Sanjay Uppal and Craig Connors, VMware | VMworld 2020
>>from around the globe. It's the Cube with digital coverage of VM World 2020 brought to you by VM Ware and its ecosystem partners. >>Welcome back. I'm stew Minuteman. And this is the Cube coverage of VM World 2020 our 11th year covering the show. And of course, networking has been a big growth story. Four vm where for a number years, going back to the Neisseria acquisition for over billion dollars. Really leveraging all of the virtual networking and SD wins been another hot topic. A couple years ago, it was the Velo Cloud acquisition. And now happy to welcome to the program two of the Velo Cloud business executives. First of all, we have Sanjay you Paul. He is the senior vice president and general manager of that mentioned division of VM Ware. Enjoining him is Craig Connors, whose the vice president and chief technology officer for that same division he was the chief architect of fellow Cloud Craig Sanjay. Thank you for joining us. >>Thank you. >>Thank you. >>Alright, So, Sanjay, first of all nice, you know, call outs and a lot of news that we're gonna get to dig into in the morning Keynote you know Pat Sanjay the team. Uh, you know, a couple of years ago, Pat talked about, you know, the next billion dollar businesses networking your team helping toe add to that. And, ah, a new term thrown out that we're gonna get to talk a little bit about. Our friends at Gartner termed it sassy. So I'll let you, you know, explain a little bit the news that this wonderful new four letter acronym that the Gartner spots that us. Um, why don't you start us there? >>Yeah. I couldn't be more excited to be here at VM World announcing this expansion of what's going on in Ste. Van. So I see Van was all about bringing branch office users to their applications and doing that in a really efficient manner, throwing out all those complex hardware appliances and simplifying everything with software, increasing the quality of experience for the user. But now what has happened is, you know they want security to be dealt off in the same way. Same simplicity and automation, same great user experience. And at the same time, you know, blocking all these attacks that are coming in from various places and covert has just driven that even more meaning that you need to get to networking and network security to be brought together in this simple and automated way while keeping the end user experience be great on while giving I t what they need, which is high security and good manageability. So this acronym sassy, secure access Service edge It really is the bringing together off net networking and network security both as a service. That service angle is really important. And the exciting part about what we're announcing at the at we'd be involved. Here is the expansion off the S, Stephen Pops and Gateways into becoming Sassy pops. And now customers can get a whole slew of services both networking and network security services from the anyway. So that's the announcement. >>Wonderful, Craig. You know, since since since you've helped with so much of the architecture here, I wanna kick out a little bit. When? When it comes to the security stuff that Sandy was talking about. I remember dealing back with land optimization solutions, trying to remember. Okay, wait. When can I compress? When can I encrypt? You know what do I lay on top of it? Um, SD when you know fits into this story, help us understand. What does you Novello Cloud do? What is it from the partner ecosystem? You know, So you know there's there's some good partners that you have helping us. Help us understand. You know what exactly we mean because security is such a broad term. >>Yeah, thanks. So there's four components in the sassy pop that we're bringing together. Obviously, VM Ware Ston is one of those Sanjay mentioned the changing workforce. We have off net users that aren't coming from behind Stu and Branch Mawr and Mawr today. So we also have secure access powered by our workspace. One solution that's bringing those remote users into the sassy pop and then two different security solutions. Secure Web gateway functionality. And that is the next generation secure Web gateway that includes things like DLP and remote browser isolation. And as you saw in the news today that's powered through ROM agreement with Menlo Security. And then we have next Gen firewall ing for securing corporate traffic. And that's powered by our own VM Ware NSX firewall, which has been recently augmented with our last line acquisition. So those are the four key components coming together within our sassy pop. And of course, we also have our continued partnership with the scaler for our our large joint via Mersey Scaler customer base to facilitate that security solution as well. >>Yeah. So, Sanjay, maybe it would make sense. As you said, you've got ah, portfolio now in this market, Uh, got v d I You've got edge walk us. Or if you could, some of the most important use cases for your business. >>Yeah. So you know the use case that has taken off in the last several years since the advent of SD. When is to get sites? So these would be branch offices and a branch office could be an agricultural field. It could be a plane. It could be an oil rig. You know, it could be any one of these. This is a branch office. So these sites how to get them connected to the applications that they need to get access to so telemedicine example. So how do you get doctors, diagnosticians and all that that are sitting in their clinics and hospitals? You get great access to the applications on the applications can be anywhere they don't have to be back in your data centers. You know, after data center consolidation happened, some of the apse you know, we're in the data centers. But then, after the cloud advent came, then the apse were everywhere there in the public cloud, both in I s as well as in SAS. And then now they're moving back towards the edge because of the advent of edge computing. So that's really the primary use case that s Stephen has been all about. And that's where you know, we have staked a claim to be the leader in that space. Now, with Covic, the use cases are expanding and obviously with work from home, you take the same telemedicine example. The doctors and diagnosticians who used to work from hospitals and clinics now have to get it done when they're working from the home. And, of course, this is a business critical app. And so what do you do? How do you get these folks who are at home to get the same quality of experience, the same security, the same manageability, but at the same time, you cannot disturb the other people who are working from home because that is an entire ecosystem. You serve the business user, but you also serve the needs off the home users keeping privacy in mind. So these two cases branch access and then remote access, which great talked about these are the primary use cases, and then they break down by vertical. So depending on whether it's health or it's federal or its manufacturing or its finance, then you have sub use cases underneath that. But this is how we from a from a V C n standpoint, you know, claimed to have 17,000 customers that have deployed our networking solutions. Ah, large fraction of those being our stu and solutions today. >>Yeah. Okay, Craig, one of those terms that gets thrown around a lot in the industry iss scale. I look at certain parts of the market, you know, say kubernetes kubernetes was about, you know, bringing together lots of sites. But now we're spending a lot of time talking about edge, which is a whole different scale. Same thing if you talk about devices and I o t can you speak to us a little bit about, you know, fundamentally, You know that branch architecture, I think, set you up well, but when I start thinking about EJ, it probably is. You know, uh, you know, larger number and some different challenges. So So maybe maybe some differences that happen to happen in the code to make that happen? >>Yeah, absolutely. I mean, I think you know, we've been fortunate in the success that we've had in RST ran deployments. More than 280,000 branches deployed with RST ran solution. So scale is something that's been near and dear to our heart from the beginning. How do you build a multi tenant service in the cloud? How do you build cloud scale? And we brought that aspect into all of these components through container ization, as you mentioned through horizontal scalability, bringing them into our own dedicated pops. Where we control the hardware we control the hyper visor, obviously built on top of the m r E. S s. I that allows us to deliver scale in a way that other competitors may not be able to achieve. >>Yeah, son Sanjay, it's been a couple of years since the acquisition by VM Ware. Give us a little bit of an update, if you would as to, you know, what I'm sure. Obviously, customer reach on adoption greatly increased by by the channel and go to market. But, you know, directionally And you know, any difference in use cases that that you've seen now being part of the M R. >>Yeah, absolutely. No. There's there's been an expansion in the use cases, which is why this fit was very good, meaning Vela Cloud being a part of VM way. So if you look at it, what the wider network does, where the place where you know ties, we tie it all together and tie walk together. If you look at the end User computing, which Greg was mentioning, the clients are digital workspace, workspace. One client. Well, those clients now will connect to our sassy pop. So that's one tie in that obviously we couldn't have and we were