It's all about about layers. You're sort of bringing that now to data protection. >> Jeff: Correct. Yeah. >> All right. In a minute, we're going to come back with Travis and dig into the news. We're going to take a short break. Keep it right there. (upbeat music) (upbeat adventurous music) Okay, we're back with Jeff and Travis Vigil to dig deeper into the news. Guys, again, good to see you. Travis, if you could, maybe you, before we get into the news, can you set the business context for us? What's going on out there? >> Yeah. Thanks for that question, Dave. To set a little bit of the context, when you look at the data protection market, Dell has been a leader in providing solutions to customers for going on nearly two decades now. We have tens of thousands of people using our appliances. We have multiple thousands of people using our latest modern, simple PowerProtect Data Manager Software. And as Jeff mentioned, we have, 1,700 customers protecting 14 exabytes of data in the public clouds today. And that foundation gives us a unique vantage point. We talked to a lot of customers and they're really telling us three things. They want simple solutions. They want us to help them modernize. And they want us to add as the highest priority, maintain that high degree of resiliency that they expect from our data protection solutions. So, that's the backdrop to the news today. And as we go through the news, I think you'll agree that each of these announcements deliver on those pillars. And in particular, today we're announcing the PowerProtect Data Manager Appliance. We are announcing PowerProtect Cyber Recovery Enhancements, and we are announcing enhancements to our APEX Data Storage Services. >> Okay, so three pieces. Let's dig to that. It's interesting, appliance, everybody wants software, but then you talk to customers and they're like, "Well, we actually want appliances because we just want to put it in and it works." >> Travis: (laughs) Right. >> It performs great. So, what do we need to know about the appliance? What's the news there? >> Well, you know, part of the reason I gave you some of those stats to begin with is that we have this strong foundation of experience, but also intellectual property components that we've taken that have been battle tested in the market. And we've put them together in a new simple, integrated appliance that really combines the best of the target appliance capabilities we have with that modern, simple software. And we've integrated it from the, you know, sort of taking all of those pieces, putting them together in a simple, easy to use and easy to scale interface for customers. >> So, the premise that I've been putting forth for months now, probably well over a year, is that data protection is becoming an extension of your cybersecurity strategies. So, I'm interested in your perspective on cyber recovery. Your specific news that you have there. >> Yeah, you know, we are in addition to simplifying things via the appliance, we are providing solutions for customers no matter where they're deploying. And cyber recovery, especially when it comes to cloud deployments, is an increasing area of interest and deployment that we see with our customers. So, what we're announcing today is that we're expanding our cyber recovery services to be available in Google Cloud. With this announcement, it means we're available in all three of the major clouds and it really provides customers the flexibility to secure their data no matter if they're running on-premises, in Acolo, at the Edge, in the public cloud. And the other nice thing about this announcement is that you have the ability to use Google Cloud as a cyber recovery vault that really allows customers to isolate critical data and they can recover that critical data from the vault back to on-premises or from that vault back to running their cyber protection or their data protection solutions in the public cloud. >> I always invoke my favorite Matt Baker here. "It's not a zero sum game", but this is a perfect example where there's opportunities for a company like Dell to partner with the public cloud provider. You've got capabilities that don't exist there. You've got the on-prem capabilities. We could talk about Edge all day, but that's a different topic. Okay, so my other question Travis, is how does this all fit into APEX? We hear a lot about APEX as a service. It's sort of the new hot thing. What's happening there? What's the news around APEX? >> Yeah, we've seen incredible momentum with our APEX solutions since we introduced data protection options into them earlier this year. And we're really building on that momentum with this announcement being providing solutions that allow customers to consume flexibly. And so, what we're announcing specifically is that we're expanding APEX Data Storage Services to include a data protection option. And it's like with all APEX offers, it's a pay-as-you-go solution. Really streamlines the process of customers purchasing, deploying, maintaining and managing their backup software. All a customer really needs to do is specify their base capacity. They specify their performance tier. They tell us do they want a one year term or a three year term and we take it from there. We get them up and running so they can start deploying and consuming flexibly. And as with many of our APEX solutions, it's a simple user experience all exposed through a unified APEX Console. >> Okay, so it's, you're keeping it simple, like I think large, medium, small. You know, we hear a lot about T-shirt sizes. I'm a big fan of that 'cause you guys should be smart enough to figure out, you know, based on my workload, what I need. How different is this? I wonder if you guys could address this. Jeff, maybe you can start. >> Sure, I'll start and then- >> Pitch me. >> You know, Travis, you jump in when I screw up here. >> Awesome. >> So, first I'd say we offer innovative multicloud data protection solutions. We provide that deliver performance, efficiency and scale that our customers demand and require. We support as Travis said, all the major public clouds. We have a broad ecosystem of workload support and I guess the great news is we're up to 80% more cost effective than any of the competition. >> Dave: 80%? >> 80% >> Hey, that's a big number. All right, Travis, what's your point of view on this? >> Yeah, I think number one, end-to-end data protection. We are that one stop shop that I talked about, whether it's a simplified appliance, whether it's deployed in the cloud, whether it's at the Edge, whether it's integrated appliances, target appliances, software. We have solutions that span the gamut as a service. I mentioned the APEX Solution as well. So really, we can provide solutions that help support customers and protect them, any workload, any cloud, anywhere that data lives. Edge, Core to Cloud. The other thing that we hear as a big differentiator for Dell, and Jeff touched on on this a little bit earlier, is our Intelligent Cyber Resiliency. We have a unique combination in the market where we can offer immutability or protection against deletion as sort of that first line of defense. But we can also offer a second level of defense, which is isolation, talking about data vaults or cyber vaults and cyber recovery. And more importantly, the intelligence that goes around that vault. It can look at detecting cyber attacks. It can help customers speed time to recovery. And really provides AI and ML to help early diagnosis of a cyber attack and fast recovery should a cyber attack occur. And if you look at customer adoption of that solution, specifically in the cloud, we have over 1300 customers utilizing PowerProtect Cyber Recovery. >> So, I think it's fair to say that your portfolio has obviously been a big differentiator. Whenever I talk to your finance team, Michael Dell, et cetera, that end-to-end capability, that your ability to manage throughout the supply chain. We actually just did an event recently with you guys where you went into what you're doing to make infrastructure trusted. And so my take on that is you, in a lot of respects, you're shifting the client's burden to your R&D. now they have a lot of work to do, so it's not like they can go home and just relax. But that's a key part of the partnership that I see. Jeff, I wonder if you could give us the final thoughts. >> Sure. Dell has a long history of being a trusted partner within IT, right? So, we have unmatched capabilities. Going back to your point, we have the broadest portfolio. We're a leader in every category that we participate in. We have a broad deep breadth of portfolio. We have scale. We have innovation that is just unmatched. Within data protection itself, we are the trusted market leader. No if, ands or buts. We're number one for both data protection software in appliances per IDC and we were just named for the 17th consecutive time the leader in the Gartner Magic Quadrant. So, bottom line is customers can count on Dell. >> Yeah, and I think again, we're seeing the evolution of data protection. It's not like the last 10 years. It's really becoming an adjacency and really, a key component of your cyber strategy. I think those two parts of the organization are coming together. So guys, really appreciate your time. Thanks for coming. >> Thank you, sir. >> Dave. >> Travis, good to see you. All right, in a moment I'm going to come right back and summarize what we learned today, what actions you can take for your business. You're watching "The Future of Multicloud Data Protection" made possible by Dell in collaboration with theCUBE, your leader in enterprise and emerging tech coverage. Right back. >> Advertiser: In our data-driven world, protecting data has never been more critical. To guard against everything from cyber incidents to unplanned outages, you need a cyber resilient multicloud data protection strategy. >> It's not a matter of if you're going to get hacked, it's a matter of when. And I want to know that I can recover and continue to recover each day. >> It is important to have a cyber security and a cyber resiliency plan in place because the threat of cyber attack are imminent. >> Advertiser: PowerProtect Data Manager from Dell Technologies helps deliver the data protection and security confidence you would expect from a trusted partner and market leader. >> We chose PowerProtect Data Manager because we've been a strategic partner with Dell Technologies for roughly 20 years now. Our partnership with Dell Technologies has provided us with the ability to scale and grow as we've transitioned from 10 billion in assets to 20 billion. >> Advertiser: With PowerProtect Data Manager, you can enjoy exceptional ease of use to increase your efficiency and reduce costs. >> I'd installed it by myself, learn it by myself. It was very intuitive. >> While restoring your machine with PowerProtect Data Manager is fast, we can fully manage PowerProtect through the center. We can recover a whole machine in seconds. >> Instructor: Data Manager offers innovation such as transparent snapshots to simplify virtual machine backups, and it goes beyond backup and restore to provide valuable insights into protected data, workloads and VMs. >> In our previous environment, it would take anywhere from three to six hours a night to do a single backup of each VM. Now, we're backing up hourly and it takes two to three seconds with the transparent snapshots. >> Advertiser: With PowerProtect's Data Manager, you get the peace of mind knowing that your data is safe and available whenever you need it. >> Data is extremely important. We can't afford to lose any data. We need things just to work. >> Advertiser: Start your journey to modern data protection with Dell PowerProtect's Data Manager. Visit dell.com/powerprotectdatamanager >> We put forth the premise in our introduction that the worlds of data protection in cybersecurity must be more integrated. We said that data recovery strategies have to be built into security practices and procedures and by default, this should include modern hardware and software. Now, in addition to reviewing some of the challenges that customers face, which have been pretty well documented, we heard about new products that Dell Technologies is bringing to the marketplace that specifically address these customer concerns. And there were three that we talked about today. First, the PowerProtect Data Manager Appliance, which is an integrated system taking advantage of Dell's history in data protection, but adding new capabilities. And I want to come back to that in a moment. Second is Dell's PowerProtect Cyber Recovery for Google Cloud platform. This rounds out the big three public cloud providers for Dell, which joins AWS and Azure support. Now finally, Dell has made its target backup appliances available in APEX. You might recall, earlier this year we saw the introduction from Dell of APEX Backup Services and then in May at Dell Technologies World, we heard about the introduction of APEX Cyber Recovery Services. And today, Dell is making its most popular backup appliances available in APEX. Now, I want to come back to the PowerProtect Data Manager Appliance because it's a new integrated appliance and I asked Dell off camera, "Really what is so special about these new systems and what's really different from the competition?" Because look, everyone offers some kind of integrated appliance. So, I heard a number of items. Dell talked about simplicity and efficiency and containers and Kubernetes. So, I kind of kept pushing and got to what I think is the heart of the matter in two really important areas. One is simplicity. Dell claims that customers can deploy the system in half the time relative to the competition. So, we're talking minutes to deploy, and of course that's going to lead to much simpler management. And the second real difference I heard was backup and restore performance for VMware workloads. In particular, Dell has developed transparent snapshot capabilities to fundamentally change the way VMs are protected, which leads to faster backup and restores with less impact on virtual infrastructure. Dell believes this new development is unique in the market and claims that in its benchmarks, the new appliance was able to back up 500 virtual machines in 47% less time compared to a leading competitor. Now, this is based on Dell benchmarks, so hopefully these are things that you can explore in more detail with Dell to see if and how they apply to your business. So if you want more information, go to the Data Protection Page at dell.com. You can find that at dell.com/dataprotection. And all the content here and other videos are available on demand at theCUBE.net. Check out our series on the blueprint for trusted infrastructure, it's related and has some additional information. And go to siliconangle.com for all the news and analysis related to these and other announcements. This is Dave Vellante. Thanks for watching "The Future of Multicloud Protection" made possible by Dell, in collaboration with theCUBE, your leader in enterprise and emerging tech coverage. (upbeat music)
SUMMARY :
by the degree to which their businesses Good to see you. You know, I'd like to So, they need to make sure I mean, when you talk about and the reality of the multicloud sprawl. mean the data's there to help our customers with. Okay, so it's nuanced 'cause and gravity of the data. They have to do that into the system to be more resilient." and that very, you know, and confirms everything we just talked I'd like to look at the time series on how to handle this. in the cloud today. Okay, so you said modern, And that's from deployment to consumption, to also reduce your risk." that meets all the needs that now to data protection. Yeah. and dig into the news. So, that's the backdrop to the news today. Let's dig to that. What's the news there? and easy to scale interface for customers. So, the premise that that critical data from the to partner with the public cloud provider. that allow customers to consume flexibly. I'm a big fan of that 'cause you guys You know, Travis, you and I guess the great news is we're up your point of view on this? I mentioned the APEX Solution as well. to say that your portfolio Going back to your point, we of the organization Travis, good to see you. to unplanned outages, you and continue to recover each day. It is important to and security confidence you would expect from 10 billion in assets to 20 billion. to increase your efficiency I'd installed it by we can fully manage to simplify virtual machine backups, from three to six hours a and available whenever you need it. We need things just to work. journey to modern data protection and of course that's going to
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Dave Vellante | PERSON | 0.99+ |
Travis | PERSON | 0.99+ |
Jeff | PERSON | 0.99+ |
Jeff Boudreau | PERSON | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
Cisco | ORGANIZATION | 0.99+ |
Matt Baker | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
10 billion | QUANTITY | 0.99+ |
47% | QUANTITY | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
20 billion | QUANTITY | 0.99+ |
two | QUANTITY | 0.99+ |
Jeff Boudreau | PERSON | 0.99+ |
three | QUANTITY | 0.99+ |
Sheltered Harbor | ORGANIZATION | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
one year | QUANTITY | 0.99+ |
second | QUANTITY | 0.99+ |
May | DATE | 0.99+ |
Second | QUANTITY | 0.99+ |
ISG | ORGANIZATION | 0.99+ |
Michael Dell | PERSON | 0.99+ |
First | QUANTITY | 0.99+ |
more than 1,700 customers | QUANTITY | 0.99+ |
Travis Vigil | PERSON | 0.99+ |
three year | QUANTITY | 0.99+ |
both | QUANTITY | 0.99+ |
more than 14 exabytes | QUANTITY | 0.99+ |
two parts | QUANTITY | 0.99+ |
80% | QUANTITY | 0.99+ |
three seconds | QUANTITY | 0.99+ |
The Future of Multicloud Protection | TITLE | 0.99+ |
three pieces | QUANTITY | 0.99+ |
one | QUANTITY | 0.99+ |
each day | QUANTITY | 0.99+ |
each | QUANTITY | 0.99+ |
today | DATE | 0.99+ |
Two | QUANTITY | 0.99+ |
second level | QUANTITY | 0.99+ |
One | QUANTITY | 0.99+ |
over 1300 customers | QUANTITY | 0.99+ |
two senior executives | QUANTITY | 0.98+ |
dell.com/powerprotectdatamanager | OTHER | 0.98+ |
Gartner | ORGANIZATION | 0.98+ |
Ed Casmer, Cloud Storage Security & James Johnson, iPipeline | AWS Startup Showcase S2 E4
(upbeat music) >> Hello, everyone. Welcome back to theCUBE's presentation of the AWS Startup Showcase. This is season two, episode four of the ongoing series covering the exciting startups from the AWS ecosystem. And talking about cybersecurity. I'm your host, John Furrier. Excited to have two great guests. Ed Casmer, founder and CEO of Cloud Storage Security, back CUBE alumni, and also James Johnson, AVP of Research and Development at iPipeline. Here to talk about cloud storage security antivirus on S3. James, thanks for joining us today. >> Thank you, John. >> Thank you. >> So the topic here is cloud security, storage security. Ed, we had a great CUBE conversation previously, earlier in the month. Companies are modernizing their apps and migrating the cloud. That's fact. Everyone kind of knows that. >> Yeah. >> Been there, done that. Clouds have the infrastructure, they got the OS, they got protection, but the end of the day, the companies are responsible and they're on the hook for their own security of their data. And this is becoming more permanent now that you have hybrid cloud, cloud operations, cloud native applications. This is the core focus right now in the next five years. This is what everyone's talking about. Architecture, how to build apps, workflows, team formation. Everything's being refactored around this. Can you talk about how organizations are adjusting and how they view their data security in light of how applications are being built and specifically around the goodness of say S3? >> Yep, absolutely. Thank you for that. So we've seen S3 grow 20,000% over the last 10 years. And that's primarily because companies like James with iPipeline are delivering solutions that are leveraging this object storage more and above the others. When we look at protection, we typically fall into a couple of categories. The first one is, we have folks that are worried about the access of the data. How are they dealing with it? And so they're looking at configuration aspects. But the big thing that we're seeing is that customers are blind to the fact that the data itself must also be protected and looked at. And so we find these customers who do come to the realization that it needs to happen, finding out, asking themselves, how do I solve for this? And so they need lightweight, cloud native built solutions to deliver that. >> So what's the blind spot? You mentioned there's a blind spot. They're kind of blind to that. What specifically are you seeing? >> Well so, when we get into these conversations, the first thing that we see with customers is I need to predict how I access it. This is everyone's conversation. Who are my users? How do they get into my data? How am I controlling that policy? Am I making sure there's no east-west traffic there, once I've blocked the north-south? But what we really find is that the data is the key packet of this whole process. It's what gets consumed by the downstream users. Whether that's an employee, a customer, a partner. And so it's really, the blind spot is the fact that we find most customers not looking at whether that data is safe to use. >> It's interesting. When you talk about that, I think about all the recent breaches and incidents. "Incidents," they call them. >> Yeah. >> They've really been around user configurations. S3 buckets not configured properly. >> Absolutely. >> And this brings up what you're saying, is that the users and the customers have to be responsible for the configurations, the encryption, the malware aspect of it. Don't just hope that AWS has the magic to do it. Is that kind of what you're getting at here? Is that the similar, am I correlating that properly? >> Absolutely. That's perfect. And we've seen it. We've had our own customers, luckily iPipeline's not one of them, that have actually infected their end users because they weren't looking at the data. >> And that's a huge issue. So James, let's get in, you're a customer partner. Talk about your relationship with these guys and what's it all about? >> Yeah, well, my pipeline is building a digital ecosystem for life insurance and wealth management industries to enable the sale of life insurance to under-insured and uninsured Americans, to make sure that they have the coverage that they need, should something happen. And our solutions have been around for many years. In a traditional data center type of an implementation. And we're in process now of migrating that to the cloud, moving it to AWS, in order to give our customers a better experience, a better resiliency, better reliability. And with that, we have to change the way that we approach file storage and how we approach scanning for vulnerabilities in those files that might come to us via feeds from third parties or that are uploaded directly by end users that come to us from a source that we don't control. So it was really necessary for us to identify a solution that both solved for these vulnerability scanning needs, as well as enabling us to leverage the capabilities that we get with other aspects of our move to the cloud and being able to automatically scale based on load, based on need, to ensure that we get the performance that our customers are looking for. >> So tell me about your journey to the cloud, migrating to the cloud and how you're using S3 specifically. What led you to determine the need for the cloud based AV solution? >> So when we looked to begin moving our applications to the cloud, one of the realizations that we had is that our approach to storing certain types of data was a bit archaic. We were storing binary files in a database, which is not the most efficient way to do things. And we were scanning them with the traditional antivirus engines that would've been scaled in traditional ways. So as our need grew, we would need to spin up additional instances of those engines to keep up with load. And we wanted a solution that was cloud native and would allow us to scan more dynamically without having to manage the underlying details of how many engines do I need to have running for a particular load at a particular time and being able to scan dynamically. And also being able to move that out of the application layer, being able to scan those files behind the scenes. So scanning in, when the file's been saved in S3, it allows us to scan and release the file once it's been deemed safe rather than blocking the user while they wait for that scan to take place. >> Awesome. Well, thanks for sharing that. I got to ask Ed, and James, same question next. It's, how does all this factor in to audits and self compliance? Because when you start getting into this level of sophistication, I'm sure it probably impacts reporting workflows. Can you guys share the impact on that piece of it? The reporting? >> Yeah. I'll start with a comment and James will have more applicable things to say. But we're seeing two things. One is, you don't want to be the vendor whose name is in the news for infecting your customer base. So that's number one. So you have to put something like this in place and figure that out. The second part is, we do hear that under SOC 2, under PCI, different aspects of it, there are scanning requirements on your data. Traditionally, we've looked at that as endpoint data and the data that you see in your on-prem world. It doesn't translate as directly to cloud data, but it's certainly applicable. And if you want to achieve SOC 2 or you want to achieve some of these other pieces, you have to be scanning your data as well. >> Furrier: James, what's your take? As practitioner, you're living it. >> Yeah, that's exactly right. There are a number of audits that we go through where this is a question that comes up both from a SOC perspective, as well as our individual customers who reach out and they want to know where we stand from a security perspective and a compliance perspective. And very often this is a question of how are you ensuring that data that is uploaded into the application is safe and doesn't contain any vulnerabilities. >> James, if you don't mind me asking, I have to kind of inquire because I can imagine that you have users on your system but also you have third parties, relationships. How does that impact this? What's the connection? >> That's a good question. We receive data from a number of different locations from our customers directly, from their users and from partners that we have as well as partners that our customers have. And as we ingest that data, from an implementation perspective, the way we've approached this, there's a minimal impact there in each one of those integrations. Because everything comes into the S3 bucket and is scanned before it is available for consumption or distribution. But this allows us to ensure that no matter where that data is coming from, that we are able to verify that it is safe before we allow it into our systems or allow it to continue on to another third party whether that's our customer or somebody else. >> Yeah, I don't mean to get in the weeds there, but it's one of those things where, this is what people are experiencing right now. Ed, we talked about this before. It's not just siloed data anymore. It's interactive data. It's third party data from multiple sources. This is a scanning requirement. >> Agreed. I find it interesting too. I think James brings it up. We've had it in previous conversations that not all data's created equal. Data that comes from third parties that you're not in control of, you feel like you have to scan. And other data you may generate internally. You don't have to be as compelled to scan that although it's a good idea, but you can, as long as you can sift through and determine which data is which and process it appropriately, then you're in good shape. >> Well, James, you're living the cloud security, storage security situation here. I got to ask you, if you zoom out and not get in the weeds and look at the board room or the management conversation. Tell me about how you guys view the data security problem. I mean, obviously it's important. So can you give us a level of how important it is for iPipeline and with your customers and where does this S3 piece fit in? I mean, when you guys look at this holistically, for data security, what's the view, what's the conversation like? >> Yeah. Well, data security is critical. As Ed mentioned a few minutes ago, you don't want to be the company that's in the news because some data was exposed. That's something that nobody has the appetite for. And so data security is first and foremost in everything that we do. And that's really where this solution came into play, in making sure that we had not only a solution but we had a solution that was the right fit for the technology that we're using. There are a number of options. Some of them have been around for a while. But this was focused on S3, which we were using to store these documents that are coming from many different sources. And we have to take all the precautions we can to ensure that something that is malicious doesn't make its way into our ecosystem or into our customers' ecosystems through us. >> What's the primary use case that you see the value here with these guys? What's the aha moment that you had? >> With the cloud storage security specifically, it goes beyond the security aspects of being able to scan for vulnerable files, which is, there are a number of options and they're one of those. But for us, the key was being able to scale dynamically without committing to a particular load whether that's under committing or overcommitting. As we move our applications from a traditional data center type of installation to AWS, we anticipated a lot of growth over time and being able to scale up very dynamically, literally moving a slider within the admin console, was key to us to be able to meet our customer's needs without overspending, by building up something that was dramatically larger than we needed in our initial rollout. >> Not a bad testimonial there, Ed. >> I mean, I agree. >> This really highlights the applications using S3 more in the file workflow for the application in real time. This is where you start to see the rise of ransomware other issues. And scale matters. Can you share your thoughts and reaction to what James just said? >> Yeah. I think it's critical. As the popularity of S3 has increased, so has the fact that it's an attack vector now. And people are going after it whether that's to plant bad malicious files, whether it's to replace code segments that are downloaded and used in other applications, it is a very critical piece. And when you look at scale and you look at the cloud native capability, there are lots of ways to solve it. You can dig a hole with a spoon, but a shovel works a lot better. And in this case, we take a simple example like James. They did a weekend migration, so they've got new data coming in all the time, but we did a massive migration 5,000 files a minute being ingested. And like he said, with a couple of clicks, scale up, process that over sustained period of time and then scale back down. So I've said it before, I said it on the previous one. We don't want to get in the way of someone's workflow. We want to help them secure their data and do it in a timely fashion that they can continue with their proper processing and their normal customer responses. >> Frictionless has to be key. I know you're in the marketplace with your antivirus for S3 on the AWS. People can just download it. So people are interested, go check it out. James, I got to ask you and maybe Ed can chime in over the top, but it seems so obvious. Data. Secure the data. Why is it so hard? Why isn't this so obvious? What's the problem? Why is it so difficult? Why are there so many different solutions? It just seems so obvious. You know, you got ransomware, you got injection of different malicious payloads. There's a ton of things going on around the data. Why is, this so obvious? Why isn't it solved? >> Well, I think there have been solutions available for a long time. But the challenge, the difficulty that I see, is that it is a moving target. As bad actors learn new vulnerabilities, new approaches and as new technology becomes available, that opens additional attack vectors. >> Yeah. >> That's the challenge, is keeping up on the changing world including keeping up on the new ways that people are finding to exploit vulnerabilities. >> And you got sensitive data at iPipeline. You do a lot of insurance, wealth management, all kinds of sensitive data, super valuable. This brings me up, reminds me of the Sony hack Ed, years ago. Companies are responsible for their own militia. I mean, cybersecurity is no government help for sure. I mean, companies are on the hook. As we mentioned earlier at the top of this interview, this really is highlighted that IT departments have to evolve to large scale cloud, cloud native applications, automation, AI machine learning all built in, to keep up at the scale. But also from a defense standpoint. I mean, James you're out there, you're in the front lines, you got to defend yourself basically, and you got to engineer it. >> A hundred percent. And just to go on top of what James was saying is, I think there, one of the big factors and we've seen this. There's skill shortages out there. There's also just a pure lack of understanding. When we look at Amazon S3 or object storage in general, it's not an executable file system. So people sort of assume that, oh, I'm safe. It's not executable. So I'm not worried about it traversing my storage network. And they also probably have the assumption that the cloud providers, Amazon is taking care of this for them. And so it's this aha moment. Like you mentioned earlier, that you start to think, oh it's not about where the data is sitting per se. It's about scanning it as close to the storage spot. So when it gets to the end user, it's safe and secure. And you can't rely on the end user's environment and system to be in place and up to date to handle it. So it's that really, that lack of understanding that drives some of these folks into this. But for a while, we'll walk into customers and they'll say the same thing you said, John. Why haven't I been doing this for so long? And it's because they didn't understand that it was such a risk. That's where that blind spot comes in. >> James, it's just a final note on your environment. What's your goals for the next year? How's things going over there on your side? How you look at the security posture? What's on your agenda for the next year? How are you guys looking at the next level? >> Yeah. Well, our goal as it relates to this is to continue to move our existing applications over to AWS to run natively there. Which includes moving more data into S3 and leveraging the cloud storage security solution to scan that and ensure that there are no vulnerabilities that are getting in. >> And the ingestion, is there like a bottlenecks log jams? How do you guys see that scaling up? I mean, what's the strategy there? Just add more S3? >> Well, S3 itself scales automatically for us and the cloud storage solution gives us leverage to pull to do that. As Ed mentioned, we ingested a large amount of data during our initial migration which created a bottleneck for us. As we were preparing to move our users over, we were able to make an adjustment in the admin console and spin up additional processes entirely behind the scenes and broke the log jam. So I don't see any immediate concerns there, being able to handle the load. >> The term cloud native and hyperscale native, cloud native, one cloud's hybrid. All these things are native. We have antivirus native coming soon. And I mean, this is what we're basically doing is making it native into the workflows. Security native. And soon there's going to be security clouds out there. We're starting to see the rise of these new solutions. Can you guys share any thoughts or vision around how you see the industry evolving and what's needed? What's working and what's needed? Ed, we'll start with you. What's your vision? >> So I think the notion of being able to look at and view the management plane and control that has been where we're at right now. That's what everyone seems to be doing and going after. I think there are niche plays coming up. Storage is one of them, but we're going to get to a point where storage is just a blanket term for where you put your stuff. I mean, it kind of already is that. But in AWS, it's going to be less about S3. Less about work docs, less about EVS. It's going to be just storage and you're going to need a solution that can span all of that to go along with where we're already at the management plane. We're going to keep growing the data plane. >> James, what's your vision for what's needed in the industry? What's the gaps, what's working, and where do you see things going? >> Yeah, well, I think on the security front specifically, Ed's probably a little bit better equipped to speak to them than I am since that his primary focus. But I see the need for just expanded solutions that are cloud native that fit and fit nicely with the Amazon technologies. Whether that comes from Amazon or other partners like Cloud Storage Security to fill those gaps. We are focused on the financial services and insurance industries. That's our niche. And we look to other partners like Ed to help be the experts in these areas. And so that's really what I'm looking for, is the experts that we can partner with that are going to help fill those gaps as they come up and as they change in the future. >> Well, James, I really appreciate you coming on, sharing your story and I'll give you the final word. Put a quick, spend a minute to talk about the company. I know Cloud Storage Security is an AWS partner with the security software competency and is one of I think 16 partners listed in the competency and the data category. So take a minute to explain what's going on with the company, where people can find more information, how they buy and consume the products. >> Okay. >> Put the plug in. >> Yeah, thank you for that. So we are a fast growing startup. We've been in business for two and a half years now. We have achieved our security competency as John indicated. We're one of 16 data protection security competent ISV vendors globally. And our goal is to expand and grow a platform that spans all storage types that you're going to be dealing with and answer basic questions. What do I have and where is it? Is it safe to use? And am I in proper control of it? Am I being alerted appropriate? So we're building this storage security platform, very laser focused on the storage aspect of it. And if people want to find out more information, you're more than welcome to go and try the software out on Amazon marketplace. That's basically where we do most of our transacting. So find it there. Start of free trial. Reach out to us directly from our website. We are happy to help you in any way that you need it. Whether that's storage assessments, figuring out what data is important to you and how to protect it. >> All right, Ed. Thank you so much. Ed Casmer, founder and CEO of Cloud Storage Security. And of course James Johnson, AVP of Research and Development, iPipeline customer. Gentlemen, thank you for sharing your story and featuring the company and the value proposition, certainly needed. This is season two, episode four. Thanks for joining us. Appreciate it. >> Casmer: Thanks John. >> Okay. I'm John Furrier. That is a wrap for this segment of the cybersecurity season two, episode four. The ongoing series covering the exciting startups from Amazon's ecosystem. Thanks for watching. (upbeat music)
SUMMARY :
of the AWS Startup Showcase. and migrating the cloud. now that you have hybrid cloud, that it needs to happen, They're kind of blind to that. that data is safe to use. When you talk about that, S3 buckets not configured properly. is that the users and the customers that have actually and what's it all about? migrating that to the cloud, for the cloud based AV solution? move that out of the application layer, I got to ask Ed, and and the data that you see Furrier: James, what's your take? audits that we go through I have to kind of inquire partners that we have get in the weeds there, You don't have to be as and look at the board room or the precautions we can and being able to scale This is where you start to see and you look at the James, I got to ask you But the challenge, the that people are finding to I mean, companies are on the hook. that the cloud providers, at the next level? and leveraging the cloud and the cloud storage And soon there's going to be of being able to look at is the experts that we can partner with and the data category. We are happy to help you in and featuring the company the exciting startups
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
James | PERSON | 0.99+ |
Ed Casmer | PERSON | 0.99+ |
Ed | PERSON | 0.99+ |
John | PERSON | 0.99+ |
James Johnson | PERSON | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
John Furrier | PERSON | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Casmer | PERSON | 0.99+ |
SOC 2 | TITLE | 0.99+ |
5,000 files | QUANTITY | 0.99+ |
iPipeline | ORGANIZATION | 0.99+ |
16 partners | QUANTITY | 0.99+ |
20,000% | QUANTITY | 0.99+ |
next year | DATE | 0.99+ |
one | QUANTITY | 0.99+ |
two and a half years | QUANTITY | 0.99+ |
CUBE | ORGANIZATION | 0.99+ |
One | QUANTITY | 0.99+ |
two things | QUANTITY | 0.99+ |
Cloud Storage Security | ORGANIZATION | 0.99+ |
S3 | TITLE | 0.99+ |
today | DATE | 0.99+ |
Sony | ORGANIZATION | 0.99+ |
both | QUANTITY | 0.98+ |
second part | QUANTITY | 0.98+ |
two great guests | QUANTITY | 0.98+ |
first one | QUANTITY | 0.98+ |
first | QUANTITY | 0.97+ |
first thing | QUANTITY | 0.97+ |
each one | QUANTITY | 0.95+ |
years ago | DATE | 0.94+ |
theCUBE | ORGANIZATION | 0.93+ |
Jason Buffington, Veeam | VeeamON 2022
(upbeat music) >> Welcome back to theCUBE's coverage of VEEMON 2022. We're here at the Aria in Las Vegas. Dave Vellante with David Nicholson, my co-host for the week, two days at wall to wall coverage. Jason Buffington is here, JBuff, who does some amazing work for VEEAM, former Analyst from the Enterprise Strategy Group. So he's got a real appreciation for independence data, and we're going to dig into some data. You guys, I got to say, Jason, first of all, welcome back to theCUBE. It's great to see you again. >> Yeah, two and a half years, thanks for having me back. >> Yeah, that's right. (Jason laughs) Seems like a blur. >> No doubt. >> But so here's the thing as analysts, you can appreciate this, the trend is your friend, right? and everybody just inundates you with now, ransomware. It's the trend. So you get everybody's talking about the ransomware, cyber resiliency, immutability, air gaps, et cetera. Okay, great. Technology's there, it's kind of like the NFL, everybody kind of does the same thing. >> There's a lot of wonderful buzzwords in that sentence. >> Absolutely, but what you guys have done that's different is you brought in some big time thought leadership, with data and survey work which of course as an analyst we love, but you drive strategies off of this. So you got to, I'll set it up. You got a new study out that's pivoted off of February study of 3,600 organizations, and then you follow that up with a thousand organizations that actually got hit with ransomware. So tell us more about the study and the work that you've done there. >> Yeah, I got to say I have the best job ever. So I spent seven years as an analyst. And when I decided I didn't want to be an analyst anymore, I called VEEAM and said, I'd like to get in the fight and they let me in. But they let me do independent research on their behalf. So it's kind of like being an in-house counsel. I'm an in-house analyst. And for the beginning of this year, in February, we published a report called the Data Protection Trends Report. And it was over 3000 responses, right? 28 countries around the world looking at digital transformation, the effects of COVID, where are they are on BAS and DRS. But one of the new areas we wanted to look at was how pervasive is ransomware? How does that align with BCDR overall? So some of those just big thought questions that everyone's trying to solve for. And out of that, we said, "Wow, this is really worth double clicking." And so today, actually about an hour ago we published the Ransomware Trends Report and it's a thousand organizations all of which have all been survived. They all had a ransomware attack. One of the things I think I'm most proud of for VEEAM in this particular project, we use an independent research firm. So no one knows it's VEEAM that's asking the questions. We don't have any access to the respondents along the way. I wish we did, right? >> Yeah, I bet >> Go sell 'em back up software. But of the thousands 200 were CISOs, 400 were security professionals which we don't normally interact with, 200 backup admins, 200 IT ops, and the idea was, "Okay, you've all been through a really bad day. Tell us from your four different views, how did that go? What did you solve for? What did you learn? What are you moving forward with?" And so, yeah, some great learnings all around helping us understand how do we deliver solutions that meet their needs? >> I mean, there's just not enough time here to cover all this data. And I think I like about it is, like you said, it's a blind survey. You used an independent third party whom I know they're really good. And you guys are really honest about it. It's like, it was funny that the analyst called today for the analyst meeting when Danny was saying if 54% and Dave Russell was like, it's 52%, actually ended up being 53%. (Jason laughs) So, whereas many companies would say 75%. So anyway, what were some of the more striking findings of that study? Let's get into it a little bit. >> So a couple of the ones that were really startling for me, on average about one in four organizations say they have not been hit. But since we know that ransomware has a gestation for around 200 days from first intrusions, so when you have that attack, 25% may be wrong. That's 25% in best case. Another 16% said they only got hit once in the last year. And that means 60%, right on the money got hit more than once per year. And so when you think about it's like that school bully Once they take your lunch money once and they want lunch money, again, they just come right back again. Did you fix this hole? Did you fix that hole? Cool, payday. And so that was really, really scary. Once they get in, on average organizations said 47% of their production data was encrypted. Think about that. So, and we tested for, hey, was it in the, maybe it's just in the ROBO. So on the edge where the tech isn't as good, or maybe it's in the cloud because it's in a broad attack surface. Whatever it is, turns out, doesn't matter. >> So this isn't just nibbling around the edges. >> No. >> This is going straight to the heart of the enterprise. >> 47% of production data, regardless of where it's stored, data center ROBO or cloud, on average was encrypted. But what I thought was really interesting was when you look at the four personas, the security professional and the backup admin. The person responsible for prevention or mediation, they saw a much higher rate of infection than the CSOs and the IT pros, which I think the meta point there is the closer you are to the problem. the worst this is. 47% is bad. it's worse than that. As you get closer to it. >> The other thing that struck me is that a large proportion of, I think it was a third of the companies that paid ransom. >> Oh yeah. >> Weren't able to recover it. Maybe got the keys and it didn't work or maybe they never got the keys. >> That's crazy too. And I think one thing that a lot of folks, you watch the movies and stuff and you think, "Oh, I'm going to pay the Bitcoin. I'm going to get this magic incantation key and all of a sudden it's like it never happened. That is not how this works. And so yeah. So the question actually was did you pay and did it work right? And so 52%, just at half of organization said, yes. I paid and I was able to recover it. A third of folks, 27%. So a third of those that paid, they paid they cut the check, they did the ransom, whatever, and they still couldn't get back. Almost even money by the way. So 24% paid, but could not get back. 19% did not pay, but recovered from backup. VEEAM's whole job for all of 2022 and 23 needs to be invert that number and help the other 81% say, "No, I didn't pay I just recovered." >> Well, in just a huge number of cases they attacked the backup Corpus. >> Yes. >> I mean, that's was... >> 94% >> 94%? >> 94% of the time, one of the first intrusions is to attempt to get rid of the backup repository. And in two thirds of all cases the back repository is impacted. And so when I describe this, I talk about it this way. The ransomware thief, they're selling a product. They're selling your survivability as a product. And how do you increase the likelihood that you will buy what they're selling? Get rid of the life preserver. Get rid of their only other option 'cause then they got nothing left. So yeah, two thirds, the backup password goes away. That's why VEEAM is so important around cloud and disk and tape, immutable at every level. How we do what we do. >> So what's the answer here. We hear things like immutability. We hear terms like air gap. We heard, which we don't hear often, is orchestrated recovery and automated recovery. I wonder if you could get, I want to come back to... So, okay. So you're differentiating with some thought leadership, that's nice. >> Yep. >> Okay, good. Thank you. The industry thanks you for that free service. But how about product and practices? How does VEEAM differentiate in that regard? >> Sure. Now full disclosure. So when you download that report, for every five or six pages of research, the marketing department is allowed to put in one paragraph. It says, this is our answer. They call the VEEAM perspective. That's their rebuttal. To five pages of research, they get one paragraph, 250 word count and you're done. And so there is actually a commercial... >> We're here to buy here in. (chuckles) >> To the back of that. It's how we pay for the research. >> Everybody sells an onset. (laughs) >> All right. So let's talk about the tech that actually matters though, because there actually are some good insights there. Certainly the first one is immutability. So if you don't have a survivable repository you have no options. And so we provide air gaping, whether you are cloud based. So your favorite hyper-scale or one of the tens of thousands of cloud service providers that offer VEEAM products. So you can have, immutability at the cloud layer. You can certainly have immutability at the object layer on-prem or disk. We're happy to use all your favorite DDoS and then tape. It is hard to get more air-gaped and take the tape out drive, stick it on a shelf or stick it in a white van and have it shipped down the street. So, and the fact that we aren't dependent on any architecture, means choose your favorite cloud, choose your favorite disc, choose your favorite tape and we'll make all of 'em usable and defendable. So that's super key Number one. Super key number two there's three. >> So Platform agnostic essentially. >> Yeah. >> Cloud platform agenda, >> Any cloud, any physical, we work happily with everybody. Just here for your data. So, now you know you have at least a repository, which is not affectable. The next thing is you need to know, do you actually have recoverable data? And that's two different questions. >> How do you know? Right, I mean... >> You don't. So one of my colleagues, Chris Hoff, talks about how you can have this Nalgene bottle that makes sure that no water spills. Do you know that that's water? Is it vodka? Is it poison? You don't know. You just know that nothing's spilling out of it. That's an immutable repository. Then you got to know, can you actually restore the data? And so automating test restores every night, not just did the backup log work. Only 16% actually test their backups. That breaks my heart. That means 84% got it wrong. >> And that's because it just don't have the resource or sometimes testing is dangerous. >> It can be dangerous. It can also just be hard. I mean, how do you spend something up without breaking what's already live. So several years ago, VEEAM created the sandbox is what we call a data lab. And so we create a whole framework for you with a proxy that goes in you can stand up whatever you want. You can, if file exists, you can ping it, you can ODBC SQL, you can map the exchange. I mean, you can, did it actually come up. >> You can actually run water through the recovery pipes. >> Yes. >> And tweak it so that it actually works. >> Exactly. So that's the second thing. And only 16% of organizations do. >> Wow. >> And then the third thing is orchestration. So there's a lot of complexity that happens when you recover one workload. There is a stupid amount of complexity happens when you try cover a whole site or old system, or I don't know, 47% of your infrastructure. And so what can you do to orchestrate that to remediate that time? Those are the three things we found. >> So, and that orchestration piece, a number of customers that were in the survey were trying to recover manually. Which is a formula for failure. A number of, I think the largest percentage were scripts which I want you to explain why scripts are problematic. And then there was a portion that was actually doing it right. Maybe it was bigger, maybe it was a quarter that was doing orchestrated recovery. But talk about why scripts are not the right approach. >> So there were two numbers in there. So there was 16% test the ability to recover, 25% use orchestration as part of the recovery process. And so the problem where it is, is that okay, if I'm doing it manually, think about, okay, I've stood back up these databases. Now I have to reconnect the apps. Now I have to re IP. I mean, there's lots of stuff to stand up any given application. Scripts says, "Hey, I'm going to write those steps down." But we all know that, that IT and infrastructure is a living breathing thing. And so those scripts are good for about the day after you put the application in, and after that they start to gather dust pretty quick. The thing about orchestration is, if you only have a script, it's as frequently as you run the script that's all you know. But if you do a workflow, have it run the workflow every night, every week, every month. Test it the same way. That's why that's such a key to success. And for us that's VEEAM disaster recovery orchestra tour. That's a product that orchestrates all the stuff that VEEAM users know and love about our backend recovery engine. >> So imagine you're, you are an Excel user, you're using macros. And I got to go in here, click on that, doing this, sort of watching you and it repeats that, but then something changes. New data or new compliance issue, whatever... >> That got renamed directly. >> So you're going to have to go in and manually change that. How do you, what's the technology behind automated orchestration? What's the magic there? >> The magic is a product that we call orchestrator. And so it actually takes all of those steps and you actually define each step along the way. You define the IP addresses. You define the paths. You define where it's going to go. And then it runs the job in test mode every night, every week, whatever. And so if there's a problem with any step along the way, it gives you the report. Fix those things before you need it. That's the power of orchestrator. >> So what are you guys doing with this study? What can we expect? >> So the report came out today. In a couple weeks, we'll release regional versions of the same data. The reason that we survey at scale is because we want to know what's different in a PJ versus the Americas versus Europe and all those different personas. So we'll be releasing regional versions of the data along the way. And then we'll enable road shows and events and all the other stuff that happens and our partners get it so they can use it for consulting, et cetera. >> So you saw differences in persona. In terms of their perception, the closer you were to the problem, the more obvious it was, did you have enough end to discern its pearly? I know that's why you're due the drill downs but did you sense any preliminary data you can share on regions as West getting hit harder or? >> So attack rate's actually pretty consistent. Especially because so many criminals now use ransomware as a service. I mean, you're standing it up and you're spreading wide and you're seeing what hits. Where we actually saw pretty distinct geographic problems is the cloud is not of as available in all segments. Expertise around preventative measures and remediation is not available in all segments, in all regions. And so really geographic split and segment split and the lack of expertise in some of the more advanced technologies you want to use, that's really where things break down. Common attack plane, uncommon disadvantage in recovery. >> Great stuff. I want to dig in more. I probably have a few more questions if you don't mind, I can email you or give you a call. It's Jason Buffington. Thanks so much for coming on theCUBE. >> Thanks for having me. >> All right, keep it right there. You're watching theCUBE's live coverage of VEEAMON 2022. We're here in person in Las Vegas, huge hybrid audience. Keep it right there, be right back. (upbeat music)
SUMMARY :
It's great to see you again. Yeah, two and a half years, Yeah, that's right. But so here's the thing as analysts, buzzwords in that sentence. and the work that you've done there. And for the beginning of But of the thousands 200 were CISOs, And you guys are really honest about it. So a couple of the ones that nibbling around the edges. straight to the heart of the enterprise. is the closer you are to the problem. is that a large proportion of, Maybe got the keys and it didn't work So the question actually was Well, in just a huge number of cases And how do you increase the likelihood I wonder if you could get, The industry thanks you So when you download that report, We're here to buy here in. To the back of that. So, and the fact that we aren't dependent The next thing is you need to know, How do you know? not just did the backup log work. just don't have the resource And so we create a whole framework for you You can actually run water So that's the second thing. And so what can you do to orchestrate that are not the right approach. And so the problem where it is, And I got to go in here, What's the magic there? and you actually define So the report came out today. the closer you were to the problem, and the lack of expertise I can email you or give you a call. live coverage of VEEAMON 2022.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Jason | PERSON | 0.99+ |
Dave Russell | PERSON | 0.99+ |
Danny | PERSON | 0.99+ |
David Nicholson | PERSON | 0.99+ |
Chris Hoff | PERSON | 0.99+ |
Jason Buffington | PERSON | 0.99+ |
JBuff | PERSON | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
25% | QUANTITY | 0.99+ |
February | DATE | 0.99+ |
16% | QUANTITY | 0.99+ |
seven years | QUANTITY | 0.99+ |
3,600 organizations | QUANTITY | 0.99+ |
five pages | QUANTITY | 0.99+ |
Las Vegas | LOCATION | 0.99+ |
47% | QUANTITY | 0.99+ |
Excel | TITLE | 0.99+ |
84% | QUANTITY | 0.99+ |
54% | QUANTITY | 0.99+ |
75% | QUANTITY | 0.99+ |
53% | QUANTITY | 0.99+ |
52% | QUANTITY | 0.99+ |
two numbers | QUANTITY | 0.99+ |
24% | QUANTITY | 0.99+ |
one paragraph | QUANTITY | 0.99+ |
60% | QUANTITY | 0.99+ |
27% | QUANTITY | 0.99+ |
six pages | QUANTITY | 0.99+ |
19% | QUANTITY | 0.99+ |
VEEAM | ORGANIZATION | 0.99+ |
today | DATE | 0.99+ |
Data Protection Trends Report | TITLE | 0.99+ |
two days | QUANTITY | 0.99+ |
Europe | LOCATION | 0.99+ |
81% | QUANTITY | 0.99+ |
four personas | QUANTITY | 0.99+ |
over 3000 responses | QUANTITY | 0.99+ |
200 backup admins | QUANTITY | 0.99+ |
250 word | QUANTITY | 0.99+ |
each step | QUANTITY | 0.99+ |
2022 | DATE | 0.99+ |
28 countries | QUANTITY | 0.98+ |
DRS. | ORGANIZATION | 0.98+ |
one | QUANTITY | 0.98+ |
two different questions | QUANTITY | 0.98+ |
third thing | QUANTITY | 0.98+ |
two thirds | QUANTITY | 0.98+ |
two and a half years | QUANTITY | 0.98+ |
second thing | QUANTITY | 0.98+ |
Americas | LOCATION | 0.98+ |
94% | QUANTITY | 0.98+ |
several years ago | DATE | 0.97+ |
Enterprise Strategy Group | ORGANIZATION | 0.97+ |
three | QUANTITY | 0.97+ |
first one | QUANTITY | 0.97+ |
Ransomware Trends Report | TITLE | 0.97+ |
thousands | QUANTITY | 0.97+ |
one thing | QUANTITY | 0.97+ |
last year | DATE | 0.96+ |
One | QUANTITY | 0.96+ |
BAS | ORGANIZATION | 0.96+ |
around 200 days | QUANTITY | 0.96+ |
COVID | OTHER | 0.95+ |
200 IT ops | QUANTITY | 0.95+ |
third | QUANTITY | 0.94+ |
four organizations | QUANTITY | 0.94+ |
NFL | ORGANIZATION | 0.94+ |
400 | QUANTITY | 0.94+ |
about an hour ago | DATE | 0.94+ |
four different views | QUANTITY | 0.94+ |
first intrusions | QUANTITY | 0.93+ |
once | QUANTITY | 0.93+ |
ROBO | ORGANIZATION | 0.92+ |
Nancy Wang, AWS | Women in Tech: International Women's Day
(upbeat music) >> Hey, everyone. Welcome to theCUBE's coverage of the International Women's Showcase for 2022. I'm your host, Lisa Martin. I'm pleased to welcome Nancy Wong, the general manager of Data Protection and Governance at AWS to the program. Nancy, it's great to have you. >> Thanks so much for having me Lisa, and you know, I really hope that this is hopefully the last year that we'll be celebrating International Women's Day all virtually. >> I agree. I agree. Well, we're going in that right direction globally. So let's cross our fingers. Talk to me a little bit about your role at AWS and what you do there. >> Sure. So as a GM of AWS Data Protection and Governance, a lot of, we tackle quite a few problems that our biggest customers face, right? When they think about, "How do I manage my data?" Right. Especially in this digital world. And speaking of the pandemic, how much data has been generated by consumers, by devices, by systems, by servers? How do you protect all of that data? Right. Especially we hear about cyber crime, cyber attacks. Right. Data breaches. It's really important to make sure that all of our customers have a coherent strategy around not just management, right, but also protection and really how you govern your data. Right. And there's just so many awesome conversations that my team and I have had lately with CSOs or chief technology officers on this topic, as it evolves. >> Data protection is so critical. It's one of my favorite topics to talk about, cybersecurity as well. Talk to me about what it means though if we keep this at a bit of a different level to be an operator within the the big ecosystem that is AWS. >> Yeah. And that's actually one of the the favorite aspects of my role. Right. Which is, you know, I get to innovate every day on behalf of my customers. For example, I love having one-on-one dialogues. I love having architecture conversations where we brainstorm. Right. And so those type of conversations help inform how we deliver and develop products. And so in an operator role, right, for the the women in the audience today, is it really gives you that perspective into not just how, what type of products do you want to build that delight your customers but also from an engineering. Right. And a bottom line perspective of, well how do you make this happen? Right. How do you fund this? And how do you plan out your development milestones? >> What are, tell me a little bit about your background and then what makes women in technology such an important initiative for you to stand behind? >> Absolutely. So I'm so proud today to see that the number of women or the percentage of women enrolled at engineering curriculums just continue to rise. Right. And especially as someone who went through an engineering degree in her undergraduate studies, that was not always the case. Right. So oftentimes, you know, I would look around the classroom and be the only woman on the lab bench or only woman in a CS classroom. And so when you have roles in tech, specifically, that require an undergraduate degree in computer science or a degree in engineering, that helps to, or that only serves to really reduce the population of eligible candidates. Right. Who then, if you look at that pool of eligible candidates who then you can invest and accelerate through the career ladder to become leaders in tech, well that's where you may end up with a representation issue. Right. And that's why we have, for example, so few women leaders in tech that we can look up to as role models. And that's really the problem or the gap that I'm very passionate about solving. And also, Lisa, I'm really excited to tell you a little bit more about advancing women in tech, which is a 501c3 nonprofit organization that I started to tackle this exact problem. >> Talk to me about that, cause it's one of the things that you bring up is, you know, we always say when we're having conversations like this, we can't be what we can't see. We need to be able to see those female leaders. To your point, there aren't a ton in comparison to the male leaders. So talk to me about advancing women in technology, why you founded this, and what you guys are accomplishing. >> Absolutely. So it's been such a personal journey as well. Just starting this organization called Advancing Women In Tech because I started it in 2017. Right. So when I really was, you know, just starting out as a product manager, I was at another big tech company at the time. And what I really realized, right, is looking around you know, I had so many, for example, bosses, managers, peer leaders, who were really invested in growing me as a product manager and growing my tech and career. And this is right after I'd made the transition from the federal government into big tech. What that said though, looking around, there weren't that many women tech leaders that I could look up to, or get coffee, or just have a mentoring conversation. And quickly I realized, well, it's not so much that women can't do it. Right. It's the fact that we're not advancing enough women into leadership roles. And so really we have to look at why that is. Right. And we, you know, from a personal perspective, one contribution towards that angle is upskilling. Right. So if you think about what skills one needs as one climbs a career ladder, whether that's your first people management role, or your first manager manager's role, or obviously for bigger leaders when they start managing thousands, tens of thousands of individuals, well all of that requires different skills. And so learning those skills about how to manage people, how to motivate your teams effectively, super, super important. And of course on the other side, and one that I'm, you know, near to dear to me is that of mentorship and executive sponsorship because you can have all the skills in the world, right. And especially with digital learning and AWIT is very involved with Coursera and AWS in producing and making those resources readily available and accessible. Well, if you don't have those opportunities, if you don't have mentors and sponsors who are well to push you or give you a step ladder to those roles, well you're still not going to get there. Right. And so, that's why actually, if you look at the AWIT mission, it's really those two pillars working very closely together to help advance women into leadership roles. >> The idea of mentorship and sponsorship is so critical. And I think a lot of people don't understand the difference between a mentor and a sponsor. How do you define that difference and how do you bring them into the organization so that they can be mentors and sponsors? >> Yeah, absolutely. And there's, you know, these two terms are often used today so interchangeably that I do get a lot of questions around, well, what is the difference? Right. And how does, let's say a mentor become a sponsor? So, maybe just taking a few steps back, right. When you have let's say questions around compensation or, "Hey I have some job offers, which ones do I consider?" And you ask someone a question or advice, well that person's likely your mentor. Right? And typically a mentor is someone who you can ask those questions on a repeated basis. Who's very accessible to you. Well, a sponsor takes that a few steps forward in the sense that they are sponsoring you into a role or into a project or initiative that you on your own may not be able to achieve. And by doing so, I think what really differentiates a sponsor from a mentor is that the sponsor will actually put their own reputation on the line. Right. They're using their own political capital in order to make sure that you get into that role, you get into that room. Right. And that's why it's so key, for example, especially if you have that relationship already with a person who's your mentor, you're able to ask questions or advice from, to convert them into a sponsor so that you can accelerate your career. >> Great definition, description, and great recommendations for converting mentors to sponsors. You know, I only learned the difference about a mentor and a sponsor a few years ago at another women in tech event that I was hosting. And I thought, "It's brilliant. It makes perfect sense." We need more people to understand the difference, the synergies, and how to promote mentors to sponsors. Talk to me now about advancing women in tech plus the power of AWS. How are they helping this nonprofit to really accelerate? >> Sure. So from an organization perspective, right, there's many women, for example, across the the tech companies who are part of Advancing Women In Tech, obviously Amazon of course as an employee has a very large community within who's part of AWIT. But we also have members across the tech industry from startups to VC firms to of course, Google, Microsoft, and Netflix. You name it. With that said, you know, what AWS has done with AWIT is actually very special in the sense that if you go to the Coursera platform, coursera.org/awit you can see our two Coursera specializations. Four courses each that go through the real world product management fundamentals. Or the business side, the technical skills, and even interviewing for mid-career product management roles. And the second specialization, which I'm super excited to share today, is actually geared towards getting folks ramped up and prepared to successfully pass the Cloud Practitioner's Exam, which is one of the industry recognized standards about understanding the AWS Cloud and being functional in the AWS Cloud. This summer, of course, and I'm sharing kind of a sneak peek announcement that I'll be making tomorrow with the University of Pennsylvania, is that we're kicking off a program for the masters of CIS program, or the Computer Information Systems Master students, to actually go through this Coursera specialization, which is produced by AWIT, sponsored by AWS, and AWS Training and Certifications has so generously donated exam vouchers for these students so that they can then go on and be certified in the AWS Cloud. So that's one just really cool collaboration that we are doing between AWS and AWIT to get more qualified folks in the door in tech jobs, and hopefully at jobs in AWS. >> That's a great collaboration. What are some of the goals in terms of metrics, the number of women that you want to get into the program and complete the program? What are some of those on your radar? >> Absolutely. So one of the reasons, of course, that the Master's of CIS Program, the University of Pennsylvania caught my eye, not withstanding, I graduated from there, but also that just the statistics of women enrolled. Right. So what's really notable about this program is it's entirely online, which as a university creating a Master's degree fully online, well, it takes a ton of resources from the university, from the faculty. And what's really special about these students is that they're already full-time adult professionals, which means that they're working a full-time job, they might be taking care of family obligations, and they're still finding time to advance themselves, to acquire a Master's degree in CS. And best of all, 42% of these students are women. Right. And so that's a number that is multiples of what we're finding in engineering curriculums today. And so my theory is, well if you go to a student population that is over 40%, 42 to be exact percent women, and enable these women to be certified in AWS Cloud, to have direct interview prep and mentorship from AWS software development leaders, well, that greatly increases their chances of getting a full-time role, right, at AWS. Right. At which then we can help them advance their careers to further and further roles in software development. >> So is this curriculum also open to women who aren't currently in tech to be able to open the door for them to get into tech and STEM fields? >> Absolutely. And so in my bad and remiss in mentioning, which is students of this Master's in CS Program are actually students not from tech already. So they're not in a tech field. And they did not have a degree in CS or even engineering as part of their undergraduate studies. So it's truly folks who are outside of tech, that are 42% women, that we're getting into the tech industry with this collaboration between AWS, AWIT, and the University of Pennsylvania. >> That's outstanding to get them in from completely different fields into tech. >> Absolutely. >> How do you help women have the confidence to say, "I want to try this." Cause if we think about every company today is a tech company. It's a data company. It has to be to be competitive. You know, the pandemic taught us that everything we're able to do online and digitally, for example, but how do you help women get the confidence to say, "Okay, I'm going to go from a completely different field into tech." >> Absolutely. So if we, you know, define tech of course as big tech or, you know, now the main companies, right, I myself made that transition, which is why it is a topic near and dear to me because I can personally speak to my journey because I didn't start my career out in tech. Right. Yes. I studied engineering. But with that said, my first full-time job out of college was with the federal government because I wanted to go and build healthdata.gov, right, which gave folks a lot of access to the healthcare data, roles, right, that existed within the U.S. government and the CMS, NIH, you know, CDC, so on and so forth. But that was quite a big change from then taking a product management job at Google. Right. And so how did I make that change? Well, a lot of it came from, you know, the mentors that I had. Right. What I call my personal board of directors who gave me that confidence. And sure, I mean even today, I still have imposter syndrome where, you know, I think, "Am I good enough." Right. "Should I be leading this organization," right, "of data protection and governance." But I think what it boils down to is, you know, inner confidence. Right. And goes back to those two pillars of having the right skills and also the right mentors and sponsors who are willing to help sponsor you into those opportunities and help sponsor you to success. >> Absolutely. Great advice and recommendations. Thanks for sharing your background, Nancy, it's outstanding to see where you started to where you are now and also to what you're enabling for so many other females to get into tech with the AWIT program combined with AWS and UPenn. Exciting stuff. Can't wait to talk to you next year to see where you guys go from here. >> Absolutely Lisa. And what I'm really looking forward to sharing with you next year is the personal testimonials of other women who have gone through the AWIT, the AWS, the UPenn Program and have gotten their tech jobs and also promotions. >> That sounds like a great thing to look forward to. I'm looking forward to that. Nancy, thanks so much for your time and the insight that you shared. >> Thanks so much for having me, Lisa. >> My pleasure. For Nancy Wong, I'm Lisa Martin. You're watching theCUBE's coverage of the International Women's Showcase 2022. (upbeat music)
SUMMARY :
of the International me Lisa, and you know, Talk to me a little bit about your role And speaking of the pandemic, Talk to me about what it means though And how do you plan out really excited to tell you that you bring up is, you know, and one that I'm, you and how do you bring them so that you can accelerate your career. the synergies, and how to in the sense that if you go the number of women that you that the Master's of CIS Program, between AWS, AWIT, and the That's outstanding to get them in have the confidence to say, and the CMS, NIH, you know, it's outstanding to see where you started with you next year and the insight that you shared. of the International
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
AWS | ORGANIZATION | 0.99+ |
Nancy | PERSON | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
Nancy Wong | PERSON | 0.99+ |
Nancy Wong | PERSON | 0.99+ |
ORGANIZATION | 0.99+ | |
AWIT | ORGANIZATION | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
Nancy Wang | PERSON | 0.99+ |
thousands | QUANTITY | 0.99+ |
Lisa | PERSON | 0.99+ |
2017 | DATE | 0.99+ |
Netflix | ORGANIZATION | 0.99+ |
NIH | ORGANIZATION | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
University of Pennsylvania | ORGANIZATION | 0.99+ |
University of Pennsylvania | ORGANIZATION | 0.99+ |
first | QUANTITY | 0.99+ |
42 | QUANTITY | 0.99+ |
42% | QUANTITY | 0.99+ |
Four courses | QUANTITY | 0.99+ |
two terms | QUANTITY | 0.99+ |
International Women's Day | EVENT | 0.99+ |
two | QUANTITY | 0.99+ |
next year | DATE | 0.99+ |
CDC | ORGANIZATION | 0.99+ |
second specialization | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
tomorrow | DATE | 0.99+ |
today | DATE | 0.99+ |
over 40% | QUANTITY | 0.98+ |
one | QUANTITY | 0.98+ |
AWS Data Protection and Governance | ORGANIZATION | 0.98+ |
This summer | DATE | 0.98+ |
two pillars | QUANTITY | 0.97+ |
Coursera | TITLE | 0.97+ |
U.S. government | ORGANIZATION | 0.96+ |
UPenn | ORGANIZATION | 0.96+ |
tens of thousands | QUANTITY | 0.94+ |
Advancing Women In Tech | ORGANIZATION | 0.94+ |
first people | QUANTITY | 0.93+ |
AWS Training and Certifications | ORGANIZATION | 0.93+ |
Coursera | ORGANIZATION | 0.93+ |
each | QUANTITY | 0.93+ |
pandemic | EVENT | 0.92+ |
Data Protection and Governance | ORGANIZATION | 0.9+ |
theCUBE | ORGANIZATION | 0.89+ |
Cloud | TITLE | 0.89+ |
few years ago | DATE | 0.88+ |
International Women's Showcase 2022 | EVENT | 0.88+ |
International Women's Showcase for 2022 | EVENT | 0.86+ |
AWIT | TITLE | 0.82+ |
Danny Allan, Veeam & James Kirschner, Amazon | AWS re:Invent 2021
(innovative music) >> Welcome back to theCUBE's continuous coverage of AWS re:Invent 2021. My name is Dave Vellante, and we are running one of the industry's most important and largest hybrid tech events of the year. Hybrid as in physical, not a lot of that going on this year. But we're here with the AWS ecosystem, AWS, and special thanks to AMD for supporting this year's editorial coverage of the event. We've got two live sets, two remote studios, more than a hundred guests on the program. We're going really deep, as we enter the next decade of Cloud innovation. We're super excited to be joined by Danny Allan, who's the Chief Technology Officer at Veeam, and James Kirschner who's the Engineering Director for Amazon S3. Guys, great to see you. >> Great to see you as well, Dave. >> Thanks for having me. >> So let's kick things off. Veeam and AWS, you guys have been partnering for a long time. Danny, where's the focus at this point in time? What are customers telling you they want you to solve for? And then maybe James, you can weigh in on the problems that customers are facing, and the opportunities that they see ahead. But Danny, why don't you start us off? >> Sure. So we hear from our customers a lot that they certainly want the solutions that Veeam is bringing to market, in terms of data protection. But one of the things that we're hearing is they want to move to Cloud. And so there's a number of capabilities that they're asking us for help with. Things like S3, things like EC2, and RDS. And so over the last, I'll say four or five years, we've been doing more and more together with AWS in, I'll say, two big categories. One is, how do we help them send their data to the Cloud? And we've done that in a very significant way. We support obviously tiering data into S3, but not just S3. We support S3, and S3 Glacier, and S3 Glacier Deep Archive. And more importantly than ever, we do it with immutability because customers are asking for security. So a big category of what we're working on is making sure that we can store data and we can do it securely. Second big category that we get asked about is "Help us to protect the Cloud-Native Workloads." So they have workloads running in EC2 and RDS, and EFS, and EKS, and all these different services knowing Cloud-Native Data Protection. So we're very focused on solving those problems for our customers. >> You know, James, it's interesting. I was out at the 15th anniversary of S3 in Seattle, in September. I was talking to Mai-Lan. Remember we used to talk about gigabytes and terabytes, but things have changed quite dramatically, haven't they? What's your take on this topic? >> Well, they sure have. We've seen the exponential growth data worldwide and that's made managing backups more difficult than ever before. We're seeing traditional methods like tape libraries and secondary sites fall behind, and many organizations are moving more and more of their workloads to the Cloud. They're extending backup targets to the Cloud as well. AWS offers the most storage services, data transfer methods and networking options with unmatched durability, security and affordability. And customers who are moving their Veeam Backups to AWS, they get all those benefits with a cost-effective offsite storage platform. Providing physical separation from on-premises primary data with pay-as-you-go economics, no upfront fees or capital investments, and near zero overhead to manage. AWS and APM partners like Veeam are helping to build secure, efficient, cost-effective backup, and restore solutions using the products you know and trust with the scale and reliability of the AWS Cloud. >> So thank you for that. Danny, I remember I was way back in the old days, it was a VeeamON physical event. And I remember kicking around and seeing this company called Kasten. And I was really interested in like, "You protect the containers, aren't they ephemeral?" And we started to sort of chit-chat about how that's going to change and what their vision was. Well, back in 2020, you purchased Kasten, you formed the Veeam KBU- the Kubernetes Business Unit. What was the rationale behind that acquisition? And then James, I'm going to get you to talk a little bit about modern apps. But Danny, start with the rationale behind the Kasten acquisition. >> Well, one of the things that we certainly believe is that the next generation of infrastructure is going to be based on containers, and there's a whole number of reasons for that. Things like scalability and portability. And there's a number of significant value-adds. So back in October of last year in 2020, as you mentioned, we acquired Kasten. And since that time we've been working through Kasten and from Veeam to add more capabilities and services around AWS. For example, we supported the Bottlerocket launch they just did and actually EKS anywhere. And so we're very focused on making sure that our customers can protect their data no matter whether it's a Kubernetes cluster, or whether it's on-premises in a data center, or if it's running up in the Cloud in EC2. We give this consistent data management experience and including, of course, the next generation of infrastructure that we believe will be based on containers. >> Yeah. You know, James, I've always noted to our audience that, "Hey AWS, they provide rich set of primitives and API's that ISV's like Veeam can take advantage of it." But I wonder if you could talk about your perspective, maybe what you're seeing in the ecosystem, maybe comment on what Veeam's doing. Specifically containers, app modernization in the Cloud, the evolution of S3 to support all these trends. >> Yeah. Well, it's been great to see Veeam expands for more and more AWS services to help joint customers protect their data. Especially since Veeam stores their data in Amazon S3 storage classes. And over the last 15 years, S3 has helped companies around the world optimize their work, so I'd be happy to share some insights into that with you today. When you think about S3 well, you can find virtually every use case across all industries running on S3. That ranges from backup, to (indistinct) data, to machine learning models, the list goes on and on. And one of the reasons is because S3 provides industry leading scalability, availability, durability, security, and performance. Those are characteristics customers want. To give you some examples, S3 stores exabytes the data across millions of hard drives, trillions of objects around the world and regularly peaks at millions of requests per second. S3 can process in a single region over 60 terabytes a second. So in summary, it's a very powerful storage offering. >> Yeah, indeed. So you guys always talking about, you know, working backwards, the customer centricity. I think frankly that AWS sort of change the culture of the entire industry. So, let's talk about customers. Danny do you have an example of a joint customer? Maybe how you're partnering with AWS to try to address some of the challenges in data protection. What are customers is seeing today? >> Well, we're certainly seeing that migration towards the Cloud as James alluded today. And actually, if we're talking about Kubernetes, actually there's a customer that I know of right now, Leidos. They're a fortune 500 Information Technology Company. They deal in the engineering and technology services space, and focus on highly regulated industry. Things like defense and intelligence in the civil space. And healthcare in these very regulated industries. Anyway, they decided to make a big investment in continuous integration, continuous development. There's a segment of the industry called portable DevSecOps, and they wanted to build infrastructure as code that they could deploy services, not in days or weeks or months, but they literally wanted to deploy their services in hours. And so they came to us, and with Kasten K10 actually around Kubernetes, they created a service that could enable them to do that. So they could be fully compliant, and they could deliver the services in, like I say, hours, not days or months. And they did that all while delivering the same security that they need in a cost-effective way. So it's been a great partnership, and that's just one example. We see these all the time, customers who want to combine the power of Kubernetes with the scale of the Cloud from AWS, with the data protection that comes from Veeam. >> Yes, so James, you know at AWS you don't get dinner if you don't have a customer example. So maybe you could share one with us. >> Yeah. We do love working backwards from customers and Danny, I loved hearing that story. One customer leveraging Veeam and AWS is Maritz. Maritz provides business performance solutions that connect people to results, ensuring brands deliver on their customer promises and drive growth. Recently Maritz moved over a thousand VM's and petabytes of data into AWS, using Veeam. Veeam Backup for AWS enables Maritz to protect their Amazon EC2 instances with the backup of the data in the Amazon S3 for highly available, cost-effective, long-term storage. >> You know, one of the hallmarks of Cloud is strong ecosystem. I see a lot of companies doing sort of their own version of Cloud. I always ask "What's the partner ecosystem look like?" Because that is a fundamental requirement, in my view anyway, and attribute. And so, a big part of that, Danny, is channel partners. And you have a 100 percent channel model. And I wonder if we could talk about your strategy in that regard. Why is it important to be all channel? How to consulting partners fit into the strategy? And then James, I'm going to ask you what's the fit with the AWS ecosystem. But Danny, let's start with you. >> Sure, so one of the things that we've learned, we're 15 years old as well, actually. I think we're about two months older, or younger I should say than AWS. I think their birthday was in August, ours was in October. But over that 15 years, we've learned that our customers enjoy the services, and support, and expertise that comes from the channel. And so we've always been a 100 percent channel company. And so one of the things that we've done with AWS is to make sure that our customers can purchase both how and when they want through the AWS marketplace. They have a program called Consulting Partners Private Agreements, or CPPO, I think is what it's known as. And that allows our customers to consume through the channel, but with the terms and bill that they associate with AWS. And so it's a new route-to-market for us, but we continue to partner with AWS in the channel programs as well. >> Yeah. The marketplace is really impressive. James, I wonder if you could maybe add in a little bit. >> Yeah. I think Danny said it well, AWS marketplace is a sales channel for ISV's and consulting partners. It lets them sell their solutions to AWS customers. And we focus on making it really easy for customers to find, buy, deploy, and manage software solutions, including software as a service in just a matter of minutes. >> Danny, you mentioned you're 15 years old. The first time I mean, the name Veeam. The brilliance of tying it to virtualization and VMware. I was at a VMUG when I first met you guys and saw your ascendancy tied to virtualization. And now you're obviously leaning heavily into the Cloud. You and I have talked a lot about the difference between just wrapping your stack in a container and hosting it in the Cloud versus actually taking advantage of Cloud-Native Services to drive further innovation. So my question to you is, where does Veeam fit on that spectrum, and specifically what Cloud-Native Services are you leveraging on AWS? And maybe what have been some outcomes of those efforts, if in fact that's what you're doing? And then James, I have a follow-up for you. >> Sure. So the, the outcomes clearly are just more success, more scale, more security. All the things that James is alluding to, that's true for Veeam it's true for our customers. And so if you look at the Cloud-Native capabilities that we protect today, certainly it began with EC2. So we run things in the Cloud in EC2, and we wanted to protect that. But we've gone well beyond that today, we protect RDS, we protect EFS- Elastic File Services. We talked about EKS- Elastic Kubernetes Services, ECS. So there's a number of these different services that we protect, and we're going to continue to expand on that. But the interesting thing is in all of these, Dave, when we do data protection, we're sending it to S3, and we're doing all of that management, and tiering, and security that our customers know and love and expect from Veeam. And so you'll continue to see these types of capabilities coming from Veeam as we go forward. >> Thank you for that. So James, as we know S3- very first service offered in 2006 on the AWS' Cloud. As I said, theCUBE was out in Seattle, September. It was a great, you know, a little semi-hybrid event. But so over the decade and a half, you really expanded the offerings quite dramatically. Including a number of, you got on-premise services things, like Outposts. You got other services with "Wintery" names. How have you seen partners take advantage of those services? Is there anything you can highlight maybe that Veeam is doing that's notable? What can you share? >> Yeah, I think you're right to call out that growth. We have a very broad and rich set of features and services, and we keep growing that. Almost every day there's a new release coming out, so it can be hard to keep up with. And Veeam has really been listening and innovating to support our joint customers. Like Danny called out a number of the ways in which they've expanded their support. Within Amazon S3, I want to call out their support for our infrequent access, infrequent access One-Zone, Glacier, and Glacier Deep Archive Storage Classes. And they also support other AWS storage services like AWS Outposts, AWS Storage Gateway, AWS Snowball Edge, and the Cold-themed storage offerings. So absolutely a broad set of support there. >> Yeah. There's those, winter is coming. Okay, great guys, we're going to leave it there. Danny, James, thanks so much for coming to theCUBE. Really good to see you guys. >> Good to see you as well, thank you. >> All right >> Thanks for having us. >> You're very welcome. You're watching theCUBE's coverage of 2021 AWS re:Invent, keep it right there for more action on theCUBE, your leader in hybrid tech event coverage, right back. (uplifting music)
SUMMARY :
and special thanks to AMD and the opportunities that they see ahead. And so over the last, I'll I was out at the 15th anniversary of S3 of the AWS Cloud. And then James, I'm going to get you is that the next generation the evolution of S3 to some insights into that with you today. of the entire industry. And so they came to us, So maybe you could share one with us. that connect people to results, And then James, I'm going to ask you and expertise that comes from the channel. James, I wonder if you could And we focus on making it So my question to you is, And so if you look at the in 2006 on the AWS' Cloud. AWS Snowball Edge, and the Really good to see you guys. coverage of 2021 AWS re:Invent,
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Danny | PERSON | 0.99+ |
James | PERSON | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
October | DATE | 0.99+ |
Danny Allan | PERSON | 0.99+ |
2006 | DATE | 0.99+ |
James Kirschner | PERSON | 0.99+ |
Seattle | LOCATION | 0.99+ |
August | DATE | 0.99+ |
100 percent | QUANTITY | 0.99+ |
2020 | DATE | 0.99+ |
Dave | PERSON | 0.99+ |
AWS' | ORGANIZATION | 0.99+ |
four | QUANTITY | 0.99+ |
AMD | ORGANIZATION | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Veeam | ORGANIZATION | 0.99+ |
September | DATE | 0.99+ |
APM | ORGANIZATION | 0.99+ |
S3 | TITLE | 0.99+ |
two remote studios | QUANTITY | 0.99+ |
five years | QUANTITY | 0.99+ |
One | QUANTITY | 0.99+ |
Leidos | ORGANIZATION | 0.99+ |
Kubernetes | TITLE | 0.99+ |
Kasten | ORGANIZATION | 0.99+ |
two live sets | QUANTITY | 0.99+ |
one | QUANTITY | 0.99+ |
15 years | QUANTITY | 0.98+ |
today | DATE | 0.98+ |
more than a hundred guests | QUANTITY | 0.98+ |
both | QUANTITY | 0.98+ |
David Noy & Rob Emsley | CUBEconversation
(upbeat music) >> Welcome to this CUBE Conversation. My name is Dave Vellante and we're going to talk about data protection in the age of ransomware. It's a top of mind topic. And with me are two great guests and CUBE alumnus, David Noy, Vice Presidents of Product Management at Dell Technologies and Rob Emsley, Director of Data Protection Product Marketing at Dell. Guys, welcome back to the CUBE, it's good to see you both. >> Oh, thanks so much, I appreciate it. Thanks for having us. >> Yeah, thanks a lot Dave. >> Hey David, let me start with you. Maybe we could look at the macro, the big picture at Dell for cyber security. What are you seeing out there? >> You know, I'm seeing an enormous amount of interest in cybersecurity obviously driven by a string of recent events and the presidential executive order around cybersecurity. Look, we're in unprecedented times where, you know, disaster readiness is not just about being prepared for a wildfire or a sprinkler going off in your data center. It's around a new class of malicious attacks that people just have to be ready for. And it's not even a question of if it's going to happen, it's a question of when it's going to happen. We know it's going to happen, you're going to get hit by them. And so we go beyond just thinking about, hey, how do you build in technical capabilities into the product to make it difficult for attackers? We actually want to get predictive. We want to use advanced technologies and capabilities like artificial intelligence and machine learning to go out and scan users environments and look at their data which is really the lifeblood of a business and say, hey, we can see that there is potentially an attack looming. We can start to look for dormant attack vectors. And as soon as something bad is happening because we know something bad is going to happen, we can help you quickly recover the restore or figure out which restore point to recover from so you can get your business back and operational as soon as possible. >> Great, thank you for that, David. Hey Rob, good to see you. You know, we've seen a lot of changes recently kind of as David was referencing, it used to be okay, cybersecurity, that's the domain of the SecOps team and, you know, the rest of the company said, okay, it's their problem. You know, data protection or backup, that was the backup admin. Those two worlds are kind of colliding together. We use terms like cyber resiliency now. It's a sort of super set of, if you will, of the traditional cybersecurity. So how can organizations get ahead of these cyber threats when you engage with customers? Do you have any sort of specific angles or tooling that you use to help? >> Yeah, Dave, there's a couple of things to unpack there. You know, I think one of the things that you call out is cyber resiliency. You know, I think there's a balancing act that customers are all working through between cybersecurity and cyber resiliency. On the left-hand side of the balancing act, it's, you know, how can I keep bad things out of my network? And the reality is that it's very difficult, you know, to do that. You know, there's many applications that customers have deployed to protect the perimeter. But as you know, many cyber threats, you know, are manifested from inside of the perimeter. So what we're seeing is customers starting to invest more in making themselves cyber resilient organizations, you know, and as David mentioned, it's not the if, it's the when. The question is, how do you respond to when a cyber attack hits you? So one of the things that we introduced pointing back six months ago is a globally available cyber resiliency assessment. And we worked in collaboration with the Enterprise Strategy Group and we put out a free online assessment tool to allow customers to really answer questions around, you know, a big part of the NIST framework, around detection, protection and recovery. And we give customers the opportunity to get themselves evaluated on, are they prepared? Are they vulnerable? Or are they just, you know, black and white exposed? You know, what we found over the last six months is that over 70% of the people that have taken this cyber resiliency assessment fall into that category of they're vulnerable or they're exposed. >> Right, thank you for that. Yeah, the guys at ESG do a good job in that they have deep expertise in that space. And David, Rob just talked about sort of the threats from inside the perimeter and, you know, any person, you don't even need a high school diploma to be a ransomwarist, you can go on the dark web. You can acquire ransomware as a service. If you have access to a server and are willing to put a stick in there and do some bad things or give credentials out, hopefully you'll end up in handcuffs. You know, but more often than not, people are getting away with really, you know, insidious crime. So how is Dell, David helping customers respond to the threat of ransomware? >> So, you know, as I mentioned earlier, the product approach is pretty sophisticated. You know, you're right, somebody can come and just put a USB stick into a machine or if they have administrative access, they can figure out a code that they've either been given because, you know, the trust has been placed in the wrong place or they've somehow socially engineered out of someone. Look, it's not enough to just say, I'm going to go lock down my system. Someone who's gained access can potentially gain access to other systems by hopping through them. We take a more of a vault based approach which means that when you create a cyber vault, it's essentially locked down from the rest of your environment. Your cyber criminal is not able to get to that solution because it's been air gapped. It's kept somewhere else completely separate from other network but it also has keys and to the keys to the kingdom or that it opens up only at a certain time of day so it's not vulnerable to coming in at any time. It goes and requests data, it pulls the data and then it keeps that immutable copy in the vault itself. So the vault is essentially like a gated off, modded off environment that an attacker cannot get into. If you find that there was an attack or if an attack has occurred in which an attack will occur sooner or later, you then can basically prevent that attacker from getting access into that vaulted environment before that next opening event occurs. We also have to go back and look at time because sometimes these attackers don't instantiate all at once, I'm going to basically go and encrypt all your data. They take a more of a graduated approach. And so you have to go and look at patterns, access patterns of how data has actually changed and not just look at the metadata, say, okay, well, it looks like the data changed at a certain time. You have to look at the data contents. You have to look at the, if there's a file type. Often times, you can actually analyze that as well and say, hey, this given file whether it's a PowerPoint file or an Excel file or one of the a hundred or a thousand different file types should look like this, it doesn't look like that inside. What are many of the solutions that look for these attackers do is they're just looking at metadata access and then potentially just entropies or how fast things are changing. Well, it's changing faster than it normally would. That's not enough. And the attackers are just going to get smarter about how they go and change things. They're going to change it so that they don't change file suffixes or they don't change them with a very high entropy rate. And without using some kind of a system that's actually constantly tuning itself to say, hey, this is how these attack vectors are evolving over time, you're going to miss out on these opportunities