an independent company. The other side of it, when you go from the sassy pop into the data center, then we tie into NSX. Not just that the Cloud firewall, but in the data center itself so we can extend micro segmentation. So that's another kid use case that is becoming prevalent. Then the third aspect of this is really when you run inside telecom operators and VM Ware has a very robust business as it goes after telcos with the software stack and so running our gateways running our sassy pops at the telco environment, then gets us to integrate with what's going on with our telecom business unit. We also have what we're doing on our visibility and Tellem entry perspective. So we had acquired a company called Neons A, which were crafting into on edge network intelligence product that then fits into VM Ware's overall. For in the space we have, ah, product suite called We Realize Network Insight. And so that network inside, combined with what we're doing from from a business unit standpoint, gives customers an end to end view from from an individual client through the cloud, even up to an individual container. And so we call this client to cloud to container. All of this is possible because we're part of VM Ware. In the last piece of this is something that's gonna happen. We believe next year, which is edge computing when edge computing comes in. You know, I jokingly say to my team this acronym of Sassy, which is s a s e you gotta insert of sea in the middle. So it becomes s a CSE and out of that pronounced that says sacks E. So I know it sounds a little bit awkward, but that c stands for the compute. So as you put compute in the computer is going to run in the edge, the computer that's going to run in the pop and the sassy is gonna become, you know, sexy. And who better to give that to you than VM Ware? Because, you know, we have that management stack that controls compute for customers today. >>Well, definitely. I think you're you're you're drawing from the Elon Musk school of You know how to name acronyms in products Do so sometimes It's really interesting. Uh, Craig, talk us a little a little bit about that vision to get there, you know? What do we need to do as an industry? How's the product mature? Give us a little bit of that. That that roadmap forward, if you would >>Yeah, I think you know Sassy is really the convergence of five key things. One is this distributed pop architecture. Er So how do you deliver this? Compute and these services near to the customers premise. And that's something that companies like us have have had years of experience and building out. And then the four key components of sassy that we have, you know, zero trust access S t u N next generation firewall ing and secure Web Gateway. We're fortunate, as Sanjay said, to be part of the M where where we don't have to invent some of these components because we already have a works based one and we already have the NSX distributed firewall. And we already have the m r s d when and so ah, lot of companies you'll see are trying to to put all of these parts together. We already had them in house. We're putting them under one umbrella, the one place where we didn't have a technology within VM Ware. That's where we're leveraging these partnerships with memo and see scaler to get it done. >>Sanjay e think the telco use case that you talked about is really important One we've definitely seen, you know, really good adoption from from VM Ware working in those spaces. One place I I wanna understand, though, if you look at vcf and how that moves. Thio ws toe Azure, even toe Oracle's talked about in the keynote this morning. How does SD win fit into just that kind of traditional hybrid cloud deployment we've been talking about for the last couple of years? >>Yeah, that's a great question. So, you know, when you look at Ste Van, that name can notes software defined, but it doesn't. It's not specific to branch office access at all. And when you look at DCF, what VCF is doing is really modernizing your compute stack. And now you can run this modern compute stack of your own data centers. You can run it in the private cloud. You can run it on the public cloud as well, right? So you can put these tax on Amazon, azure, Google and and then run them. So what an STV in architecture allows you to do is not just get your branch and secure users to access the applications that are running on those computes tax. But you can also intermediate between them. So when customers come in and they say that they want simplified networking and security between two public cloud providers, this is the multi cloud use case, then getting that networking toe work in a seamless fashion with high security can be done by an S Stephen architectures. And our sassy pop is perfectly situated to do that. And all you would need to do is add virtual services at the sassy pop. An enterprise customer would come in and they say they want some peanuts here and some VP CS there they want to look at them in an automated fashion. They want to set it up, you know, with the point and click architectures and not have to do all this manual work, and we can get that done. So there's a there's a really good fit between Sassy s Stephen and where VCF is going to solve the multi cloud problem that people are having right now. >>Excellent. I really appreciate that. That that explanation last thing, I guess I'll ask is, you know, here at VM World, I'm sure you've got a lot of breakouts. You've probably got some good customers sharing some of their stories. So anonymous if it has to be. But we would love if you've got either views of some examples, uh, to help bring home that the value that your solutions are delivering. >>Great. When I start with one and then creek and fill in the other one, eso let me start off with the telemedicine example. So we have, you know, customer called M. D. Anderson Cancer Center. And these are the folks in in Texas, and they provide a really, really important service. And that service is, you know, providing patients who are critically ill to give them all the kinds of services, whether they come into the clinic or whether they're across a network connection. And they're radiologists and doctors air sitting at home. So I think it's very important use case and, you know, we started off by deploying in the hospitals and the clinics. But when Cove, it hit there to send a lot of these folks to work from home, and then when they work from home, it's really this device that goes in which you can see here. This is our Belo cloud edge. And this, um, has said in one of the my my favorite song says, There's nothing this box can't do. All right, so this box goes home into the, you know, doctors home, and then they are talking to their patient, getting telemedicine done because it solves the problem off performance. Um, you know that some of those folks have literally said that this thing was a God sent. That's not very often that networking people, you know, have been told that their products are like godsend. So I'll take that to the limit of grain of salt. But we are solving a very important problems increasing the performance were also this is a secure device, so it's not gonna be hacked into and then makes things much more manageable from a nightie standpoint. So this is one of those use cases, and there's plenty of them. But Craig has his favorites all turn it over to him. >>There's so many I could bore you. I think you know one really interesting. One is a new investment banking company that we have is a customer, and they used to go work in the office five days a week, and everything that they did was on their computer in the office and with this pivot to work from home post Kobe, did they think their future is a flexible work workforce where sometimes there in the office and sometimes they're remote. And when the remote there are deep peeing into their desktop, that is sting in their office and with their like to remote access VPN solution, they had to connect, Say, I'm a user sitting in Southern California. I'm connecting my VPN to Chicago to then come across the network back to Los Angeles to get to my desktop so that I can work from home. And now with Sassy, my secure access client from workspace one connects to the closest asi pop I get to my desktop in my office. Tremendously lower, Leighton see tremendously higher quality to experience for the users, whether they're, you know, at home, on the road anywhere they need to access that device. >>Craig Sanjay, thank you so much. Love the customer example. Sanjay. Good job bringing out the box. Uh, show people It's a software world. But the sassy hardware is still needed at times, too. Thanks for joining us. All >>right. Thank you, Stew. Thanks. Great. Cheers. All >>right. Stay with us for more coverage of VM World 2020. I'm still minimum. Thanks. As always for watching the cube
SUMMARY :
World 2020 brought to you by VM Ware and its ecosystem partners. First of all, we have Sanjay you Paul. that we're gonna get to dig into in the morning Keynote you know Pat Sanjay the team. And at the same time, you know, You know, So you know there's there's some good partners that you have helping us. And as you saw in the Or if you could, some of the most important use cases for your business. And that's where you know, we have staked a claim to be the leader in that space. I look at certain parts of the market, you know, say kubernetes kubernetes was about, I mean, I think you know, we've been fortunate in the success But, you know, directionally And you know, any difference in use Then the third aspect of this is really when you run inside telecom That that roadmap forward, if you would And then the four key components of sassy that we have, you know, we've definitely seen, you know, really good adoption from from VM Ware working in those spaces. So what an STV in architecture allows you to do is not just get your branch and I guess I'll ask is, you know, here at VM World, I'm sure you've got a lot of breakouts. And that service is, you know, providing patients who are critically ill the users, whether they're, you know, at home, on the road anywhere they need Craig Sanjay, thank you so much. All Stay with us for more coverage of VM World 2020.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Sanjay | PERSON | 0.99+ |