to go and protect yourself. So we have also a constantly evolving and learning capability to go in and say, okay, as we see how these attack vectors are evolving to adapt to the way that we defend against them, we're going to also (audio glitches) other practices to make sure that we account for the new models. So it's a very adaptable kind of, it really is artificial intelligence form of protecting yourself. >> Can I ask you a question, David, just a follow-up on the immutable copy? Where does that live? Is it kind of live on prem? Is it in the cloud, either? >> Both, so we have the ability to put that on prem. We have the ability to put that in a second data center. We have the ability to keep that actually in a colo site so basically, completely out of your data center. And we've got the ability to keep that in the cloud as well. >> The reason I ask is because I just, you know, putting my paranoid SecOps hat on and I'm no expert here but I've talked to organizations that say, oh yeah, it's in the cloud, it's a service. Say, okay, but it's immutable? Yeah, it's write once, read many. You can't erase it. I go, okay, can I turn it off? Well, no, not really. Well, what if I stopped paying for the service? Well, we'd send a notice out. I said, okay, wait a minute. So am I just being too paranoid here? How do you handle that objection? >> Of turning it off? >> Yeah, can I turn it off or can you make it so that nobody can turn it off? >> Oh yeah, that's a good question. So actually what we're building into the product roadmap is the ability to that product actually self inspect and to look at. Whether or not even the underlying, so for example, if the service is running in a virtual machine. Well, the attacker could say, let me just go attack the virtual machine and it infect it and basically turn itself off even in an on-prem, nevermind in the cloud. And so we're looking at building or we're building into the roadmap, a lot more self inspection capabilities to make sure that somebody isn't going to just shut down the service. And so that kind of self resiliency is critical even to a vaulted solution which is air gapped, right? To your point. You don't want someone going, well, I can just get around your solution. I'm just going to go shut it down. That's something that we're getting at. >> So this talks, I think for the audience, this talks it's like an ongoing game of escalation and you want to have a partner who has the resources to keep up with the bad guys cause it's just the constantly, you know, upping the ante, Rob, you guys do a survey every year, the Global Data Protection Index. Tell us about that. What are the latest results? You survey a lot of people. I'm interested in, you know, the context of things like remote work and hybrid work, it's escalated the threat. What are you seeing there? >> Yeah, so as you mentioned, the Global Data Protection Index, we survey over a thousand IT executives, you know, around the globe. And in the most recent study, we absolutely started to ask questions specifically around, you know, customer's concerns with regards to cybersecurity. And we found that over 60% of the customer surveyed, you know, really are concerned that they don't feel that they are adequately prepared to respond to cyber threats that they see, unfortunately on a day-to-day basis. You know, certainly, you know, as you mentioned, the work from anywhere, learn from anywhere reality that many customers are dealing with, you know, one of the concerns that they have is the increased attack surface that they now have to deal with. I mean, the perimeter of the network is now, you know, much broader than it ever has been in the past. You know, so I think all of this leads, Dave, to cybersecurity discussions and cyber resiliency discussions being top of mind for really any CIO, their CSO in any industry. You know, in the days of old, you know, we used to focus at the financial services industry, you know, as, you know, a bunch of customers that we, you know, could have very relevant conversations with but now, you know, that is now cross industry-wide. There isn't a vertical that isn't concerned about the threats of cyber security and cyber attacks. So, you know, when we think about our business especially around data vaulting with our PowerProtect portfolio but also with our PowerScale portfolio, with our unstructured data storage solutions. You know, when we're really having constant conversations of brand, how do you make your environment more cyber resilient? And, you know, we've been seeing, you know, rapid growth in both of those solution areas, both implementing extensions of customers, backup and recovery solutions, you know, but also, you know, in the environments where, you know, we're deploying, you know, large scale unstructured storage infrastructure, you know, the ability to have real-time monitoring of those environments and also to extend that to delivering a vaulted solution for your unstructured storage are all things that are leading us to, you know, work with customers to actually help them become more cyber resilient. >> Great, thanks. The last question and maybe for both of you. Maybe Rob you start and David you can chime in. I'm interested in what's exciting you guys, what's new in the portfolio, are there new features that you're delivering that map to the current market conditions? I mean, your unique value proposition and your capabilities have shifted. You have to respond to the market changes over the left last 18 to 24 months whether it's cyber, ransomware, the digital transformation, what's new in the portfolio and what's exciting you guys. >> So Dave, yes, so quite recently we, you know, as well as, you know, running an event specifically to talk about protection and the age of ransomware and to discuss many of the things that we've covered on this call. You know, data protection is still a foundational technology to help customers become, you know, more secure and, you know, reduce their risk profiles. So innovation that we delivered very recently, you know, it's really in three specific areas, you know, VMware Data Protection, NAS Data Protection and then, you know, also, you know, we introduced a tech preview of a direction that we're taking to expand the scalability and manageability of our PowerProtect appliances. So transparent snapshots delivers capabilities to help customers better protect their VMware environment without the concern of disrupting their production applications when they're doing backup and recovery of virtual machines. Dynamic NAS protection moves away from the age old mechanism of NDMP and provides a much more performance and scalable solution for protecting all of that unstructured data running on NAS infrastructure. And then last but not least to say the tech preview of Smart Scale which is our new solution and architecture to allow customers to pull together multiple power of attack appliances within their data sensors and give them a much easier way of managing the PowerProtect appliances that they have and scaling them environment by implementing a federated namespace to align on them to get support in that environment. >> Nice, some great innovations there. All right, David bring us home. What's exciting you? You shared a little bit with the roadmap of... >> Yeah, look, I think all of this is about operations today. Every enterprise is 24/7. It doesn't matter what vertical you're in, right? Downtime is unacceptable. And whether that means whether it's downtime because you got hit by a malicious attacker, it means downtime because you were caused by disruption of virtual machine instances to Rob's point during the backup process. And we can't interrupt those processes, we can't impact their performance. It means, you know, making sure that your largest unstructured repositories in NAS deployments can be backed up in a time that makes sense so that you can meet your own SLAs. And it means that with a smart scale product there are ability to go and say, okay, as you're expanding your backup target environment, we can do that in a seamless fashion without disrupting your backup operations and your day-to-day operations. All of this is around making sure that we minimize the amount of disruption that our end users experience either because of malicious attacks or because of day-to-day operations and making, you know, making sure that those businesses really can operate 24/7. And that is the crux of a really true enterprise solution for data protection >> Guys, very important topic, really appreciate you coming on the CUBE. Great conversation and keep up the good work of protecting our data. >> Well, Dave, thanks. >> Thanks Dave. >> All right, and thanks everybody for watching this CUBE conversation. This is Dave Vellante and we'll see you next time. (gentle music)
SUMMARY :
it's good to see you both. Thanks for having us. What are you seeing out there? into the product to make and, you know, the rest the things that you call out to be a ransomwarist, you because, you know, the We have the ability to put because I just, you know, is the ability to that you know, upping the ante, You know, in the days of old, you know, over the left last 18 to 24 months and then, you know, also, you know, You shared a little bit and making, you know, making sure really appreciate you coming on the CUBE. we'll see you next time.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
David | PERSON | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
David Noy | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
Rob Emsley | PERSON | 0.99+ |
Rob | PERSON | 0.99+ |
ESG | ORGANIZATION | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
both | QUANTITY | 0.99+ |
Both | QUANTITY | 0.99+ |
PowerPoint | TITLE | 0.99+ |
Excel | TITLE | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
six months ago | DATE | 0.99+ |
over 70% | QUANTITY | 0.98+ |
over 60% | QUANTITY | 0.98+ |
one | QUANTITY | 0.96+ |
two worlds | QUANTITY | 0.96+ |
two great guests | QUANTITY | 0.95+ |
second data center | QUANTITY | 0.95+ |
CUBE | ORGANIZATION | 0.94+ |
SecOps | ORGANIZATION | 0.94+ |
Enterprise Strategy Group | ORGANIZATION | 0.92+ |
over a thousand | QUANTITY | 0.92+ |
today | DATE | 0.88+ |
VMware | ORGANIZATION | 0.87+ |
24 months | QUANTITY | 0.87+ |
VMware Data Protection | TITLE | 0.83+ |
a hundred or | QUANTITY | 0.83+ |
three specific areas | QUANTITY | 0.82+ |
a minute | QUANTITY | 0.78+ |
once | QUANTITY | 0.78+ |
Global Data Protection Index | TITLE | 0.76+ |
last six months | DATE | 0.76+ |
PowerProtect | COMMERCIAL_ITEM | 0.72+ |
a thousand | QUANTITY | 0.7+ |
SecOps | TITLE | 0.64+ |
18 | QUANTITY | 0.62+ |
Director | PERSON | 0.59+ |
file | QUANTITY | 0.59+ |
last | DATE | 0.54+ |
Scale | COMMERCIAL_ITEM | 0.52+ |
PowerScale | ORGANIZATION | 0.5+ |
Data | TITLE | 0.43+ |
Smart | TITLE | 0.42+ |
NIST | ORGANIZATION | 0.4+ |
Protection | OTHER | 0.37+ |
CUBE | EVENT | 0.32+ |
Breaking Analysis: Rethinking Data Protection in the 2020s
>> From theCUBE studios in Palo Alto in Boston, bringing you data-driven insights from theCUBE and ETR. This is braking analysis with Dave Vellante. >> Techniques to protect sensitive data have evolved over thousands of years, literally. The pace of modern data protection is rapidly accelerating and presents both opportunities and threats for organizations. In particular, the amount of data stored in the cloud combined with hybrid work models, the clear and present threat of cyber crime, regulatory edicts, and the ever expanding edge and associated use cases should put CXOs on notice that the time is now to rethink your data protection strategies. Hello, and welcome to this week's Wikibon Cube Insights powered by ETR. In this breaking analysis, we're going to explore the evolving world of data protection and share some information on how we see the market changing in the competitive landscape for some of the top players. Steve Kenniston, AKA the Storage Alchemist, shared a story with me, and it was pretty clever. Way back in 4000 BC, the Sumerians invented the first system of writing. Now, they used clay tokens to represent transactions at that time. Now, to prevent messing with these tokens, they sealed them in clay jars to ensure that the tokens, i.e the data, would remain secure with an accurate record that was, let's call it quasi, immutable, and lived in a clay vault. And since that time, we've seen quite an evolution of data protection. Tape, of course, was the main means of protecting data and backing data up during most of the mainframe era. And that carried into client server computing, which really accentuated and underscored the issues around backup windows and challenges with RTO, recovery time objective and RPO recovery point objective. And just overall recovery nightmares. Then in the 2000's data reduction made disk-based backup more popular and pushed tape into an archive last resort media. Data Domain, then EMC, now Dell still sell many purpose-built backup appliances as do others as a primary backup target disc-based. The rise of virtualization brought more changes in backup and recovery strategies, as a reduction in physical resources squeezed the one application that wasn't under utilizing compute, i.e, backup. And we saw the rise of Veem, the cleverly-named company that became synonymous with data protection for virtual machines. Now, the cloud has created new challenges related to data sovereignty, governance, latency, copy creep, expense, et cetera. But more recently, cyber threats have elevated data protection to become a critical adjacency to information security. Cyber resilience to specifically protect against attacks is the new trend being pushed by the vendor community as organizations are urgently looking for help with this insidious threat. Okay, so there are two major disruptors that we're going to talk about today, the cloud and cyber crime, especially around ransoming your data. Every customer is using the cloud in some way, shape, or form. Around 76% are using multiple clouds, that's according to a recent study by Hashi Corp. We've talked extensively about skill shortages on theCUBE, and data protection and security concerns are really key challenges to address, given that skill shortage is a real talent gap in terms of being able to throw people at solving this problem. So what customers are doing, they're either building out or they're buying really mostly building abstraction layers to hide the underlying cloud complexity. So what this does... The good news is it's simplifies provisioning and management, but it creates problems around opacity. In other words, you can't see sometimes what's going on with the data. These challenges fundamentally become data problems, in our view. Things like fast, accurate, and complete backup recovery, compliance, data sovereignty, data sharing. I mentioned copy creep, cyber resiliency, privacy protections. These are all challenges brought to fore by the cloud, the advantages, the pros, and the cons. Now, remote workers are especially vulnerable. And as clouds span rapidly, data protection technologies are struggling to keep pace. So let's talk briefly about the rapidly-expanding public cloud. This chart shows worldwide revenue for the big four hyperscalers. As you can see, we projected that they're going to surpass $115 billion in revenue in 2021. That's up from 86 billion last year. So it's a huge market, it's growing in the 35% range. The interesting thing is last year, 80-plus billion dollars in revenue, but 100 billion dollars was spent last year by these firms in cap ex. So they're building out infrastructure for the industry. This is a gift to the balance of the industry. Now to date, legacy vendors and the surrounding community have been pretty defensive around the cloud. Oh, not everything's going to move to the cloud. It's not a zero sum game we hear. And while that's all true, the narrative was really kind of a defensive posture, and that's starting to change as large tech companies like Dell, IBM, Cisco, HPE, and others see opportunities to build on top of this infrastructure. You certainly see that with Arvind Krishna comments at IBM, Cisco obviously leaning in from a networking and security perspective, HPE using language that is very much cloud-like with its GreenLake strategy. And of course, Dell is all over this. Let's listen to how Michael Dell is thinking about this opportunity when he was questioned on the queue by John Furrier about the cloud. Play the clip. So in my view, Michael nailed it. The cloud is everywhere. You have to make it easy. And you have to admire the scope of his comments. We know this guy, he thinks big. He said, "Enables everything." He's basically saying is that technology is at the point where it has the potential to touch virtually every industry, every person, every problem, everything. So let's talk about how this informs the changing world of data protection. Now, we all know, we've seen with the pandemic, there's an acceleration in toward digital, and that has caused an escalation, if you will, in the data protection mandate. So essentially what we're talking about here is the application of Michael Dell's cloud everywhere comments. You've got on-prem, private clouds, hybrid clouds. You've got public clouds across AWS, Azure, Google, Alibaba. Really those are the big four hyperscalers. You got many clouds that are popping up all their place. But multi-cloud, to that Hashi Corp data point, 75, 70 6%. And then you now see the cloud expanding out to the edge, programmable infrastructure heading out to the edge. So the opportunity here to build the data protection cloud is to have the same experiences across all these estates with automation and orchestration in that cloud, that data protection cloud, if you will. So think of it as an abstraction layer that hides that underlying complexity, you log into that data protection cloud, it's the same experience. So you've got backup, you've got recovery, you can handle bare metal. You can do virtualized backups and recoveries, any cloud, any OS, out to the edge, Kubernetes and container use cases, which is an emerging data protection requirement. And you've got analytics, perhaps you've got PII, personally identifiable information protection in there. So the attributes of this data protection cloud, again, abstracts the underlying cloud primitives, takes care of that. It also explodes cloud native technologies. In other words, it takes advantage of whether it's machine learning, which all the big cloud players have expertise in, new processor models, things like graviton, and other services that are in the cloud natively. It doesn't just wrap it's on-prem stack in a container and shove it into the cloud, no. It actually re architects or architects around those cloud native services. And it's got distributed metadata to track files and volumes and any organizational data irrespective of location. And it enables sets of services to intelligently govern in a federated governance manner while ensuring data integrity. And all this is automated and an orchestrated to help with the skills gap. Now, as it relates to cyber recovery, air-gap solutions must be part of the portfolio, but managed outside of that data protection cloud that we just briefly described. The orchestration and the management must also be gaped, if you will. Otherwise, (laughs) you don't have an air gap. So all of this is really a cohort to cyber security or your cybersecurity strategy and posture, but you have to be careful here because your data protection strategy could get lost in this mess. So you want to think about the data protection cloud as again, an adjacency or maybe an overlay to your cybersecurity approach. Not a bolt on, it's got to be fundamentally architectured from the bottom up. And yes, this is going to maybe create some overheads and some integration challenges, but this is the way in which we think you should think about it. So you'll likely need a partner to do this. Again, we come back to the skill skills gap if we're seeing the rise of MSPs, managed service providers and specialist service providers. Not public cloud providers. People are concerned about lock-in, and that's really not their role. They're not high-touch services company. Probably not your technology arms dealer, (clear throat) excuse me, they're selling technology to these MSPs. So the MSPs, they have intimate relationships with their customers. They understand their business and specialize in architecting solutions to handle these difficult challenges. So let's take a look at some of the risk factors here, dig a little bit into the cyber threat that organizations face. This is a slide that, again, the Storage Alchemists, Steve Kenniston, shared with me. It's based on a study that IBM funds with the Panmore Institute, which is a firm that studies these things like cost of breaches and has for many, many, many years. The slide shows the total cost of a typical breach within each dot and on the Y axis and the frequency in percentage terms on the horizontal axis. Now, it's interesting. The top two compromise credentials and phishing, which once again proves that bad user behavior trumps good security every time. But the point here is that the adversary's attack vectors are many. And specific companies often specialize in solving these problems often with point products, which is why the slide that we showed from Optiv earlier, that messy slide, looks so cluttered. So there's a huge challenge for companies. And that's why we've seen the emergence of cyber recovery solutions from virtually all the major players. Ransomware and the solar winds hack have made trust the number one issue for CIOs and CISOs and boards of directors. Shifting CISO spending patterns are clear. They're shifting largely because they're catalyzed by the work from home. But outside of the moat to endpoint security, identity and access management, cloud security, the horizontal network security. So security priorities and spending are changing. And that's why you see the emergence of disruptors like we've covered extensively, Okta, CrowdStrike, Zscaler. And cyber resilience is top of mind, and robust solutions are required. And that's why companies are building cyber recovery solutions that are most often focused on the backup corpus because that's a target for the bad guys. So there is an opportunity, however, to expand from just the backup corpus to all data and protect this kind of 3, 2, 1, or maybe it's 3, 2, 1, 1, three copies, two backups, a backup in the cloud and one that's air gaped. So this can be extended to primary storage, copies, snaps, containers, data in motion, et cetera, to have a comprehensive data protection strategy. And customers, as I said earlier, are increasingly looking to manage service providers and specialists because of that skills gap. And that's a big reason why automation is so important in orchestration. And automation and orchestration, I'll emphasize, on the air gap solutions should be separated physically and logically. All right, now let's take a look at some of the ETR data and some of the players. This is a chart that we like to show often. It's a X-Y axis. And the Y axis is net score, which is a measure of spending momentum. And the horizontal axis is market share. Now, market share is an indicator of pervasiveness in the survey. It's not spending market share, it's not market share of the overall market, it's a term that ETR uses. It's essentially market share of the responses within the survey set. Think of it as mind share. Okay, you've got the pure plays here on this slide, in the storage category. There is no data protection or backup category. So what we've done is we've isolated the pure plays or close to pure plays in backup and data protection. Now notice that red line, that red is kind of our subjective view of anything that's over that 40% line is elevated. And you can see only Rubrik, and the July survey is over that 40% line. I'll show you the ends in a moment. Smaller ends, but still, Rubrik is the only one. Now, look at Cohesity and Rubrik in the January 2020. So last year, pre-pandemic, Cohesity and Rubrik, they've come well off their peak for net score. Look at Veeam. Veeam, having studied this data for the last say 24 hours months, Veeam has been steady Eddy. It is really always in the mid to high 30s, always shows a large shared end, so it's coming up in the survey. Customers are mentioning Veeam. And it's got a very solid net score. It's not above that 40% line, but it's hovering just below consistently. That's very impressive. Commvault has steadily been moving up. Sanjay Mirchandani has made some acquisitions. He did the Hedvig acquisition. They launched Metallic, that's driving cloud affinity within Commvault's large customer base. So it's good example of a legacy player pivoting and evolving and transforming itself. Veritas, it continues to under perform in the ETR surveys relative to the other players. Now, for context, let's add IBM and Dell to the chart. Now just note, this is IBM and Dell's full storage portfolio. The category in the taxonomy at ETR is all storage. Just previous slide, I isolated on the pure plays. But this now adds in IBM and Dell. It probably representative of where they would be. Probably Dell larger on the horizontal axis than IBM, of course. And you could see the spending momentum accordingly. So you can see that in the data chart that we've inserted. So some smaller ends for Rubrik and Cohesity. But still enough to pay attention, it's not like one or two. When you're 20-plus, 15-plus 25-plus, you can start to pay attention to trends. Veeam, again, is very impressive. It's net score is solid, it's got a consistent presence in the dataset, it's clear leader here. SimpliVity is small, but it's improving relative to last several surveys. And we talked about Convolt. Now, I want to emphasize something that we've been hitting on for quite some time now. And that's the Renaissance that's coming in compute. Now, we all know about Moore's Law, the doubling of transistor density every two years, 18 to 24 months. And that leads to a doubling of performance in that timeframe. X86, that x86 curve is in the blue. And if you do the math, this is expressed in trillions of operations per second. The orange line is representative of Apples A series, culminating in the A15, most recently. The A series is what Apple is now... Well, it's the technology basis for what's inside M1, the new Apple laptops, which is replacing Intel. That's that that orange line there, we'll come back to that. So go back to the blue line for a minute. If you do the math on doubling performance every 24 months, it comes out to roughly 40% annual improvement in processing power per year. That's now moderated. So Moore's Law is waning in one sense, so we wrote a piece Moore's Law is not dead. So I'm sort of contradicting myself there. But the traditional Moore's Law curve on x86 is waning. It's probably now down to around 30%, low 30s. But look at the orange line. Again, using the A series as an indicator, if you combine then the CPU, the NPU, which neuro processing unit, XPU, pick whatever PU you want, the accelerators, the DSPs, that line is growing at 100% plus per year. It's probably more accurately around 110% a year. So there's a new industry curve occurring, and it's being led by the Arm ecosystem. The other key factor there, and you're seeing this in a lot of use cases, a lot of consumer use cases, Apple is an example, but you're also seeing it in things like Tesla, Amazon with AWS graviton, the Annapurna acquisition, building out graviton and nitro, that's based on Arm. You can get from design to tape out in less than two years. Whereas the Intel cycles, we know, they've been running it four to five years now. Maybe Pat Gelsinger is compressing those. But Intel is behind. So organizations that are on that orange curve are going to see faster acceleration, lower cost, lower power, et cetera. All right, so what's the tie to data protection. I'm going to leave you with this chart. Arm has introduced it's confidential, compute architecture and is ushering in a new era of security and data protection. Zero trust is the new mandate. And what Arm has it's done with what they call realms is create physical separation of the vulnerable components by creating essentially physical buckets to put code in and to put data in, separate from the OS. Remember, the OS is the most valuable entry point for hackers or one of them because it contains privileged access, and it's a weak link because of things like memory leakages and vulnerabilities. And malicious code can be placed by bad guys within data in the OS and appear benign, even though it's anything but. So in this, all the OS does is create API calls to the realm controller. That's the only interaction. So it makes it much harder for bad actors to get access to the code and the data. And importantly, very importantly, it's an end-to-end architecture. So there's protection throughout. If you're pulling data from the edge and bringing it back to the on-prem or the cloud, you've got that end to end architecture and protection throughout. So the link to data protection is that backup software vendors need to be the most trusted of applications. Backup software needs to be the most trusted of applications because it's one of the most targeted areas in a cyber attack. Realms provide an end-to-end separation of data and code from the OS and it's a better architectural construct to support zero trust and confidential computing and critical use cases like data protection/backup and other digital business apps. So our call to action is backup software vendors, you can lead the charge. Arm is several years ahead at the moment, ahead of Intel, in our view. So you've got to pay attention to that, research that. We're not saying over rotate, but go investigate that. And use your relationships with Intel to accelerate its version of this architecture. Or ideally, the industry should agree on common standards and solve this problem together. Pat Gelsinger told us in theCUBE that if it's the last thing he's going to do in his industry life, he's going to solve this security problem. That's when he was at VMware. Well, Pat, you're even in a better place to do it now. You don't have to solve it yourself, you can't, and you know that. So while you're going about your business saving Intel, look to partner with Arm. I know it sounds crazy to use these published APIs and push to collaborate on an open source architecture that addresses the cyber problem. If anyone can do it, you can. Okay, that's it for today. Remember, these episodes are all available as podcasts. All you got to do is search Braking Analysis Podcast. I publish weekly on wikibond.com and siliconangle.com. Or you can reach me @dvellante on Twitter, email me at david.vellante@siliconangle.com. And don't forget to check out etr.plus for all the survey and data action. This is Dave Vellante for theCUBE Insights, powered by ETR. Thanks for watching, everybody. Be well, and we'll see you next time. (gentle music)
SUMMARY :
This is braking analysis So the link to data protection
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Steve Kenniston | PERSON | 0.99+ |
IBM | ORGANIZATION | 0.99+ |
Michael | PERSON | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
Michael Dell | PERSON | 0.99+ |
Pat Gelsinger | PERSON | 0.99+ |
John Furrier | PERSON | 0.99+ |
Steve Kenniston | PERSON | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
Cisco | ORGANIZATION | 0.99+ |
Sanjay Mirchandani | PERSON | 0.99+ |
Commvault | ORGANIZATION | 0.99+ |
January 2020 | DATE | 0.99+ |
75 | QUANTITY | 0.99+ |
Pat | PERSON | 0.99+ |
Panmore Institute | ORGANIZATION | 0.99+ |
100% | QUANTITY | 0.99+ |
100 billion dollars | QUANTITY | 0.99+ |
Palo Alto | LOCATION | 0.99+ |
18 | QUANTITY | 0.99+ |
Apple | ORGANIZATION | 0.99+ |
20 | QUANTITY | 0.99+ |
July | DATE | 0.99+ |
last year | DATE | 0.99+ |
15 | QUANTITY | 0.99+ |
$115 billion | QUANTITY | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Hashi Corp. | ORGANIZATION | 0.99+ |
2021 | DATE | 0.99+ |
35% | QUANTITY | 0.99+ |
two | QUANTITY | 0.99+ |
Tesla | ORGANIZATION | 0.99+ |
four | QUANTITY | 0.99+ |
Alibaba | ORGANIZATION | 0.99+ |
HPE | ORGANIZATION | 0.99+ |
ORGANIZATION | 0.99+ | |
less than two years | QUANTITY | 0.99+ |
Arvind Krishna | PERSON | 0.99+ |
five years | QUANTITY | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
80-plus billion dollars | QUANTITY | 0.99+ |
Hashi Corp | ORGANIZATION | 0.99+ |
one | QUANTITY | 0.99+ |
david.vellante@siliconangle.com | OTHER | 0.99+ |
24 months | QUANTITY | 0.99+ |
40% | QUANTITY | 0.99+ |
A15 | COMMERCIAL_ITEM | 0.99+ |
Veeam | PERSON | 0.99+ |
Intel | ORGANIZATION | 0.99+ |
4000 BC | DATE | 0.98+ |
Moore's Law | TITLE | 0.98+ |
Convolt | ORGANIZATION | 0.98+ |
86 billion | QUANTITY | 0.98+ |
VMware | ORGANIZATION | 0.98+ |
first system | QUANTITY | 0.98+ |
Storage Alchemists | ORGANIZATION | 0.98+ |
EMC | ORGANIZATION | 0.98+ |
siliconangle.com | OTHER | 0.98+ |
pandemic | EVENT | 0.97+ |
Hedvig | ORGANIZATION | 0.97+ |
one sense | QUANTITY | 0.97+ |
Metallic | ORGANIZATION | 0.97+ |
Veritas | ORGANIZATION | 0.97+ |
ETR | ORGANIZATION | 0.97+ |
Okta | ORGANIZATION | 0.97+ |
Zscaler | ORGANIZATION | 0.96+ |
@dvellante | PERSON | 0.96+ |
each dot | QUANTITY | 0.96+ |
24 hours | QUANTITY | 0.95+ |
CrowdStrike | ORGANIZATION | 0.95+ |
Eddy | PERSON | 0.95+ |
two backups | QUANTITY | 0.95+ |
around 110% a year | QUANTITY | 0.95+ |
2021 015 Laura Dubois
(gentle music) >> Welcome to this Cube Conversation, I'm Lisa Martin. Laura Dubois joins me next, VP of product management at Dell Technologies, Laura, welcome back to the program. >> Yeah, thank you so much Lisa, it's just fantastic to be here and talking about data protection now that we're coming out of COVID, it's just wonderful to be here, thank you so much. >> Isn't it so refreshing. So, you're going to provide some updates on Dell's data protection software, some of the innovation, how you're working with customers and prospects. So let's go ahead and dig right in, let's talk about some of the innovation and the enhancements that Dell is making to its data protection suite of software and also how customers are influencing that. >> Yeah, so it's a great question Lisa and you're right. We have driven a lot of innovation and enhancements in our data protection suite. And let me just level a second. So data protection suite, is a solution that is deployed by really tens of thousands of customers. And we continue to innovate and enhance that data protection suite. Data protection suite is comprised primarily of three main data protection software capabilities. So, longstanding capabilities and customer adoption of Avamar, which continues to be a central capability on our portfolio. The second one is Networker. So Networker is also an enterprise grade, highly scalable and performance data protection solution. And then a couple of years ago, we launched a new data protection capability called power protect data manager. So, all three of these capabilities, really the foundation of our data protection suite. And as I said, enterprises around the world rely on these three sets of capabilities to protect their data, regardless of wherever it resides. And it's really central now more than ever in the face of increasing security, risks and compliance and the need to be able to have an always kind of available environment that customers rely on the capabilities and data protection suite to really make sure their enterprises resilient. >> Absolutely, and make sure that that data is recoverable if anything happens, you mentioned cybersecurity. We'll get into that in a second. But so thousands of Avamar and Networker customers, what are some of the key workloads and data that these customers are protecting with these technologies? >> Yeah, I mean, so, actually tens of thousands. >> Tens of thousands. >> Tens of thousands of customers that rely on data protection suite. And it really, I think the strength and advantage of our portfolio is its breadth, breadth in terms of client operating environments, in terms of applications and databases, in terms of workloads and specifically use cases. So I mean, the breadth that we offer is unparalleled, pretty much whether Windows, Linux, OpenVMS, NetWare, kind of going back in time a long tail of kind of operating environments and then databases, right. So everything from SQL and Oracle and Sybase and DB2 to new types of databases, like the NoSQL or content store and key value store types of NoSQL schemas, if you will. And so, and then lastly is the word they use cases, right? So being able to protect data, whether that be data that's in a data center, out in remote or branch locations or data that's out in the cloud, right. And of course, increasingly customers are placing their data in a variety of locations; on Edge, on core data centers and in cloud environments. And we actually have over six exabytes of capacity under management, across public cloud environments. So pretty extensive deployment of our data protection suite in public clouds, you know, the leading hyperscalers, cloud environments and premises as well. >> So let's talk a little bit about the customer influence 'cause obviously there's a very cooperative relationship that Dell has with its customers that help you achieve things. Like, for example, I saw that according to IDC, Dell Technologies is number one in data protection, appliances, and software, leader in the Gartner Magic Quadrant for data center backup and recovery for over 20 years now. Talk to us a little bit more about that symbiotic customer, Dell relationship. >> Yeah, so it's a great question. We see our customers as strategic partners, and we really want to understand their business, their requirements. We engage on a quarterly basis with customers and partners in advisory councils. And then of course, we are always engaging with customers outside of those cycles on a kind of a one-on-one basis. And so we are really driving the innovation and the backlogs and the roadmap for data protection suite based upon customer feedback. And approximately 79% of the fortune 100 customers, our Dell data, Dell Technologies data protection customers. Now that's not to say that that's our only customer base. We have customers in commercial accounts, in mid-market in federal agencies, but, you know, we take our customer relationships really, really seriously, and we engage with them on a regular basis, both in a group forum to provide feedback as well as in a one-on-one basis. And we're building our roadmaps and our product release is based on feedback from customers, and again, know large customer base that we take very seriously. >> Right to the customer listening obviously it is critical for Dell. So you talked a little bit about what that cycle looks like in terms of quarterly meetings and then those individual meetings. What are some of the enhancements and advancements that customers have actually influenced? >> Yeah, so we, I mean, we, I think continuing to provide simplicity and ease of use is a key element of our portfolio and our strategy, right? So continuing to modernize and update the software in terms of workflows, in terms of, you know, common experiences also increasingly customers want to automate their data protection process. So really taking an API-first strategy for how we deliver capabilities to customers, continuing to expand our client database, hypervisor environments, continue to extend out our cloud support, you know, things like protection of cloud native applications with increasingly customers containerizing and building scale-out applications. We want to be able to protect Kubernetes environment. So that's kind of an area of focus for us. Another area of focus for us is going deeper with our key strategic partners, whether that'd be a cloud partner or a hypervisor partner. And then of course, customers, in fact, one of the top three things that we consistently hear from these councils that we do is the criticality of security, security and our data protection environment but the criticality of being able to be resilient from, and in the event of a cyber attack to be able to resilient recover from that cyber attack. So that is an area where we continue to make innovations and investments in the data protection suite as well. >> And that's so critical. One of the things that we saw in the last year, 15 months plus Laura, is this massive rise in ransomware. It's now a household word, the Colonial Pipeline for example, the meat packing plant, it's now many businesses knowing it's not, if we get attacked, but it's when. So having the ability to be resilient and recover that data is table stakes for, I imagine a business in any organization. I want to understand a little bit more. So you talked about tens of thousands of customers using Avamar and Networker. So now they have the capability of also expanding and using more of the suite. Talk to me a little bit about that. >> Yeah, so, I mean, I think it starts with the customer environment and what workloads and use cases they have. And because of the breadth of capabilities indeed the data protection suite, we really optimize the solution based upon their needs, right. So if they have a large portfolio of applications that they need to maintain but they're also building applications or systems for the future, we have a solution there. If they have a single hypervisor strategy or a multiple hypervisor strategy, we have a strategy there, if they have data that's on-premise and across a range of public clouds, one large customer we have as a, kind of three-plus one strategy around cloud. So they're leveraging three different public cloud, IS environments, and then they're also have their on-premise cloud environment. So, you know, we, it really starts with the customer workload and the data, and where it lives; whether that's be out in an Edge location in a remote or branch office, on an end point somewhere, they need to protect whether it be in a core data center or multiple data centers, or rather be in the cloud. That's how we think about optimizing the solution for the customers. >> Curious if you can give me any examples of customers maybe by industry that were, have been with Dell for a long time with Avamar and Networker for a long time and how they've expanded, being able to pick, as you say, as their, or as their environment grows and we've got, now this blur of right. It's now worked from anywhere, data centers, Edge. Talk to me about some customers examples that you think really articulate the value of what Dell is delivering. >> Yeah, so, I mean, I think one customer in the financial services sector comes to mind. They have a large amount of unstructured data that they need to protect, you know, petabytes, petabytes and petabytes of data they need to protect. And so I think that's one customer that comes to mind is someone we've been with for a long time, been partnering with for a long time. Another customer I mentioned in the, it was a kind of a three-letter software company that is a really strategic partner for us with on-premise, in the cloud. You know, healthcare is a big and important sector for Dell. We have integrations into kind of leading healthcare applications. So that's another big, whether they be a healthcare provider or a healthcare insurance company, and had a fourth example, but it's escaping my mind right now, but, I would say going back to the cyber discussion, I mean, one thing that we, where we see really customers looking for guidance from us around cyber recovery and cyber resilience is in what the, you know, of course president Biden just released this executive board on his mandate for ensuring that the federal agencies but also companies in the millisecond sector, sectors be able to ensure resilience from cyber attacks. So that's companies in financial services, that's companies in healthcare, energy, oil, and gas transportation, right. Obviously in companies and industries that are critical to our economy and our infrastructure. And so that has been an area where we've seen, recently in the last, I would say 12 months increased in engagement, you mentioned Colonial Pipeline, for example. So those are some high salient highlights I think of in terms of, you know, kind of key customers. But pretty much every sector. I mean, the U.S. government, all of the the agencies, whether they be civilian, or DOD or key kind of engagement partners of ours. >> Yeah, and as you said in the last year, what a year it's been. But really a business in every industry has got to be able to be resilient and recover when something happens. Can you talk a little bit about some of the specific enhancements that you guys have made to the suite? >> Yeah, sure. So, you know, we continue to enhance our hypervisor capabilities. So we continue to enhance not only the core VMware or hyperbaric capabilities but we continue to enhance some of the extensions or plugins that we have for those. So whether that be things like our VRealized plugin or a vCloud director plugin for say, VMware. So that's kind of a big focus for us. Continuing to enhance capabilities around leveraging the cloud for long-term retention. So that's another kind of enhancement area for us. But cloud in general is an ara where we continue to drive more and more enhancement. Improving performance in cloud environments for a variety of use cases, whether that be DR to the cloud, backup or replications of the cloud or backing up workloads that are already in the cloud. There's a key use cases for us, as well as the archive to cloud use cases. So there's just some examples or areas where we've driven enhancements and you can expect to see more, you know we have a six month release cadence for Avamar and Networker, and we continue with that momentum. And at the end of this month, we have the next major release of our data protection suite. And then six months later, we'll have the next update and so on and so forth. And we've been doing that actually for the last three to four years. This is a six month release cadence for data protection suite. We continue with that momentum. And like I said, simplicity and modernity, APIs and automation, extending our workloads and hypervisors and use cases. And then cloud is a big focusing area as well, as well as security and cyber resilience. >> Right, and so a lot of flexibility in choice for Avamar and Networker customers. As things change the world continues to pivot and we know it's absolutely essential to be able to recover that data. You mentioned 70, I think 79% of the Fortune 100 are using Dell technologies for data protection software. That's probably something that's only going to continue to grow. Lots of stuff coming up. As you mention, what are some of the things that you're personally excited about as the world starts to open up and you get to actually go out and engage with customers? >> I'm in just looking forward to like in-person meetings. I mean, I just loved going and trying to understand what problems the customers are trying to solve and how we can help address those. I think, you know, what I see customers sort of struggling with is how do they kind of manage their current environment while they're building for the future? So there's a lot of interest in questions around, how do they protect some of these new types of workloads, whether they're deployed on premise or in the public cloud. So that continues to be an area where we continue to engage with customers. I'm also really personally excited about the extensions that we're doing in our cyber recovery capabilities so as you can expect to hear more about some of those in the next 12 months, because we're really seeing that as a key driver to kind of increased policies around and implementations around data protection is because of these, you know, the needs to be able to be resilient from cyber attacks. I would say we're also doing some very interesting integrations with VMware. We're going to have some first and only announcements around VMware and managing protection for VMware, you know, VM environments. So you can look forward to hearing more about that. And we have customers that have deployed our data protection solutions at scale. One customer has 150,000 clients who they're protecting with our data protection offerings, 150,000. And so we're continuing to improve the, and enhance the products to meet those kinds of scale requirements. And I'm excited by the fact that we've had this long standing relationship with this one particular customer and continue to help in flowing up where their needs go. >> And that's something that even a great job of talking about is just not just a longstanding relationships but really that dedication that Dell has to innovating with its customers. Laura, thank you for sharing some of the updates of what's new, what you're continuing to do with customers, and what you're looking forward to in the future. It sounds like we might hear some news around the VMworld timeframe. >> Yes, I think so. >> All right, Laura, thank you so much for joining me today. Appreciate your time. >> Yeah, it's been great to be here. Thanks so much. >> Excellent from Laura Dubois and Lisa Martin, you're watching this Cube Conversation. (soft music)
SUMMARY :
Welcome to this Cube it's just fantastic to be here and the enhancements that Dell is making and the need to be able to have an always Absolutely, and make sure Yeah, I mean, so, So I mean, the breadth that that according to IDC, and the roadmap for data protection suite What are some of the and in the event of a cyber attack So having the ability to be resilient of applications that they need to maintain that you think really articulate the value that they need to protect, Yeah, and as you said in the last year, And at the end of this month, 79% of the Fortune 100 the needs to be able to be continuing to do with customers, All right, Laura, thank you to be here. Dubois and Lisa Martin,
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Laura | PERSON | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
Stu Miniman | PERSON | 0.99+ |
2015 | DATE | 0.99+ |
John Troyer | PERSON | 0.99+ |
Umair Khan | PERSON | 0.99+ |
Laura Dubois | PERSON | 0.99+ |
Keith Townsend | PERSON | 0.99+ |
1965 | DATE | 0.99+ |
Keith | PERSON | 0.99+ |
Laura Dubois | PERSON | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
Emil | PERSON | 0.99+ |
Cloud Native Computing Foundation | ORGANIZATION | 0.99+ |
Fidelity | ORGANIZATION | 0.99+ |
Lisa | PERSON | 0.99+ |
1946 | DATE | 0.99+ |
10 seconds | QUANTITY | 0.99+ |
2020 | DATE | 0.99+ |
2019 | DATE | 0.99+ |
Amr Abdelhalem | PERSON | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Red Hat | ORGANIZATION | 0.99+ |
Kapil Thangavelu | PERSON | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
San Diego | LOCATION | 0.99+ |
10 feet | QUANTITY | 0.99+ |
Avamar | ORGANIZATION | 0.99+ |
Amr | PERSON | 0.99+ |
One | QUANTITY | 0.99+ |
San Diego, California | LOCATION | 0.99+ |
12 months | QUANTITY | 0.99+ |
one tool | QUANTITY | 0.99+ |
Fidelity Investments | ORGANIZATION | 0.99+ |
tens of thousands | QUANTITY | 0.99+ |
Oracle | ORGANIZATION | 0.99+ |
thousands | QUANTITY | 0.99+ |
one repository | QUANTITY | 0.99+ |
Lambda | TITLE | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
Tens of thousands | QUANTITY | 0.99+ |
six month | QUANTITY | 0.99+ |
8000 people | QUANTITY | 0.99+ |
next year | DATE | 0.99+ |
10,000 developers | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
214 | OTHER | 0.99+ |
six months later | DATE | 0.99+ |
C two | TITLE | 0.99+ |
today | DATE | 0.99+ |
fourth year | QUANTITY | 0.99+ |
three | QUANTITY | 0.99+ |
NoSQL | TITLE | 0.99+ |
CNCF | ORGANIZATION | 0.99+ |
one | QUANTITY | 0.99+ |
150,000 | QUANTITY | 0.99+ |
79% | QUANTITY | 0.99+ |
KubeCon | EVENT | 0.99+ |
2022 | DATE | 0.99+ |
OpenVMS | TITLE | 0.99+ |
Networker | ORGANIZATION | 0.99+ |
GitOps | TITLE | 0.99+ |
DOD | ORGANIZATION | 0.99+ |
Rajesh Janey, Dell Technologies, Uptal Bakshi & Satish Yadavali, Wipro | Dell Technologies World '20
>> Narrator: From around the globe it's theCUBE with digital coverage of Dell Technologies World. Digital experience brought to you by Dell Technologies. >> Welcome back everybody. Jeff Frick here with theCUBE. Welcome back to our ongoing coverage of Dell Technology World. We've been covering Dell Tech World since it started really. It used to just be Dell World and there was EMC World after the merger and this is the all virtual version but we're excited to be here and we've got a great panel coming up. I think you're going to enjoy it. Our first guest is Rajesh Janey. He is the Senior Vice President of Global Alliances for APJ for Dell Technologies. Rajesh, where are you coming in from today? >> I'm speaking to you from Gurgaon, India. >> Awesome. It's the power of the virtual, right? It's not all bad that we don't have to get on planes all the time. >> Absolutely. >> And joining him is Utpal Bakshi. He is the Vice President and Global Vertical Head High Tech for Wipro. Utpal, good to see you. >> Nice to see you. >> And where are you calling us in from? >> I'm from Dallas, Texas. Actually suburb outside of Dallas called South Lake. >> Oh, excellent. Great to see you and again didn't have to get on a plane to do this so not all bad. And also joining us is Satish Yadavalli. He is the Vice President and Global Practice Head, Cloud and Infrastructure Services for Wipro. Satish, where are you joining us from? >> Hi, I'm joining from Bangalore, India. >> Excellent. Welcome. So gentlemen let's just jump into it. Wipro's a huge services firm, does a lot of work with Dell so I wonder Rajesh if you can talk really about the importance of partnerships and the importance of having somebody like Wipro within the Dell ecosystem. >> Absolutely. Thank you for having us on with Wipro. Wipro and we have had a partnership which is over two decades old and we have a multifaceted 360 degree kind of relationship with Wipro. Wipro is a platinum partner and what's more while we bring a lot of technology and products and the depth of product which are relevant to customer's transformation scenarios today, coupled with Wipro's consulting and services and design abilities this becomes an unbeatable power house so to say whereby we can work closely with a customer to help them transform and live in what we are calling the next normal. >> Yeah that's great. Utpal to you there's a lot of interesting trends going on. We've had cloud and big data been going on for a lot but really the talk in social media is what's driving your digital transformation, the CEO, the CIO or COVID and we all know what the answer is. So we've got a lot of new stuff in terms of digital transformation, working from anywhere, workforce transformation. Wonder if you can speak a little bit about how COVID has accelerated some of the priorities that your customers are trying to get done. >> Yeah. I think that's a great point. Wipro has been transforming over the last several years. We were a strong, large scale system integration partner, large IT organization but over the last several years we pivoted hard into the digital transformation world moving into the design side, leading the design, moving to cloud and helping our clients help make that journey and all of that got accelerated with the whole COVID situation. The work from home became all pervasive and the whole virtualization of the workforce really pivoted with some of our key transformational ideas around live workspace and the virtual desk which we've been working very closely with Dell have taken shape. So that has been a big part of our ongoing strategy. Doing the modernization off the network has also accelerated the customer networks and infrastructure was not necessarily set up for enabling these hybrid work environment. A lot of our clients are coming back and saying they want to modernize and actually accelerate. So that has all changed with COVID. Some of it is very positive actually for the business. >> Right. >> From an SI perspective. >> Satish, you've got cloud and infrastructure in your title. Public cloud really changed the game when Amazon kind of came on the scene and now we're seeing this evolution and change over time between a public cloud and hybrid cloud and multi cloud and cloud on cloud. I wonder if you could speak to and then even have an AWS inside of other people's clouds. They're trying to get it out there. The evolution of cloud both as a technology but really more as a way of thinking in terms of rapid deployment of new functionality to support the business and what you're seeing with your customers today. >> So let me share a perspective, right? Enterprises today are looking at options to extract greater value from hybrid cloud investment. It's a brownfield environment today where customers have their existing data centers but the hyperscalers have really come into play now and right cloud is the strategy which most of our customers embrace to address the market demands which are primarily focused on business outcomes today. As Wipro we have invested in developing a holistic extensible platform led approach called Wipro BoundaryLess Enterprise to drive business outcomes to customers. So the BLE construct is all about providing a ready to use plug-and-play platforms making IT easily consumable from multiple stakeholder personas be it admins, be it line of businesses, developers and partners. So basically we have built a holistic solution and our BLE solutions has majorly five building blocks. The first building block would be the BoundaryLess Data Center. The second is the BoundaryLess Container Platform. The third is the BoundaryLess Data Protection Platform. The fourth is the BoundaryLess Cloud Exchange where we get together all the internet connections and define the software defined network part to give access to the workloads across hybrid environments and the BoundaryLess Integration Platform which we call it as BLIP. Basically this is what we have put together to deliver an outcome to the customers powered by BLE. >> So BLE again, you call it the BoundaryLess Enterprise. What's the most important components of BLE? What are the things that most people are missing to actually implement the strategy? >> So if I actually build on you, right? The five building blocks let me elaborate in detail. The first is on the BoundaryLess Data Center. This enables our clients to deliver an infrastructure as a service across data centers and public clouds and enables customers to seamlessly move workloads from Edge to Cloud and manage them in a consistent and efficient model. That's the first building block of our BLE. The second important building block is container, right? We all know today container orchestration is key across hybrid cloud and with micro services and architectures becoming more prominent we see huge search for managing various Kubernetes enrollments with our clients. So our BLCP platform leverages solutions like VMware Tanzu, which is again a Dell company to enable clients manage the multicloud Kubernetes enrollments through a single pane of glass and provide seamless migration and movement of workloads across cloud environments. That's going to be the key in the future with microservices being dominant and every enterprise embracing microservices architectures this becomes very important building block in our overall solution. The third important stuff is BoundaryLess Data Protection. Now that data is all cross in hybrid cloud environment and application actually consume this data it is important to protect the data which is intellectual property and very critical to every business. So with the BLDP platform we ensure that we deliver availability, solidarity, security and reliability of cloud adoption increasingly and rapidly across multicloud platforms. So our solution leverages the DTC of Dell and other existing Dell storages and data production solutions to offer seamless and right cost models which will be very critical for any cloud transformation and schedules as we move forward. The fourth point which I was talking about is BLCE. This is basically a cloud exchange where in a hybrid cloud environment you need to establish connectivities across PaaS and SaaS platforms as well as on-premise networks to provide seamless access to data and the workloads which are in multicloud scenarios. So that's about BLCE. With respect to BLIP it is an integration platform. Today we are in a software defined world and when I talk about providing a single pane of glass solution it is important for us to have an integration platform where I can bring all EPIs together and do northbound and southbound integrations with the architectures of clients and the cloud providers to spin off workloads, to commission, decommission and provide a seamless consumption experience to clients across multiple hyperscalers and on-premise infrastructure. >> Thank you for that summary. I think you hit on all the big trends. I want to go back to you Rajesh 'cause you said that this is a really unique time. You've been in the business for a very long time. You've seen a lot of other transformations and you've seen a lot of big trends. Why is this one different? What makes where we are today such a unique point in time in this IT industry journey? >> Excellent. I think I would say we are in a period of what is called an enforced innovation. While most of the time transformation in IT has been very, very sequential or continuous I think we are seeing an order of shift in the transformation and this whole situation is forcing everyone to accelerate the pace of innovation and transformation. There are two key priorities for every organization in this time. One, build resilient operations and second employee safety. These two parameters have forced the organization to look at their businesses differently, look at their IT infrastructure differently and created a sort of opportunity you can say which is ripe for Wipro's BoundaryLess Enterprise because there are no boundaries. People are working from home. They're no longer in an office confined or boundary. So that's smart. Coming back we are seeing an accelerated innovation. That means our partnership to deliver customer transformation at scale becomes all the more important. Bringing all the good technologies of Dell on one side and combining it Wipro's size, scale and services help us lead in the marketplace for customer transformation. And what's more, we are adding our Dell financial services solutions as Dell Tech on demand to enable all this to be consumed as a service and with flexible payment options which Wipro helps us translate it to customer offerings. >> That's great. Utpal, I want to go to you and get your perspective on how customers, in terms of this boundaryless, how things have changed since March 15th which at least here in the US, I don't know if in India it was on the same date when everything basically got shut down. So it was this light switch moment. Everybody worked from home, no planning, no thought like ready, set, go to now we're six, seven, eight months into this thing and clearly we're it's a marathon not a sprint and even if we go back to some semblance of what was the old normal the new normal is going to be different and everyone is not going to go back to work full time like they did before. So how, from a customer perspective, from a technology implementation perspective and from an initiative and getting this stuff done how has that changed pre-COVID then oh my goodness, it's the light switch moment and now it's, hey, we're in this for the long term. >> Yeah. I think Rajesh did hit upon that a little bit. This is truly that moment where it was a forced innovation. Some of it was happening anyways and it was bound to happen but I think the COVID kind of accelerated all of it. What has impacted is it all started with, okay, how do we enable work from home? And that is when the whole BoundaryLess infrastructure, the virtual desk solutions and all of that started getting impact. I think after that most companies have realized that this is not a short term fix. It is a longterm it's going to be here for staying so they wanted to have a longterm fix so they wanted to come in with innovation but at the same time from a business perspective they've had impact in business so they wanted very creative business models for them to get set with the technology innovation quicker but they didn't want to do it in a traditional way of paying it all upfront and moving it to that. So that is where the creativity in terms of joint innovation which we did with Dell, in flexible payment options, bringing in some kind of an asset lease model and things like that have gained traction. A lot more conversations are around we want to transform help us find a way to make the transformation sooner with maybe less investment upfront and find a way to fund this from the future savings we'll get so that we can be ready for the future without necessarily impacting the bottom line today. All of that has changed, I would say in summary, has accelerated the adoption and the rate of change but it has also led to all of us thinking some creative business models and new approaches to doing business. >> Right, right. Satish back to you. What are the big conflicts that always exist? There's innovation versus security, right? And enabling innovation and giving people more power, more tools, more data to do things at the same time now your tax surface has increased you don't necessarily have everybody locked down on their home infrastructure and they were forced into this. When people are talking about digital transformation, how do they continue to drive forward and how are you helping them on innovation and enabling innovation at the same time as you talked about keeping the data protected and really thinking about business resiliency and continuity in this to increase the tax surface not only because of mobile, but now with the working from home thing? It's increased exponentially. >> Yeah. So I would just take an example of how Wipro handled this pandemic when it hit us and what solutions we get. So let me just give you a perspective. As we all know the current pandemic has disrupted many industries and we were no exception. Basically COVID has brought to the forefront many crucial factors in terms of business continuity process, the quality of employee experience and the automation connected with the employees. So while we enable our employees to connect, collaborate, and communicate with ease from anywhere from any device in a secure way with a consistent user experience powered by Wipro LiVE Workspace platform which actually takes care of delivering a seamless onboarding of user via the Wipro LiVE Workspace platform and consume all the services the way they used to traditionally consume when they were working from office? So this is something which is the power of Wipro LiVe Workspace platform we have implemented to deliver a seamless employee experience access to the workspaces. That's one but also there are some learnings. When we implemented the solutions on the flip side as businesses we must also acknowledge and be cognizant of the fact that employees are trying hard to juggle between frequent interruptions at home and notifications from various applications we receive both on corporate and personal devices. Basically in a nut shell it is difficult to have the culture of corporate to be working from home. Basically that's another big learning. While all of us are adjusting to this new normal we are in constant touch with our employees and trying to improve the overall employee connect and experience. From a solution perspective let me just give you what we actually did. We have close to 175,000 employees across the globe. Suddenly started working from home post lockdown. What does this mean? The traffic pattern suddenly changed the directions which were traditionally moving on a East to West direction started moving North to South. Basically this means a 100% of the workforce in a corporate started coming from the internet to access the corporate infrastructure and then gain access to the customer network. So basically we had to quickly swing in with our solutions and got our engineering teams to re engineer and tweet the infrastructure and security architecture to this new normal. By leveraging our Wipro BLE and video architectures which is powered by Dell VxRail, NSX we were able to spin off and build capacity on on-prem as well as on cloud in less than 24 hours post one got approvals from the client. Lastly we also deployed a back to work IoT solution which helped our employees to get back to work safely. Basically the solution offers various security parameters. Apart from traditional COVID updates it also helps in scanning the employees' temperatures, employee movement within the office premises, bundled with video analytics and enables secure touch less access to the ODCs for employees who are coming back to work. So we are putting all these solutions together and we pretty much seamlessly were able to navigate from the pandemic situation and get our business back to operations in a matter of days. >> 175,000 People. It's really interesting to think about how that network traffic completely changed from inside the firewalls to everything coming from the outside. It's a lot of people to get working from home right away so congratulations on that. As we come to a close Rajesh, I want to come back to you and talk about again, partnership in the age of this rapid acceleration of technology adoption, new technology move. We talked about the work from home. We've talked about cloud. We haven't talked very much about there's this other big thing that's coming down the pike which is 5G and IoT and kind of this entirely new scale of communication that's machine to machine, not person to person and now these connected devices. The amount of traffic continues to go up into the right at an accelerating rate. Tell us a little bit about the meaningfulness of having a partnership like Wipro that you guys can build solutions around new cutting edge technologies and have that real close connection with the customer or with all the supporting services. >> We'd love to. And maybe first I'll give you a perspective on how our employee base started working from home. Some other statistics that they wanted to show maybe add on towards what Satish said. We transitioned 120,000 employees. Twice the normal to work from home within two weeks and every day we are running something like 20,000 meetings and 16 million zoom minutes per day. That's the kind of traffic IT has seen. >> 16 million zoom minutes per day? >> Zoom minutes per day. >> Wow. >> That's the kind of traffic and our VPN traffic user load just tripled. At software or IT we call Dell digital. It was just a smooth and seamless experience. Now coming back, you said rightly. While we have partnered so far to deliver to the solution which are here today and the customers needs which are here today, what are we going to do for the future needs especially ie 5G IoT? We believe as a corporation that Edge is going to be the next wave of innovation. And next way our customers will benefit. Therefore connectivity to Edge via 5G becomes critical. IoT devices and managing the traffic and contain it there itself rather than flowing it back to data center becomes critical. As an example Wipro and Dell technologies are using our hyper converge solutions along with VMware telco and software for a European telco to provide automation and AI to deliver rapid results for the customer. So these are just early parts of it. We are partnering with Wipro to build solutions around 5G as well as telecom related innovation that'll come into the picture. IoT Satish spoke about a simple example of employee attendance. Imagine this is a need which will only accelerate from every organization, multiply it with the automation and AI that needs to be built into machines and feeding all the data back to drive some intelligence and refine the processes, refine the business outcomes. So I think we are working together on many such things and what's important is in all this, when the universe just explodes to devices and millions of devices, security becomes a paramount feature and we are working with Wipro to build what is called an embedded security into each of the solutions that we are designing. Security cannot be an afterthought or a bolt on it's becoming an integral part of the overall solution as we move towards the Edge. >> Yeah, right. And I think as Satish talked about all the distractions and notifications there're a lot of great opportunities for applied AI too to help people know what to do next. It's hard to be context switching all the time, not only on your work, but also the spouses working from home, the kids are doing homeschooling. It's not an optimal environment at all. Gentlemen thank you for your time. Congratulations on your partnership and hope you have a fantastic Dell Tech World. Sorry we can't be in person but this is not too bad. >> Thank you. >> Jeff >> Thank you >> Thank you Utpal, thank you Satish for your partnership. >> All right. Thank you gentlemen. >> Thank you. >> Alright. Stay with us for continuing coverage of Dell Technologies World 2020. I'm Jeff Frick. Thanks for watching. (upbeat music)
SUMMARY :
to you by Dell Technologies. and this is the all virtual version I'm speaking to you It's the power of the virtual, right? He is the Vice President I'm from Dallas, Texas. and again didn't have to and the importance of and products and the depth of product and we all know what the answer is. and the virtual desk and cloud on cloud. and the BoundaryLess Integration Platform What are the things that and the workloads which are You've been in the business and with flexible payment options the new normal is going to be different and the rate of change and continuity in this to and be cognizant of the fact that and kind of this entirely Twice the normal to work and AI that needs to and hope you have a Thank you Utpal, thank you Thank you gentlemen. of Dell Technologies World 2020.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Rajesh Janey | PERSON | 0.99+ |
US | LOCATION | 0.99+ |
Satish Yadavalli | PERSON | 0.99+ |
India | LOCATION | 0.99+ |
Jeff | PERSON | 0.99+ |
Satish | PERSON | 0.99+ |
Rajesh | PERSON | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
Jeff Frick | PERSON | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Wipro | ORGANIZATION | 0.99+ |
Satish Yadavali | PERSON | 0.99+ |
Utpal | PERSON | 0.99+ |
Twice | QUANTITY | 0.99+ |
six | QUANTITY | 0.99+ |
Dallas, Texas | LOCATION | 0.99+ |
Bangalore, India | LOCATION | 0.99+ |
Dallas | LOCATION | 0.99+ |
100% | QUANTITY | 0.99+ |
20,000 meetings | QUANTITY | 0.99+ |
seven | QUANTITY | 0.99+ |
Utpal Bakshi | PERSON | 0.99+ |
Gurgaon, India | LOCATION | 0.99+ |
Edge | ORGANIZATION | 0.99+ |
March 15th | DATE | 0.99+ |
South Lake | LOCATION | 0.99+ |
each | QUANTITY | 0.99+ |
third | QUANTITY | 0.99+ |
first | QUANTITY | 0.99+ |
fourth | QUANTITY | 0.99+ |
today | DATE | 0.99+ |
five building blocks | QUANTITY | 0.99+ |
120,000 employees | QUANTITY | 0.99+ |
eight months | QUANTITY | 0.99+ |
360 degree | QUANTITY | 0.99+ |
Today | DATE | 0.99+ |
first guest | QUANTITY | 0.99+ |
second | QUANTITY | 0.99+ |
less than 24 hours | QUANTITY | 0.99+ |
both | QUANTITY | 0.98+ |
fourth point | QUANTITY | 0.98+ |
Dell Technologies World | ORGANIZATION | 0.98+ |
Dell Tech | ORGANIZATION | 0.98+ |
two weeks | QUANTITY | 0.97+ |
two key | QUANTITY | 0.97+ |
pandemic | EVENT | 0.96+ |
Uptal Bakshi | PERSON | 0.95+ |
millions of devices | QUANTITY | 0.95+ |
One | QUANTITY | 0.94+ |
Tom Spoonemore, VMware and Efri Natel Shay, Dell Technologies | VMworld 2020
(bright music) >> Announcer: From around the globe, it's "theCUBE", with digital coverage of VMworld 2020, brought to you by VMware and its ecosystem partners. >> Welcome back, I'm Stu Miniman, and this is "theCUBE's" coverage of VMworld 2020. Of course, such a broad ecosystem in the VMware environment. Been talking a lot, of course, this year, about what's happened in the Cloud Native space. vSphere 7 has Kubernetes coming into the virtualized environment. And one of those key pieces of doing cloud is you need to make sure data protection still works. And, of course, VMware has a long history working with lots of companies. In this segment, we're going to be digging into the VMware, and Dell, also, solution for data protection. So, happy to welcome to the program. First, I have, from VMware, Tom Spoonemore. He is a product line manager for Modern Application Platform with VMware, and welcome back to the program, one of our CUBE alumnis, Efri Nattel-Shay, who is with Dell technologies, Director of Data Protection and Cloud Native apps. Efri, welcome back, Tom, welcome to the program. >> Thank you very much, it's good to be here. >> So, Tom, I kind of teed it up in my intro. VMware, for the longest time, for as long as I can remember, we've really talked about that ecosystem, those joint solutions. I remember, back when we started "theCUBE", in 2010, you'd go there and it would be, oh, there's $15, no, $20, for every dollar that you spend on VMware that the ecosystem kind of pulls along. When VMware started building the VMware Cloud Foundation and the VMware cloud solutions, data protection really went along with it. So, the integrations that they done with vSphere hold them in there as the environment. Tanzu Kubernetes, there's a lot of new pieces. But I think some of those principles have stayed the same. So, why don't you start us off. Tell us a little bit, philosophically, how is VMware treating this space, and how data protection fills into it, and then, Efri, we'll get your take on it, too. >> Yeah, sure, absolutely. So, from the perspective of VMware and the ecosystem, as you say, we want to be very inclusive. We want to bring the ecosystem and our partners along with what we're doing, regardless of what space it is, and in the Modern Applications Platform and Cloud Native tooling, we're very much thinking along the same lines. And as it relates to data protection in specific, Cloud Native is a place where, mainly it's been thought of as a place for stateless applications. but what we're seeing in people's deployments is more and more stateful applications are beginning to move to Kubernetes and into containers. And so the question then becomes, what do you do for data protection of those applications that are deployed into Kubernetes? And so, with Tanzu, and specifically Tanzu Mission Control, we have included a data protection capability, along with the other capabilities that come with Mission Control, that allows you to provide data protection for your fleet of Kubernetes clusters, regardless of which distribution, regardless of which cloud they're running on, and regardless of how many teams you might have running on a particular cluster or set of clusters. And so, for this reason, we have introduced a data protection capability that is focused around our open source project called Velero and Mission Control operates Velero in your clusters from a central UI API and CLI. That allows you to do data protection, initiating schedules of backups, doing restores, and even migration from cloud to cloud, from a single control point. And part of this vision is not only providing an API that we can handle directly with our own Velero-based implementation, but also opening that up to partners. And this is where we're working with Dell, specifically, to be able to provide that single API, but yet have Dell, for instance, with their PowerProtect solution, be able to plug in and be a data protection provider underneath Tanzu Mission Control. And so, that's the work that we're doing together to help satisfy this vision that we have for data protection in the Cloud Native space. >> Yeah, agree 100% with Tom. Like Tom has said, when we looked at customer environments three years ago, people talk mainly about stateless applications, but over time, when more storage solutions, persistent data solutions came along, there came the need to, not only provision the data, but also protect it, and be able to do backups, and restores, and cyber recovery solutions, and disaster recovery, and the whole set of use cases that allow a full life cycle of data along the Cloud Native set of applications, not just a traditional one. And what we've seen, we're talking, obviously, with a lot of customers, joint customers with VMware, customers that use our storage solutions, as well as others, on-prem and in the cloud. And what they have shown, to say, there, is that you have the IT infrastructure people on one hand, which have certain needs, and there is the new set of users, the DevOps people, who are writing applications in a new way, and they need to communicate and they need a solution that fits both of them. So, with VMware, with the community, with Velero, we are introducing a solution that is capable of doing both management for the DevOps people, as well as for the other team infrastructure. And, a year ago, we have talked about this coming up, and now it's really there, and it's doing great. >> Oh, Efri, I'm so glad you brought up some of those organizational issues, because it's not just, oh, we have some new applications, and, of course, we need to do data protection. Can you bring us inside a little bit? Your customers, are they aware of what they need to do? Is it central IT that's coming over and telling the DevOps team, hey, don't forget, security, data protection, still super important. How does that engagement go, and what change does that have for the Dell field and the channel? >> Yeah, I think that the more successful organizations really have that kind of dialogue. So, the developers are not operating in silos. They're not doing things themselves. They do, some of the use cases, they do need to copy data for their own use, but they understand that there are also organizational needs. Someone needs to sign the audit pass, the SLAs are in compliance, the regulations are met. So, all of these things, someone needs to do them. And there is a mutual recognition that there is a role for these people and for these people, for these use cases and for these use cases. >> Yeah, I would agree with that. One of the things that we're seeing, particularly as you think about Kubernetes as a multitenant kind of platform, what we're seeing is that central IT operations still wants to make sure that backups are happening with stateful applications, but more and more they're relying on and providing self-service capabilities to line of business and DevOps, to be able to back up their applications in the way that's best for those applications. It's a recognition of domain expertise for a particular application. So, what we've done with Mission Control is allowed central IT to define policy. And those policies then give the framework, or guidelines, if you will, that then allow the DevOps teams to make the best choices within their own field of expertise and for their own applications. >> Yeah, and what we've seen is some of the organizations really like full control over central IT, and some customers have told us, don't give anything to the developers, but most of them are asking for some self-service capabilities for the developers. But then, who is setting the policy? Who is saying, okay, I have a gold policy data protection? Does it mean I replicate to another side? Does it mean I do longterm retention for a month, or for a year? That is for someone in central IT to set up. So, saying what the policy means, or what it actually is, is the job of a central IT, whereas, this application needs application consistency, and it is of gold policy, that oftentimes is the best knowledge and domain expertise of the developer. >> So, Tom, you mentioned Tanzu Mission Control, which is the management solution. Tanzu is a portfolio. Can you help walk us through the relevant pieces here that are part of this joint solution? >> Yeah, sure. So, Tanzu is really a portfolio of applications, or a portfolio of solutions, as you've said. It's really along three main pillars. It's what we call, build, run and manage. Tanzu Mission Control fills in, along with our Tanzu Observability and Tanzu Service Mesh, in our manage pillar. The build pillar is more along the lines of supporting developing of modern applications, developing and deploying modern applications. So, many of the technologies that have come from our acquisitions of Pivotal, as well as Bitnami, make up that pillar, and these are technologies that are coming to fore, and you'll hear more and more about at this VM world and going forward. Our run pillar is really where you'll find Tanzu Kubernetes Grid. Now, this is our distribution, but it's more than just a distribution of Kubernetes. It's a distribution of Kubernetes, along with all the tools that you would need to be able to deploy modern applications. So, all of these three pillars come together, along with services provided by Pivotal labs, to really give you a full, multifaceted platform for deploying and operating modern applications. >> Great, and Efri, where are there integrations there? How does the storage fit in has been a discussion we've been having for a few years% when it comes to Kubernetes. >> Yeah, basically, PowerProtect integrates with all of these levels that Tom has mentioned, starting with the lowest levels of integration. With the storage, VMware has Cloud Native storage solutions, which allow things like incremental snapshots to be taken from the environment. And we're using this mechanism in order to copy data efficiently from TKG, Tanzu Kubernetes Grid, environment, out of the cluster, into a space-efficient data domain, as a target site. So, that's a storage integration. Then, there is qualification and support for the various run environments that Tom has mentioned, the Tanzu Kubernetes Grid, and Tanzu Kubernetes Grid Integrated, as well as things that we're working with VMware in order to enable protection for what has been called the Project Pacific, which really allows you very sophisticated capabilities of running multiple Kubernetes clusters using the Kubernetes cluster API capabilities. So, you can spin up a cluster very, very quickly by VMware. And then, we can take backups of this environment up to data domain target site. And, finally, working with Tom for tons of amount of time and effort to do the integration between Tanzu Mission Control and PowerProtect. So, allowing cloud, multicloud, multilocation environments to be provisioned and monitoring by Tanzu Mission Control, but also protected using PowerProtect. >> Yeah, so, Tom, we talked about supporting the ecosystem, and it's a much faster cadence now than it was in the past. It used to be, it felt like every other year at VMworld, we got together and talked about the major vSphere release. Of course, in the container, in Kubernetes world, we're having a much faster cadence. So, could you just help us understand, what of this is generally available today? We saw vSphere 7 back in the spring. The update, right ahead of VMworld, that really extended Kubernetes beyond just VCF, to be able to be an all vSphere 7 environment. So, we know some of this is here on the roadmap, so help map this out for us, what's here today from VMware and what the timeline is we expect for all of these pieces we've been discussing. >> Yeah, absolutely. So, Mission Control shipped in March. So we're still relatively new, but as you say, we run Cloud Native ourselves, and so we're releasing new features, new capabilities. literally every week. We have a weekly cadence for release. Our data protection capability was just introduced at the end of June, so it's fairly new, and we are still introducing capabilities, like bring your own storage, doing scheduling of backups, and this kind of thing. You'll see us adding more and more cloud providers. We have been working to open up the platform to make it available to partners. And this is, just generally, with Mission Control, across the board, but specifically, when it comes to Dell, and PowerProtect, the data protection capability, this is something that we are still actively working on, and it is past the architecture stage, but it's probably still a little ways out before we can deliver on it, but we are working on it diligently, and definitely expect to have that in the product, and available, and really providing a basis for integrations with other providers as well. >> Yeah, and in terms of PowerProtect, we have told the audience about a tech preview a year ago, and since then we have released a number of releases. We are having a quarterly cadence. So, it is available for the general consumption for quite some time. Talking about the integration layers that we have mentioned before, we are the first stack to protect VMs and Kubernetes and applications using the same platform, the same UI, the same policies, everything looks the same. And we have recently introduced capabilities such as application consistency for a number of applications. The support for TKG is available for now. And, as Tom has said, we are working on further integrations, such as the integration with Tanzu Mission Control with VMware. >> Wonderful, I want to get a final word from both of you. Efri, we'll start with you. We've got this regular cadence coming up. We know we're only a couple of weeks away from DTWE, the Dell Technology World Experience, where, of course, theCUBE will be there. What should we look for the rest of 2020, or any final comments that you have for customers that might be looking at this environment? >> Sure, I think that, two trends that I'm seeing, and they're just getting stronger over the years. The first thing is multicloud, and multicloud means many things to different people, but, basically, every customer that we are speaking to is talking about, I want to run things on-prem, but I also need to run these workloads in the hyperscaler. And I need to move from one hyperscaler region to another, or between hyperscalers, and they want to run this distribution here, and the other distribution there. And there are many combinations of stacks and Database-as-a-Service and other components of the infrastructure that different developers are using on-prem and in the cloud. So, I expect this to go even further, and solutions like PowerProtect and TKG can help customers to do that job, and, of course, Tanzu Mission Control, to monitor and manage this environment. Secondly, I think that protection is going to follow more the workloads. So, application is no longer the VM. Obviously, it's becoming many different components that are starting to span across locations and across environments. And again, the protection nature of these is going to change according to where and how these workloads are being provisioned. >> Yeah, and I would say the same thing about Mission Control, very much multicloud-focused, Today it's largely an AWS-focused solution. We're changing to add more flexible storage options, more clouds. Azure is something that we'll be doing in the short term, Google Cloud platform and Google Cloud Storage after that, as well as just the ability to use your own on-prem storage for your backup targets. Also, we're going to be focusing on driving more policy-driven backup. So, being able to define policies for groups of clusters, define RTO and RPO for groups of clusters, allowing Mission Control to help determine what the individual backup policy should be for that particular asset. And continuing to work with Dell and other partners to help extend our platform and open it up for other data protection providers. >> Tom and Efri, thanks so much for the updates. Tom, welcome to being a CUBE alumni, and Efri, I'm sure we'll be seeing you in the team, in the near future. >> Thank you. >> Thank you so much. >> Stay with us for more coverage from VMworld 2020. I'm Stu Miniman, and as always, thank you for watching theCUBE. (bright music)
SUMMARY :
brought to you by VMware in the VMware environment. it's good to be here. and the VMware cloud solutions, and in the Modern Applications Platform and the whole set of use cases and telling the DevOps So, the developers are One of the things that we're seeing, that oftentimes is the best the relevant pieces here So, many of the How does the storage fit and effort to do the integration Of course, in the container, and it is past the architecture stage, and since then we have the Dell Technology World Experience, and the other distribution there. be doing in the short term, in the near future. I'm Stu Miniman, and as always,
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Tom | PERSON | 0.99+ |
Efri | PERSON | 0.99+ |
Tom Spoonemore | PERSON | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
$15 | QUANTITY | 0.99+ |
$20 | QUANTITY | 0.99+ |
VMware | ORGANIZATION | 0.99+ |
Stu Miniman | PERSON | 0.99+ |
March | DATE | 0.99+ |
Tanzu | ORGANIZATION | 0.99+ |
100% | QUANTITY | 0.99+ |
Efri Nattel-Shay | PERSON | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
2010 | DATE | 0.99+ |
vSphere 7 | TITLE | 0.99+ |
First | QUANTITY | 0.99+ |
both | QUANTITY | 0.99+ |
a year ago | DATE | 0.99+ |
end of June | DATE | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
a year | QUANTITY | 0.99+ |
CUBE | ORGANIZATION | 0.98+ |
three years ago | DATE | 0.98+ |
this year | DATE | 0.98+ |
VMware Cloud Foundation | ORGANIZATION | 0.98+ |
TKG | ORGANIZATION | 0.98+ |
VMworld | ORGANIZATION | 0.98+ |
One | QUANTITY | 0.98+ |
Cloud Native | TITLE | 0.98+ |
vSphere | TITLE | 0.98+ |
Tanzu Kubernetes Grid | TITLE | 0.98+ |
first stack | QUANTITY | 0.98+ |
today | DATE | 0.98+ |
a month | QUANTITY | 0.97+ |
Velero | ORGANIZATION | 0.97+ |
Today | DATE | 0.97+ |
2020 | DATE | 0.97+ |
Secondly | QUANTITY | 0.97+ |
Velero | TITLE | 0.95+ |
two trends | QUANTITY | 0.94+ |
PowerProtect | TITLE | 0.93+ |
Tanzu Mission Control | ORGANIZATION | 0.93+ |
VMworld 2020 | EVENT | 0.91+ |
Pivotal | ORGANIZATION | 0.91+ |
Krishna Cheriath, Bristol Myers Squibb | MITCDOIQ 2020
>> From the Cube Studios in Palo Alto in Boston, connecting with thought leaders all around the world, this is a Cube Conversation. >> Hi everyone, this is Dave Vellante and welcome back to the Cube's coverage of the MIT CDOIQ. God, we've been covering this show since probably 2013, really trying to understand the intersection of data and organizations and data quality and how that's evolved over time. And with me to discuss these issues is Krishna Cheriath, who's the Vice President and Chief Data Officer, Bristol-Myers Squibb. Krishna, great to see you, thanks so much for coming on. >> Thank you so much Dave for the invite, I'm looking forward to it. >> Yeah first of all, how are things in your part of the world? You're in New Jersey, I'm also on the East coast, how you guys making out? >> Yeah, I think these are unprecedented times all around the globe and whether it is from a company perspective or a personal standpoint, it is how do you manage your life, how do you manage your work in these unprecedented COVID-19 times has been a very interesting challenge. And to me, what is most amazing has been, I've seen humanity rise up and so to our company has sort of snap to be able to manage our work so that the important medicines that have to be delivered to our patients are delivered on time. So really proud about how we have done as a company and of course, personally, it has been an interesting journey with my kids from college, remote learning, wife working from home. So I'm very lucky and blessed to be safe and healthy at this time. So hopefully the people listening to this conversation are finding that they are able to manage through their lives as well. >> Obviously Bristol-Myers Squibb, very, very strong business. You guys just recently announced your quarter. There's a biologics facility near me in Devon's, Massachusetts, I drive by it all the time, it's a beautiful facility actually. But extremely broad portfolio, obviously some COVID impact, but you're managing through that very, very well, if I understand it correctly, you're taking a collaborative approach to a COVID vaccine, you're now bringing people physically back to work, you've been very planful about that. My question is from your standpoint, what role did you play in that whole COVID response and what role did data play? >> Yeah, I think it's a two part as you rightly pointed out, the Bristol-Myers Squibb, we have been an active partner on the the overall scientific ecosystem supporting many different targets that is, from many different companies I think. Across biopharmaceuticals, there's been a healthy convergence of scientific innovation to see how can we solve this together. And Bristol-Myers Squibb have been an active participant as our CEO, as well as our Chief Medical Officer and Head of Research have articulated publicly. Within the company itself, from a data and technology standpoint, data and digital is core to the response from a company standpoint to the COVID-19, how do we ensure that our work continues when the entire global workforce pivots to a kind of a remote setting. So that really calls on the digital infrastructure to rise to the challenge, to enable a complete global workforce. And I mean workforce, it is not just employees of the company but the all of the third-party partners and others that we work with, the whole ecosystem needs to work. And I think our digital infrastructure has proven to be extremely resilient than that. From a data perspective, I think it is twofold. One is how does the core book of business of data continue to drive forward to make sure that our companies key priorities are being advanced. Secondarily, we've been partnering with a research and development organization as well as medical organization to look at what kind of real world data insights can really help in answering the many questions around COVID-19. So I think it is twofold. Main summary; one is, how do we ensure that the data and digital infrastructure of the company continues to operate in a way that allows us to progress the company's mission even during a time when globally, we have been switched to a remote working force, except for some essential staff from lab and manufacturing standpoint. And secondarily is how do we look at the real-world evidence as well as the scientific data to be a good partner with other companies to look at progressing the societal innovations needed for this. >> I think it's a really prudent approach because let's face it, sometimes one shot all vaccine can be like playing roulette. So you guys are both managing your risk and just as I say, financially, a very, very successful company in a sound approach. I want to ask you about your organization. We've interviewed many, many Chief Data Officers over the years, and there seems to be some fuzziness as to the organizational structure. It's very clear with you, you report in to the CIO, you came out of a technical bag, you have a technical degree but you also of course have a business degree. So you're dangerous from that standpoint. You got both sides which is critical, I would think in your role, but let's start with the organizational reporting structure. How did that come about and what are the benefits of reporting into the CIO? >> I think the Genesis for that as Bristol-Myers Squibb and when I say Bristol-Myers Squibb, the new Bristol-Myers Squibb is a combination of Heritage Bristol-Myers Squibb and Heritage Celgene after the Celgene acquisition last November. So in the Heritage Bristol-Myers Squibb acquisition, we came to a conclusion that in order for BMS to be able to fully capitalize on our scientific innovation potential as well as to drive data-driven decisions across the company, having a robust data agenda is key. Now the question is, how do you progress that? Historically, we had approached a very decentralized mechanism that made a different data constituencies. We didn't have a formal role of a Chief Data Officer up until 2018 or so. So coming from that realization that we need to have an effective data agenda to drive forward the necessary data-driven innovations from an analytic standpoint. And equally importantly, from optimizing our execution, we came to conclusion that we need an enterprise-level data organization, we need to have a first among equals if you will, to be mandated by the CEO, his leadership team, to be the kind of an orchestrator of a data agenda for the company, because data agenda cannot be done individually by a singular CDO. It has to be done in partnership with many stakeholders, business, technology, analytics, et cetera. So from that came this notion that we need an enterprise-wide data organization. So we started there. So for awhile, I would joke around that I had all of the accountabilities of the CDO without the lofty title. So this journey started around 2016, where we create an enterprise-wide data organization. And we made a very conscious choice of separating the data organization from analytics. And the reason we did that is when we look at the bowl of Bristol-Myers Squibb, analytics for example, is core and part of our scientific discovery process, research, our clinical development, all of them have deep data science and analytic embedded in it. But we also have other analytics whether it is part of our sales and marketing, whether it is part of our finance and our enabling functions they catch all across global procurement et cetera. So the world of analytics is very broad. BMS did a separation between the world of analytics and from the world of data. Analytics at BMS is in two modes. There is a central analytics organization called Business Insights and Analytics that drive most of the enterprise-level analytics. But then we have embedded analytics in our business areas, which is research and development, manufacturing and supply chain, et cetera, to drive what needs to be closer to the business idea. And the reason for separating that out and having a separate data organization is that none of these analytic aspirations or the business aspirations from data will be met if the world of data is, you don't have the right level of data available, the velocity of data is not appropriate for the use cases, the quality of data is not great or the control of the data. So that we are using the data for the right intent, meeting the compliance and regulatory expectations around the data is met. So that's why we separated out that data world from the analytics world, which is a little bit of a unique construct for us compared to what we see generally in the world of CDOs. And from that standpoint, then the decision was taken to make that report for global CIO. At Bristol-Myers Squibb, they have a very strong CIO organization and IT organization. When I say strong, it is from this lens