Gartner | ORGANIZATION | 0.99+ |
Craig | PERSON | 0.99+ |
VM Ware | ORGANIZATION | 0.99+ |
Chicago | LOCATION | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Oracle | ORGANIZATION | 0.99+ |
Southern California | LOCATION | 0.99+ |
Greg | PERSON | 0.99+ |
Texas | LOCATION | 0.99+ |
Los Angeles | LOCATION | 0.99+ |
Stew | PERSON | 0.99+ |
ORGANIZATION | 0.99+ | |
Pat | PERSON | 0.99+ |
Craig Connors | PERSON | 0.99+ |
Neons A | ORGANIZATION | 0.99+ |
next year | DATE | 0.99+ |
Velo Cloud | ORGANIZATION | 0.99+ |
VM World | ORGANIZATION | 0.99+ |
Menlo Security | ORGANIZATION | 0.99+ |
More than 280,000 branches | QUANTITY | 0.99+ |
Craig Sanjay | PERSON | 0.99+ |
Sassy s Stephen | ORGANIZATION | 0.99+ |
One solution | QUANTITY | 0.99+ |
two cases | QUANTITY | 0.99+ |
azure | ORGANIZATION | 0.99+ |
17,000 customers | QUANTITY | 0.99+ |
M. D. Anderson Cancer Center | ORGANIZATION | 0.99+ |
Mersey Scaler | ORGANIZATION | 0.99+ |
Paul | PERSON | 0.99+ |
NSX | ORGANIZATION | 0.99+ |
today | DATE | 0.99+ |
Stephen | PERSON | 0.98+ |
World | ORGANIZATION | 0.98+ |
11th year | QUANTITY | 0.98+ |
both | QUANTITY | 0.98+ |
third aspect | QUANTITY | 0.98+ |
Sandy | PERSON | 0.98+ |
Pat Sanjay | PERSON | 0.98+ |
Neisseria | ORGANIZATION | 0.98+ |
One | QUANTITY | 0.98+ |
VMware | ORGANIZATION | 0.98+ |
one | QUANTITY | 0.98+ |
VCF | ORGANIZATION | 0.98+ |
One client | QUANTITY | 0.97+ |
five key | QUANTITY | 0.97+ |
over billion dollars | QUANTITY | 0.97+ |
Sanjay Uppal | PERSON | 0.97+ |
Cloud | ORGANIZATION | 0.96+ |
Stu | ORGANIZATION | 0.96+ |
telco | ORGANIZATION | 0.96+ |
VM Ware | TITLE | 0.96+ |
First | QUANTITY | 0.96+ |
two different security solutions | QUANTITY | 0.96+ |
five days a week | QUANTITY | 0.95+ |
four letter | QUANTITY | 0.93+ |
Branch Mawr | ORGANIZATION | 0.91+ |
Mawr | ORGANIZATION | 0.91+ |
Covic | ORGANIZATION | 0.91+ |
Cube | ORGANIZATION | 0.91+ |
Novello Cloud | ORGANIZATION | 0.9+ |
this morning | DATE | 0.87+ |
billion dollar | QUANTITY | 0.87+ |
four components | QUANTITY | 0.85+ |
couple of years ago | DATE | 0.84+ |
one tie | QUANTITY | 0.83+ |
stew Minuteman | PERSON | 0.82+ |
Eric Han & Lisa-Marie Namphy, Portworx | ESCAPE/19
>>from New York. It's the Q covering Escape. 19. >>Welcome back to the Cube coverage here in New York City for the first inaugural multi cloud conference called Escape, where in New York City was staying in New York, were not escaping from New York were in New York. It's all about multi Cloud, and we're here. Lisa Marie Nancy, developer advocate for Port Works, and Eric Conn, vice president of Products Works. Welcome back. Q. >>Thank you, John. Good to see >>you guys. So, um, whenever the first inaugural of anything, we want to get into it and find out why. Multi clouds certainly been kicked around. People have multiple clouds, but is there really multi clouding going on? So this seems to be the theme here about setting the foundation, architecture and data of the two kind of consistent themes. What shared guys take Eric, What's your take on this multi cloud trend? Yeah, >>I think it's something we've all been actively watching for a couple years, and suddenly it is becoming the thing right? So every we just had ah, customer event back in Europe last week, and every customer there is already running multi cloud. It's always something on their consideration. So there's definitely it's not just a discussion topic. It's now becoming a practical reality. So this event's been perfect because it's both the sense of what are people doing, What are they trying to achieve and also the business sense. So it's definitely something that is not necessarily mainstream, but it's becoming much more how they're thinking about building all their applications. Going forward, >>you know, you have almost two camps in the world. Want to get your thoughts on this guy's Because, like you have cloud native and people that are cloud native, they love it. They born the cloud that get it. Everything's cracking along. The developers air on Micro Service's They're agile train with their own micro service's. Then you got the hybrid I t. Trying to be hybrid developer, right? So you kind of have to markets coming together. So to me, I see multi cloud as kind of a combination of old legacy Data center types of I t with cloud native, not just ops and dead. But how about like trying to build developer teams inside enterprises? This seems to be a big trend, and multi club fits into that because now the reality is that I got azure. I got Amazon. Well, let's take a step back and think about the architecture. What's the foundation? So that to me, is more my opinion. But I want to get your thoughts and reactions that because if it's true, that means some new thinking has to come around around. What's the architecture? What are you trying to do? What's the workloads behavior outcome look like? What's the work flows? So there's a whole nother set of conversations that happened. >>I agree. I think the thing that the fight out there right now that we want to make mainstream is that it's a platform choice, and that's the best way to go forward. So it's still an active debate. But the idea could be I want to do multi club, but I'm gonna lock myself into the Cloud Service is if that's the intent or that's the design architecture pattern. You're really not gonna achieve the goals we all set out to do right, So in some ways we have to design ourselves or have the architecture that will let us achieve the business schools that were really going for and that really means from our perspective or from a port works perspective. There's a platform team. That platform team should run all the applications and do so in a multi cloud first design pattern. And so from that perspective, that's what we're doing from a data plan perspective. And that's what we do with Kubernetes etcetera. So from that idea going forward, what we're seeing is that customers do want to build a platform team, have that as the architecture pattern, and that's what we think is going to be the winning strategy. >>Thank you. Also, when you have the definition of cod you have to incorporate, just like with hybrid I t the legacy applications. And we saw that you throughout the years those crucial applications, as we call them People don't always want them to refer to his legacy. But those are crucial applications, and our customers were definitely thinking about how we're gonna run those and where is the right places it on Prem. We're seeing that a lot too. So I think when we talk about multi cloud, we also talk about what What is in your legacy? What is it? Yeah, I >>like I mean I use legacy. I think it's a great word because I think it really puts nail in the coffin of that old way because remember, if you think about some of the large enterprises, these legacy applications, they've been optimized for hardware and optimize their full stack. They've been build up from the ground up, so they're cool. They're running stuff, but it doesn't always translate to see a new platform designed point. So how do you mean Containers is great fit for their Cooper names. Obviously, you know is the answer. We you guys see that as well, but okay, I can keep that and still get this design point. So I guess what I want to ask you guys, as you guys are digging into some of the customer facing conversations, what are they talking about? The day talking about? The platform? Specifically? Certainly, on the security side, we're seeing everyone running away from buying tools to thinking about platforms. What's the conversation like on the cloud side >>way? Did a talk are multiplied for real talk at Barcelona? Q. Khan put your X three on Sudden. Andrew named it for reals of Izzy, but we really wanted to talk about multiplied in the real world. And when we said show of hands in Barcelona, who's running multi cloud? It was very, very few. And this was in, what, five months? Four months ago? Whereas maybe our customers are just really super advanced because of our 100 plus customers. At four words, we Eric is right. A lot of them are already running multi cloud or if not their plan, in the planning stage right now. So even in the last +56 months, this has become a reality. And we're big fans of communities. I don't know if you know Eric was the first product manager for Pernetti. Hey, he's too shy to say it on Dhe. So yeah, and we think, you know, and criminal justice to be the answer to making all They caught a reality right now. >>Well, I want to get back into G, K, E and Cooper. Very notable historic moment. So congratulations, But to your point about multi cloud, it's interesting because, you know, having multiple clouds means things, right? So, for instance, if I upgrade to office 3 65 and I kill my exchange server, I'm essentially running azure by their definition. If I'm building it, stack on AWS. I'm a native, this customer. Let's