standpoint. A, it is centralized, we have centralized the budget as well as we have centralized the execution across the enterprise. And the CDO reporting to the CIO with that data-specific agenda, has a lot of value in being able to connect the world of data with the world of technology. So at BMS, their Chief Data Officer organization is a combination of traditional CDO-type accountabilities like data risk management, data governance, data stewardship, but also all of the related technologies around master data management, data lake, data and analytic engineering and a nascent AI data and technology lab. So that construct allows us to be a true enterprise horizontal, supporting analytics, whether it is done in a central analytics organization or embedded analytics teams in the business area, but also equally importantly, focus on the world of data from operational execution standpoint, how do we optimize data to drive operational effectiveness? So that's the construct that we have where CDO reports to the CIO, data organization separated from analytics to really focus around the availability but also the quality and control of data. And the last nuance that is that at BMS, the Chief Data Officer organization is also accountable to be the Data Protection Office. So we orchestrate and facilitate all privacy-related actions across because that allows us to make sure that all personal data that is collected, managed and consumed, meets all of the various privacy standards across the world, as well as our own commitments as a company from across from compliance principles standpoint. >> So that makes a lot of sense to me and thank you for that description. You're not getting in the way of R&D and the scientists, they know data science, they don't need really your help. I mean, they need to innovate at their own pace, but the balance of the business really does need your innovation, and that's really where it seems like you're focused. You mentioned master data management, data lakes, data engineering, et cetera. So your responsibility is for that enterprise data lifecycle to support the business side of things, and I wonder if you could talk a little bit about that and how that's evolved. I mean a lot has changed from the old days of data warehouse and cumbersome ETL and you mentioned, as you say data lakes, many of those have been challenging, expensive, slow, but now we're entering this era of cloud, real-time, a lot of machine intelligence, and I wonder if you could talk about the changes there and how you're looking at and thinking about the data lifecycle and accelerating the time to insights. >> Yeah, I think the way we think about it, we as an organization in our strategy and tactics, think of this as a data supply chain. The supply chain of data to drive business value whether it is through insights and analytics or through operation execution. When you think about it from that standpoint, then we need to get many elements of that into an effective stage. This could be the technologies that is part of that data supply chain, you reference some of them, the master data management platforms, data lake platforms, the analytics and reporting capabilities and business intelligence capabilities that plug into a data backbone, which is that I would say the technology, swim lane that needs to get right. Along with that, what we also need to get right for that effective data supply chain is that data layer. That is, how do you make sure that there is the right data navigation capability, probably you make sure that we have the right ontology mapping and the understanding around the data. How do we have data navigation? It is something that we have invested very heavily in. So imagine a new employee joining BMS, any organization our size has a pretty wide technology ecosystem and data ecosystem. How do you navigate that, how do we find the data? Data discovery has been a key focus for us. So for an effective data supply chain, then we knew that and we have instituted our roadmap to make sure that we have a robust technology orchestration of it, but equally important is an effective data operations orchestration. Both needs to go hand in hand for us to be able to make sure that that supply chain is effective from a business use case and analytic use standpoint. So that has led us on a journey from a cloud perspective, since you refer that in your question, is we have invested very heavily to move from very disparate set of data ecosystems to a more converse cloud-based data backbone. That has been a big focus at the BMS since 2016, whether it is from a research and development standpoint or from commercialization, it is our word for the sales and marketing or manufacturing and supply chain and HR, et cetera. How do we create a converged data backbone that allows us to use that data as a resource to drive many different consumption patterns? Because when you imagine an enterprise of our size, we have many different consumers of the data. So those consumers have different consumption needs. You have deep data science population who just needs access to the data and they have data science platforms but they are at once programmers as well, to the other end of the spectrum where executives need pre-packaged KPIs. So the effective orchestration of the data ecosystem at BMS through a data supply chain and the data backbone, there's a couple of things for us. One, it drives productivity of our data consumers, the scientific researchers, analytic community or other operational staff. And second, in a world where we need to make sure that the data consumption appalls ethical standards as well as privacy and other regulatory expectations, we are able to build it into our system and process the necessary controls to make sure that the consumption and the use of data meets our highest trust advancements standards. >> That makes a lot of sense. I mean, converging your data like that, people always talk about stove pipes. I know it's kind of a bromide but it's true, and allows you to sort of inject consistent policies. What about automation? How has that affected your data pipeline recently and on your journey with things like data classification and the like? >> I think in pursuing a broad data automation journey, one of the things that we did was to operate at two different speed points. In a historically, the data organizations have been bundled with long-running data infrastructure programs. By the time you complete them, their business context have moved on and the organization leaders are also exhausted from having to wait from these massive programs to reach its full potential. So what we did very intentionally from our data automation journey is to organize ourselves in two speed dimensions. First, a concept called Rapid Data Lab. The idea is that recognizing the reality that the data is not well automated and orchestrated today, we need a SWAT team of data engineers, data SMEs to partner with consumers of data to make sure that we can make effective data supply chain decisions here and now, and enable the business to answer questions of today. Simultaneously in a longer time horizon, we need to do the necessary work of moving the data automation to a better footprint. So enterprise data lake investments, where we built services based on, we had chosen AWS as the cloud backbone for data. So how do we use the AWS services? How do we wrap around it with the necessary capabilities so that we have a consistent reference and technical architecture to drive the many different function journeys? So we organized ourselves into speed dimensions; the Rapid Data Lab teams focus around partnering with the consumers of data to help them with data automation needs here and now, and then a secondary team focused around the convergence of data into a better cloud-based data backbone. So that allowed us to one, make an impact here and now and deliver value from data to the dismiss here and now. Secondly, we also learned a lot from actually partnering with consumers of data on what needs to get adjusted over a period of time in our automation journey. >> It makes sense, I mean again, that whole notion of converged data, putting data at the core of your business, you brought up AWS, I wonder if I could ask you a question. You don't have to comment on specific vendors, but there's a conversation we have in our community. You have AWS huge platform, tons of partners, a lot of innovation going on and you see innovation in areas like the cloud data warehouse or data science tooling, et cetera, all components of that data pipeline. As well, you have AWS with its own tooling around there. So a question we often have in the community is will technologists and technology buyers go for kind of best of breed and cobble together different services or would they prefer to have sort of the convenience of a bundled service from an AWS or a Microsoft or Google, or maybe they even go best of breeds for all cloud. Can you comment on that, what's your thinking? >> I think, especially for organizations, our size and breadth, having a converged to convenient, all of the above from a single provider does not seem practical and feasible, because a couple of reasons. One, the heterogeneity of the data, the heterogeneity of consumption of the data and we are yet to find a single stack provider who can meet all of the different needs. So I am more in the best of breed camp with a few caveats, a hybrid best of breed, if you will. It is important to have a converged the data backbone for the enterprise. And so whether you invest in a singular cloud or private cloud or a combination, you need to have a clear intention strategy around where are you going to host the data and how is the data is going to be organized. But you could have a lot more flexibility in the consumption of data. So once you have the data converged into, in our case, we converged on AWS-based backbone. We allow many different consumptions of the data, because I think the analytic and insights layer, data science community within R&D is different from a data science community in the supply chain context, we have business intelligence needs, we have a catered needs and then there are other data needs that needs to be funneled into software as service platforms like the sales forces of the world, to be able to drive operational execution as well. So when you look at it from that context, having a hybrid model of best of breed, whether you have a lot more convergence from a data backbone standpoint, but then allow for best of breed from an analytic and consumption of data is more where my heart and my brain is. >> I know a lot of companies would be excited to hear that answer, but I love it because it fosters competition and innovation. I wish I could talk for you forever, but you made me think of another question which is around self-serve. On your journey, are you at the point where you can deliver self-serve to the lines of business? Is that something that you're trying to get to? >> Yeah, I think it does. The self-serve is an absolutely important point because I think the traditional boundaries of what you consider the classical IT versus a classical business is great. I think there is an important gray area in the middle where you have a deep citizen data scientist in the business community who really needs to be able to have access to the data and I have advanced data science and programming skills. So self-serve is important but in that, companies need to be very intentional and very conscious of making sure that you're allowing that self-serve in a safe containment sock. Because at the end of the day, whether it is a cyber risk or data risk or technology risk, it's all real. So we need to have a balanced approach between promoting whether you call it data democratization or whether you call it self-serve, but you need to balance that with making sure that you're meeting the right risk mitigation strategy standpoint. So that's how then our focus is to say, how do we promote self-serve for the communities that they need self-serve, where they have deeper levels of access? How do we set up the right safe zones for those which may be the appropriate mitigation from a cyber risk or data risk or technology risk. >> Security pieces, again, you keep bringing up topics that I could talk to you forever on, but I heard on TV the other night, I heard somebody talking about how COVID has affected, because of remote access, affected security. And it's like hey, give everybody access. That was sort of the initial knee-jerk response, but the example they gave as well, if your parents go out of town and the kid has a party, you may have some people show up that you don't want to show up. And so, same issue with remote working, work from home. Clearly you guys have had to pivot to support that, but where does the security organization fit? Does that report separate alongside the CIO? Does it report into the CIO? Are they sort of peers of yours, how does that all work? >> Yeah, I think at Bristol-Myers Squibb, we have a Chief Information Security Officer who is a peer of mine, who also reports to the global CIO. The CDO and the CSO are effective partners and are two sides of the coin and trying to advance a total risk mitigation strategy, whether it is from a cyber risk standpoint, which is the focus of the Chief Information Security Officer and whether it is the general data consumption risk. And that is the focus from a Chief Data Officer in the capacities that I have. And together, those are two sides of a coin that the CIO needs to be accountable for. So I think that's how we have orchestrated it, because I think it is important in these worlds where you want to be able to drive data-driven innovation but you want to be able to do that in a way that doesn't open the company to unwanted risk exposures as well. And that is always a delicate balancing act, because if you index too much on risk and then high levels of security and control, then you could lose productivity. But if you index too much on productivity, collaboration and open access and data, it opens up the company for risks. So it is a delicate balance within the two. >> Increasingly, we're seeing that reporting structure evolve and coalesce, I think it makes a lot of sense. I felt like at some point you had too many seats at the executive leadership table, too many kind of competing agendas. And now your structure, the CIO is obviously a very important position. I'm sure has a seat at the leadership table, but also has the responsibility for managing that sort of data as an asset versus a liability which my view, has always been sort of the role of the Head of Information. I want to ask you, I want to hit the Escape key a little bit and ask you about data as a resource. You hear a lot of people talk about data is the new oil. We often say data is more valuable than oil because you can use it, it doesn't follow the laws of scarcity. You could use data in infinite number of places. You can only put oil in your car or your house. How do you think about data as a resource today and going forward? >> Yeah, I think the data as the new oil paradigm in my opinion, was an unhealthy, and it prompts different types of conversations around that. I think for certain companies, data is indeed an asset. If you're a company that is focused on information products and data products and that is core of your business, then of course there's monetization of data and then data as an asset, just like any other assets on the company's balance sheet. But for many enterprises to further their mission, I think considering data as a resource, I think is a better focus. So as a vital resource for the company, you need to make sure that there is an appropriate caring and feeding for it, there is an appropriate management of the resource and an appropriate evolution of the resource. So that's how I would like to consider it, it is a personal end of one perspective, that data as a resource that can power the mission of the company, the new products and services, I think that's a good, healthy way to look at it. At the center of it though, a lot of strategies, whether people talk about a digital strategy, whether the people talk about data strategy, what is important is a company to have a pool north star around what is the core mission of the company and what is the core strategy of the company. For Bristol-Myers Squibb, we are about transforming patients' lives through science. And we think about digital and data as key value levers and drivers of that strategy. So digital for the sake of digital or data strategy for the sake of data strategy is meaningless in my opinion. We are focused on making sure that how do we make sure that data and digital is an accelerant and has a value lever for the company's mission and company strategy. So that's why thinking about data as a resource, as a key resource for our scientific researchers or a key resource for our manufacturing team or a key resource for our sales and marketing, allows us to think about the actions and the strategies and tactics we need to deploy to make that effective. >> Yeah, that makes a lot of sense, you're constantly using that North star as your guideline and how data contributes to that mission. Krishna Cheriath, thanks so much for coming on the Cube and supporting the MIT Chief Data Officer community, it was a really pleasure having you. >> Thank you so much for Dave, hopefully you and the audience is safe and healthy during these times. >> Thank you for that and thank you for watching everybody. This is Vellante for the Cube's coverage of the MIT CDOIQ Conference 2020 gone virtual. Keep it right there, we'll right back right after this short break. (lively upbeat music)
SUMMARY :
leaders all around the world, coverage of the MIT CDOIQ. I'm looking forward to it. so that the important medicines I drive by it all the time, and digital infrastructure of the company of reporting into the CIO? So that's the construct that we have and accelerating the time to insights. and the data backbone, and allows you to sort of and enable the business to in areas like the cloud data warehouse and how is the data is to the lines of business? in the business community that I could talk to you forever on, that the CIO needs to be accountable for. about data is the new oil. that can power the mission of the company, and supporting the MIT Chief and healthy during these times. of the MIT CDOIQ Conference
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Dave | PERSON | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
ORGANIZATION | 0.99+ | |
Bristol-Myers Squibb | ORGANIZATION | 0.99+ |
New Jersey | LOCATION | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Devon | LOCATION | 0.99+ |
Palo Alto | LOCATION | 0.99+ |
Rapid Data Lab | ORGANIZATION | 0.99+ |
2013 | DATE | 0.99+ |
Krishna Cheriath | PERSON | 0.99+ |
two sides | QUANTITY | 0.99+ |
two | QUANTITY | 0.99+ |
COVID-19 | OTHER | 0.99+ |
Celgene | ORGANIZATION | 0.99+ |
First | QUANTITY | 0.99+ |
Cube | ORGANIZATION | 0.99+ |
Krishna | PERSON | 0.99+ |
Heritage Bristol-Myers Squibb | ORGANIZATION | 0.99+ |
2018 | DATE | 0.99+ |
both sides | QUANTITY | 0.99+ |
Both | QUANTITY | 0.98+ |
Boston | LOCATION | 0.98+ |
2016 | DATE | 0.98+ |
CDO | TITLE | 0.98+ |
two modes | QUANTITY | 0.98+ |
COVID | OTHER | 0.98+ |
first | QUANTITY | 0.98+ |
Bristol-Myers Squibb | ORGANIZATION | 0.98+ |
last November | DATE | 0.98+ |
Data Protection Office | ORGANIZATION | 0.98+ |
One | QUANTITY | 0.98+ |
two part | QUANTITY | 0.98+ |
Secondly | QUANTITY | 0.98+ |
second | QUANTITY | 0.98+ |
MIT | ORGANIZATION | 0.98+ |
both | QUANTITY | 0.98+ |
MIT CDOIQ Conference 2020 | EVENT | 0.97+ |
Heritage Celgene | ORGANIZATION | 0.97+ |
one | QUANTITY | 0.97+ |
COVID-19 times | OTHER | 0.96+ |
today | DATE | 0.96+ |
BMS | ORGANIZATION | 0.96+ |
single provider | QUANTITY | 0.95+ |
single stack | QUANTITY | 0.93+ |
Bristol Myers Squibb | PERSON | 0.93+ |
one shot | QUANTITY | 0.92+ |
Cube Studios | ORGANIZATION | 0.9+ |
one perspective | QUANTITY | 0.9+ |
Bristol-Myers | ORGANIZATION | 0.9+ |
Business Insights | ORGANIZATION | 0.89+ |
two speed | QUANTITY | 0.89+ |
twofold | QUANTITY | 0.84+ |
secondary | QUANTITY | 0.8+ |
Secondarily | QUANTITY | 0.77+ |
MIT CDOIQ | ORGANIZATION | 0.76+ |
Massachusetts | LOCATION | 0.75+ |
MITCDOIQ 2020 | EVENT | 0.74+ |
Vellante | PERSON | 0.72+ |
Data | PERSON | 0.71+ |
Chief Data Officer | PERSON | 0.61+ |
Ann Cavoukian and Michelle Dennedy | CUBE Conversation, August 2020
(upbeat music) >> Announcer: From the CUBE studios in Palo Alto, in Boston, connecting with thought leaders all around the world. This is theCUBE Conversation. >> Hey, welcome back everybody Jeffrey Frick with theCUBE. We are getting through the COVID crisis. It continues and impacting the summer. I can't believe the summer's almost over, but there's a whole lot of things going on in terms of privacy and contact tracing and this kind of this feeling that there's this conflict between kind of personal identification and your personal privacy versus the public good around things like contact tracing. And I was in a session last week with two really fantastic experts. I wanted to bring them on the show and we're really excited to have back for I don't even know how many times Michelle has been on Michelle Dennedy, She is the former chief privacy officer at Cisco and now she's running the CEO of Identity, Michelle great to see you. >> Good to see you always Jeff >> Yeah and for the first time Dr. Ann Cavoukian and she is the executive director Global Privacy & Security By Design Center. Joining us from Toronto, worked with the government and is not short on opinions about privacy. (laughing) Ann good to see you. >> Hi Jeff thank you >> Yes, so let's jump into it cause I think one of the fundamental issues that we keep hearing is this zero-sum game. And I know and it's a big topic for you that there seems to be this trade off this either or and specifically let's just go to contact tracing. Cause that's a hot topic right now with COVID. I hear that it's like you're telling everybody where I'm going and you're sharing that with all these other people. How is this even a conversation and where do I get to choose whether I want to participate or not? >> You can't have people traced and tracked and surveil. You simply can't have it and it can't be an either or win lose model. You have to get rid of that data. Zero-sum game where only one person can win and the other one loses and it sums to a total of zero. Get rid of that, that's so yesterday. You have to have both groups winning positive sum. Meaning yes, you need public health and public safety and you need privacy. It's not one versus the other. We can do both and that's what we insist upon. So the contact term tracing app that was developed in Canada was based on the Apple Google framework, which is actually called exposure notification. It's totally privacy protective individuals choose to voluntarily download this app. And no personal information is collected whatsoever. No names, no geolocation data, nothing. It's simply notifies you. If you've been exposed to someone who is COVID-19 positive, and then you can decide on what action you wish to take. Do you want to go get tested? Do you want to go to your family doctor, whatever the decision lies with you, you have total control and that's what privacy is all about. >> Jeffrey: But what about the person who was sick? Who's feeding the top into that process and is the sick person that you're no notifying they obviously their personal information is part of that transaction. >> what the COVID alerts that we developed based on the Apple Google framework. It builds on manual contact tracing, which also take place the two to compliment each other. So the manual contact tracing is when individuals go get to get tested and they're tested as positive. So healthcare nurses will speak to that individual and say, please tell us who you've been in contact with recently, family, friends, et cetera. So the two work together and by working together, we will combat this in a much more effective manner. >> Jeffrey: So shifting over to you Michelle, you know, there's PIN and a lot of conversations all the time about personal identifiable information but right. But then medical has this whole nother class of kind of privacy restrictions and level of care. And I find it really interesting that on one hand, you know, we were trying to do the contract tracing on another hand if you know, my wife works in a public school. If they find out that one of the kids in this class has been exposed to COVID somehow they can't necessarily tell the teacher because of HIPAA restriction. So I wonder if you could share your thoughts on this kind of crossover between privacy and health information when it gets into this kind of public crisis and this inherent conflict for the public right to know and should the teacher be able to be told and it's not a really clean line with a simple answer, I don't think. >> No and Jeff, and you're also layering, you know, when you're talking about student data, you layering another layer of legal restriction. And I think what you're putting your thumb on is something that's really critical. When you talk about privacy engineering, privacy by design and ethics engineering. You can't simply start with the legal premise. So is it lawful to share HIPAA covered data. A child telling mommy I don't feel well not HIPAA covered. A child seeing a doctor for medical services and finding some sort of infection or illness covered, right? So figuring out the origin of the exact same zero one. Am I ill or not, all depends on context. So you have to first figure out, first of all let's tackle the moral issues. Have we decided that it is a moral imperative to expose certain types of data. And I separate that from ethics intentionally and with apologies to true ethicists. The moral imperative is sort of the things we find are so wrong. We don't want a list of kids who are sick or conversely once the tipping point goes the list of kids who are well. So then they are called out that's the moral choice. The ethical choice is just because you can should you, and that's a much longer conversation. Then you get to the legal imperative. Are you allowed to based on the past mistakes that we made. That's what every piece of litigation or legislation is particularly in a common law construct in the US. It's very important to understand that civil law countries like the European theater. They try to prospectively legislate for things that might go wrong. The construct is thinner in a common law economy where you do, you use test cases in the courts of law. That's why we are such a litigious society has its own baggage. But you have to now look at is that legal structure attempting to cover past harms that are so bad that we've decided as a society to punish them, is this a preventative law? And then you finally get to what I say is stage four for every evaluation is isn't viable, are the protections that you have to put on top of these restrictions. So dire that they either cannot be maintained because of culture process or cash or it just doesn't make sense anymore. So does it, is it better to just feel someone's forehead for illness rather than giving a blood assay, having it sent away for three weeks and then maybe blah, blah, blah, blah, blah, blah. >> Right. >> You have to look at this as a system problem solving issue. >> So I want to look at it in the context of, again kind of this increased level of politicization and or, you know, kind of exposure outside of what's pretty closed. And I want to bring up AIDS and the porn industry very frankly right? Where people behaving in the behavior of the business risk a life threatening disease of which I still don't think it as a virus. So you know why, cause suddenly, you know, we can track for that and that's okay to track for that. And there's a legitimate reason to versus all of the other potential medical conditions that I may or may not have that are not necessarily brought to bear within coming to work. And we might be seeing this very soon. As you said, if people are wanting our temperatures, as we come in the door to check for symptoms. How does that play with privacy and healthcare? It's still fascinates me that certain things is kind of pop out into their own little bucket of regulation. I'm wondering if you could share your thoughts on that Ann. >> You know, whenever you make it privacy versus fill in the blank, especially in the context of healthcare. You end up turning it to a lose lose as opposed to even a win lose. Because you will have fewer people wanting to allow themselves to be tested, to be brought forward for fear of where that information may land. If it lands in the hands of your employer for example or your whoever owns your house if you're in renting, et cetera. It creates enormous problems. So regardless of what you may think of the benefits of that model. History has shown that it doesn't work well that people end up shying away from being tested or seeking treatment or any of those things. Even now with the contact tracing apps that have been developed. If you look globally the contact tracing apps for COVID-19. They have failed the ones that identify individuals in the UK, in Australia, in Western Canada that's how it started out. And they've completely dropped them because they don't work. People shy away from them. They don't use them. So they've gotten rid of that. They've replaced it with the, an app based on the Apple Google framework, which is the one that protects privacy and will encourage people to come forward and seek to be tested. If there's a problem in Germany. Germany is one of the largest privacy data protection countries in the world. Their privacy people are highly trusted in Germany. Germany based their app on the Apple Google framework. About a month ago they released it. And within 24 hours they had 6.5 million people download the app. >> Right. >> Because there is such trust there unlike the rest of the world where there's very little trust and we have to be very careful of the trust deficit. Because we want to encourage people to seek out these apps so they can attempt to be tested if there's a problem, but they're not going to use them. They're just going to shy away from them. If there is such a problem. And in fact I'll never forget. I did an interview about a month ago, three weeks ago in the US on a major major radio station that has like 54 million people followers. And I was telling them about the COVID alert the Canadian contact tracing app, actually it's called exposure notification app, which was built on the Apple Google framework. And people in hoard said they wouldn't trust anyone with it in the US. They just wouldn't trust it. So you see there's such a trust deficit. That's what we have to be careful to avoid. >> So I want to hold on the trust for just a second, but I want to go back to you Michelle and talk about the lessons that we can learn post 9/11. So the other thing right and keep going back to this over and over. It's not a zero-sum game. It's not a zero-sum game and yet that's the way it's often positioned as a way to break down existing barriers. So if you go back to 9/11 probably the highest profile thing being the Patriot Act, you know, where laws are put in place to protect us from terrorism that are going to do things that were not normally allowed to be done. I bet without checking real exhaustively that most of those things are still in place. You know, cause a lot of times laws are written. They don't go away for a long time. What can we learn from what happened after 9/11 and the Patriot Act and what should be really scared of, or careful of or wary of using that as a framework for what's happening now around COVID and privacy. >> It's a perfect, it's not even an analogy because we're feeling the shadows of the Patriot Act. Even now today, we had an agreement from the United States with the European community until recently called the Privacy Shield. And it was basically if companies and organizations that were, that fell under the Federal Trade Commissions jurisdiction, there's a bit of layering legal process here. But if they did and they agreed to supply enough protection to data about people who were present in the European Union to the same or better level than the Europeans would. Then that information could pass through this Privacy Shield unencumbered to and from the United States. That was challenged and taken down. I don't know if it's a month ago or if it's still March it's COVID time, but very recently on basis that the US government can overly and some would say indifferent nations, improperly look at European data based on some of these Patriot Act, FISA courts and other intrusive mechanisms that absolutely do apply if we were under the jurisdiction of the United States. So now companies and private actors are in the position of having to somehow prove that they will mechanize their systems and their processes to be immune from their own government intrusion before they can do digital trade with other parts of the world. We haven't yet seen the commercial disruption that will take place. So the unintended consequence of saying rather than owning the answers or the observations and the intelligence that we got out of the actual 9/11 report, which said we had the information we needed. We did not share enough between the agencies and we didn't have the decision making activity and will to take action in that particular instance. Rather than sticking to that knowledge. Instead we stuck to the Patriot Act, which was all but I believe to Congress people. When I mean, you see the hot mess. That is the US right now. When everyone but two people in the room vote for something on the quick. There's probably some sort of a psychological gun to your head. That's probably well thought out thing. We fight each other. That's part of being an American dammit. So I think having these laws that say, you've got to have this one solution because the boogeyman is coming or COVID is coming or terrorists or child pornographers are coming. There's not one solution. So you really have to break this down into an engineering problem and I don't mean technology when I say engineering. I mean looking at the culture, how much trust do you have? Who is the trusted entity? Do we trust Microsoft more than we trust the US government right now? Maybe that might be your contact. How you're going to build people, process and technology not to avoid a bad thing, but to achieve a positive objective because if you're not achieving that positive objective of understanding that safe to move about without masks on, for example, stop, just stop. >> Right, right. My favorite analogy Jeff, and I think I've said this to you in the past is we don't sit around and debate the merits of viscosity of water to protect concrete holes. We have to make sure that when you lead them to the concrete hole, there's enough water in the hole. No, you're building a swimming pool. What kind of a swimming pool do you want? Is it commercial, Is it toddlers? Is it (indistinct), then you build in correlation, protection and da da da da. But if you start looking at every problem as how to avoid hitting a concrete hole. You're really going to miss the opportunity to build and solve the problem that you want and avoid the risk that you do not want. >> Right right, and I want to go back to you on the trust thing. You got an interesting competent in that other show, talking about working for the government and not working directly for the people are voted in power, but for the kind of the larger bureaucracy and agency. I mean, the Edelman Trust Barometer is really interesting. They come out every year. I think it's their 20th year. And they break down kind of like media, government and business. And who do you trust and who do you not trust? What what's so fascinating about the time we're in today is even within the government, the direction that's coming out is completely diametrically opposed oftentimes between the Fed, the state and the local. So what does kind of this breakdown of trust when you're getting two different opinions from the same basic kind of authority due to people's ability or desire to want to participate and actually share the stuff that maybe or maybe not might get reshared. >> It leaves you with no confidence. Basically, you can't take confidence in any of this. And when I was privacy commissioner. I served for three terms, each term that was a different government, different political power in place. And before they had become the government, they were all for privacy and data protection believed in and all that. And then once they became the government all that changed and all of a sudden they wanted to control everyone's information and they wanted to be in power. No, I don't trust government. You know, people often point to the private sector as being the group you should distrust in terms of privacy. I say no, not at all. To me far worse is actually the government because everyone thinks they're there to do good job and trust them. You can't trust. You have to always look under the hood. I always say trust but verify. So unfortunately we have to be vigilant in terms of the protections we seek for privacy both with private sector and with the government, especially with the government and different levels of government. We need to ensure that people's privacy remains intact. It's preserved now and well into the future. You can't give up on it because there's some emergency a pandemic, a terrorist incident whatever of course we have to address those issues. But you have to insist upon people's privacy being preserved. Privacy forms the foundation of our freedom. You cannot have free and open societies without a solid foundation of privacy. So I'm just encouraging everyone. Don't take anything at face value, just because the government tells you something. It doesn't mean it's so always look under the hood and let us ensure the privacy is strongly protected. See emergencies come and go. The pandemic will end. What cannot end is our privacy and our freedom. >> So this is a little dark in here, but we're going to lighten it up a little bit because there's, as Michelle said, you know, if you think about building a pool versus putting up filling a hole, you know, you can take proactive steps. And there's a lot of conversation about proactive steps and I pulled Ann your thing Privacy by Design, The 7 Foundational Principles. I have the guys pull up a slide. But I think what's really interesting here is, is you're very, very specific prescriptive, proactive, right? Proactive, not reactive. Privacy is the default setting. You know, don't have to read the ULAs and I'm not going to read the, all the words we'll share it. People can find it. But what I wanted to focus on is there is an opportunity to get ahead of the curve, but you just have to be a little bit more thoughtful. >> That's right, and Privacy By Design it's a model of prevention, much like a medical model of prevention where you try to prevent the harms from arising, not just deal with them after the facts through regulatory compliance. Of course we have privacy laws and that's very important, but they usually kick in after there's been a data breach or privacy infraction. So when I was privacy commissioner obviously those laws were intact and we had to follow them, but I wanted something better. I wanted to prevent the privacy harms from arising, just like a medical model of prevention. So that's a Privacy By Design is intended to do is instantiate, embed much needed privacy protective measures into your policies, into your procedures bake it into the code so that it has a constant presence and can prevent the harms from arising. >> Jeffrey: Right right. One of the things I know you love to talk about Michelle is compliance, right? And is compliance enough. I know you like to talk about the law. And I think one of the topics that came up on your guys' prior conversation is, you know, will there be a national law, right? GDPR went through on the European side last year, the California Protection Act. A lot of people think that might become the model for more of a national type of rule. But I tell you, when you watch some of the hearings in DC, you know, I'm sure 90% of these people still print their emails and have their staff hand them to them. I mean, it's really scary that said, you know, regulation always does kind of lag probably when it needs to be put in place because people maybe abuse or go places they shouldn't go. So I wonder if you could share your thoughts on where you think legislation is going to going and how should people kind of see that kind of playing out over the next several years, I guess. >> Yeah, it's such a good question Jeff. And it's like, you know, I think even the guys in Vegas are having trouble with setting the high laws on this. Cameron said in I think it was December of 2019, which was like 15 years ago now that in the first quarter of 2020, we would see a federal law. And I participated in a hearing at the Senate banking committee, again, November, October and in the before times. I'm talking about the same thing and here we are. Will we have a comprehensive, reasonable, privacy law in the United States before the end of this president's term. No, we will not. I can say that with just such faith and fidelity. (laughing) But what does that mean? And I think Katie Porter who I'm starting to just love, she's the Congresswoman who's famous for pulling on her white board and just saying, stop fudging the numbers. Let's talk about the numbers. There's about a, what she calls the 20% legislative flip phone a caucus. So there are 20% or more on both sides of the aisle of people in the US who are in the position of writing our laws. who are still on flip phones and aren't using smart phones and other kinds of technologies. There's a generation gap. And as much as I can kind of chuckle at that a little bit and wink, wink, nudge, nudge, isn't that cute. Because you know, my dad, as you know, is very very technical and he's a senior citizen. This is hard. I hope he doesn't see that but... (laughing) But then it's not old versus young. It's not let's get a whole new group and crop and start over again. What it is instead and this is, you know, as my constant tome sort of anti compliance. I'm not anti compliance. You got to put your underwear on before your pants or it's just really hard. (laughing) And I would love to see anyone who is capable of putting their underwater on afterwards. After you've made the decision of following the process. That is so basic. It comes down to, do you want the data that describes or is donated or observed about human beings. Whether it's performance of your employees. People you would love to entice onto your show to be a guest. People you'd like to listen and consume your content. People you want to meet. People you want to marry. Private data as Ann says, does the form the foundation of our freedom, but it also forms the foundation of our commerce. So that compliance, if you have stacked the deck proactively with an ethics that people can understand and agree with and have a choice about and feel like they have some integrity. Then you will start to see the acceleration factor of privacy being something that belongs on your balance sheet. What kind of data is high quality, high nutrition in the right context. And once you've got that, you're in good shape. >> I'm laughing at privacy on the balance sheet. We just had a big conversation about data on the balance sheets. It's a whole, that's a whole another topic. So we can go for days. I have Pages and pages of notes here. But unfortunately I know we've got some time restrictions. And so, and I want to give you the last word as you look forward. You've been in this for a while. You've been in it from the private side, as well as the government side. And you mentioned lots of other scary things, kind of on the horizon. Like the kick of surveillance creep, which there's all kinds of interesting stuff. You know, what advice do you give to citizens. What advice do you give to leaders in the public sector about framing the privacy conversation >> I always want to start by telling them don't frame privacy as a negative. It's not a negative. It's something that can build so much. If you're a business, you can gain a competitive advantage by strongly protecting your customer's privacy because then it will build such loyalty and you'll gain a competitive advantage. You make it work for you. As a government you want your citizens to have faith in the government. You want to encourage them to understand that as a government you respect their privacy. Privacy is highly contextual. It's only the individual who can make determinations relating to the disclosure of his or her personal information. So make sure you build that trust both as a government and as a business, private sector entity and gain from that. It's not a negative at all, make it work for you, make it work for your citizens, for your customers, make it a plus a win win that will give you the best returns. >> Isn't it nice when doing the right thing actually provides better business outcomes too. It's like diversity of opinion and women on boards. And kind of things- >> I love that. we cover these days. >> Well ladies, thank you very very much for your time. I know you've got a hard stop, so I'm going to cut you loose or else we would go for probably another hour and a half, but thank you so much for your time. Thank you for continuing to beat the drum out there and look forward to our next conversation. Hopefully in the not too distant future. >> My pleasure Jeff. Thank you so much. >> Thank you. >> Thank you too. >> All right She's Michelle. >> She's Ann. I'm Jeff. You're watching theCUBE. Thanks for watching. We'll see you next time. (upbeat music)
SUMMARY :
leaders all around the world. and now she's running the CEO of Identity, Yeah and for the first And I know and it's a big topic for you and the other one loses and and is the sick person So the two work together and should the teacher be able to be told are the protections that you have to put You have to look at this and the porn industry very frankly right? of the benefits of that model. careful of the trust deficit. and the Patriot Act and what and the intelligence that we got out of and solve the problem that you want but for the kind of the as being the group you should I have the guys pull up a slide. and can prevent the harms from arising. One of the things I know you and in the before times. kind of on the horizon. that will give you the best returns. doing the right thing I love that. so I'm going to cut you loose Thank you so much. We'll see you next time.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Katie Porter | PERSON | 0.99+ |
Michelle | PERSON | 0.99+ |
Jeffrey | PERSON | 0.99+ |
Jeff | PERSON | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
Jeffrey Frick | PERSON | 0.99+ |
Canada | LOCATION | 0.99+ |
three terms | QUANTITY | 0.99+ |
Patriot Act | TITLE | 0.99+ |
Palo Alto | LOCATION | 0.99+ |
November | DATE | 0.99+ |
Michelle Dennedy | PERSON | 0.99+ |
UK | LOCATION | 0.99+ |
three weeks | QUANTITY | 0.99+ |
Cisco | ORGANIZATION | 0.99+ |
Germany | LOCATION | 0.99+ |
20% | QUANTITY | 0.99+ |
Vegas | LOCATION | 0.99+ |
August 2020 | DATE | 0.99+ |
Ann | PERSON | 0.99+ |
Federal Trade Commissions | ORGANIZATION | 0.99+ |
Ann Cavoukian | PERSON | 0.99+ |
December of 2019 | DATE | 0.99+ |
HIPAA | TITLE | 0.99+ |
US | LOCATION | 0.99+ |
Congress | ORGANIZATION | 0.99+ |
California Protection Act | TITLE | 0.99+ |
United States | LOCATION | 0.99+ |
Australia | LOCATION | 0.99+ |
two people | QUANTITY | 0.99+ |
each term | QUANTITY | 0.99+ |
20th year | QUANTITY | 0.99+ |
Cameron | PERSON | 0.99+ |
last year | DATE | 0.99+ |
both groups | QUANTITY | 0.99+ |
DC | LOCATION | 0.99+ |
90% | QUANTITY | 0.99+ |
three weeks ago | DATE | 0.99+ |
Western Canada | LOCATION | 0.99+ |
CUBE | ORGANIZATION | 0.99+ |
last week | DATE | 0.99+ |
two | QUANTITY | 0.99+ |
Toronto | LOCATION | 0.99+ |
first quarter of 2020 | DATE | 0.99+ |
today | DATE | 0.99+ |
March | DATE | 0.99+ |
US | ORGANIZATION | 0.99+ |
Fed | ORGANIZATION | 0.99+ |
one solution | QUANTITY | 0.99+ |
Boston | LOCATION | 0.99+ |
US government | ORGANIZATION | 0.99+ |
6.5 million people | QUANTITY | 0.99+ |
yesterday | DATE | 0.99+ |
both | QUANTITY | 0.99+ |
zero | QUANTITY | 0.99+ |
a month ago | DATE | 0.99+ |
15 years ago | DATE | 0.98+ |
one person | QUANTITY | 0.98+ |
COVID-19 | OTHER | 0.98+ |
two really fantastic experts | QUANTITY | 0.98+ |
first | QUANTITY | 0.98+ |
one | QUANTITY | 0.98+ |
both sides | QUANTITY | 0.98+ |
54 million people | QUANTITY | 0.98+ |
Apple | ORGANIZATION | 0.97+ |
Jim Clancy, Dell Technologies | CUBE Conversation, June 2020
(logo chiming) >> Presenter: From theCUBE studios in Palo Alto in Boston, connecting with thought leaders all around the world, this is a cube conversation. >> Hi, welcome to this cube conversation. I'm Lisa Martin. And I'm pleased to welcome back one of our cube alumni from Dell Technologies. Joining me right now is Jim Clancy, the SVP of Global Data Protection Solutions Dell. Jim, great to have you back on theCUBE. >> Hey, Lisa, thanks for having me. Looking forward to our conversation. >> Though we're nice. So we're very appropriately socially distance as you can tell California East Coast. So 2020 has been a quite a year, right? We're only about halfway through it, Jim. But some of the things that I noticed from Dell Technologies is these three big waves that Dell Technologies that we want to ride these in 2020. And those waves are Cloud, VMware, and Cyber Recovery. >> That's right. >> Talk to me about these three waves and what's happening with those currents in this pandemic time. >> Yeah, it's really interesting. So back in February we, we actually had Dave Volante had a video that we shared with our teams at FRS, which is the global sales organization meeting. And we were talking about some of the things that we're seeing from our customers and how they're picking up. And those are the key waves that our teams have been focused on. But most importantly, these are what our customers are asking us about. These are the things that are really important to them, that are allowing them to know modernize in, some of the challenges that that have really kind of taken off and gotten, quite frankly, worse in the current environment. So yeah, we, we kind of jumped on the wave that Dave kind of brought forward to us at FRS and now we've been riding those with our customers. And if you can imagine that they're pretty choppy with some of the change in the environment that we're in today, but they certainly allow someone like Dell DPS to be able to be really successful if you write them correctly. >> Alright, so let's break down those choppy waves right now from a cloud perspective. So many organizations in every industry globally, are living in a multicloud world, whether it's strategic, and some of it is or by acquisition. And they're running traditional workloads, they're running emerging workloads. How is cloud now even more important from a data protection perspective? And what is Dell Technologies doing to help them in this navigate this multicloud world? >> Yeah, well, I think a couple a couple of different things. First, is that before COVID, and before the pandemic, customers were obviously living in a multicloud world they were picking applications choosing. Is it easier, is it faster to deploy in the cloud. And now with with the situation that we're in, customers are accelerating their adoption. So if you look at some of the announcements that come out from like Microsoft. The Microsoft's cloud businesses is just exploding right now. And a lot of it has to do with our customers are not going back to the data center, they don't have access. And the world has changed that their focus so much on work from home, that the quickest way to get going is to adopt the cloud. And so we're seeing a massive uptick on that. It's good news for Dell Data Protection, because there's a couple of key things that happen. When customers take some of these applications and put them in the cloud. They certainly open themselves up for some challenges, or they certainly open up with a cost really takes off if they're not leveraging an efficient data protection solution. So the first, first and foremost customers are adopting and leveraging the cloud more and more. And then about I think the numbers around 70% of customers today are looking to optimize their cloud experience. So they want to use it more, but they definitely understand that they're spending a tremendous amount of dollars out there and they want to optimize it. So we've had an example with a customer that wanted to leverage the cloud more. But the challenge was the cost just wasn't working out for them. And 60% of that cost that they felt they needed to update was their backup and archive. And so we went in, worked with them talked about how we could optimize that environment, to the extent that we could cut their costs in half. So there's a there's definitely a need, customers are going to continue working and going to the cloud, but they need an optimized, efficient Data Protection Solution. And Dell is the only one that can deliver that. >> And speaking of cost for a second, let's pivot on that. Because these days, it seems like the financing for Data Protection Solutions is as important as protecting the data itself. So when your customers are coming to you guys say, hey help us out, we need to leverage out more but we need to do some cost effectively. What are some of the the flexible financing options or even incentives and offers that Dell Technologies is delivering to it's customers? >> Yes. So we've been offering a lot to our customers for years in terms of flexible financing, we have the best finance organization sales financing organization in the world which is our DFS group. And what we've been able to do is start to look at more about how can we offer a subscription pricing to our customers flex on demand. But then on top of that, is we announced another program, which allows customers to extend their payment terms, right? It allows them to, zero dollar finance. So as the customer are really kind of focused on preserving their cash. We are bringing to market solutions, not only with DFS, that makes it more flexible from a consumption standpoint. But we're also looking at how do we kind of bundle some of our solutions together. How do we become more aggressive and help our customers get through this because cash is king for a lot of our customers today. And if we can help them preserve that cash it gives them the flexibility, they're going to remember that. Right? They're going to, they're going to want to partner with us more, they're going to see that we're stepping up to help them get through this difficult time. So, flex on-demand subscription pricing, those are the big things that we're starting to see more and more from our customers and Dell is here to help them with stepping up and helping our customers when it comes to the financing. >> Then imagine that applies not just to the Cloud environment, but also the VMware environment. That's another wave. Talk to me a little bit more about that wave and how you're helping customers to be able to protect their VMware workloads across the entire VMware stack. >> Yeah, and just let me add one thing to, from a when I talk about the financing, it's, it's whether someone runs stuff on-prem or in the cloud. So I know you mentioned that it's it's flexible pricing options across on-prem or off-prem, it doesn't matter. For us, it's a multicloud world and wherever you want to run it, you want to have flexible consumption models. But the topic of VMware which is just an amazing opportunity that we're working together with VMware and the partnership could never be any stronger than it is today is that VMware is working and growing, in every one of our customer environments today. And as they grow, they really need a strong Data Protection Solution that's going to bring governance, that's going to have scale, that's going to have cyber, Cybersecurity on it, that's going to give them that flexibility to be able to protect these workloads. And VMware wants to continue to virtualize more and more workloads, databases. And to do that, you need to be able to say that you can protect them recover that data. So customers are really pressing VMware and VMware is coming to Dell Data Protection to say, look, we're becoming more and more critical, and they've always been critical in the data center. But we really need to partner with you to be able to deliver a full experience and offer that protection that is necessary for a customer's mission-critical environment. So VMware and Dell DPS, I mean, together, no one can compete with us. It's actually exciting where we are today. But most importantly, some of the things that we're doing moving forward. >> And one of the obvious advantages that Dell Technologies has with respect to VMware is joint VMware engineering and that deep integration. Tell me a little bit more about that, and how that is an advantage when you're talking and sell situations with your customers? >> Yeah, it's a. So I always say that probably about 18 months ago, we really started to put together this joint development start to get really tighter from a technology standpoint, because you can't just show up one day and say, Hey, I'm the best in this market, right? You really need to be building, something and get to a point and so about 18 months ago, I tell customers, that's when Dell and VMware really came together and started doing more in terms of strategic solutions. And it's paying off for us. So if you think about VMC, very critical, VMware Cloud, very very important for their future and their success. We were the first to market with that integration. If you think of Kubernetes, and the importance of Kubernetes. Moving forward, we were first integrated with that with VMware, so our engineering investments are paying off. And this is just the beginning of where that relationship is going to be. As we exit this year, our solutions together will be second to none in the market. And quite frankly, there'll be no one else left in the market that can compete with us from a technology and that's good, not just for our customers and our partners, and not just good for Dell DPS. But most importantly, that's really important to VMware right? They're scaling, they're growing tremendously. They're the leader in this market, and they want to continue to own more of a customer experience. And to do that they need a data protection partner that can help them and so we got a great relationship going right now and it's only getting better. >> That's good to hear. So in terms of data protection, let's let's dig into that third wave, which was Cyber Recovery because one of the things that we know is happening during the pandemic is that cybersecurity issues are on the rise. We know that as technology advances, and it's used for good applications. The bad actors also have access to it. I was reading from the FCC the other day that just since March, there are about 1000 new domain names registered every day with COVID-19. There's malware that's easily dropped on a suspecting persons a endpoint because maybe it has a really entirely enticing title from the World Health Organization. What are you seeing in your customer environments with respect to Cyber Recovery? And is it is security now even more of an important factor given that this work from home situation is probably going to continue for some businesses for quite some time? >> Yeah, I think, our customers have a lot of different challenges now with with COVID-19. And one of them was how do you get your workforce working remotely. And sometimes you have to cut corners to get that done. And what that does is open you up for more challenges, more security breaches. And on top of that, is we're seeing the I call them the bad guys, the bad guys are out there right now attacking our customers more than they ever had. So, before COVID-19 ransomware was a big problem. And now it's, it's even worse. And so I think the bad guys see that they have an opportunity to go out there and really hurt some of these companies hold them, hold them for ransom, get some money from them, which is very unfortunate, but at the same time, that's the reality that we're living in. So before COVID-19, we had a massive customer acceptance, so looking at what we delivered from a Cyber Recovery Solution. And now since COVID-19, is about a 4,000% increase in ransomware attacks, we're seeing every one of our customers really starting to adopt the Cyber Recovery Vault that we delivered to the market today. Now we it's this isn't something new, right? We we've been building on this since about 2016. And our solution has gotten better and better and better, to now where absolutely, we've always been the leader in this market. But now we have such an incredible lead with our customers in terms of how we can help them in the challenges that are exacerbating in their install base. We're really in the right place at the right time. It's unfortunate for our customers, but at the same time, they have to protect their assets. They always have to be able to recover their their their assets or the business won't continue. So it's an unfortunate thing for them, but Dell is here to help take care of one of these problems that they have which is protecting their mission-critical assets. >> Right. And this mission-critical assets are on devices. They're in Cloud applications like office 365, or Salesforce business-critical, revenue-critical data. They're in a data center, they're in VMs. How are you helping customers kind of evaluate if they're in a situation now where they realize maybe we haven't put the emphasis into data protection that we need to? How do you help a customer sort of stack rank and prioritize knowing that the threat vectors are fairly holistic and get a solution from Dell Technologies implemented, and securing them as fast as possible? >> Yeah, it's a good it's a good question. It's kind of a hard one to answer because our customers have data everywhere. So it's a hard one for our customers to kind of figure it out. But what we can do is we can start in different places for them so we can work with them on assets that things that absolutely for them to restart their business, we have a solution that allows them or a way that we say look for you to get your business back up and running there's a critical rebuild there's things that absolutely need to be able to lay down your foundation before you even consider dropping assets, or any applications back out there. So that's like a first step of hey, let's at least size out how you get your critical rebuild up and running. But then there's other companies like big banks that say, well, I need all my customer information no matter what, and I need to recover that. So it's it can get a little complicated. Sometimes we have customers, because they have to figure out what assets they want to put in the vault and how do they want to recover that data. And what's the RPO RTO time but for us, we can work with them and say here's the critical rebuild. Here's the first step of getting your information back from the bad guys or back from wherever you're storing it today. But then on top of that, we can start to expand with them. And they can start to protect more and more things and add to the ball more and more the critical applications that they have out there. And, no one understands this better than us. And so it's good because we can help our clients size where they are today, we can help take a snapshot of their environment today. And then we can recommend what we think is step one, and depending on their appetite, depending on their urgency, we could take them from step one to step done, right? We can, we can cover all their assets, so we can start with their mission-critical and move down to other applications. So the good news for our customers, we have the only secure vault in the market. And we also have the expertise and the people to be able to help them understand how they can get going. >> Last question, Jim, for you in terms of the choices of the technologies that Dell Technologies offers to your customers, Dell has been the leader in the purpose-built backup of plan market. Since IDC invented that category, but the market is bifurcating, and we're seeing Integrated Data Protection Appliances IDPA, even though it's a smaller term, that market is growing faster. Talk to me about the different choices of technologies that you deliver to your customers? >> Yeah, I guess there's a couple ways to look at there's a traditional way of a customer building out their solution and that would be the traditional purpose-built backup appliance Data Domain with our software. And so they would kind of build that build on their own, they put the software in the hardware together, and that would be their solution. What we are seeing more and more is that customers are looking for that integrated appliance. And I'm happy to say that, our IDPA solution, which was a little bit behind getting to the market is now right in the center of the market and picking share right? We are easily outgrowing the market. This is something that we're putting our shoulder behind. We're pushing really high with our customers. Our customers are extremely happy. So thank you to the engineering team, the services team, the product management team that, really helped us get from where we were, say three years ago to where we are now. Now our customers are really pushing for that integrated experience, because they're flying to quality. There's a flight to quality right now, someone that might have multiple backup applications might have multiple hardware solutions. They're trying to get to one vendor, they're trying to get to one partner, they are trying to make this a simpler experience. And so from Dell, because we cover all the use cases that our customers have out there, they're looking at us as that one provider, that one vendor that can deliver on the full experience across their whole environment, not just maybe the VMware solution, maybe not just a couple of databases, maybe not just their Cloud applications. They want a vendor that can provide solutions. Across all of their workloads across all of their use cases, and no matter where the data sits in a remote office, on-prem in a data center or in the cloud, and that's where IDPA comes in, we can deliver a solution that covers all customers use cases, with the same experience from Dell, which is second to none. So that's where IDPA is exciting. That's where IDPA is growing up place in the market. And that's where teams have to really spend time helping customers understand how they can consolidate down to one vendor, which is Dell, and be able to cover all of their requirements. So it's pretty exciting time on what we're delivering from an IDPA standpoint. And we are clearly taking share on that market right now. >> Well Jim, thank you for joining me on theCUBE today talking about those three waves, Cloud, VMware, Cyber Recovery and how Dell is really helping your customers rapidly pivot in these turbulent waters to capitalize on some of the new opportunities that are clearly there, we appreciate your time, Jim. >> Yeah, thanks for having me and we're going to continue to ride the waves and be really successful. >> All right, for Jim Clancy, I'm Lisa Martin. You're watching theCUBES conversation with Dell Technologies. (soft music)
SUMMARY :
leaders all around the world, And I'm pleased to welcome back one Looking forward to our conversation. But some of the things that I noticed Talk to me about these three waves that we shared with our teams at FRS, doing to help them in And a lot of it has to to you guys say, hey is here to help them with stepping up customers to be able And to do that, And one of the obvious advantages And to do that they need that we know is happening but Dell is here to help take care of one that the threat vectors And they can start to Talk to me about the different And I'm happy to say that, of the new opportunities that to ride the waves with Dell Technologies.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Jim | PERSON | 0.99+ |
Jim Clancy | PERSON | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
World Health Organization | ORGANIZATION | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
FCC | ORGANIZATION | 0.99+ |
Palo Alto | LOCATION | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
June 2020 | DATE | 0.99+ |
Dave | PERSON | 0.99+ |
February | DATE | 0.99+ |
Dave Volante | PERSON | 0.99+ |
60% | QUANTITY | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
Lisa | PERSON | 0.99+ |
VMware | ORGANIZATION | 0.99+ |
March | DATE | 0.99+ |
First | QUANTITY | 0.99+ |
zero dollar | QUANTITY | 0.99+ |
first | QUANTITY | 0.99+ |
2020 | DATE | 0.99+ |
one partner | QUANTITY | 0.99+ |
Global Data Protection Solutions | ORGANIZATION | 0.99+ |
IDC | ORGANIZATION | 0.99+ |
one | QUANTITY | 0.99+ |
three years ago | DATE | 0.99+ |
first step | QUANTITY | 0.99+ |
today | DATE | 0.98+ |
FRS | ORGANIZATION | 0.98+ |
one provider | QUANTITY | 0.98+ |
COVID-19 | OTHER | 0.98+ |
Boston | LOCATION | 0.98+ |
one vendor | QUANTITY | 0.98+ |
second | QUANTITY | 0.97+ |
office 365 | TITLE | 0.97+ |
California East Coast | LOCATION | 0.96+ |
COVID | EVENT | 0.96+ |
about 18 months ago | DATE | 0.96+ |
pandemic | EVENT | 0.95+ |
step one | QUANTITY | 0.95+ |
about 1000 new domain names | QUANTITY | 0.94+ |
one thing | QUANTITY | 0.94+ |
this year | DATE | 0.93+ |
VMC | ORGANIZATION | 0.93+ |
Mark Sanders, Dell Technologies | CUBE Conversation, June 2020
>> Commentator: From theCUBE studios in Palo Alto, in Boston, connecting with thought leaders all around the world, this is a CUBE conversation. >> Welcome to theCUBE's conversation with Dell Technologies. I'm Lisa Martin and today I'm talking with Mark Sanders, the VP of Global Presales from the Data Protection Division at Dell Technologies. Mark, welcome to theCUBE. >> Thank you for having me, Lisa. >> Great to meet you virtually in this new world that we're all operating in. So I want to understand a couple of things, when you were in the field talking with customers, as I'm sure you are on a daily basis, now virtually. But, in terms of value, I think nowadays for businesses to understand the value that technology decisions and longterm benefits can make to their environments is critical as budgets are changing, they're shrinking, et cetera. Validate the Value or VTV is a methodology that Dell EMC has pioneered. Tell me about that and what does it actually mean? >> Yeah, I mean, when was the last time a customer said, "Hey, I need to do more with less", right? It just doesn't happen. So, the reality is customers are under extreme pressure when they make us an investment, to validate that what they planned it to solve, like, what's the outcome they're looking for actually came true. And, you know, we pioneered this process where we go back in after a solution has been implemented, and it's, you know, been installed for a little bit of time and go in and pull a bunch of stats from the system so we can objectively provide data to the customer that says, this is the actual performance, this is the actual outcome that you receive for the solution that you invested in. And then, you know, what's really transpired once we created that process is customer really loved seeing this information, so they wanted to see it on a frequent basis and it kind of evolved into a process where we can quickly identify key KPIs with a dashboard view, DU proficiency, time to back up, time to restore, success, failure rates and as systems evolve continually provide an update to the customer on the value of the system that they have from us is providing to them and keep in front of mind and then, you know, nowadays we not only show them the stats of the system, but also then validate the actual Cost to Serve, meaning the amount of data they're holding versus the investment they've made, you do the math, you can come up with a cost per Gigabyte to that store on the system, which are key metrics that customers like to see. >> Well, that quantification is critical, right? Because there's a lot of competitors in the market that do similar things, but being able to not just show metrics from a survey or an analyst report, but actual customer metrics. These are the numbers that we're generating for you on a weekly or a monthly basis. That sounds pretty differentiating. >> It sure is. The reality is, if you can show a customer not only the performance of their system and validate it to that level, that really puts a lot of the noise in the system from different competitors who are claiming other things, you know, puts it to rest when the real data, it's really performing, the cost of service is exceptional. When they compare that to another solution that they're looking at, it's a no brainer that why they continue to invest in and stay with Dell EMC. The other point of this is you can show an Automatized B2B to potential customer to show, hey, this is a customer, the same vertical you are, who's doing the same things that you're talking about doing with us. Here are the stats that they're seeing, it's a real proof points and what I've found in the market is those who can truly show the value that their system can do and validate it do, and those who just rely on Marchitecture and PowerPoint slides and handshakes, they don't talk about these things and, you know, if you scan the market, I don't hear any other vendor talking about validate the value or showing objective stats after implementation and actually doing the cost and serve math for them. And you should be asking yourself as a customer who's considering us, why aren't the other guys talking about this? It's because their numbers aren't as good as ours. If you had better stats than us, I guarantee you'd be talking about it all day long, twice on Sunday. >> So validate the value, how does that synergize with TCO and ROI some of the other metrics that we're often used to hearing? Is this a kind of like a trifecta where you can really show customers a number of significant statistics to show what they're in real time achieving with your technologies? >> Yeah, so there's a number of stats that are covered in a value to value, the amount of data that's protected and mandated your storing, how long it takes to back data up, how many systems are being protected and then, you know, we factor that into the original investment that you made, come up with your cost to serve. So those key metrics then validate the ROI or the return on investment that you're looking for, you know, are you able to meet the current demand need that you sized the system for? Therefore you don't have to invest more and so the actual projection on that TCO is true. You can continually validate that along the way and a normal customer will look at a B2B and their stats on a quarterly or six month basis, a rolling basis just to make sure that ROI, TCO, that they were, you know, that you modeled in the beginning is actually coming through. See what happens is a lot of times people think they have ROI, but then the reality is whoever sold them something didn't sell them enough, and then they have to invest more in, and so that ROI gets thrown out of whack and they don't go back and validate that they actually did meet the ROI. So one of the things we really pride ourselves on is sizing, being able to deliver a solution that performs as designed, you stand behind it and then we continually validate that we're being able to meet those milestones to hit that ROI. >> Can you give me a customer example in any industry that you think really, highlights and underscores the hallmark of what VTV actually means and delivers? >> Yeah, so we've done so many of these last year, just to give you an example, we did something like 33,000 Value to Values across all the different customers that we have. And so you see some very common statistics when you look at these as many of them as I do. So a common statistic will be, you know, 99% success rate, that means that 99% of the time, all the backups complete and finish a hundred percent, there's no issues. And then another common statistic is that, you know, about 80 to 90% of the backups finish in less than an hour. That means that out of all the thousands of clients that you have, almost, you know, almost all of your backups are actually happening in less than an hour, showing the performance of our system. And then the typical stats we see on a deduplication are anywhere from 20 to 100 to 1, it just depends on how many backups you're doing a day and what your intention is, but we see significant value on the deduplication of timeline. And then the last bit I'll tell you that's pretty typical is the actual, you know, replication window, how much data you have to replicate, right? There's three stats that show up here, the daily DD Break, the weekly DD Break and the overall. We typically show the overall, and that gives you your cost to serve, which is typically pennies a gig but what's very interesting is that daily DD Break is the amount of data you have to replicate. And that is consistently super low due to a high DD Break which drives that TCO that you were talking about before, who said drives ROI, right? If you have to invest in more bandwidth because the solution you have does not perform and you constantly are sending way more data than was advertised to you, you know, pipes are expensive, dedicated connections become costly, and it is opening up a new link becomes a real burden to an enterprise. >> So as organizations are evolving every day and especially in the COVID situation, when there's so much acceleration going on at the same time as there's budgets that are shrinking or being depleted or being eliminated, customers are also in this multi-cloud hybrid world in which they live, where they're trying to manage pretty much every organization that a suite of traditional technologies and they're taking on emerging technologies, whether it's Cloud Native, SaaS, 5G or Kubernetes. So how does Dell EMC help customers manage and protect this critical data across traditional technologies and those emerging and really be able to manage all of that, from a single pane of glass, ensuring that everything is protected from any type of accidental or malicious incident? >> Well, that's a lot, but let's go kind of unpack that real fast, right? So there's a couple of things that Dell does, which makes us unique in this current market that we live in where Multicloud you have both proven workloads that have been around for a while that still need protecting, plus you're looking at modern workloads, whether it's containers, Kubernetes or you can have stuff in Azure, Amazon, Google, you know, multiple clouds or you have your own private cloud. The reality is most customers have multiple applications in a life cycle management situation where they may have some older applications they're going to be around for several years while they're still doing modern apps at the same time. And so Dell's really got, you know, what we categorize is, you know, proven in modern and then coexistence. And the reality is, is that we have both proven technology that delivers a fantastic performance, fantastic ROI, fantastic cost to serve, and really protects that application tool set that's been out there in the market for a long time that customers still have. At the same time we now have modern capabilities that address things like Kubernetes and Multicloud and the ability to manage that all from a single pane of glass, click and launch, single sign on, everything's HTML5, simple and easy to do, the same time delivering full API transparency. A lot of customers have both the need for UI and full automation through an API and so it's this value that we unlock by allowing the customer to have a single vendor that protects both proven in modern capabilities and proven in modern workloads across all the different cloud environments that they need. So they don't need another vendor and I know we were talking earlier about the study that we've done at Dell, the Global Data Protection Index, done it multiple years in a row and it consistently shows that companies who have multiple data protection vendors to protect their workloads, tend to lose more data when they have a data loss, those data loss events take longer to recover and they cost more than a customer who's running a single vendor to protect all their workloads. Now, what happens when you partner with somebody who doesn't have that proven and modern coexistence capability for you to tap into? You're forced to then have another vendor in your mix to help you protect that modern workload or another vendor to stay with you, to help protect it, a proven workload that's not going anywhere for anytime soon. Plus entering more risks, more costs into your environment. Dell's really in a unique position with our proven and modern coexistence strategy, allowing our customers to remove that risk and have all the value unlocked so that they don't really have to worry about, hey, I got another use case. I'm going to Azure, I'm going to Amazon, I'm going to Google, I want it to back up on Chrome and want to replicate to the cloud. All that's covered with our solutions. There's no other vendors required. >> In that 2020 Global Data Protection Index research survey that you mentioned, an interesting stat that popped out to me is that about 80% of the respondents and I think there was about a thousand IT decision makers who have responded, over 80% said, we are using multiple data protection solutions. So presumably a big market opportunity for you guys. How do you go in, walk me through the strategy of helping a customer, either extract existing data protection solutions or maybe even coexist? >> Yeah. >> I'll use that word in a different route, What is that typical scenario like? If I can ask you to take something, I'm sure that's very broad, but maybe standardize it a bit? >> Yeah, so there are, you know, Dell's, in addition to this coexistence proven and modern strategy that we offer our customers, we have multiple ways for them to consume that strategy. One is software defined, another is integrated with our integrated data protection appliance and then we also have purpose-built technology. And so our ability to walk into a customer's environment and immediately add value by replacing one of the things that they use for data protection and our ability to support third-party allows them to easily transition off of something that they've been using for a while and onto our single vendor strategy. So we have, you know, the ability to deliver that capability right out of the gate, give them some value and then transition them over to a single vendor across all their work use cases. The other thing that you pointed out, is the opportunity is huge, you know, we have a number one share, according to IDC's recent poll for last year, but you know, the percentage of market share is, you know, we still have a lot of room to grow. So there's a lot of customers for us to continue to go help. And because of that, you know, it's all about getting to the customer with the message that, hey, I can help you now, I can help you remove risk and I can help you transition off of these multiple solutions to a single vendor. Some customers want to go really quickly, some want to go over time, and we are in a position to give them multiple options to make that journey happen. >> In this very interesting 2020 year that's unfolding, are you seeing more customers with the need to accelerate? As they have now, an expanding multi-cloud organization with, you know, traditional and emerging technologies. Are they coming to you saying help me actually get off of these multiple solutions? I understand the stats about the risks and the POS, is that acceleration point to me that you're seeing it as a trend? >> For sure, there's several things that happen in when you have a stress factor like we're dealing with now where, you know, the need to do more with less and to save money is more paramount now than it's ever been and so kind of some of the old things that stopped IT professionals from really transforming to get true cost savings if they go down this journey, you know, all those blockers are now kind of off the table and people are seriously looking at how do I reduce risks? How do I get myself in a situation where I'm partnered with a quality vendor? And then, how do I save money at the same time? And so we've done several things to help our customers with that process. One is we released a new a cloud subscription model that allows our customers to consume all of our functionality for much less than if they paid for all those individual piece parts, allowing them to take advantage of prepaying it upfront or paying on an annual basis so they can get some more cash to spend on other investments. And then our efficiencies have increased this year as well so systems that used to take up multiple racks can now be fit into a single rack and actually can store more data. So we're finding more value in the data center, while continuing to evolve that Cost to Serve strategy, then try to drive costs out of the environment and what we tend to find is when you consolidate multiple platforms, there's a lot of inefficiency in that. So there is a lot of savings initially if you go to one vendor, but then you know, when we go to our existing customers already done that, how do we then continue to save them more money, right? And, that's really the value that we're doing here. Now, the other thing I will tell you is in this pandemic, we're also seeing a real fight to security. And some of the value that we've unlocked for our customers with our cyber recovery solutions is also another key technology wave they've really gripped onto, with less physical people on site to help solve, you know, cyber recovery issue where they've maybe got impacted. They're really looking for vendor solutions that have that full coverage that can easily be implemented to allow them to quickly recover from an event. So, you know, when you combine those things together, we're really delivering some value and helping our customers both save money, transition and remove risk from their environments, which are key in this current market that we're in. >> Absolutely and I think the theme of this interview, Mark would be quantification. It really sounds like what Dell is able to do is show customers the hard numbers about significant benefits to their environment. So we thank you so much for walking us through that. There's a lot to unpack there, but this has been a great conversation. We appreciate your time, Mark. >> Thank you for having me. >> From Mark Sanders, I'm Lisa Martin. You're watching theCUBE with Dell technologies. Thanks for watching. (upbeat acoustic music)
SUMMARY :
leaders all around the world, Welcome to theCUBE's Great to meet you for the solution that you invested in. in the market that do similar things, the same vertical you are, that they were, you know, that you modeled and that gives you your cost to serve, and especially in the COVID situation, and the ability to manage that all from research survey that you mentioned, is the opportunity is huge, you know, Are they coming to you saying that happen in when you So we thank you so much for with Dell technologies.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Lisa Martin | PERSON | 0.99+ |
Mark Sanders | PERSON | 0.99+ |
Palo Alto | LOCATION | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
99% | QUANTITY | 0.99+ |
Mark | PERSON | 0.99+ |
June 2020 | DATE | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
Lisa | PERSON | 0.99+ |
last year | DATE | 0.99+ |
HTML5 | TITLE | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Boston | LOCATION | 0.99+ |
twice | QUANTITY | 0.99+ |
less than an hour | QUANTITY | 0.99+ |
2020 year | DATE | 0.99+ |
20 | QUANTITY | 0.99+ |
PowerPoint | TITLE | 0.99+ |
over 80% | QUANTITY | 0.99+ |
six month | QUANTITY | 0.99+ |
Sunday | DATE | 0.99+ |
three stats | QUANTITY | 0.99+ |
ORGANIZATION | 0.99+ | |
one | QUANTITY | 0.98+ |
both | QUANTITY | 0.98+ |
IDC | ORGANIZATION | 0.98+ |
theCUBE | ORGANIZATION | 0.98+ |
Dell EMC | ORGANIZATION | 0.98+ |
Chrome | TITLE | 0.98+ |
one vendor | QUANTITY | 0.98+ |
single | QUANTITY | 0.98+ |
Data Protection Division | ORGANIZATION | 0.98+ |
today | DATE | 0.97+ |
a day | QUANTITY | 0.97+ |
about 80% | QUANTITY | 0.97+ |
1 | QUANTITY | 0.97+ |
single rack | QUANTITY | 0.97+ |
VTV | ORGANIZATION | 0.97+ |
90% | QUANTITY | 0.96+ |
Multicloud | ORGANIZATION | 0.96+ |
100 | QUANTITY | 0.96+ |
One | QUANTITY | 0.95+ |
Global Presales | ORGANIZATION | 0.94+ |
single vendor | QUANTITY | 0.94+ |
hundred percent | QUANTITY | 0.94+ |
33,000 | QUANTITY | 0.93+ |
Azure | TITLE | 0.91+ |
single pane | QUANTITY | 0.9+ |
Multicloud | TITLE | 0.9+ |
thousands of clients | QUANTITY | 0.9+ |
TCO | ORGANIZATION | 0.88+ |
Kubernetes | TITLE | 0.87+ |
about a thousand IT decision makers | QUANTITY | 0.85+ |
pandemic | EVENT | 0.84+ |
one share | QUANTITY | 0.82+ |
99% of | QUANTITY | 0.81+ |
about 80 | QUANTITY | 0.81+ |
single pane of glass | QUANTITY | 0.81+ |
this year | DATE | 0.78+ |
Azure | ORGANIZATION | 0.77+ |
Marchitecture | ORGANIZATION | 0.76+ |
2020 Global Data Protection Index | TITLE | 0.72+ |
Global Data Protection Index | TITLE | 0.68+ |
Gigabyte | ORGANIZATION | 0.66+ |
things | QUANTITY | 0.65+ |
daily | QUANTITY | 0.61+ |
every organization | QUANTITY | 0.56+ |
Beth Phalen, Dell EMC | CUBE Conversation, March 2020
from the silicon angle media office in Boston Massachusetts it's the queue now here's your host David on tape the imperative to protect data has never been more pressing as companies transform themselves from businesses into digital businesses the intrinsic value of their data Rises exponentially the problem for infrastructure pros is that everything in IT is additive it seems like nothing ever dies which means more things to manage now think about that when you're protecting data you have bare metal VMs now containers you've got cloud you got to worry about the edge all this data needs to be protected not only does this increase complexity it expands the attack surface for adversaries wanting to steal or ransom your data at the heart of all this is a build out of a massively global distributed cloud we saw wave 1 of the cloud which was public wave 2 was really hybrid and that's evolving now in parallel you're seeing the emergence of multi cloud and as I said these earlier trends are additive they're not replacements and with me to discuss these important issues and how Dell EMC specifically is pivoting toward cloud data protection is Beth Phelan who was the president of Dell emcs Data Protection Division that's great to see you well good to be here again so we know the world is hybrid it's a fundamental the on-prem stuff is part of the fundamental digital digital transformations of these these companies and now you've got data protection for the cloud so what do you see happening in that world yeah let's start with what we're seeing in the market we recently remade our global data protection index we've been doing it for many years and we've been really using that to help us understand the landscape and what our customers need and first not surprisingly it shows that continued trend of movement and reliance towards cloud environments for business applications sure continuing to increase on top of that the customers despite that are continuing to struggle with ensuring they have the right data protection for their cloud environments right so they're they're struggling you see that we see that as well what what's going on there Wow what is the data tell you yeah first of all more than half the customers don't have a comprehensive data protection solution for their Salas cloud native and multi cloud environments more than two-thirds of the customers who may be relying on their cloud service providers for data protection say that they do not have a solution that covers all of their workloads so whether they're working with a cloud service provider or some other vendor they're being really clear that they do not have a comprehensive approach to cloud data protection yeah so I mean you see the cloud adoption is going like crazy but it seems like the data protection component is lagging how is that affecting the traction in your business yeah you know it's a double-edged sword right on one level customers see the advantages of moving to a cloud but on the other hand you know they are really looking for vendors that they can partner with to still have the same confidence that the data is protected that they have on Prem and what we're seeing now is that customers are turning to us to help solve that problem we have over a thousand customers using Dell EMC for their Cloud Data Protection and we're narrowing in on three exabytes of data that we're currently protecting in the cloud so it's happening yeah that's pretty good traction so I want to talk about VMware obviously VMware is the linchpin of many customers hybrid strategy and it's a clearly an important component of Dell technologies talk a little bit about the relationship between Dell EMC data protection specifically and VMware I'm interested in you know they've announced project tenzou and there's kubernetes how are you guys working together to really deliver a value for customers so we are super excited about the opportunity to work so closely with VMware because as their in their domain we're working directly with them and that's an advantage that comes with being part of the dell technologies family and so we were the first company to bring data protection for were kubernetes environments out to market it's available now so you'll see us bring that into the tan zoom mission-critical has been moved forward partnering closely with with VMware and of course we're already fully certified for VMware cloud it's really an ongoing regular conversation about how we can work together to bring the best to our customers so Beth I gotta ask you so you're part of your role as the leader of the the division is obviously you got a you got a lot of mouths to feed big division you got to make your plan you got to deliver for customers but strategy is another key component of this how do all these cloud trends shape your strategy so core to our strategy is to be the essential provider of data protection for multi cloud environments so no matter where customers are choosing to deploy their applications they can have the same confidence that they always did that that data is protected and the way they can get it back so that's core and if you want three words to remember for our strategy think VMware cloud and cyber cloud is central to it and you're gonna be hearing a lot more about it in the weeks and months ahead okay so I gotta ask you break out your binoculars maybe even the telescope what are the future what are the futures look like when you think about the division and the market so we've been talking about cloud for a long time but we are still in the middle of this journey customers are going to rely on the cloud even more for additional use cases and especially in the data protection space right now we're seeing backup to the cloud dr to the cloud but the future will include cyber resiliency that's leveraging cloud deployments you're also going to see more and more of an emphasis on people leveraging SAS for their software consumption and for us that means not only protecting SAS applications but it also means giving customers the option to consume data protection in a SAS model we already do that today with things like cloud snapshot manager with things like the power protect management and orchestration but you're going to see us do even more of that because they're just incredible benefits of people leveraging sass to consume their software data constantly evolving lamps landscape data protection has to evolve with it that thanks so much for her thank you thank you keep it right there we'll be right back right after this short break
**Summary and Sentiment Analysis are not been shown because of improper transcript**
ENTITIES
Entity | Category | Confidence |
---|---|---|
Beth Phelan | PERSON | 0.99+ |
Beth Phalen | PERSON | 0.99+ |
David | PERSON | 0.99+ |
March 2020 | DATE | 0.99+ |
wave 1 | EVENT | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
Dell EMC | ORGANIZATION | 0.98+ |
Beth | PERSON | 0.98+ |
Boston Massachusetts | LOCATION | 0.98+ |
over a thousand customers | QUANTITY | 0.98+ |
today | DATE | 0.98+ |
VMware | ORGANIZATION | 0.97+ |
more than two-thirds | QUANTITY | 0.97+ |
three exabytes | QUANTITY | 0.95+ |
one level | QUANTITY | 0.94+ |
wave 2 | EVENT | 0.94+ |
more than half | QUANTITY | 0.94+ |
dell | ORGANIZATION | 0.93+ |
first company | QUANTITY | 0.92+ |
first | QUANTITY | 0.88+ |
three words | QUANTITY | 0.85+ |
SAS | TITLE | 0.82+ |
Data Protection Division | ORGANIZATION | 0.81+ |
public | EVENT | 0.79+ |
VMware cloud | TITLE | 0.67+ |
double-edged | QUANTITY | 0.62+ |
many years | QUANTITY | 0.56+ |
SAS | ORGANIZATION | 0.5+ |
Rob Emsley, Dell EMC | CUBE Conversation, March 2020
>> We're back with Rob Emsley who's the director of product marketing for Dell EMC's data protection division. Rob, good to see you. >> Hi, Dave, good to be back. >> So we just heard from Beth about some of the momentum that you guys have. From your perspective, from a product angle, what is really driving this? >> Yeah, well, one of the things that we've definitely seen is as we talk to our customers, both existing and new customers, cloud journeys is top of mind for all of the CIOs. It's being driven by either the desire to drive efficiency, take out costs, and data protection is one of the most common use cases. One of the things that we find is there's four use cases for data protection that we see. Long term retention of data, cloud disaster recovery, backup to the cloud, and the emerging desire to stand up new applications in the cloud that need to be protected. So backup in the cloud really completes the four major use cases. >> Well, one of the things I think is really important in this market is that you deliver optionality to your customers. So how are customers enabling these use cases? >> Yeah, so the first two use cases of long terms retention and cloud disaster recovery is really driven by our software and our appliances. Both of those are really predicated based upon the assumption that customers are going to deploy data protection on premises to protect their on premises workloads and then tier to the cloud, or, which is becoming more common, use the cloud as a disaster recovery target. It's delivered by our data protection software and that's either in a software form factor or that software delivered and integrated appliance form factor. >> So let's talk about purpose built backup appliances. I think our friends at IDC I think coined that, they tracked that market for awhile, you guys have been a leader there, the acquisition of Data Domain obviously put you in a really strong position. Give us the update there. Is it still a vibrant market? Is it growing, what's the size? What's it look like? >> Yeah, so as we look at 2020, IDC forecasts the market size to be a little under $5 billion. So it's still a very large market. The overall market is growing at a little over 4%. But the interesting thing is that if you think about how the market is made up, it's made up of two different types of appliances. One is a target appliance, such as Data Domain and the new PowerProtect DD, and the other is integrated appliances where you integrate the target appliance architecture with data protection software. And it's the integrated appliance part of the market that is really growing faster than the other part of the PBBA market. It's actually growing at 8%. In fact, IDC's projection is that by 2022, half of the purpose built backup appliance market will be made up of integrated appliance solutions. >> So it's grown to twice the overall market rate, but you guys have two integrated appliances. Why two, how should people think about those? >> Yeah, so a little under three years ago, we introduced a new integrated appliance called the Integrated Data Protection Appliance. It was really the combination of our backup software with our Data Domain appliance architecture. And the Integrated Data Protection Appliance has been our work course for the last three years, really allowing us to support that fastest growing segment of the market. In fact, last year, the Integrated Data Protection Appliance grew by over 100%. So triple digit growth was great. It's something that allows us to address all market segments, all the way down to SMB all the way to the enterprise. But last year, one of the things you may remember at Dell Technologies World is we introduced our PowerProtect portfolio and that constituted PowerProtect Data Manager our new software defined platform as well as the delivery of PowerProtect Data Manager in an integrated appliance form factor with PowerProtect X400. So that's really our new scale out data protection appliance. We've never had a scale out appliance in the architecture before, in the portfolio before, and that gives us the ability to offer customers choice, scale up, or scale out, integrated and target, and with the X400, it's available as a hybrid configuration or it's also our first all Flash architecture. So really, we're providing customers with the existing software solutions that we've had in the market for a long time, an integrated form factor, with the Integrated Data Protection Appliance as well as the brand new software platform that will really be our innovation engine. That will be where we will be looking at supporting new workloads and certainly leaning into how we support cloud data protection in the hybrid cloud reality of the next decade. >> Okay, so one of the other things I want to explore, is we've heard a lot about your new agile development organization, Beth has talked about that a lot, and the benefit, obviously, is you're able to get products out more quickly, respond to market changes, but ultimately the proof is in translating that development into product. What can you tell us about how that's progressing? >> Yeah, so certainly with PowerProtect Data Manager and the X400, that really is the epicenter of our agile product development activities. We've moved to a three month cadence for software releases, so working to deliver small batch releases into the market much more rapidly than we've ever done before. In fact since we introduced PowerProtect Data Manager where we shipped a first release in July, we're now at the third iteration of PowerProtect Data Manager and therefore the third iteration of the X400 appliance. So there's three things that I'd like to highlight within the X400 appliance specifically. First is really the exciting news that we've introduced support for Kubernetes, so we're really the first large enterprise data protection vendor to lean into providing Kubernetes data protection. So that becomes vitally important especially with the developments over at our partner in VMware with vSphere 7, with the introduction of Tanzu, and the reality is that customers will have both vSphere virtual machines and Kubernetes containers working side by side and both of those environments need to be protected. So PowerProtect Data Manager and the X400 appliance has that support available now for customers to take advantage of. Second, we talk about long term retention of data in the cloud. The X400 appliance has just received the capabilities to also take part in long term retention to AWS. So those are two very important cloud capabilities that are brand new with the X400 appliance. And then finally we introduce the X400 appliance with a maximum configuration of four capacity cubes. Rough and tough that was 400 terabytes of usable capacity. We've just introduced support of 12 capacity cubes. So that gives the customers the ability to scale out the X400 appliance from 64 terabytes all the way to over a petabyte of storage. So now if you look at our two integrated appliances, we now cover the landscape from small numbers of terabytes all the way through to a petabyte of capacity whether or not you pick a scale up architecture or a scale out architecture. >> Yeah, so that really comes back to the point I was making about optionality. Kubernates is key. It's going to be a linchpin, obviously, a portability for multi cloud sets that up. As we've said, it's not the be-all end-all, but it's a really necessary condition to enable multi cloud which is fundamental to your strategy. >> Absolutely. >> All right, Rob, thanks very much for coming to theCUBE. It's great to have you. >> Thanks, Dave. >> And thank you for watching, everybody. This is Dave Vellante for theCUBE. We'll see you next time. (bright music)