just say I want to do some tensorflow or play with big table or spanner on Google. Now >>we have three >>clouds now they're not. So they have work clothes, specific objectives. I am totally no problem. I see that like for the progressive customers, some legacy be to be people who like maybe they put their toe in the cloud. But anyone doing meaningful cloud probably has multiple clouds. But that's workload driven when you get into tying them together and is interesting. And I think that's where I think you guys have a great opportunity in this community because if open source convene the gateway to minimize the lock in and when I say lock and I mean like locking them propriety respect if his value their great use it. But if I want to move my data out of the Amazon, >>you brought up so many good points. So let me go through a few and Lisa jumping. I feel like locking. People don't wanna be locked >>in at the infrastructure level. So, like you said, if >>there's value at the higher levels of Stack, and it helps me do my business faster. That's an okay thing to exchange, but it is just locked in and it's not doing anything. They're that's not equal exchange, right, So there's definitely a move from infrastructure up the platform. So locking in >>infrastructure is what people are trying to move away from. >>From what we see from the perspective of legacy, there is a lot of things happening in industry that's pretty exciting of how legacy will also start to running containers. And I'm sure you've seen that. But containers being the basis you could run a BM as well. And so that will mean a lot for in terms of how V EMS can start >>to be matched by orchestrators like kubernetes. So that is another movement for legacy, and I wanted to acknowledge that point >>now, in terms of the patterns, there are definitely applications, like a hybrid pattern where connect the car has to upload all its data once it docks into its location and move it to the data center. So there are patterns where the workflow does move the ups are the application data between on Prem into a public cloud, for instance, and then coming back from that your trip with Lisa. There is also examples where regulations require companies to enterprise is to be able to move to another cloud in a reasonable time frame. So there's definitely a notion of Multi Cloud is both an architectural design pattern. But it's also a sourcing strategy, and that sourcing strategy is more regulation type o. R. In terms of not being locked in. And that's where I'm saying it's all those things. I'd >>love to get your thoughts on this because I like where you're going with this because it kind of takes it to a level of okay, standardization, kubernetes nights, containers, everyone knows what that is. But then you start talking about a P I gateways, for instance, right? So if I'm a car and I have five different gateways on my device, I ot devices or I have multiple vendors dealing with control playing data that could be problematic. I gotta do something like that. So I'm starting. Envision them? I just made that news case up, but my point is is that you need some standards. So on the a p I side was seeing some trends there. One saying, Okay, here's my stuff. I'll just pass parameters with FBI State and stateless are two dynamics. What do you make of that? What, What? What has to happen next to get to that next level of happiness and goodness? Because Bernays, who's got it, got it there, >>right? I feel that next level. I feel like in Lisa, Please jump. And I feel like from automation perspective, Kubernetes has done that from a P I gateway. And what has to happen next. There's still a lot of easy use that isn't solved right. There's probably tons of opportunities out there to build a much better user experience, both from the operations point of view and from what I'm trying to do is an intense because what people aren't gonna automate right now is the intent. They automate a lot of the infrastructure manual tasks, and that's goodness. But from how I docked my application, how the application did it gets moved. We're still at the point of making policy driven, easy to use, and I think there's a lot of opportunities for everyone to get better there. That's like low priority loving fruitcake manual stuff >>and communities was really good at the local food. That's a really use case that you brought up. Really. People were looking at the data now and when you're talking about persistent mean kun is his great for stateless, but for state full really crucial data. So that's where we really come in. And a number of other companies in the cloud native storage ecosystem come in and have really fought through this problem and that data management problem. That's where this platform that Aaron was talking to that >>state problem. Talk about your company. I want to go back to to, um, Google Days. Um, many war stories around kubernetes will have the same fate as map reduce. Yeah, the debates internally at Google. What do we do with it? You guys made the good call. Congratulations on doing that. What was it like to be early on? Because you already had large scale. You were already had. Borg already had all these things in place. Um, it wasn't like there was what was, >>Well, a few things l say one is It was intense, right? It was intense in the sense that amazing amount of intelligence amazing amount of intent, and right back then a lot of things were still undecided, right? We're still looking at how containers or package we're still looking at how infrastructure kit run and a lot of service is were still being rolled out. So what it really meant is howto build something that people want to build, something that people want to run with you and how to build an ecosystem community. A lot of that the community got was done very well, right? You have to give credit to things like the Sig. A lot of things like how people like advocates like Lisa had gone out and made it part of what they're doing. And that's important, right? Every ecosystem needs to have those advocates, and that's what's going well, a cz ah flip side. I think there's a lot of things where way always look back, in which we could have done a few things differently. But that's a different story for different. Today >>I will come back in the studio Palop of that. I gotta ask you now that you're outside. Google was a culture shock. Oh my God! People actually provisioning software provisioning data center culture shock when there's a little >>bit of culture shock. One thing is, and the funny thing is coming full circle in communities now, is that the idea of an application? Right? The idea of what is an application eyes, something that feels very comfortable to a lot of legacy traditional. I wanna use traditional applications, but the moment you're you've spent so much time incriminates and you say, What's the application? It became a very hard thing, and I used to have a lot of academic debates. Where is saying there is no application? It's It's a soup of resources and such. So that was a hard thing. But funny thing is covered, as is now coming out with definitions around application, and Microsoft announced a few things in that area to so there are things that are coming full circle, but that just shows how the movement has changed and how things are becoming in some ways meeting each other halfway. >>Talk about the company, what you guys are doing. Take a moment. Explain in context to multi cloud. We're here. Port works. What's the platform? It's a product. What's the value proposition? What's the state of the company. >>So the companies? Uh well, well, it's grown from early days when Lisa and I joined where we're probably a handful now. We're in four or five cities. Geography ease over 100 people over 150 customers and there. It's been a lot of enterprises that are saying, like, How do I take this pattern of doing containers and micro service is And how do I run it with my mission? Critical business crinkle workloads. And at that point, there is no mission critical business critical workload that isn't stable so suddenly they're trying to say, How do I run These applications and containers and data have different life cycles. So what they're really looking for is a data plane that works with the control planes and how controlled planes are changing the behavior. So a lot of our technology and a lot of our product innovation has been around both the data plane but a storage control plane that integrates with a computer controlled plane. So I know we like to talk about one control plane. There's actually multiple control planes, and you mentioned security, right? If I look at how applications are running way after now securely access for applications, and it's no longer have access to the data. Before I get to use it, you have to now start to do things like J W. T. Or much higher level bearer tokens to say, I know how to access this application for this life cycle for this use case and get that kind of resiliency. So it's really around having that storage. More complexity absolutely need abstraction >>layers, and you got compute. Look, leading work there. But you gotta have >>software to do it from a poor works perspective. Our products entirely software right down loans and runs using kubernetes. And so the point here is we make remarries able to run all the staple workloads out of the box using the same comment control plane, which is communities. So that's the experiences that we really want to make it so that Dev Ops teams can run anywhere close. And that's that's in some ways been part of the