SUMMARY :
Rob, good to see you. about some of the momentum that you guys have. and the emerging desire to stand up new applications Well, one of the things I think is really important Yeah, so the first two use cases the acquisition of Data Domain and the other is integrated appliances So it's grown to twice the overall market rate, that fastest growing segment of the market. and the benefit, obviously, So that gives the customers the ability Yeah, so that really comes back to the point It's great to have you. And thank you for watching, everybody.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Dave Vellante | PERSON | 0.99+ |
Rob Emsley | PERSON | 0.99+ |
Rob | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
last year | DATE | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
2020 | DATE | 0.99+ |
March 2020 | DATE | 0.99+ |
first | QUANTITY | 0.99+ |
July | DATE | 0.99+ |
8% | QUANTITY | 0.99+ |
Beth | PERSON | 0.99+ |
64 terabytes | QUANTITY | 0.99+ |
400 terabytes | QUANTITY | 0.99+ |
First | QUANTITY | 0.99+ |
Second | QUANTITY | 0.99+ |
2022 | DATE | 0.99+ |
IDC | ORGANIZATION | 0.99+ |
two | QUANTITY | 0.99+ |
third iteration | QUANTITY | 0.99+ |
X400 | COMMERCIAL_ITEM | 0.99+ |
one | QUANTITY | 0.99+ |
Both | QUANTITY | 0.99+ |
Dell EMC | ORGANIZATION | 0.99+ |
both | QUANTITY | 0.99+ |
over 100% | QUANTITY | 0.99+ |
two integrated appliances | QUANTITY | 0.99+ |
12 capacity cubes | QUANTITY | 0.98+ |
under $5 billion | QUANTITY | 0.98+ |
twice | QUANTITY | 0.98+ |
next decade | DATE | 0.98+ |
One | QUANTITY | 0.98+ |
three month | QUANTITY | 0.98+ |
over 4% | QUANTITY | 0.97+ |
first release | QUANTITY | 0.97+ |
four major use cases | QUANTITY | 0.97+ |
Dell Technologies World | ORGANIZATION | 0.97+ |
vSphere 7 | TITLE | 0.97+ |
three things | QUANTITY | 0.96+ |
first two use cases | QUANTITY | 0.96+ |
PowerProtect Data Manager | TITLE | 0.94+ |
two different types | QUANTITY | 0.92+ |
four use cases | QUANTITY | 0.91+ |
Data Domain | ORGANIZATION | 0.89+ |
petabyte | QUANTITY | 0.86+ |
last three years | DATE | 0.84+ |
One of | QUANTITY | 0.82+ |
vSphere | TITLE | 0.81+ |
PowerProtect | TITLE | 0.78+ |
under three years ago | DATE | 0.78+ |
PowerProtect | ORGANIZATION | 0.77+ |
half | QUANTITY | 0.75+ |
things | QUANTITY | 0.75+ |
triple | QUANTITY | 0.74+ |
four capacity | QUANTITY | 0.68+ |
terabytes | QUANTITY | 0.67+ |
most common use cases | QUANTITY | 0.66+ |
Tanzu | ORGANIZATION | 0.64+ |
important cloud capabilities | QUANTITY | 0.6+ |
Kubernetes | ORGANIZATION | 0.56+ |
a petabyte | QUANTITY | 0.53+ |
Data Manager | TITLE | 0.52+ |
Kubernates | PERSON | 0.52+ |
Kubernetes | TITLE | 0.5+ |
theCUBE | ORGANIZATION | 0.49+ |
VMware | TITLE | 0.48+ |
Protection | OTHER | 0.47+ |
Dell EMC: Cloud Data Protection Momentum
from the silicon angle media office in Boston Massachusetts it's the cube now here's your host David on tape the imperative to protect data has never been more pressing as companies transform themselves from businesses into digital businesses the intrinsic value of their data Rises exponentially the problem for infrastructure pros is that everything in IT is additive it seems like nothing ever dies which means more things to manage now think about that when you're protecting data you have bare metal VMs now containers you've got cloud you got to worry about the edge all this data needs to be protected not only does this increase complexity it expands the attack surface for adversaries wanting to steal or ransom your data at the heart of all this is a build out of a massively global distributed cloud we saw wave 1 of the cloud which was public wave 2 was really hybrid and that's evolving now in parallel you're seeing the emergence of multi cloud and as I said these earlier trends are additive they're not replacements and with me to discuss these important issues and how Dell EMC specifically is pivoting toward cloud data protection is Beth Phelan who is the president of Dell emcs Data Protection Division that's great to see you well good to be here again so we know the world is hybrid it's a fundamental the on-prem stuff is part of the fundamental digital digital transformations of these these companies and now you've got data protection for the cloud so what do you see happening in that world yeah let's start with what we're seeing in the market we recently remade on our global data protection index we've been doing it for many years and we've been really using that to help us understand the landscape and what our customers need and first not surprisingly it shows that continued trend of movement and reliance towards cloud environments for business applications continuing to increase on top of that the customers despite that are continuing to struggle with ensuring they have the right data protection for their cloud environments right so they're they're struggling you see that we see that as well what what's going on there well what is the data tell you yeah first of all more than half of the customers don't have a comprehensive data protection solution for their Salas cloud native and multi cloud environments more than two-thirds of the customers who may be relying on their cloud service providers for data protection say that they do not have a solution that covers all of their workloads so whether they're working with a cloud service provider or some other vendor they're being really clear that they do not have a comprehensive approach to cloud data protection yeah so I mean you see the cloud adoption is going like crazy but it seems like the data protection component is lagging how is that affecting the traction in your business yeah you know it's a double-edged sword right on one level customers see the advantages of moving to a cloud on the other hand you know they are really looking for vendors that they can partner with to still have the same confidence that the data is protected that they have on Prem and what we're seeing now is that customers are turning to us to help solve that problem we have over a thousand customers using Dell EMC for their Cloud Data Protection and we're narrowing in on three exabyte the data that we're currently protecting in the cloud so it's happening yeah that's pretty good traction so I want to talk about VMware obviously VMware is the linchpin of many customers hybrid strategy and it's a clearly an important component of Dell technologies talk a little bit about the relationship between Dell EMC data protection specifically and VMware I'm interested in you know they've announced project tenzou and there's kubernetes how are you guys working together to really deliver a value for customers so we are super excited about the opportunity to work so closely with VMware because as they're cut in their domain we're working directly with them and that's an advantage that comes with being part of the dell technologies family and so we were the first company to bring data protection for were kubernetes environments out to market it's available now so you'll see us bring that into the tenzou mission-critical has been moved forward partnering closely with with vmware and of course we're already fully certified for vmware cloud it's really an ongoing regular conversation about how we can work together to bring the best to our customers so Beth I gotta ask you so you're part of your role as the leader of the the division is obviously you gotta get a lot of mouths to feed big division you got to make your plan you got to deliver for customers but strategy is another key component of this how do all these cloud trends shape your strategy so core to our strategy is to be the essential provider of data protection for multi cloud environments so no matter where customers are choosing to deploy their applications they can have the same confidence that they always did that that data is protected and the way they can get it back so that's core and if you want three words to remember for our strategy think VMware cloud and cyber cloud is central to it and you're going to be hearing a lot more about it in the weeks and months ahead okay so I gotta ask you break out your binoculars maybe even the telescope what are the future what are the future's look like when you think about the division and the market so we've been talking about cloud for a long time but we are still in the middle of this journey customers are going to rely on the cloud even more for additional use cases and especially in the data protection space right now we're seeing backup to the cloud dr to the cloud but the future will include cyber resiliency that's leveraging cloud deployments you're also going to see more and more of an emphasis on people leveraging SAS for their software consumption and for us that means not only protecting SAS applications but it also means giving customers the option to consume data protection in a SAS model we already do that today with things like cloud snapshot manager with things like the power protect management and orchestration but you're going to see us do even more of that because they're just incredible benefits of people leveraging sass to consume their software data constantly evolving lamps landscape data protection has to evolve with it Beth thanks so much for thank you and thank you keep it right there we'll be right back right after this short break from world famous cloud Studios Dell Technologies presents the world's number one show on data protection solutions for today's organizations it's proven in modern magazine with Jake and Emmy hello everyone and welcome to the premiere of PM magazine where we cover the proven Dell technology solutions that you've come to rely on and the latest modern innovation driving powerful data protection for the future I recently spent some quality time with one of our customers and I learned a thing or two about Dell proven data protection solutions let's watch the clip we've always relied on tell performance efficiency and scale to help us keep pace with our data protection needs but there's so much more for example we've been crushing it with Dell cloud data protection for backup to the cloud in cloud backup cloud tearing cloud dr uh-huh look at the picture it's a huge business advantage how so our costs are down we spend less time on management we're meeting our service levels and we have peace of mind that all of our data is protected right awesome did you talk about how Dells agile development approach is accelerating the speed at which we deliver customer value yes and how cloud capabilities will continue to grow yes and about VMware protection yes and cyber recovery yes I mean we covered all of that as well as the mega trends that require data protection with a modern approach well modern is exactly what our guests today are here to discuss Jake he is Ken fatale a noted data protection expert and joining us from the field on her vacation in the Bahamas is Barbara Penner of the data management Institute thank you both for being here so Ken what should our viewers think about when they hear the phrase modern data protection they should think new requirements for modern applications cloud native workloads Cubana is multi-cloud and data services to name a few Barbara would you add anything to that list I would add business service recovery on premises or in the cloud autonomous protection to auto detect and protect workloads across edge core and cloud infrastructure and lastly all of this must operate at global scale thank you both this is exactly where we're heading with Dell power protect solutions well it's time for a break but when we come back we've got something special in store for you don't we Jake I was hoping you forgot oh no someone learned how to make cream puffs and it did not turn out well for him yeah my apologies in advance to my mother who tried to show me around the kitchen but as you can see we'll be right back [Music] we're back with Rob and Rob Emslie who's the director of product marketing for Delhi MCS data protection division Rob good to see you hi Dave good to be back so we just heard from Beth about some of the momentum that you guys have from your perspective from a product angle what is really driving this yeah well one of the things that we've you know definitely seen is that as we talk to our customers both existing and new customers cloud journeys is is top of mind for all of the CIOs it's being driven by either the desire to drive efficiency take out costs and data protection is one of the the most common use cases and one of the things that we find is that there's four use cases for data protection that we see long term retention of data cloud disaster recovery backup to the cloud and the emerging desire to stand up new applications in the cloud that need to be protected so backup in the cloud really completes the four major use cases well one of the things I think is really important this market is that you deliver optionality to your customers so how are our customers enabling these use cases yeah so the the first two UK's first two use cases of long term retention and cleitus recovery is is really driven by our software on our appliances both of those are really predicated based upon the assumption that customers are going to deploy data protection on premises to protect their on-premises workloads and then it's here to the cloud or which is becoming more common used to cloud as a disaster recovery target you know it's delivered by our data protection software and that's either in a software form factor or that software delivered in an integrated appliance form factor so let's talk about purpose-built backup appliances I think you know our friends at IDC I think you know coined that they tracked that market for a while you guys have been a leader there the acquisition of data domain obviously put you in a really strong position give us the update there is it's still a vibrant market is it growing what's the size it's it look like yeah so as we look at 2020 you know IDC forecasts the market size to be a little under five billion dollars so it's still a very large market the overall market is growing at a little over four percent but the interesting thing is that if you think about how the market is is made up it's made up of two different types of appliances one is a target appliance such as data domain and the new power protect dd and the other is integrated appliances where you integrate the target appliance architecture with data protection software and it's the integrated appliance part of the market that is really growing faster than the other part of the of the people being market it's actually growing at 8% in fact IBC's projection is that by 2022 half of the purpose-built back to appliance market will be made up of integrated appliance solutions so it's growing at twice the overall market rate but you guys have two integrated appliances what why - how should people think about those yeah so a little under three years ago we introduced a new integrated appliance the called the integrated data protection appliance it was really the combination of our backup software with our data domain appliance architecture and the integrated air protection appliance has been our workhorse for the last three years really allowing us to to support that that fastest-growing segment of the market in fact last year the integrated air protection appliance grew by over a hundred percent so triple digit growth was great you know it's something that you know allows us to address all market segments all the way down to SMB all the way to the enterprise but last year one of the things you may remember at Delta Nadi's world is we introduced our power to protect portfolio you know and that constituted power protect data manager our new software to find platform as well as the delivery of packet there in an integrated appliance form-factor with perfectly x400 so that's really our our new scale out data protection appliance we've never had a scale out appliance in the architecture before in the portfolio before and that gives us the ability to offer customers choice scale up or scale out integrated and target and with the X 400 it's available is a hybrid configuration or it's also our first or flash architecture so really we're providing customers with the existing software solutions that we've had in the market for a long time an integrated form factor with the integrator protection appliance as well as the brand-new software platform that will really be our innovation engine that will be where we'll be looking at supporting new workloads and certainly leaning into how we support cloud air protection and the hybrid cloud reality of the next decade okay so one of the other things I want to explore is we've heard a lot about your new agile development organization Beth has talked about that a lot and the benefit obviously is you're more you're able to get products out more quickly respond to market changes but ultimately the proof is in translating that development into product what can you tell us about how that's progressing yep so certainly with Papa Tech Data Manager and the X 400 that really is the the epicenter of our agile product development activities you know we've moved to a three-month cadence for software releases so working to deliver a small batch releases into the market much more rapidly than we've ever done before in fact since we introduced palpitate Denham manager where we we shipped the first release in July we're now at the third iteration of palpitate Data Manager and therefore the third iteration of the x100 appliance so there's three things that you know I'd like to highlight within the x100 appliance specifically first is really the the exciting news that we've introduced support for kubernetes so we're really the first you know large enterprise data protection vendor to to lean into providing kubernetes data protection so that becomes the vitally important especially with the developments over our partner in VMware with vSphere 7 with the introduction of tan zoo and the reality is that customers will have both these fear virtual machines and kubernetes containers working side-by-side and both of those environments need to be protected soap a patek denim algae and the x400 appliance has that support available now for customers to take advantage of second we talked about long-term retention of of data in the cloud the x100 appliance has just received the capabilities to also take part in long term retention to AWS so those are two very important cloud capabilities that are brand-new with the excellent appliance and then finally we introduced yet 400 appliance with a maximum configuration of four capacity cubes rough-and-tough that was 400 terabytes of usable capacity we've just introduced support of 12 capacity cubes so that gives the customers the ability to scale out the x100 appliance from 64 terabytes all the way to over a petabyte storage so now if you look at our two integrated appliances we now cover the landscape from small numbers of terabytes all the way through to a petabyte of capacity whether or not you pick a scale up architecture or a scale length architecture yeah so that really comes back to the point I was making about optionality and kubernetes is key it's gonna be a linchpin obviously a portability for multi cloud sets that up as we've said it's it's not the be-all end-all but it's a really necessary condition to enable multi cloud which is fundamental to your strategy absolutely alright Rob thanks very much for coming on the cube it's great to have you thanks Dave and thank you for watching everybody this is Dave Volante for the cube we'll see you next time [Music]
**Summary and Sentiment Analysis are not been shown because of improper transcript**
ENTITIES
Entity | Category | Confidence |
---|---|---|
Beth Phelan | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
Rob | PERSON | 0.99+ |
Barbara Penner | PERSON | 0.99+ |
Ken | PERSON | 0.99+ |
Dave Volante | PERSON | 0.99+ |
400 terabytes | QUANTITY | 0.99+ |
Barbara | PERSON | 0.99+ |
Rob Emslie | PERSON | 0.99+ |
2020 | DATE | 0.99+ |
IBC | ORGANIZATION | 0.99+ |
three-month | QUANTITY | 0.99+ |
8% | QUANTITY | 0.99+ |
Bahamas | LOCATION | 0.99+ |
64 terabytes | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
Jake | PERSON | 0.99+ |
David | PERSON | 0.99+ |
Ken fatale | PERSON | 0.99+ |
2022 | DATE | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
July | DATE | 0.99+ |
wave 1 | EVENT | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
IDC | ORGANIZATION | 0.99+ |
Delta Nadi | ORGANIZATION | 0.99+ |
third iteration | QUANTITY | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Emmy | PERSON | 0.99+ |
three things | QUANTITY | 0.98+ |
first | QUANTITY | 0.98+ |
Beth | PERSON | 0.98+ |
over a hundred percent | QUANTITY | 0.98+ |
today | DATE | 0.98+ |
first release | QUANTITY | 0.98+ |
Boston Massachusetts | LOCATION | 0.98+ |
Dell EMC | ORGANIZATION | 0.98+ |
third iteration | QUANTITY | 0.98+ |
VMware | ORGANIZATION | 0.98+ |
two integrated appliances | QUANTITY | 0.98+ |
over a thousand customers | QUANTITY | 0.98+ |
next decade | DATE | 0.98+ |
vSphere 7 | TITLE | 0.98+ |
two | QUANTITY | 0.97+ |
four use cases | QUANTITY | 0.97+ |
400 appliance | QUANTITY | 0.97+ |
first two | QUANTITY | 0.97+ |
one | QUANTITY | 0.97+ |
twice | QUANTITY | 0.97+ |
both | QUANTITY | 0.97+ |
more than two-thirds | QUANTITY | 0.97+ |
x100 | COMMERCIAL_ITEM | 0.97+ |
four major use cases | QUANTITY | 0.96+ |
under five billion dollars | QUANTITY | 0.96+ |
x400 | COMMERCIAL_ITEM | 0.96+ |
two different types | QUANTITY | 0.95+ |
a thing | QUANTITY | 0.95+ |
first two use cases | QUANTITY | 0.94+ |
more than half | QUANTITY | 0.94+ |
two integrated appliances | QUANTITY | 0.94+ |
wave 2 | EVENT | 0.94+ |
Delhi | LOCATION | 0.93+ |
Dells | ORGANIZATION | 0.92+ |
one of the things | QUANTITY | 0.91+ |
first company | QUANTITY | 0.9+ |
12 capacity cubes | QUANTITY | 0.9+ |
UK | LOCATION | 0.9+ |
MCS | ORGANIZATION | 0.89+ |
X 400 | COMMERCIAL_ITEM | 0.87+ |
dell | ORGANIZATION | 0.86+ |
over four percent | QUANTITY | 0.86+ |
Rob Emsley, Dell EMC | CUBE Conversation, February 2020
>> From the SiliconANGLE Media office in Boston, Massachusets, it's the Cube! Now, here's your host, Dave Vellante. >> We're back with Rob Emsley, who's the Director of Product Marketing for Dell EMC Data Protection Division. Rob, good to see you. >> Oh, good to be back, Dave. >> Yeah, so we heard from Beth about some of the momentum, the pivot-to-cloud. What's fueling this from you standpoint. >> I think one of the things that most people know, is that if you're a C-I-O today, is that you have to be looking at how you're going to make use of the cloud. And data protection is one of the easiest ways of getting into, kind of your cloud journey Whether it be using the cloud as a backup target, or a backup to the cloud. Using cloud for longterm retention. And we're moving away from on premises or off premises, backup storage using the cloud for that. Using cloud for disaster recovery, standing up copies of your production environment when you need to in the case of a disaster in the cloud. Or if you've deployed applications in the cloud, backing up in the cloud. So protecting the data that that's in the cloud applications. >> That's a good point. it's actually a pretty low risk choice to use the cloud for a data product. There was an article in the wall street journal the other day and they had these experts talking about how should you protect data? And a lot of them were saying, "Well, I might protect it two, three, four times." Is that kind of what they're doing in the cloud? I mean, I can say it's a safe bet, right? >> Yeah, it is. I think the idea of using the cloud for longterm retention, I mean, so many customers, they use their backups as an archive of the history of their production systems. And one of the things though is that architecture in that situation does actually matter. So one of the things that we've been able to do is we've been able to take our on premise appliance technology that we've had in the market for many years with date domain. And our power protect DD. I've been able to take that technology, put it into a software defined architecture and deploy it in AWS, Azure, GCP. So that really allows us to bring the duplication into cloud economics. So people always say, "Oh, cloud is cheap." But you still get a bill every month. So if we can reduce the size of that bill, customers say, "Oh, that's an actually good architecture to use." So that's a big benefit. >> Yeah. And they can put that money elsewhere. So is that really how customers are enabling all these various use cases that you're talking about? >> Certainly from a longterm retention to the cloud perspective, the ability to tear to the cloud from on premises appliances, whether it be a target appliances with power protect DD or integrated appliances, letting the integrate data protection appliance or the power protect X 400. So a very easy use of the cloud as a target. So after 14 days of on premise retention, you move that data off into the public cloud. >> So let's talk about purpose-built backup appliances that was a booming market. Data domain kind of took off, got the lead. EMC obviously acquired them. Now it's Dell EMC and it's a critical part of your portfolio. Can you give us the update on what's happening in that space? >> Yeah, so still it's a big market. I think in 2019 it probably was a $3 billion market. Rough and tough. We're still very fortunate that the customers still vote with their hardened budgets to choose Dell EMC purpose-built backup appliances to put into their on premise locations to store their backups. Certainly the market is divided between two types. One is target appliances and the other is integrated on the target appliance side. We've been lucky enough to, with the acquisition of data domain and now with the new Power protect DD appliances, we already maintain a really significant market share position with those The target clients is very useful, they can be used with our software, they can be used with third party software. It's kind of a, we need a default solution for target based appliances comes from Dell EMC. But what's changed is integrated appliances have become sort of much more interesting to customers as they start thinking about what they do next with their backup software. The form factor that they like to use is an integrated appliance, >> But you still got two integrated appliances. How should customers think about those in terms of strategic fit? >> Yeah, so we introduced our first integrated appliance by combining our data in the main technology with our backup software. And we introduced the integrated data protection appliance into the market in 2017. So think of that as our scale up architecture, bringing our backup software together with our D duplication storage highly integrated with the client, the cloud's hearing, cloud AR. and that's been a very fast growing part of our portfolio. In fact, through the first three quarters of last year as trapped by IDC, we actually grew that business by over 157%. So in a very, very good way of consuming backup software and appliances. But as you mentioned, last year was a big year for us because we introduced our first scale out appliance with the power protect X 400. So not only was it our first scale out, we offered it in both a hybrid form factor, but also an all flash form factor. So that was something that really, really leans into sort of our next generation of appliances. We started using something called multidimensional appliance portfolio scale up, scale out, hybrid or flash, integrated or target. So it's really the focus of giving customers a choice of how they actually consume data protection for us. >> we've talked in the cube a lot about these data protection market, how it's evolving, extending into data management. We talked today about cloud. I want to ask you as somebody who's been in the industry, you've seen a lot of different approaches. I was commenting recently on the amazing transformation of Dell, Dell technologies, from largely a PC company with an enterprise business that was, you know, okay. But not nearly as what it is today, what amazing transformation, 90 plus billion dollar company. You left when it was EMC and now you've come back in Dell technologies, there's been a really a much greater emphasis on speed agility of the AC cloud. How do you see the culture generally and in specifically within the data protection division? >> Yeah, good question. I think that one of the biggest changes for me is the increase in time to market being so important the ability to rapidly evolve your solutions to meet market requirements. One of the things that the data protection division has done is they've truly embraced agile at scale product development. So if you think about our power protect portfolio, specifically the X 400 appliance and the power protect data manager software that powers it is that's on a three month release cadence. So that gives us the ability to rapidly provide net new functionality to our customers. That in the days of our older products is that even though those have also evolved to a more regular release cadence, that used to be the time between releases was often measured in a year to 18 months. And that's completely different now since I've come back. So that really gives a marketeer the ability to really lean into communicate into the market on a much more regular basis. Having a more of a continuous theme to deliver. So if you think about our theme for this year, cloud data protection is really the focus of what we're talking to the market about and VM-ware and cyber recovery is on how those relate to our client deck protection theme is really what we'll be using to communicate and then be supported by these regular releases into the market. >> Well, the focus on acceleration, cultural agility it's key. You guys are a leader. Everybody wants a piece of you, you're hired, you're not just going to let them take it. So you need that type of discipline to really continue to drive innovation in the marketplace. Rob, thanks so much for coming on The cube was great to have you. >> Thanks Dave. >> You're welcome. And thank you for watching everybody. We'll see you next time. (upbeat music)
SUMMARY :
in Boston, Massachusets, it's the Cube! Rob, good to see you. the pivot-to-cloud. So protecting the data that that's in the other day and they had these experts So one of the things that we've been able to do So is that really how customers the ability to tear to the cloud got the lead. that the customers still vote But you still got two integrated appliances. So it's really the focus of giving customers on speed agility of the AC cloud. So that really gives a marketeer the ability Well, the focus on acceleration, And thank you for watching everybody.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Megan Smith | PERSON | 0.99+ |
2018 | DATE | 0.99+ |
Jeff Frick | PERSON | 0.99+ |
Brenda | PERSON | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
EMC | ORGANIZATION | 0.99+ |
Rob | PERSON | 0.99+ |
Rob Emsley | PERSON | 0.99+ |
Jeff | PERSON | 0.99+ |
Boston | LOCATION | 0.99+ |
Telle Whitney | PERSON | 0.99+ |
2017 | DATE | 0.99+ |
February 2020 | DATE | 0.99+ |
2019 | DATE | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
Dave | PERSON | 0.99+ |
$3 billion | QUANTITY | 0.99+ |
15 years | QUANTITY | 0.99+ |
Beth | PERSON | 0.99+ |
Megan | PERSON | 0.99+ |
last year | DATE | 0.99+ |
two types | QUANTITY | 0.99+ |
four years | QUANTITY | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Best Buy | ORGANIZATION | 0.99+ |
Orlando, Florida | LOCATION | 0.99+ |
Telle | PERSON | 0.99+ |
two | QUANTITY | 0.99+ |
14 days | QUANTITY | 0.99+ |
one | QUANTITY | 0.99+ |
140 people | QUANTITY | 0.99+ |
three | QUANTITY | 0.99+ |
three month | QUANTITY | 0.99+ |
three days | QUANTITY | 0.99+ |
18 months | QUANTITY | 0.99+ |
ORGANIZATION | 0.99+ | |
One | QUANTITY | 0.99+ |
18 | QUANTITY | 0.99+ |
180 | QUANTITY | 0.99+ |
Dell EMC Data Protection Division | ORGANIZATION | 0.99+ |
Dell EMC | ORGANIZATION | 0.99+ |
January | DATE | 0.99+ |
over 157% | QUANTITY | 0.99+ |
next year | DATE | 0.99+ |
18,000 women | QUANTITY | 0.98+ |
today | DATE | 0.98+ |
this year | DATE | 0.98+ |
Orlando Convention Center | LOCATION | 0.98+ |
Target | ORGANIZATION | 0.98+ |
four times | QUANTITY | 0.98+ |
a year | QUANTITY | 0.98+ |
SiliconANGLE Media | ORGANIZATION | 0.98+ |
two integrated appliances | QUANTITY | 0.97+ |
both | QUANTITY | 0.97+ |
last Sunday | DATE | 0.97+ |
MLB | ORGANIZATION | 0.97+ |
Grace Hopper | ORGANIZATION | 0.96+ |
90 plus billion dollar | QUANTITY | 0.96+ |
first scale | QUANTITY | 0.96+ |
up to 800 people | QUANTITY | 0.94+ |
AnitaB.org | ORGANIZATION | 0.93+ |
400 | COMMERCIAL_ITEM | 0.93+ |
SiliconANGLE | ORGANIZATION | 0.91+ |
Massachusets | LOCATION | 0.91+ |
Cube | COMMERCIAL_ITEM | 0.91+ |
X 400 | COMMERCIAL_ITEM | 0.9+ |
Dell EMC and The State of Data Protection 2020 | CUBE Conversation, February 2020
>> From the SiliconANGLE Media office in Boston, Massachusetts, it's theCUBE. Now, here's your host Dave Vellante. >> Hello everyone and welcome to this CUBE conversation. You know, data protection, it used to be so easy. You'd have apps, they'd be running on a bunch of servers, you'd bolt on a little backup and boom! One size fit all. It was really easy peasy. Now, business disruptions at the time, they were certainly not desired, but they were definitely much more tolerated and they were certainly fairly common place. Today, business disruptions are still fairly common occurrence but the situation is different. First of all, digital imperatives have created so much more pressure for IT organizations to deliver services that are always available with great consumer experiences. The risks of downtime are so much higher but meeting expectations is far more complex. This idea of "one size fits all" it really no longer cuts it. You got physical, virtual, public cloud, on-prim, hybrid, edge, containers. Add to this cyber threats, AI, competition from digital disrupters. The speed of change is accelerating and it's stressing processes and taxing the people skills required to deliver business resilience. These and other factors are forcing organizations to rethink how they protect, manage, and secure data in the coming decade. And with me, to talk about the state of data protection today and beyond, is a thought leader from one of the companies in data protection, Arthur Lent is the Senior Vice President and CTO of the Data Protection Division at Dell EMC. Arthur, good to see you again. Thanks for coming in. >> Great to see you, Dave. >> So, I'm going to start right off. This is a hot space and everybody wants a piece of your hide because you're the leader. How are you guys responding to that competitive threat? >> Well, so the key thing that we're doing is we're taking our proven products and technologies and we've recognized the need to transform and really modernize them and invest in a new set of capabilities and changing workloads. And our core part of that, with some changes in leadership, have been to shift our processes in terms of how we do stuff internally and so we've moved from a very big batch waterfall-style approach where things need to be planned one, two, three years out in advance, to a very small batch agile approach where we're looking a couple of weeks, a couple of months in advance of what we're going to be delivering into product. And this is enabling us to be far more responsive to what we're learning in the market in very rapidly changing areas. And we're at the spot where we now have several successive releases that have been taking place with our products in this new model. >> So, that's a major cultural shift that you're really driving. I mean, that allows you to track you know, younger people, you guys are a global organization so I mean, how is that sort of dynamic change? You know, people sometimes maybe think of you as this stodgy, you know, company been around for 20 plus years. What's it like when you walk around the hallways? What's that dynamic like? >> It's like we're the largest start-up in the data protection industry but we've got the backing of a Fortune 50 company. >> Nice. All right, well let's get into it. I talked in my narrative upfront about business disruptions and I said there's still you know, kind of a common occurrence today, is that what you're seeing? >> Absolutely! So, our latest data protection index research has 82% of the people we surveyed experienced downtime or data loss within the last 12 months and this survey was just completed within the last month or two. So, this is still very much a real problem. >> Why do you think it's still a problem today? What are the factors? >> So I would say the problem's getting worse and it's because complexity is only increasing in IT environments. Complexity around multi-platform, between physical servers, virtual servers, cloud, various flavors of hybrid cloud, data distribution between the core, edge and the cloud, growing data volumes, the amount of data, and the data that companies need to run their business is ever increasing, and a growing risk around compliance, around security threats, and many customers have multi-vendor environments and multi-vendor environments also increase their complexity and risk and challenges. >> Who was that talking about cloud? Because you know, we entered last decade. Cloud was kind of this experimental, throw some dev out in the cloud, and now as we enter this decade it's kind of a fundamental part of IT strategies. Every CIO, he or she has a cloud strategy. But it's also becoming clear that it's a hybrid world. So, in thinking about data protection, how does hybrid affect how your customers are thinking about protecting their data in the coming decade? >> So it produces a bunch of changes in how you have to think about things and today, we have over a thousand customers protecting over 2.5 exabytes of data in the public cloud. And it goes across a variety of use cases from longterm retention in the cloud, backup to the cloud, disaster recovery to the cloud, a desire to leverage the cloud for analytics and dev test, as well as production workloads in the cloud and the need to protect data that is born in the cloud. And we're in an environment where IT is spanning from the edge to the core to the cloud and the need to have a cohesive ability and approach to protect that data across its lifecycle for where it's born and where it's being operated on and where value is being added to it. >> Yeah, and people don't want to buy a thousand products to do that or even a dozen products to do that, right? They want a single platform. I want to talk about containers because Kubernetes, specifically, the containers generally one of the hottest areas. It's funny, containers have been around forever (laughs) but now they're exploding, people are investing much more in containers. IT organizations and dev organizations see it as a way to drive some of the agility that you maybe talked about earlier. But I'm hearing a lot about you know, protection, data protection for containers, and I'm thinking, "Well, wait a minute... "You know, containers come and go. "They're ephemeral. Why do I need to protect them?" Help me understand that. >> So, first I want to say yeah, we're seeing a lot of interest in enterprises deploying containers. Our latest survey says 57% of enterprises are planning on deploying it next year. And in terms of the ephemerality and the importance of protection, I have to admit, I started this job about a year ago and I was thinking almost exactly the same thing you were. I came in, we had an advanced development project going on around how to protect Kubernetes environments, both to protect the data and the infrastructure. And I was like, "Yeah, I see this "as an important advanced development priority, "but why is this important "to productize in the near future?" And then I thought about it some more and was talking to folks where the Kubernetes technologies, there's two key things with it. One: It's Kubernetes as a DevOps CI/CD environment, well if that environment is down... Your business is down in terms of being able to develop. So, you have to think about the loss of productivity and the loss of business value as you're trying to get your developer environment back up and running. But also, even though there might not be stateful applications running in the containers, there's generally production usage in terms of delivering your service that's coming out of that cluster. So, if your clusters go down or your Kubernetes environment goes down, you got to be able to bring it back up in order to be able to get it up and running. And then the last thing is in the last year or two, there's been a lot of investment in the Kubernetes community around enabling Kubernetes containers to be stateful and to have persistence with them. And that will enable databases to run in containers and stateful applications to run in to containers. And we see a lot of enterprises that are interested in doing that but... Now they can have that persistence but it turns out they can't go into production with the persistence because they can't back it up. And so, there's this chicken and egg problem in order to do the production you need both the state and the data protection. And the nice thing about the transformation that we've done is as we saw this trend materializing we were able to rapidly take this advanced development project and turn it into productization. And we're able to get to a tech preview in the summer and a joint announcement with Pat Gelsinger around our work together in the Kubernetes environment and being able to get our first... Product release out to market a couple of weeks ago and we're going to be able to really rapidly enhance the capabilities of that as we're working with our customers on where do they need the features added most and being able to rapidly integrate in with VMware's management ecosystem for container environments. >> So, you got a couple things going on there. You're kind of describing the dynamic of the developer and developers set to key... Strategic linchpin now. Because the time between you developing function and you get it to market I mean, it used to be weeks or months or sometimes even years. Today, it's like nanoseconds, right? "Hey, we need this function today. "Something's happening in the market, go push it." And if you don't have your data, you don't have the containers. The data and the containers are not protected, you're in trouble, right? Okay so, that's one aspect of it. The other is the technical piece so help us understand like, how you do that. What's the secret sauce conceptually behind you know, protecting containers? >> So, there's really two parts of what one needs to do for protecting the containers. There's the container infrastructure itself and the container configuration and knowing what's involved in the environment so that if your Kubernetes cluster goes down being able to restart it and being able to get your appropriate application environment up and running So, the containers may not be stateful but you've got to be able to get your CI/CD operate environment up and running again. And then the second part is we are seeing people use stateful containers and put databases in containers in development and they want to roll that into production. And so for there we need to backup not just the container definitions but backup the data that's inside the container and be able to restore them. And those are some of the things that we're working on now. >> One of the things I've learned from being around this industry for a while is people who really understand technology, they'll ask questions about, "What happens when something goes wrong?" so it's all about the recovery is really what you're talking about is that's the key. How does machine intelligence fit in... Stay on containers for a minute. Is machine learning and machine intelligence allowing you to recover more quickly, does it fit in there? >> So a key part of the container environment that's different from some of the environments in the past is just how dynamic it is and just how frequently containers are going to come and go and workloads mix, expand, and contract their usage of IT resources and footprint. And that really increases the need for automation and using some AI and machine learning techniques so that one can discover what is an application as it's containerized and what are all the resources it needs so that in the event of an interruption of service you know, all of the pieces that you need to bring together and automate its recovery and bring back. And in these environments you can no longer be in a spot to have people handcraft and tailor exactly what to protect and exactly how to bring it back after protection. You need these things to be able to protect themselves automatically and recover themselves automatically. >> So, I want to sort of, double click on that. Again, it's 2020 so I'm always going back to last decade and thinking about what's different. Beginning of last decade people were afraid of automation, they wanted knobs to turn. Even exiting the decade recently and even now, people are afraid about losing jobs. But the reality is things are happening so fast, there's so much data that humans just can't keep up. So, maybe you could make some comments about automation generally and specifically applying to data protection and recovery. >> Okay, so with the increasing amounts of data to be protected and the increasing complexity of environments, more and more of the instances of downtime or challenges in performing a recovery, tend to be because of the complexity of having deployed them and having the recovery procedures write and insuring that the SLAs that are needed are met and it's just no longer realistic... To expect people to have to do all of those things in excruciating detail. And it's really just necessary, in order to meet the SLAs going forward, to have the environments be automatically discovered, automatically protected, and have automated workflows for the recovery scenarios. And because of the complexities of changing, we need to reach the point of having AI and machine learning technologies help guide the people owning the data protection on data criticality and what's the right SLA for this and what's the right SLA for that and really get a human-machine partnership. So, it's not people or machines, but it's rather the people and machines working together in tandem with each doing what they do best to get the best outcome. >> Now that's great, you'd be helping people prioritize and the criticality applications... I want to change the conversation and talk about the edge a little bit. You sponsor off like, IDC surveys on how big the market is in terms of just zettabytes and it's really interesting and thank you from the industry standpoint for doing that. I have no doubt edge is coming into play now because so much data is going to be created at the edge, there's all this analog data that's going to be digitized, and it's just a big component of the digital future. In thinking about data at the edge, a lot of the data is going to stay at the edge, maybe it's got to be persisted at the edge. And obviously if it's persisted it has to be protected. So, how are you thinking about the evolution of edge, specifically around data protection? >> Okay, so the... I think you kind of caught it in the beginning. There's going to be a huge amount of data in the edge. Our analysis has us seeing that there's going to be more data generated and stored in the edge than in all the public clouds combined. So, that's just a huge shift in that three to five to ten year timeframe. >> Lot of data. >> Lot of data. You're not going to be able to bring it all back. You're just going to have elements of physics. So, there's data that's going to need to be persisted there. Some of that data will be transitory. Some of that data is going to be critical and need to be recovered. And a key part of the strategy around the edge is really, again going back to that, AI and machine learning intelligence and having a centralized control and understanding of what is my data in the edge and having what are the right triggers and understanding of what's going on of when is it an event occurred where I really need to protect this data? You can't afford to protect everything all the time. You got to protect the right things at the right time and then move it around appropriately. And so, a key part of being successful with the edge is getting that distributed intelligence and distributed control and recognizing that applications are going to span from core to edge to cloud and have just specific features and functions and capabilities that implement into various spots and then that intelligence to do the right thing at the right time with central policy control. >> So this is a good discussion. We've spanned a lot of territories but let's bring it back to the practical you know, uses for the IT person today saying, "Okay, Arthur, look. "Yeah, I'm doing cloud. I'm playing around with AI. "I've got my feet in containers "and my dev staff is doing that. "Yeah, edge. I see that coming. "But I just got some problems today that I have to solve." So, my question to you is, how do you address those really tactical day-to-day problems that your customers are facing today and still help them you know, plan for the future and make sure that they've got a platform that's going to be there for them and they're not going to just have to rip and replace in three or four years? >> Okay, and so that's like the $100,000 question as we look at ourselves in this situation. And the key is really taking our proven technologies and proven products and solutions and taking the agile approach for adding the most critical modern capabilities for new workloads, new deployment scenarios alongside them as we modernize those solutions themselves and really bringing our customers along in the journey with that and having a very smooth path for that customer transition experience on that path to our powered up portfolio. >> I mean, that's key because if you get that wrong and your customers get that wrong then maybe now it's a $100,000 problem it's going to be billions of dollars of problems. >> Fair. >> So, I want to talk a little bit about alternative use cases for data protection. We've kind of changed the parlance, we used to call it "backup". I've often said people want to get more out of their backup, they want to do other things with their backup 'cause they don't want just to pay for insurance, the CFO wants ROI. What are you seeing in terms of alternative use cases and the sort of expanding TAM, if you will, of backup and data protection? >> So, a core part of our strategy is to recognize that there is all of this data that we have as part of the data protection solutions and there's a desire on our customer's parts to get additional business value out of it and additional use cases from there. And we've explored and are investing in a variety of ways of doing that and the one that we see that's really hit a key problem of the here-and-now is around security and malware. And we are having multiple customers that are under attack for a variety of threats and it's hitting front page news. And a very large fraction of enterprises are having some amount of downtime due to malware or cyber attacks. And a key focus that we've had is around our cyber recovery solutions of really enabling a protected air gap solution so that in the event of some hidden malware or an intrusion, having a protected copy of that data to be able to restore from. And we've got customers who otherwise would have been brought down but were able to be brought back up very, very quickly by recovering out of our cyber vault. >> Yeah, I mean, it's a huge problem. Cyber has become a board-level issue, people are you know, scared to death of getting hit with ransomware, getting their entire data corpus encrypted so that air gap is obviously critical and increasingly it's becoming a fundamental requirement from a compliance standpoint. All right, I'll give you last word. Bring us home. >> Okay, so, the most important thing about the evolving and rapidly changing space of data protection at this point is that need for enterprises to have a coherent approach across their old and new workloads, across their emerging technologies, across their deployments in core, edge, and cloud, to be able to identify and manage that data and protect and manage that data throughout its lifecycle and to have a single coherent way to do that and single set of policies and controls across the data in all of those places. And that's one key part of our strategy of bringing that coherence across all of those environments and not just in the data protection domain, but there's also a need for this cross-domain coherence and getting your automation and simplification, not just in the data protection domain but up into higher levels of your infrastructure. And so we've got automation's taking place with our PowerOne Converged Infrastructure and we're looking across our Dell Technologies portfolio of how can we together, with our partners in Dell Technologies, solve more of our customer problems by doing things jointly. And so for example, doing data management that spans not just your protection storage but your primary storage as well. Your AI and ML techniques for full stack automation. Working with VMware around the full end to end Kubernetes management for VMware environments. And those are just a couple of examples of where we're looking to both be full across the data protection, but then expand into broader IT collaborations. >> You're seeing this across the industry. I mean, Arthur, you mentioned PowerOne. You're talking about microservices, API-based platform increasing, we're seeing infrastructure as a code which means more speed, more agility, and that's how the industry is dealing with all this complexity. Arthur, thank you so much for coming on theCUBE. Really appreciate it. >> Thank you. >> And thank you for watching, everybody. This is Dave Vellante and we'll see you next time. (electronic music)