mix. Lisa, >>we've been covering Dev up, going back to 2010. Remember when I first was hanging around San Francisco 2008 joint was coming out the woodwork and all that early days and you look at the journey of how infrastructures code We talked about that in 2008 and now we'll get 11 years later. Look at the advancements you've been through this now The tipping point. It's just seems like this wave is big and people are on it. The developers air getting it. It's a modern renaissance of application developers, and the enterprises it's happening in the enterprise is not just like the nerds Tier one, the Alfa Geeks or >>the Cloud native. It's happening in the >>everyone's on board this time, and you and I have been in the trenches in the early stages of many open source projects. And I think with with kubernetes Arab reference of community earlier, I'm super proud to be running the world's largest CNC F for user group. And it's a great community, a diverse community, super smart people. One of my favorite things about working for works is we have some really smart engineers that have figured out what companies want, how to solve problems, and then we'll go creative. It'll open source projects. We created a project called autopilot, really largely because one of our customers, every who's in the G s space and who's running just incredible application. You can google it and see what the work they're doing. It's all there publicly, Onda We built, you know, we built an open source project for them to help them get the most out of kubernetes. We can say so. There's a lot of people in the community system doing that. How can we make communities better halfway make commitments, enterprise grade and not take years to do that? Like some of the other open source projects that we worked on, it took. So it's a super exciting time to be here, >>and open source is growing so fast now. I mean, just think about how these projects being structured. Maur and Maur projects are coming online and user price, but a lot more vendor driven projects to use be mostly and used, but now you have a lot of vendors who are users. So the line is blurring between Bender User in Open source is really fascinating. >>Well, you look at the look of the landscape on the C N. C f. You know the website. I mean, it's what 400 that are already on board. It's really important. >>They don't have enough speaking slasher with >>right. I know, and it's just it. It is users and vendors. Everybody's in this community together. It's one of things that makes it super exciting. And it it's how we know this is This was the right choice for us to base this on communities because that's what everybody, you guys >>are practically neighbors. So we're looking for seeing the studio. Palo Alto Eric, I want to ask you one final question on the product side. Road map. What you guys thinking As Kubernetes goes, the next level state, a lot of micro service is observe abilities becoming a key part of it, Obviously, automation, configuration management things are developing fast. State. What's the What's the road map for you guys? >>For us, it's been always about howto handle the mission critical and make that application run seamlessly. And then now we've done a lot of portability. So disaster recovery has been one of the biggest things for us is that customers are saying, How do I do a hybrid pattern back to your earlier question of running on Prem and in Public Cloud and do a d. R. Pale over into some of the things at least, is pointing out that we're announcing soon is non series autopilot in the idea, automatically managing applications scale from a volume capacity. And then we're actually going to start moving a lot more into some of the what you do with data after the life cycle in terms of backup and retention. So those are the things that everyone's been pushing us and the customers are all asking for. You >>know, I think data they were back in recovery is interesting. I think that's going to change radically. And I think we look at the trend of how yeah, data backup and recovery was built. It was built because of disruption of business, floods, our gains, data center failure. But I think the biggest disruptions ransomware that malware. So security is now a active disruptor. So it's not like it after the hey, if we ever have, ah, fire, we can always roll back. So you're infected and you're just rolling back infected code. That's a ransomware dream. That's what's going on. So I think data protection it needs to be >>redefined. What do you think? Absolutely. I think there's a notion of How do I get last week's data last month? And then oftentimes customers will say, If I have a piece of data volume and I suddenly have to delete it, I still need to have some record of that action for a long time, right? So those are the kinds of things that are happening and his crew bearnaise and everything. It gets changed. Suddenly. The important part is not what was just that one pot it becomes. How do I reconstruct everything? What action is not one thing. It's everywhere. That's right and protected all through the platform. If it was a platform decision, it's not some the cattlemen on the side. You can't be a single lap. It has to be entire solution. And it has to handle things like, Where do you come from? Where is it allowed to go? And you guys have that philosophy. We absolutely, and it's based on the enterprises that are adopting port works and saying, Hey, this is my romance. I'm basing it on Kubernetes. You're my date a partner. We make it happen. >>This speaks to your point of why the enterprise is in. The vendors jumped in this is what people care about Security. How do you solve this last mile problem? Storage. Networking. How do you plug those holes in Kubernetes? Because that is crucial to our >>personal private moment. Victory moment for me personally, was been a big fan of Cuban is absolutely, you know, for years. Then there were created, talked about one. The moments that got me that was really kind of a personal, heartfelt moment was enterprise buyer. And, you know, the whole mindset in the Enterprise has always been You gotta kill the old to bring in the new. And so there's always been that tension of a you know, the shiny new toy from Silicon Valley or whatever. You know, I'm not gonna just trash this and have a migration za paying that. But for I t, they don't want that to do that. They hate doing migrations, but with containers and kubernetes that could actually they don't to end of life to bring in the new project. They can do it on their own timetable or keep it around. So that took a lot of air out of the tension in on the I t. Side because they say great I can deal with the lifecycle management, my app on my own terms and go play with Cloud native and said to me, that's like that was to be like, Okay, there it is. That was validation. That means this Israel because now they can innovate without compromising. >>I think so. And I think some of that has been how the ecosystems embrace it, right. So now it's becoming all the vendors are saying my internal stack is also based on community. So even if you as an application owner or not realizing it, you're gonna take a B M next year and you're gonna run it and it's gonna be back by something like awesome. Lisa >>Marie Nappy Eric on Thank you for coming on Port Works Hot start of multiple cities Kubernetes big developer Project Open Source. Talking about multi cloud here at the inaugural Multi cloud conference in New York City. It's the Cube Courage of escape. 2019. I'm John Period. Thanks for watching
SUMMARY :
from New York. It's the Q covering Escape. It's all about multi Cloud, and we're here. So this seems to be the theme here about So it's definitely something that is not So that to me, And so from that perspective, that's what we're doing from And we saw that you throughout the years those crucial applications, So I guess what I want to ask you guys, as you guys are digging into some of the customer facing So even in the last +56 months, So congratulations, But to your point about multi cloud, it's interesting because, And I think that's where I think you guys have a great opportunity in this community because if open you brought up so many good points. in at the infrastructure level. That's an okay thing to exchange, But containers being the basis you could So that is another movement for legacy, now, in terms of the patterns, there are definitely applications, like a hybrid pattern where connect the car has So on the a p I side was seeing some trends there. We're still at the point of making policy driven, easy to use, and I think there's a lot of opportunities for everyone to get And a number of other companies in the cloud native storage ecosystem come in and have really fought through this problem You guys made the good call. to build, something that people want to run with you and how to build an ecosystem community. I gotta ask you now that you're outside. but that just shows how the movement has changed and how things are becoming in some ways meeting Talk about the company, what you guys are doing. So the companies? But you gotta have So that's the experiences that we really want 2008 joint was coming out the woodwork and all that early days and you look at the journey It's happening in the So it's a super exciting time to be here, So the line is blurring between Bender User in Well, you look at the look of the landscape on the C N. C f. You know the website. base this on communities because that's what everybody, you guys What's the What's the road map for you guys? of the what you do with data after the life cycle in terms of backup and retention. So it's not like it after the hey, And it has to handle things like, Where do you come from? Because that is crucial to our in on the I t. Side because they say great I can deal with the lifecycle management, So now it's becoming all the vendors are saying my internal stack is also based on community. It's the Cube Courage of escape.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Eric Conn | PERSON | 0.99+ |
Eric | PERSON | 0.99+ |
Europe | LOCATION | 0.99+ |
Lisa | PERSON | 0.99+ |
Andrew | PERSON | 0.99+ |
2008 | DATE | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Aaron | PERSON | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
New York | LOCATION | 0.99+ |
John | PERSON | 0.99+ |
Lisa Marie Nancy | PERSON | 0.99+ |
2010 | DATE | 0.99+ |
New York City | LOCATION | 0.99+ |
Barcelona | LOCATION | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
FBI | ORGANIZATION | 0.99+ |
Silicon Valley | LOCATION | 0.99+ |
five cities | QUANTITY | 0.99+ |
Eric Han | PERSON | 0.99+ |
Today | DATE | 0.99+ |
last week | DATE | 0.99+ |
last month | DATE | 0.99+ |
four | QUANTITY | 0.99+ |
next year | DATE | 0.99+ |
ORGANIZATION | 0.99+ | |
100 plus customers | QUANTITY | 0.99+ |
over 100 people | QUANTITY | 0.99+ |
Port Works | ORGANIZATION | 0.99+ |
J W. T. | PERSON | 0.99+ |
2019 | DATE | 0.98+ |
Four months ago | DATE | 0.98+ |
over 150 customers | QUANTITY | 0.98+ |
Products Works | ORGANIZATION | 0.98+ |
both | QUANTITY | 0.98+ |
11 years later | DATE | 0.98+ |
four words | QUANTITY | 0.98+ |
One | QUANTITY | 0.97+ |
Izzy | PERSON | 0.97+ |
two dynamics | QUANTITY | 0.97+ |
three | QUANTITY | 0.97+ |
first | QUANTITY | 0.97+ |
Pernetti | ORGANIZATION | 0.96+ |
one | QUANTITY | 0.94+ |
San Francisco | LOCATION | 0.94+ |
One thing | QUANTITY | 0.94+ |
two kind | QUANTITY | 0.94+ |
single lap | QUANTITY | 0.93+ |
first product | QUANTITY | 0.93+ |
five different gateways | QUANTITY | 0.93+ |
one thing | QUANTITY | 0.92+ |
Kubernetes | ORGANIZATION | 0.92+ |
one pot | QUANTITY | 0.92+ |
Palo Alto | LOCATION | 0.91+ |
Onda | ORGANIZATION | 0.9+ |
one final question | QUANTITY | 0.88+ |
Marie Nappy Eric | PERSON | 0.87+ |
Bernays | PERSON | 0.87+ |
Alfa Geeks | ORGANIZATION | 0.87+ |
one control plane | QUANTITY | 0.83+ |
Portworx | ORGANIZATION | 0.8+ |
G, K, E and Cooper | ORGANIZATION | 0.8+ |
themes | QUANTITY | 0.79+ |
autopilot | TITLE | 0.78+ |
Escape | EVENT | 0.78+ |
Prem | ORGANIZATION | 0.77+ |
two camps | QUANTITY | 0.77+ |
Q. Khan | PERSON | 0.71+ |
Jay Chaudhry, Zscaler | CUBE Conversations July 2017
>> Hey, welcome back, everybody. Jeffrey here with the cue, we're having acute conversation that are probably out. The studio's a little bit of a break in the conference schedule, which means we're gonna have a little bit more intimate conversations outside of the context of a show we're really excited to have. Our next guest is running $1,000,000,000 company evaluation that been added for almost 10 years. Cloud first from the beginning, way ahead of the curve. And I think the curves probably kind of catching up to him in terms of really thinking about security in a cloud based way. It's J. Charger. He's the founder and CEO of Ze Scaler. J Welcome. Thank you, Jeff. So we've had a few of your associates on, but we've never had you on. So a great to have you on the Cube >> appreciate the opportunity. >> Absolutely. So you guys from the get go really took a cloud native approach security when everyone is building appliances and shipping appliances and a beautiful fronts and flashing lights and everyone's neighborhood appliances. You took a very different tact explain kind of your thinking when you founded the company. >> So all the companies I had done. I looked for a fuss to move her advantage. So if you are first mover, then you got significant advantage. A lot of others. So look at 2008 we were goingto Internet for a whole range of service is lots of information sitting there from weather to news and all the other stuff right now on Cloud Applications. Point of view sales force was doing very well. Net Suite was doing well, and I have been using sales force in that suite and all of my start up since the year 2001. Okay, when each of them was under 10,000,000 in sales. So my notion was simple. Will more and more information sit on the Internet? Answer was yes. If sales force the nets weed is so good, why won't other applications move? The cloud answer was yes. So if that's the case, why should security appliances sit in the data? Security should sit in the cloud as well. So with that simple notion, I said, if I start a new company, no legacy boxes to what he bought, you start a clean slate, clean architecture designed for the cloud. What we like to call. Born in the cloud for a cloud. That's what I did. What >> great foresight. I mean trying in 2008 if tha the enterprise Adoption of cloud I mean sales was really was the first application to drive that. I mean, I just think poor 80 p gets no credit for being really the earliest cloud that they weren't really a solution right there. That's the service provider. But sales force really kind of cracked the enterprise, not four. Trust with SAS application wasn't even turn back back then. So So, taking a cloud approach to security. Very different strategy than an appliance. And, you know, credit to you for thinking about you know, you could no longer build the wall in the moat anymore. Creon and Internet world. Yeah. >> So my no show, no simple. The old world off security Waas What you just mentioned castle and moat. I am safe in my castle. But when people wanted to go out to call it greener pastures, right, you needed to build a drawbridge. And that's the kind of drawbridge these appliances bills. And then if you really want to be outside for business and all other reasons you're not coming in right? So notion of Castle and Motors, No good. So we said, Let's give it up. So let's get away from the notion that I must secure my network on which users and applications are sitting. I really need to make sure the right user has access to write application or service, which may be on the Internet, which may be on a public cloud, which may be a sass application like Salesforce. Or it may be the data center. So we really thought very differently, Right? Network security will become irrelevant. Internet will become your corporate network, and we connect the right user to write application, Right? Very logical. It took us a while to evangelize and convince a bunch of customers, right. But as G and Nestle and Seaman's off, the Wolf jumped on it because they love the technology. We got fair amount of momentum, and then lots of other enterprises came along >> right, right. It's so interesting that nobody ever really talked about the Internet, has an application delivery platform back in the day, right? It was just it was Bbn. And then we had a few pictures. Thank you Netscape, but really to think of the Internet as a way to deliver application and an enterprise applications with great foresight that you had there. >> Yes. So I think we built >> on the foresight off sales force in that suite and other information sources on the great. I >> came from security side off it. I built a number of companies that build and sold appliances, right. But it was obvious that in the new world, security will become a service. So think of cloud computing. People get surprised about cloud computing being big. It's natural. It's a utility service. If I'm in the business on manufacturing veg, it's a B and C. Gray computing is not my business. If just like I plug into the wall socket, get electricity right, I should be able to turn on some device and terminal and access abdication, sitting somewhere right and managed by someone right and all. So we re needed good connectivity over the Internet to do that. As that has matured over the past 10 years, as devices have become more capable and mobile, it's a natural way to go to cloud computing, and for us to do cloud security was a very natural >> threat. Right. So then you use right place right time, right. So then you picked up on a couple These other tremendous trends that that that ah cloud centric application really take advantage of first is mobile. Next is you know, B Bring your own global right B y o d. And then this this funky little thing called Shadow I T. Which Amazon enabled by having a data center of the swipe of a credit card. Your application, your technology. This works great with all those various kind of access methodologies. Still consistently right >> now. And that is because the traditional security vendors so called network security vendors but protecting the network they assumed that you sat in an office on the Net for great. Only if you're outside. You came back to the network through vpn, right? We assume that Forget the network. Ah, user sitting in the office or at home or coffee shop airport has to get to some destination over some network. That's not What about securing the net for Let's have a policy and security. It says Whether you are on a PC auto mobile phone, you're simply connecting through our security check post. Do what you want to go. So mobile and clothes for the natural. Two things mobile became the user cloud became the destination, and Internet became the connector off the two. And we became the policy check post in the middle. >> So what? So what do you do in terms of your security application? Are you looking at, you know, Mac addresses? Are you looking at multi factor authentication? Cause I would