SUMMARY :
From the SiliconANGLE Media office and taxing the people skills required So, I'm going to start right off. Well, so the key thing that we're doing I mean, that allows you to track you know, in the data protection industry and I said there's still you know, has 82% of the people we surveyed experienced downtime and the data that companies need and now as we enter this decade it's kind of and the need to protect data that is born in the cloud. Yeah, and people don't want to buy and to have persistence with them. of the developer and developers set to key... and being able to get your appropriate One of the things I've learned and just how frequently containers are going to come and go and recovery. and insuring that the SLAs that are needed are met a lot of the data is going to stay at the edge, in that three to five to ten year timeframe. and then that intelligence to do the right thing and they're not going to just have to rip Okay, and so that's like the $100,000 question it's going to be billions of dollars of problems. and the sort of expanding TAM, if you will, and the one that we see that's really and increasingly it's becoming a fundamental and to have a single coherent way to do that and that's how the industry is dealing And thank you
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Dave Vellante | PERSON | 0.99+ |
$100,000 | QUANTITY | 0.99+ |
Arthur | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
Pat Gelsinger | PERSON | 0.99+ |
February 2020 | DATE | 0.99+ |
57% | QUANTITY | 0.99+ |
82% | QUANTITY | 0.99+ |
Arthur Lent | PERSON | 0.99+ |
second part | QUANTITY | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
next year | DATE | 0.99+ |
first | QUANTITY | 0.99+ |
three | QUANTITY | 0.99+ |
five | QUANTITY | 0.99+ |
two parts | QUANTITY | 0.99+ |
Today | DATE | 0.99+ |
today | DATE | 0.99+ |
One | QUANTITY | 0.99+ |
a dozen products | QUANTITY | 0.98+ |
one | QUANTITY | 0.98+ |
Boston, Massachusetts | LOCATION | 0.98+ |
both | QUANTITY | 0.98+ |
Dell EMC | ORGANIZATION | 0.98+ |
four years | QUANTITY | 0.98+ |
two | QUANTITY | 0.98+ |
2020 | DATE | 0.98+ |
last decade | DATE | 0.98+ |
one aspect | QUANTITY | 0.97+ |
last month | DATE | 0.97+ |
over a thousand customers | QUANTITY | 0.97+ |
ten year | QUANTITY | 0.97+ |
PowerOne | COMMERCIAL_ITEM | 0.96+ |
single | QUANTITY | 0.96+ |
three years | QUANTITY | 0.95+ |
IDC | ORGANIZATION | 0.95+ |
each | QUANTITY | 0.95+ |
single platform | QUANTITY | 0.94+ |
billions of dollars | QUANTITY | 0.93+ |
20 plus years | QUANTITY | 0.91+ |
over 2.5 exabytes of data | QUANTITY | 0.91+ |
one key part | QUANTITY | 0.91+ |
last year | DATE | 0.91+ |
The State of Data Protection | TITLE | 0.89+ |
last 12 months | DATE | 0.88+ |
couple of weeks ago | DATE | 0.88+ |
a minute | QUANTITY | 0.88+ |
two key things | QUANTITY | 0.88+ |
Kubernetes | TITLE | 0.87+ |
about | DATE | 0.87+ |
a thousand products | QUANTITY | 0.86+ |
TAM | ORGANIZATION | 0.85+ |
First | QUANTITY | 0.85+ |
One size | QUANTITY | 0.85+ |
a year ago | DATE | 0.8+ |
Data Protection Division | ORGANIZATION | 0.78+ |
DevOps | TITLE | 0.77+ |
SiliconANGLE Media | ORGANIZATION | 0.75+ |
coming decade | DATE | 0.75+ |
Fortune | ORGANIZATION | 0.75+ |
one size | QUANTITY | 0.74+ |
PowerOne | ORGANIZATION | 0.64+ |
VMware | TITLE | 0.62+ |
two | DATE | 0.62+ |
Infrastructure | COMMERCIAL_ITEM | 0.6+ |
Data Protection 2020 Cloud, VMware and Cyber | | CUBE Conversation, February 2020
>> From the SiliconANGLE Media office in Boston, Massachusetts. It's theCUBE. (upbeat music) Now, here's your host Dave Vellante. >> Hi everybody, welcome to this Cube Conversation on data protection. You know, I've been reporting for the last several months that spending on storage is reverting back to pre-2018 levels, but at the same time, it's not falling off a cliff. Now, one area of storage that is still very, very strong is the data protection segment. In the past 18 months, we've seen about a half a billion dollars in venture funding come into the market. We've just seen a big multi-billion dollar exit. And backup specifically in data protection, data management generally is where all the action is right now. And one of the leaders in data protection is Dell EMC. The company has the largest share of the market and the new entrants, believe me, want a piece of their pie. But anyone who follows this company knows that the firm is not likely to give up it's turf very easily. So much is changing in the market today. And I want to understand how Dell EMC's data protection division is responding to both the competitive threats and the changing market dynamics. With me are two experts from Dell EMC to address these issues. Nelson Hsu is Director of Solutions, Product Marketing for the data protection division at Dell EMC, and Colm Keegan is Senior Consultant, Product Marketing at Dell EMC. Gents, welcome to theCUBE. Great to see you again. >> Thank you for having us. >> Thanks, Dave. >> So you heard my intro. You guys are the leader. You got the biggest market share. You got all the upstarts coming at ya. What's your response? >> Want me to take that? >> Sure. >> Yeah. It's interesting, so we were talking about this before we came on set, you know and often times they want to poke holes at us 'cause you know we're perceived as being the old timers, or the stodgy ones of the group out there. And play a little jiu jitsu, you move in say you know well time in market counts for something. You know we've been solving data protection challenges for customers for literally decades now. You know and so, water under the boat and knowing the experience that we've derived from that allows us to bring solutions that are mature, that are proven. What we're doing is we're taking those proven solutions and pairing them with modern capabilities. So that, you know we look at it and say, hey, look, Mr. Customer. You have significant data protection challenges today because, as you said, the world's changing. It's changing rapidly. We can help you address those while also sowing the seeds for the foundation for the future. So we think that's a compelling message and we think that while some of our competitors, in particular the upstarts, have had some interesting things to say, big picture-wise, they don't know what they don't know. 'Cause they just don't have the time in the market. Their solutions are also largely absent upmarket, you know, when you look at the enterprise. So we're comfortable. We think we're in a very good spot right now. >> So cloud obviously was the huge mega trend of the past decade. You guys said from the beginning, it's going to be a hybrid world. Some of that was we hope it's going to be a hybrid world. Well you were right, it's a hybrid world. So how is cloud, hybrid cloud affecting your customer decisions around data protection, and how are you responding? >> Well, you know, there's no doubt that the growth in cloud and the growth in hybrid cloud is real. And it's there today. As we look, and as Colm mentioned, we've been protecting data across the enterprise, across the edge and in the cloud, and that growth continues. So today, we have over 1,000 customers that we're protecting their data in the cloud. To the tone of over 2.7 exabytes of data protected in the cloud by Dell EMC data protection. So there is absolutely no doubt that that growth is there. We have a lot of innovation that we're driving on, both in various ares of cloud native, cyber security and deep integration. >> Okay, so that's good, 1,000 customers. That's a pretty good observation space. But when you think about hybrid, what I think when I talk to customers is they want that same exact cloud experience. They don't want to have to context switch. They don't want to have to buy different platforms. So how are you specifically addressing that customer requirement? >> So there's a couple ways we look at that, right? For our customers, simplicity is very key in ease of use. So that's one of our core tenants as we go across both the edge, the core and the cloud. And the other aspect of that is consistency. So giving them and allowing them to use the tools that they know today to be able to protect their data, wherever that data resides. So with the cloud, with cloud native, your data becomes very, very distributed. And you have to be able to see all that data, and control and manage that data. So the whole aspect around cloud data management has now risen to the top as a major concern. We do that in a great way in a sense that we both have a hybrid strategy and a lot of that is working with Dell Technologies cloud. And it's based upon VMware. And so we have a very good deep relationship with VMware to utilize their tools that our customers use today. Whether it be vSphere or vcontrol that they can manage their data protection from one console, from one environment itself. >> Yeah, Dave, I think when you look at the split today, the latest cut of research is that roughly 52% of VM's are in the cloud, and 48 percent are on-prems so it's already hybrid, and as Nelson said, it's largely predicated on VMware. So as organizations start consuming cloud they're going to go with the platform that they've been operating under for years now. So it'll be VMware. We've always had very tight integration with VMware. We have a very strong partnership with them. And that's both on the existing portfolio as well as the agile portfolio that we're building out today under PowerProtect. So as that hybrid world evolves for the customers obviously we want to make sure they're protected from a virtual machine standpoint. And make that, as Nelson said, very simple for them because the last thing customers need is complexity particularly as their environments are becoming inherently more complex. Because now you look at most enterprises today, they're going to have a mix of workloads. It's physical, it's virtual, containers are unaccounted for. It's cloud native apps, it's SaaS. You know we were talking earlier about multi-clouds. Oftentimes it just kind of came up organically and now you've got this huge distribution of workloads and oftentimes, customers have been just sort of reactive to that. In other words, let me find a way to protect that and I'll worry about the details later. We're looking at that and saying, we have the portfolio to help you protect all your workloads, and as importantly, we'll help consolidate the management in that environment. It's going to start with VMware, but then longer term we're planning for things like a SaaS control plane so that we can give you a complete view of that environment and allow you to assign the policies you need in terms of SLA's, in terms of compliance. You're basically hitting all the security, hitting all the key things that you need and so directionally we think starting with VMware and building from there is probably the most realistic way we can get customers protected from a hyper cloud. >> So the vision is a single point of control that is SaaS based that lives in the cloud or lives wherever you want it to live? >> Right, it can be either. >> So one of our core tendencies here, right, is that we want and deliver the ability to protect our customer's data wherever it resides. Whether it's edge, core or cloud. >> So sticking on cloud for a second, and then sort of segue into the VMware conversation that I want to have is VMware is the sort of linchpin of your multi-cloud strategy. That makes a lot of sense. VMware is going to be a leader, if not the leader in multi-cloud. We'll see how that all shakes out. It's kind of jump ball right now but VMware is in pretty good position with 500,000 customers. But your perspective on cloud is different than say, take an AWS cloud provider, it's a place. Put your data in my cloud. You guys are talking about the experience. And that's really what you're trying to drive with VMware, whether is Ron-prem, whether it's in Google, Azure, AWS, wherever. The cloud, you name it. Is that the right way to think about your strategy? Specifically as it relates to multi-cloud. >> Yeah, so I think on the area of multi-cloud, it is a multi-cloud world. Years ago I was in a SaaS startup and we had customers that were looking to deploy to the cloud. And then that was the question. Okay, do we hedge on multi-cloud or not? As a SaaS provider, we actually implemented on both AWS and Azure at the time. Which became relevant, because now our customers are asking us, yes, my primary is with this particular hyper scaler. But do you also support this second hyper scaler? So the reality started to evolve. And so for us, yes, VMware is a very strategic aspect and partner with us, especially with Dell Technologies cloud. But we also have a multi-cloud relationship with AWS, with Azure and with Google. >> Yes, so the compatibility matrix, if you will, applies now to the cloud. >> Absolutely, absolutely. So now it's having that feature and functionality across multiple clouds. >> One of the things we obviously paid attention to is Project Tanzu with inside of VMware. All around bringing kind of Kubernetes and VMware together. How does that affect data protection? >> Well, I think it affects data protection in the sense that addressing the entire aspect of still your data is distributed now. And it's going to grow that way. I think that we've seen numbers upwards of 70% of applications will be container based. Some of that will be going forward to 2022 where there'll be multiple production applications that will be container based. I think what Tanzu will bring to the table is a cohesive way to manage and control that environment itself. >> Okay, and so maybe we could sort of drill into that a little bit. Containers, it's becoming more obvious that people want to persist some of that data. It's largely stateless, but you've got to figure out how to recover. So do you have solutions in that space, is that sort of more road mapping? You can talk about that a little bit. >> No, absolutely. So definitely we have concrete solutions with our Dell EMC PowerProtect data manager for Kubernetes. It's actually one of the first that was in the market to support cloud native environments. >> It is the first. >> Yeah, the first offering out there to support Kubernetes. And so the aspect there is that as cloud native has moved from DevOps, and now into production in the mission critical applications, now becomes the aspect of originally the DNA of DevOps was my data doesn't have to be persistent. Now when you move into a mission critical environment, you're entire environment needs to be protected. And to be able to bring those workloads back up should anything happen and to be able to protect that data that is critical to those workloads. >> Okay, and so you're saying you're first, and you see this as a differentiator in the marketplace, or is everybody going to have this, or it's one of these confusing ice cream cone of solutions. So why you guys? What's your big differentiation? Let's stick to containers. I have the same questions sort of overall come back to that. >> So great question, and the matter of fact is that with our experience across the edge, core and cloud, Kubernetes and containers will be prevalent throughout. And it'll be the way that applications will be developed. It's meeting the demands of the business and being agile. And I think that with our ability internally that would move to that agile emotion. We have that ability to address the customer's needs especially in the cloud native Kubernetes space. >> I think going back to what you said too about VMware, certainly our partnership there is differentiated. We even heard some echos of that during Vmworld. Pat Gelsinger usually doesn't give call outs on the main stage very frequently. And he said that they were working with us as a best-in-class partner for data protection with Tanzu. And so there is a very tight partnership there, so if I'm a customer and I'm looking at containers, I'm probably going to want to do it within the framework of VMware to start with. But it's important to point out that we're also not dependent on VMware. So we can still deliver protection for Kubernetes containers outside of say the VMware management domain. But I would say from a differentiation standpoint there are some real tight partnering going on to make these capabilities mature. >> Well it helps that your CEO owns 80% of the company. (laughing) But it's an interesting point you're making because again, dial back 10 years ago, VMware had much more of a Switzerland strategy under Maritz, almost to, at the time, EMC's detriment. I think Michael Dell is very clearly, as is Jeff Clarke, said look, we're going to do more integration. And Pat Gelsinger has been, look, I love all my partners. It's true but we're entering sort of a new era. And that integration is key, you know, again, because of the ownership structure, and your long history there. It's got to confer some advantages in the marketplace. >> Yeah, and he's also got to remove some of the headwinds to adoption of VMware cloud. And data protection, as we discussed often times can be a headwind if customers are concerned that they're not going to be able to protect their data, chances are they're going to stand pat for a while. So I mean you need to find ways to take some of those objections off the table. >> Yeah, and not to take anything away from your competitors. Look, it's an open API world, and again, people are going to compete. But at the end of the day this stuff is still really complex and if you can do some core engineering together it's definitely an advantage. Let's talk a little bit about cyber. I often say it's become a board level topic. It's not a matter of if, it's a matter of when. SecOps teams are overtaxed. I think I put out a stat lately, I got it from Robert Herjavec actually. He said think about this. The worldwide economy is 86 trillion and we spend .014% on cyber, that's it. We're barely scratching the surface. And that's part of the problem. Okay, but with that limited resource we have to be as smart as possible. You've got this ransomware coming in. So what are your customers asking you for and how are you responding? >> So it's interesting, right, because it is top of mind, cyber and cyber attacks, and it takes many forms. The attacks can be malware, they could be encryption, they could be deletion. Which is ultimately the worst case scenario. And I think as you go forward and you look at it cyber is the number one concern for any CIO, CISO or anyone that's worried about their security infrastructure. >> Which is everybody >> Which is everybody, right, exactly. I think that we have delivered for the cloud data protection area a first and best offering with an air gap data protection solution. So inherently, we can insulate and protect our customer's data from cyber threats. So when a ransom event occurs you can recover your data without having to pay that ransom. Or not be concerned that in most severe cases your data gets deleted. I think most recently there was a healthcare provider who was threatened about their data being deleted. And that was the worst case. We were able to protect their data in the sense that with our cyber recovery offering they protected their data in an air gap vaulted solution. And they didn't have to pay for that ransom. >> So what I'm hearing from you guys is okay, cloud, very important. Hybrid cloud, multi-cloud, fundamental to our strategy. VMware, they say bet on sure things. VMware is pretty much a sure thing. Large customer base, leader in the space. And then cyber as a key concern of customers, you want to expand the notion of backup and data protection to really point it at cyber as well. >> Absolutely, in fact with this recent research, it's called the Global Data Protection Index Survey and we just refreshed it. And what customers identified as the most compelling reasons to adopt cloud is for better performance, better data protection, and better security. Not necessarily in that order but those were the top three. So we look at that and say, you know we've got plays there. Certainly we have capabilities protecting workloads in the cloud whether they be virtual machines, cloud native, containers. But the security aspect of it is huge. Because oftentimes customers, and Dave, you and I were talking about this, they make some broader assumptions about once data is in the clouds they can kind of wash their hands and walk away. Not so fast, because certainly there is a shared responsibility model that extends not only to data protection, but also to security. Look, don't get me wrong, the cloud service providers have fantastic security capabilities, have a great perimeter. But as you said, it's not a question of if, it's a question of when. And when something happens, are you ready for it? So these solutions extend not only to on-prem but into the cloud. So it's that ability wherever the workload lives that you can get the right protection and what we're really now referring to as safeguarding data. Because it's a combination of data protection and security that's embedded and doing it wherever the workload resides. >> I'm glad you brought that up Colm. I have a follow up on that, but Nelson, did you want to add something? >> Well, I just want to mention that one of the biggest concerns is making sure that that data you vaulted is actually clean and safe. So we have a cyber sense capability within our cyber recovery product, that when you vault that data it does about 100 analytics on that data to make sure that there's no malware. That it's not infected. And it does it automatically and even on incremental using machine learning. >> That's really important because mistakes happen really fast. (laughing) So if you're vaulting corrupted data, >> What do you do? >> Oops. >> Yeah, exactly. >> I want to come back, I think the shared responsibility model is not well understand and there's a lot of confusion in the industry. At a conference this year, AWS' CISO Stephen Schmidt was saying, look all this talk about security is broken it's not really productive. The state of security in the cloud is actually really good and to your point Colm, yeah, he's right about that. Then you hear Pat Gelsinger saying, he's told me many times in theCUBE security is a do-over. To my point, you know the 86 trillion. And so I kind of lean, when I talk to IT people what Pat is saying. So you say okay, where is the dissidence there? Well, the reality is is the cloud service providers and the shared security model, they'll secure the physical infrastructure. But it's up to the customer to be responsible for everything else. You know, the edicts of the organization are applied. We were talking to the CISO of a large insurance company and she said to us, oh no, shared responsibility means it's our responsibility. So you're not going to go after the cloud service provider, you're going to go after the insurance company, or the financial service institution. Their brand is the one that's going to get hurt. So that's misunderstood. My question, very long winded rant, but what role do you guys play in that shared responsibility model? >> Well, ultimately it comes down to the customer. And the shared responsibility model really is admissible, as you mentioned, right? And so at the end of the day, you as the customer own and are responsible to protect that data. So your data protection strategy, your cyber resilience strategy has to be sound. And it has to be secured by those that can actually do it across multiple distribution models and platforms, whether it's edge, core or cloud. Whether it's VM's, containers. It doesn't change. You're still ultimately responsible for it. >> I think maybe what you might be driving at the question, Dave, is empowering the customers to maintain control of their data. And having the tools in place so that they feel comfortable. And part of it too is moving more towards automation. Because as their applications grow, and as Nelson said, become more distributed, as the data grows exponentially, this just fundamentally isn't a task that humans can manage very much longer. >> I'm glad you brought that up, because you ask a CISO, what's your number one problem? And he or she will tell you the skill sets to keep up with all this complexity. And that's where automation comes in. >> Correct, it does. So that's where we're taking it. Is trying to make things more automated and take tasks away from humans that they just can't keep up with. >> All right guys, I'll give you the last word. We go back a decade or so ago and backup was a whole different situation. And we saw the rise of virtualization and now cloud and all these other things that we have been talking about. Edge, the cyber threats, et cetera. So bring us home, where do you see the future and how does Dell EMC data protection fit in? >> It's an exciting time, it really is. It's kind of like the coming of that second storm as you mentioned. Businesses have that demand of needing more services to load more quickly in an agile fashion. And as they pair that with the growth of their data which is distributed, they really have that challenge overall of how do I manage this environment? So you have to have the observability to understand where your data is and to be able to monitor it. You have to be able to orchestrate your workloads so that they're automated, and the data protection of those workloads are automated as well. And so the imperative that aspects like Tanzu are addressing with cloud native, that Kubernetes brings to the table to deliver containerized applications. That's really quite honestly is the biggest evolution I've seen in my last 20 to 30 years. This is definitely a different paradigm shift. >> Yeah, you know, six months ago I was with a competitor and was taking a look at EMC, sorry, I should say Dell EMC, and I was wondering, should I make a move over here? And really what convinced me was the fact that the company was willing to basically solve internally the innovator's dilemma. You're making so much money on your existing portfolio, now you're going to start investing in what appears to be almost internal competition to your portfolio. It's not, it's complimentary. So that's what drove the decision for me to come here, but I will also say it's great to be a part of an organization that has a long-term vision. You remember, I think the phrase that was being used, being held captive to the 90-day shot clock. You know, the earnings reports and stuff. And that drives behavior. Well, if your organization is looking at decade-long goals, that means that you can actually plan to do things that over time are going to actually bring real value to customers. So I think we're doing the right things. We're obviously innovating, we're on this agile software development cadence gives us the ability to solve the problems incrementally over time so customers can see that value instead of waiting for large batch releases. But is also gives us the ability to say, hey, when we've made mistakes or when we hadn't seen certain things come around the corner, we're agile enough to change with that. So I think the combination of having that vision and putting in the investments, and we've kind of likened ourselves to the biggest startup in the industry with the backing of a Fortune 50. And so from a customer standpoint you got to look at that and think, you know, that's interesting, because I need to solve my current problems today. I need to have a path forward for the future. And who am I betting on to deliver that? And the other thing I'll leave on is customers are trying to work with fewer suppliers, not more suppliers. Because they want to reduce the complexity. Well who has the ability to not only bring data protection to bear, but a whole portfolio of technology is really end to end. That can snap into those environments to again reduce complexity and drive more business value. >> That's a really interesting point you make about consolidations. Ever since I've been in this industry people want to deal with less suppliers and reduce the complexity. But you still see startups and VC's funding things. And what's happened is this consolidation, the big guys, you guys are the biggest consolidator. And I always say the rich get richer. There's always this tension between sort of, do I go out and buy the spoke, best of breed tools, or do I get them from somebody who can help me across the portfolio? That's really where your strength is. Guys, thank you so much. This is really a very important topic. Data protection is one of the most important areas that we've been covering. I've been reporting on it a lot. As I said, a lot of venture money has been flowing in. So I really appreciate you guys coming in, sharing your perspectives. And best of luck in the marketplace. >> Appreciate it, Dave. >> Thanks, this was great. >> You're welcome. All right, and thank you for watching, everybody. This is Dave Vellante for theCUBE. We'll see you next time. (upbeat music)
SUMMARY :
From the SiliconANGLE Media office that the firm is not likely You got the biggest market share. and knowing the experience Some of that was we hope that the growth in cloud So how are you specifically addressing And the other aspect of that is consistency. so that we can give you is that we want and deliver the ability Is that the right way So the reality started to evolve. Yes, so the compatibility matrix, So now it's having that feature and functionality One of the things we obviously paid attention to And it's going to grow that way. So do you have solutions in that space, It's actually one of the first that was in the market And so the aspect there is that in the marketplace, or is everybody going to have this, and the matter of fact is that I think going back to what you said too And that integration is key, you know, again, some of the headwinds to adoption of VMware cloud. And that's part of the problem. And I think as you go forward and you look at it And they didn't have to pay for that ransom. So what I'm hearing from you guys as the most compelling reasons to adopt cloud I'm glad you brought that up Colm. is making sure that that data you vaulted So if you're vaulting corrupted data, Their brand is the one that's going to get hurt. And so at the end of the day, And having the tools in place And he or she will tell you the skill sets that they just can't keep up with. So bring us home, where do you see the future the coming of that second storm as you mentioned. the ability to say, hey, when we've made mistakes And best of luck in the marketplace. All right, and thank you for watching, everybody.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Dave | PERSON | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
Pat Gelsinger | PERSON | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Jeff Clarke | PERSON | 0.99+ |
Pat | PERSON | 0.99+ |
EMC | ORGANIZATION | 0.99+ |
AWS' | ORGANIZATION | 0.99+ |
80% | QUANTITY | 0.99+ |
.014% | QUANTITY | 0.99+ |
Dell EMC | ORGANIZATION | 0.99+ |
February 2020 | DATE | 0.99+ |
Colm | PERSON | 0.99+ |
Nelson | PERSON | 0.99+ |
90-day | QUANTITY | 0.99+ |
86 trillion | QUANTITY | 0.99+ |
Colm Keegan | PERSON | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
48 percent | QUANTITY | 0.99+ |
70% | QUANTITY | 0.99+ |
today | DATE | 0.99+ |
2022 | DATE | 0.99+ |
Michael Dell | PERSON | 0.99+ |
ORGANIZATION | 0.99+ | |
1,000 customers | QUANTITY | 0.99+ |
Nelson Hsu | PERSON | 0.99+ |
Stephen Schmidt | PERSON | 0.99+ |
VMware | ORGANIZATION | 0.99+ |
two experts | QUANTITY | 0.99+ |
one console | QUANTITY | 0.99+ |
Robert Herjavec | PERSON | 0.99+ |
500,000 customers | QUANTITY | 0.99+ |
first | QUANTITY | 0.99+ |
Tanzu | ORGANIZATION | 0.99+ |
Boston, Massachusetts | LOCATION | 0.99+ |
both | QUANTITY | 0.99+ |
over 1,000 customers | QUANTITY | 0.99+ |
one | QUANTITY | 0.98+ |
six months ago | DATE | 0.98+ |
DevOps | TITLE | 0.98+ |
One | QUANTITY | 0.98+ |
one environment | QUANTITY | 0.98+ |
Dell Technologies | ORGANIZATION | 0.98+ |
over 2.7 exabytes | QUANTITY | 0.98+ |
about a half a billion dollars | QUANTITY | 0.97+ |
vSphere | TITLE | 0.97+ |
this year | DATE | 0.97+ |
PowerProtect | TITLE | 0.96+ |
about 100 analytics | QUANTITY | 0.96+ |
Switzerland | LOCATION | 0.96+ |
Vmworld | ORGANIZATION | 0.95+ |
Rüya Atac-Barrett, Dell EMC | CUBEConversation, November 2019
from the silicon angle media office in Boston Massachusetts it's the queue now here's your host still minimun hi and welcome to a special cube conversation here in our Boston area studio I'm Stu minimun and we're getting towards the end of 2019 where we've had a bevy of cloud conferences I've - I've attended Microsoft ignite cube con cloud native con and the big the Super Bowl for industry AWS reinvent is right on the horizon and happy to talk about some of the data protection items related to cloud welcoming back to our program RIA a touch Barrett who is the vice president of marketing in the data protection group at Dell EMC Fria great to see you great to see you Stu nice to be back alright so RIA you know obviously cloud has had such a huge impact on our entire industry you know transforming what's happening there bring us inside how some of those trends are really impacting your organization in your customers yeah definitely I think one of the things that no one would be surprised about is that organizations today are managing seven times the data that they were managing just two years ago so last year in 2018 there was a study done by Vanson Bourne and analyst firm it's called the global data protection index study where they surveyed over 2,200 IT decision-makers and they asked specifically about their data protection challenges one interesting data point is more than 76 percent of the surveyed had placed some sort of data disruption in the last 12 month the preceding 12 months before the survey and 30 close to 30 percent are twenty seven to be exact had lost data costing upwards of millions based on that disruption so before you even get into some of the market trends that's complicating protection I think a lot of customers are still very challenged with their data protection just in any regular environment now the challenge are on data protection and even more broadly data management because again there's the 80/20 rule a lot of your data is actually in the tertiary secondary copies of your data it's getting more complex so a couple of big trends that you and I talk about all the time data growth we kind of talked about that data distribution data is more distributed than ever you have it across multiple clouds you have data hungry technologies like artificial intelligence and machine learning that's basically generating data volumes that's unprecedented and that will be generating data volumes that are unprecedented and obvious and some of these technologies are actually also fueling data growth at the edge so I think that I saw a number or I think Michael Dell was talking about how the data at the edge is actually going to surpass data in all of the clouds combined in the near future then you have application transformation so that's where cloud really comes in a lot of our customers are speeding their time to market and their exchanges and interactions with their customers by really transforming their application development and using cloud native you know application deployment to really fuel how they're how they're developing apps and that's requiring new ways of data protection then you bring into effect all the regulatory rules there's one coming up very shortly I think in January so you have increasing governmental regulations you have increasing privacy laws and and mandates so again data protection is getting into this area where you would say it's in the eye of the storm yeah so many challenges what we've really loved to document over the last few years is the opportunity around data your business is creating new business value creating new lines of business and really extracting information use the word information even you know we've really defined is what defines a company that has successfully gone through digital transformation is it as data that is driving decisions and companies there so you've talked to a lot of customers you've got some survey data or you bring us inside you know what are some of those leading-edge customers what differentiates kind of the leaders and ones that become winners in this world compared to before data was at the center of what they were doing absolutely three the power of three again I think the the companies that are really doing things well or have seem to have a handle around their ever-changing data protection needs are doing have three things in common I think the first thing is pretty evident and you talk to it just now Stu they value data they see data as capital so the amount of attention they give to data is really significantly different than a lot of the other companies so they really ranked when they talked about how they see data as the most important capital you know one of the most important capitals in their in their environment they looked at productivity apps as a significant area of importance they looked at AI machine learning business intelligence and analytics as some of the most critical applications including the new cloud native applications they are gaining significant importance in the eyes of these companies so first and foremost they really value data and they want to make sure that they are protecting it in a way that really meets what they need to the second thing that's really interesting that they're doing is they're investing in a single vendor for all of their data protection needs again this is based on the global data protection index study of the 2,200 IT decision makers and GDP I found that companies that are using at least two vendors are 35 percent more likely to experience some sort of disruption and when they talk about disruption they talked about downtime ransomware and they talked about data loss as the number most frequently cited disruptions in their environment and multiple vendor solutions really really lead to increased complexity there's just more touch points disparate management tools especially when you're in a recovery type situation it just adds a lot of complexity to it including service and support experience that you're going to get from multiple vendors so again investing in a single solution across a very diverse portfolio of application deployment choices physical virtual multi-cloud including extent to cloud use cases as well as cloud native protection really makes sense from core to edge to cloud and I think it will increase decrease the complexity as well as minimize the downtime associated with any type of disruption so that's the second trend so we talked about they value data the second one was that they really have investing in a single partner in their data protection solutions the other one is that they prioritize the third one they have some fundamental needs that they prioritize for their multi cloud so they prioritize scale efficiency as well as ease of management for their multi cloud data protection needs so while cloud computing gives us a lot of flexibility agility it can also bring with it complexity unknown costs and increased risk if not managed appropriately and if this extends to your data protection environment so you need data protection solutions that basically can manage that are easy to scale easy to deploy and deliver efficiency and resiliency across this multi cloud environment so those are the three things that are really doing differently still all right yes so many so many things that customers need to think about now living in that multi cloud world cloud native infiltrating the application environment so as we look forward to 2020 here what are those new requirements so you know what a customers need to really think about when they're they're shaping the future of building their environments yeah that's that's a great question and all of the new requirements start with the fundamentals if you don't have the fundamentals and your requirements will fall short and if anything the fundamentals are becoming more and more critical so we already talked about what those companies that are doing well really do differently so they value scale efficiency performance and when they look at those environments they look at it across a distributed deployment model so you're talking about global scale performance at a global level you know if efficiency across the cloud as well as the cloud resources that you're utilizing so if when you talk about efficiency and performance and scale it takes on a brand-new meaning in the new set of requirements and then there's some real new new requirements so for protection we're seeing protection for cloud native applications so we were at kubernetes and we had our kubernetes cube con and we were showcasing our container data protection kubernetes container data protection so we're doing a tech preview of that that got really well received because a lot of companies are struggling with how they're going to be protecting containers and then you have protection for modern apps SAS based applications MongoDB cloud era type applications that now need protection so it used to be a wide range of different applications now there's new modern apps that need the same level of protection and they have new requirements one of the last ones is again protection of traditional because you're going to still have a big traditional deployment and cloud native applications at what we're calling global scale so what does global scale mean it means you have visibility and reporting to ensure protection across health compliance efficiency across core edge and multi cloud right those are going to be some of the new requirements and then data reuse is another one that we see coming up more and more so there's so much investment in making sure your data is protected and companies want to actually get additional value out of their protection data and they want to drive that value through innovation through being able to leverage that data for app dev and test analytics type work so really they want to be able to do that on their secondary and tertiary copies so that's another set new set of requirements that we're seeing so it starts with the fundamentals and then you need to be able to scale and drive these new requirements yeah absolutely in many ways some of these requirements echo what we had in the past you know go back 20 years ago was spreading a crawl you know mainframe UNIX and Linux and Windows and now it's multi cloud and SAS and hybrid environments so really exciting stuff you know your team you know just give us a look for 2020 you know you know seeing Dell EMC show up not only at of course Dell technology's world but you know cube Colin and reinvent and some of these cloud shows yeah yes more and more Dell to be announced I'll tech cloud last year so it's a big focus for the company what we're doing in partnership with VMware so there's a lot of exciting things that are happening and data protection is really becoming critical to all of these conversations so it's going to be a very exciting year I think it's going to be a defining year for us next year and you're gonna see innovation like you've never seen before from Dell EMC all right exciting stuff definitely so much opportunity innovation happen in the clouds Rhea thank you so much for the updates looking forward to seeing the team with lots of you know over 50,000 of everybody's friends in Las Vegas for AWS thank you thanks for having us - all right be sure to check out the cube net for all of the AWS reinvent content as well as all the other shows we've done this year and look forward to 2020 also I'm Stu minimun thanks for watching the Q
**Summary and Sentiment Analysis are not been shown because of improper transcript**
ENTITIES
Entity | Category | Confidence |
---|---|---|
November 2019 | DATE | 0.99+ |
35 percent | QUANTITY | 0.99+ |
Barrett | PERSON | 0.99+ |
seven times | QUANTITY | 0.99+ |
January | DATE | 0.99+ |
2020 | DATE | 0.99+ |
Michael Dell | PERSON | 0.99+ |
Las Vegas | LOCATION | 0.99+ |
Boston | LOCATION | 0.99+ |
30 | QUANTITY | 0.99+ |
next year | DATE | 0.99+ |
2018 | DATE | 0.99+ |
Windows | TITLE | 0.99+ |
Dell EMC | ORGANIZATION | 0.99+ |
three things | QUANTITY | 0.99+ |
Linux | TITLE | 0.99+ |
twenty seven | QUANTITY | 0.99+ |
Rhea | PERSON | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
last year | DATE | 0.99+ |
over 2,200 IT decision-makers | QUANTITY | 0.99+ |
second thing | QUANTITY | 0.99+ |
end of 2019 | DATE | 0.99+ |
Boston Massachusetts | LOCATION | 0.99+ |
second one | QUANTITY | 0.99+ |
20 years ago | DATE | 0.98+ |
Dell | ORGANIZATION | 0.98+ |
two years ago | DATE | 0.98+ |
more than 76 percent | QUANTITY | 0.98+ |
Super Bowl | EVENT | 0.98+ |
VMware | ORGANIZATION | 0.98+ |
second trend | QUANTITY | 0.98+ |
third one | QUANTITY | 0.98+ |
AWS | ORGANIZATION | 0.97+ |
Rüya Atac-Barrett | PERSON | 0.97+ |
Stu minimun | PERSON | 0.97+ |
three things | QUANTITY | 0.97+ |
single solution | QUANTITY | 0.96+ |
UNIX | TITLE | 0.96+ |
one | QUANTITY | 0.96+ |
over 50,000 | QUANTITY | 0.96+ |
2,200 IT decision makers | QUANTITY | 0.95+ |
single partner | QUANTITY | 0.95+ |
Vanson Bourne | ORGANIZATION | 0.95+ |
first | QUANTITY | 0.95+ |
MongoDB | TITLE | 0.94+ |
three | QUANTITY | 0.93+ |
this year | DATE | 0.91+ |
first thing | QUANTITY | 0.9+ |
single vendor | QUANTITY | 0.9+ |
echo | COMMERCIAL_ITEM | 0.89+ |
millions | QUANTITY | 0.87+ |
today | DATE | 0.86+ |
last 12 month | DATE | 0.86+ |
30 percent | QUANTITY | 0.85+ |
at least two vendors | QUANTITY | 0.79+ |
tertiary | QUANTITY | 0.77+ |
secondary | QUANTITY | 0.75+ |
Dell EMC Fria | ORGANIZATION | 0.75+ |
tertiary secondary copies | QUANTITY | 0.75+ |
global data protection index | TITLE | 0.75+ |
last few years | DATE | 0.75+ |
to | QUANTITY | 0.68+ |
lot | QUANTITY | 0.68+ |
Stu | PERSON | 0.68+ |
cube con | COMMERCIAL_ITEM | 0.65+ |
kubernetes | ORGANIZATION | 0.65+ |
companies | QUANTITY | 0.64+ |
con | EVENT | 0.62+ |
native | EVENT | 0.6+ |
80/20 | QUANTITY | 0.56+ |
12 months | DATE | 0.56+ |
minimun | PERSON | 0.54+ |
customers | QUANTITY | 0.52+ |
RIA | TITLE | 0.49+ |
ignite | EVENT | 0.44+ |
everybody | QUANTITY | 0.41+ |
Colin | PERSON | 0.27+ |