assume if you're not guarding the network per se, you're really must be all about the identity and the rules that go along with that identity. >> It's a good question, so user needs to get to certain applications, and service is so you put them into buckets. First is external service is external means that a company doesn't need to management, and that is either open Internet, which could be Google Search could be Facebook lengthen and type of stuff. Or it could be SAS applications that Salesforce offers on Microsoft Office E 65. So in that case, we want to make sure that been uses. Go to those sites. Nothing bad should comment. That means the malware stuff and nothing good chili con you confidential information. So we are inspecting traffic going in and out. So we are about inspecting the traffic, the packets, the packets to make sure this is not malicious. Okay, Now, for authentication, we use third party serves like Microsoft A D or Octagon. They tell us who the user is into what the group is. And based on that sitting in the traffic path were that I who enforce the policy so that is for external applications. Okay, the second part of the secular service, what we called the school a private access is to make sure that you can get to your internal applications. Either in your data center, all this sitting in a public cloud, such chance as your eight of us there were less. Whatever mouth we're more worried about is the right person getting to the right application and the other checks are different. There you are connecting the right parties, Okay. Unless worried about >> security, and then does it work with the existing, um, turn of the of, you know, the internal corporate systems. Who identified you? Integrate, I assume, with all those existing types of systems. >> Yes. So we look at the destination you did. Existing system could be sitting on in your data center or in the cloud. It doesn't really matter. We look at your data center as a destination. OK, we look at stuff sitting in Azure as a destiny. >> And then and then this new little twist. So obviously Salesforce's been very successfully referenced them a few times, and I just like to point to the new 60 story tower. If anyone ever questions whether people think Cloud of Secures, go look downtown at the new school. But there's a big new entrance in play on kind of the Enterprise corporate SAS side. And that's office 3 65 It's not that noone you are still relatively new. I'm just curious to get your perspective. You've been at this for 10 years? Almost, um, the impact of that application specifically to this evolution to really pure SAS base model, getting more and more of the enterprise software stack. >> So number one application in any enterprise is email >> before you gotta think that's gonna be your next started. We gotta fix today after another e >> mail calendar ring sharing files and what it used to sit in your data center and you had to buy deploy manage Sutter was with in a Microsoft exchange. So Microsoft said, Forget about you managing it. I've will manage your exchange, uh, with a new name, all 50 65 in the clout so you don't what he bought it and are You come to me and I'll take care off it. I think it's a brilliant move by Microsoft, and customers are ready to give up. The headaches are maintaining the boxes, the software and sordid and everything. Right now, when the biggest application moves the cloud, every CEO pays attention to it. So as Office God embraced the corporate network start to break. Now, why would that happen if you aren't in 50 cities and on the globe, your exchanges? Sitting in Chicago Data Center every employee from every city came to Chicago. Did know Microsoft Office. This is sun setting something. Why should every employee go to Chicago? That's the networks on and then try to go to cloud right? So they're back. Haul over traditional corporate network using Mpls technology very expensive, and then they go to them. Then they go to the Internet to go to office. If the 65 slow slow. No one likes it. Microsatellite. >> Get too damn slow >> speed. OnlyTest Fetal light. You can only go so far. It's >> not fast. If you're going around the world and you're waiting for something, I >> have to go to New York City to my data center so I could come to a local site in San Francisco. It is hard, right? Right, And that's what our traditional networks have done. That's what traditional security boxes down what Z's killer says. Don't worry about having two or three gateways to the Internet. You have as many gay tricks as your employees because every employee simply points to the Z's. Killers near this data center were the security stack. We take care of security inspection and policy, and you get to where you need to get to the fastest way. So Office 3 65 is a great catalyst for the skin. Asked customers of struggling with user experience and the traffic getting clogged on the traditional network. We go in and say, if you did local Internet breakout, you go direct, but you couldn't go direct without us because you need some security check personally. So we are the checkpost sitting 100 data centers around the globe and uses a happy customer. We are happy. >> So I was gonna be my next point. Begs the question, How many access points do you guys have just answered? You have hundreds. So you worked with local Coehlo. You got a short You got a short hop from your device into the sea scaler system and then you you're into your network. >> You know, we are deployed and 100 data center. These are generally cola is coming from leading vendors. Maybe it connects maybe level three tire cities of gold and the goal is to shorten the distance. I'll tell you two interesting anecdotes. I talked to a C i o last year. I said, How many employees do you have? He said 10,000 said, How many Internet gateways do you have? I tell you, it's safe. I he's a 10,000. I said What? He said. Every employee has a laptop and laptop goes with it. Employee goes and indirectly goes the Internet. It's a gate for you, Right? Then he said, Sorry, I'm Miss Booke. Every employee is a smartphone, and many have tablets to have 25,000 gate. So if you start thinking that way, trying to take all the traffic back to some security appliance is sitting in a data center or 10 branch offices, right? Makes no sense. So that's where we come in. And I had an interesting discussion with a very large consumer company out of Europe. I went to see them to one of her early customers. I >> met the >> head of security. I said, I'm here to understand how well these killers working. Since our security is so good, you must be loving it. He smiled, and he said, I love you security, but I love something more than your security. I said, Huh? What is that? He said. Imagine if the world had four airport hubs to connect through and you are a world traveler. You'll be missing, he said. I have 160,000 employees in hundreds, 30 countries. I have four Internet gateways with security appliance sitting there and everyone has to go to one of those four before they get out, right, so they were miserable. Now they are blogging on the Internet than entrant has become very fast, she said. As a C so I love it because security leaders are blamed for slowing you down in the name of security. Now I have made uses happy abroad in better security. So it's all wonderful. >> Hey, sounds like you're a virtual networking company that Trojan horsed in as a security company >> way. So let's put it this way. I >> mean, the value problem. Like I'm just I'm teasing you. But it's really interesting, you know, kind of twisted tale, >> so don't know you actually making a very good point. So So this is what happening Every c. I is talking about digital transformation through I t transmission Right now. If you start drilling down, what does that mean? Applications are moving in the cloud. So that's the application transformation going on because applications are no longer in your data center, which was the central gravity. If applications the move to the cloud, the network that designed to bring everything to the data center becomes irrelevant. It's no good. So no companies are transforming the data center bit. Sorry, they're transforming the network not to transform network so you could directly go to the application. The only thing that's holding you back is security, so we essentially built a new type of security, so we're bringing security transformation, which is needed. Do transform your network and transfer your application. Right? So that's why people customers who buy us is typically the head off application, head of security and head of networking. All three come together because transformation doesn't happen in isolation. Traditional security boxes are bought, typically by the security team only because they said, put a box here, you need to inspect the traffic. We go in and say the old world off ideas change. Let me help you transform to the New World. Why we call it cloned enabled enterprise, right? And that's what we come >> pretty interesting, too, when you think of the impact that not only are you leveraging us and security layer in this cloud and getting in the way of the phone traffic in the laptop traffic, but to as people migrate to Maura and Maur of these enterprise SAS APS, you're leveraging their security infrastructure, which is usually significantly bigger than any particular individual company can ever afford. >> That that's correct. So a point there so sales force an enterprise doesn't need to worry about protecting Salesforce, they need to make sure they can have a shortest path and the right user is getting so. We help as a policy jackboots in the middle, and also we make sure employees on downloading confidential customer information and sending out in Gmail to somebody else. But when applications moved to Azure or eight of us, you as an enterprise have to what he bought securing it if you expose them. If there is all to the Internet, then somebody can discover you. Somebody can do denial of service attack. So how do you handle that? So that's where we come in. We kind of say even 1,000,000,000 applications are in azure. I will give you the shortest bat with all the technology that you need to secure your internal >> happy. It's interesting because there's been recent breaches reported at Amazon, where the Emma's the eight of US customer didn't secure their own instance. Inside of eight of us, it wasn't an eight of US problems configuration problem >> or it could be the policy problem or possible. Somebody, for example, came into your data center over vpn, and once they're on you network, they can have what we call the lateral boom and they can go around to see what's out there. And they could get to applications. So we overcome all those security >> issues. Okay, so you've been at this for a while. 3 65 is a game changer and kind of accelerating as you look forward, Um, what excites you? What scares you? You know, where do you see kind of security world evolving? Obviously, you know, here in the news all the time that the attacks now or, you know, oftentimes nation states and you know it's it's the security challenges grown significantly higher than just the crazy hacker working out of his mom's basement. A CZ You see the evolution? You know what, What, what's kind of scary and what's exciting. >> I think the scary part is inertia. People kind of say this high done security than the castle and moat. That's still still because they feel like I can put my arms that only I can see the drawbridge. And I got to see the airplane right over the missing on that. So so one someone gets into your castle, you're in trouble, right? So in the new approach we advocate, don't worry about castles, and moats. The desk applications are out there somewhere. Your users are out there somewhere, right? And they just need to reach the right application. So we are focuses connecting the right people. Now, more and more devices coming in. We all here. But I owe tease out. The I. O. T. At the end of the day is a copier printer of video camera or some machine controls >> or a nuclear power plant. >> They all need to talk to something, something right if they got hijacked. You thinkyou nuclear power plant is sending information about its health to place a. But it's going to Ukraine, right? That's a problem. How do you make sure that the coyote controls in a plant are talking right parties? So we actually sit in the middle, are connecting the party. So that's another area for us. For potential, right? Looking at opportunity. >> So another big one like mobile and in 3 65 wasn't enough. Now you have I a t. >> It's a natural hanging out with you. So today, every day we see tens of thousands of cameras and copiers calling the Internet, and customers have no idea know why are they calling. Generally, there's no malicious motive. The vendor wanted to know if the toner is down or not. Are things are working fine, but they have no security control. R. C So does a demo from the Internet. He logs onto the camera, are the printer and copier and actually gets can show that information can be obtained. So those are some of the things we must control and protect. And you do it not by doing network security but a policy base access from a right device to alright, destiny. >> So, are you seeing an increase in the in the, you know, kind of machine machine? A tremendous amount of >> traffic machine to machine. So is io to traffic, and there's a machine to machine traffic. So when you have a bunch of applications said in our data center and you a bunch of applications sitting an azure eight of us, they need to talk. So lot of that traffic goes through Z Skinner. Okay, so we're long enforcing it, then you're an application that needs to go and get, say, some market pricing information from Internet. So the machine a sitting in your data center or in azure is calling someone out. There are some server to get that information. So we come in in between as a checkpost too. Have right connectivity. >> You're saying I proper. Same value difference. Very simple, but elegant. J I'm hanging out of the more you see now, the touch to nowhere to be at the right time. We're having fun. It's a great story, and and I really appreciate you taking a few minutes out of your day to stop. But I >> have a great team that makes it happen. >> That's a big piece of it. Well, and good leadership as well. Obviously >> great leaders in the company. >> All right, Thank you. J Child Reza, founder and CEO of Ze Scaler. Check it out. Thanks again for stopping by the Cube. I'm Jeff. Rick. Thanks for watching. We'll catch you next time.
SUMMARY :
So a great to have you on the Cube So you guys from the get go really took a cloud So if you are first mover, then you got significant advantage. So So, taking a cloud approach to security. So let's get away from the notion that I must secure my network on which It's so interesting that nobody ever really talked about the Internet, has an application on the foresight off sales force in that suite and other information sources connectivity over the Internet to do that. So then you use right place right time, right. So mobile and clothes for the natural. So what do you do in terms of your security application? That means the malware stuff and nothing good chili con you confidential of the of, you know, the internal corporate systems. We look at your data center as a destination. And that's office 3 65 It's not that noone you are still relatively new. before you gotta think that's gonna be your next started. So as Office God embraced the You can only go so far. If you're going around the world and you're waiting for something, I We go in and say, if you did local Internet breakout, you go direct, device into the sea scaler system and then you you're into your network. So if you start thinking that way, hubs to connect through and you are a world traveler. So let's put it this way. you know, kind of twisted tale, So that's the application transformation going on because applications pretty interesting, too, when you think of the impact that not only are you leveraging us and security layer all the technology that you need to secure your internal the eight of US customer didn't secure their own instance. So we overcome all Obviously, you know, here in the news all the time that the attacks now or, you know, So in the new approach we advocate, don't worry about So we actually sit in the middle, are connecting the party. Now you have I a t. And you do it not by doing So the machine a sitting in your data center out of the more you see now, the touch to nowhere to be at the right time. That's a big piece of it. Thanks again for stopping by the Cube.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Jeff | PERSON | 0.99+ |
Chicago | LOCATION | 0.99+ |
Jeffrey | PERSON | 0.99+ |
Jay Chaudhry | PERSON | 0.99+ |
2008 | DATE | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
July 2017 | DATE | 0.99+ |
$1,000,000,000 | QUANTITY | 0.99+ |
two | QUANTITY | 0.99+ |
San Francisco | LOCATION | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
eight | QUANTITY | 0.99+ |
New York City | LOCATION | 0.99+ |
hundreds | QUANTITY | 0.99+ |
100 data centers | QUANTITY | 0.99+ |
Rick | PERSON | 0.99+ |
J Child Reza | PERSON | 0.99+ |
50 cities | QUANTITY | 0.99+ |
10 years | QUANTITY | 0.99+ |
Ukraine | LOCATION | 0.99+ |
160,000 employees | QUANTITY | 0.99+ |
Gmail | TITLE | 0.99+ |
Booke | PERSON | 0.99+ |
second part | QUANTITY | 0.99+ |
2001 | DATE | 0.99+ |
today | DATE | 0.99+ |
First | QUANTITY | 0.99+ |
J. Charger | PERSON | 0.99+ |
one | QUANTITY | 0.99+ |
10,000 | QUANTITY | 0.99+ |
two interesting anecdotes | QUANTITY | 0.99+ |
Coehlo | ORGANIZATION | 0.98+ |
first application | QUANTITY | 0.98+ |
Bbn | ORGANIZATION | 0.98+ |
100 data center | QUANTITY | 0.98+ |
four | QUANTITY | 0.98+ |
80 p | QUANTITY | 0.98+ |
last year | DATE | 0.98+ |
US | LOCATION | 0.98+ |
under 10,000,000 | QUANTITY | 0.98+ |
Ze Scaler | ORGANIZATION | 0.98+ |
each | QUANTITY | 0.98+ |
Chicago Data Center | LOCATION | 0.98+ |
three gateways | QUANTITY | 0.97+ |
60 story | QUANTITY | 0.97+ |
ORGANIZATION | 0.97+ | |
Two things | QUANTITY | 0.96+ |
almost 10 years | QUANTITY | 0.96+ |
first | QUANTITY | 0.96+ |
1,000,000,000 applications | QUANTITY | 0.96+ |
Mac | COMMERCIAL_ITEM | 0.95+ |
first mover | QUANTITY | 0.95+ |
65 slow slow | QUANTITY | 0.94+ |
Salesforce | ORGANIZATION | 0.94+ |
four airport hubs | QUANTITY | 0.94+ |
Azure | TITLE | 0.94+ |
tens of thousands of cameras | QUANTITY | 0.93+ |
50 65 | OTHER | 0.93+ |
Netscape | ORGANIZATION | 0.93+ |
Zscaler | PERSON | 0.92+ |
Microsatellite | ORGANIZATION | 0.92+ |
Office | TITLE | 0.92+ |
Cube | ORGANIZATION | 0.92+ |
hundreds, 30 countries | QUANTITY | 0.92+ |
SAS | ORGANIZATION | 0.89+ |
Salesforce | TITLE | 0.89+ |
Microsoft Office | ORGANIZATION | 0.88+ |
Maura | PERSON | 0.87+ |
3 65 | OTHER | 0.87+ |
25,000 gate | QUANTITY | 0.87+ |
Maur | PERSON | 0.87+ |
J | PERSON | 0.86+ |
Emma | ORGANIZATION | 0.85+ |
three | QUANTITY | 0.84+ |
10 branch offices | QUANTITY | 0.84+ |
G and | ORGANIZATION | 0.78+ |
Office E 65 | TITLE | 0.78+ |
Octagon | ORGANIZATION | 0.77+ |