Wayne Duso & Nancy Wang | AWS Storage Day 2022
>>Okay, we're back. My name is Dave Valante and this is the Cube's coverage of AWS storage day. You know, coming off of reinforc I wrote the, the cloud was a new layer of defense. In fact, the first line of defense in a cyber security strategy. And that brings new thinking and models for protecting data, data protection, specifically, traditionally thought of as backup and recovery, it's become a critical adjacency to security and a component of a comprehensive cybersecurity strategy. We're here in our studios outside of Boston with two cube alums, and we're gonna discuss this in other topics. Wayne do so is the vice president for AWS storage edge and data services, and Nancy Wong as general manager of AWS backup and data protection services, guys. Welcome. Great to see you again. Thanks for coming on. Of >>Course, always a pleasure, Dave. Good to >>See you, Dave. All right. So Wayne, let's talk about how organizations should be thinking about this term data protection. It's an expanding definition, isn't >>It? It is an expanding definition. They, last year we talked about data and the importance of data to companies. Every company is becoming a data company, you know, da the amount of data they generate, the amount of data they can use to create models, to do predictive analytics. And frankly, to find ways of innovating is, is grown rapidly. And, you know, there's this tension between access to all that data, right? Getting the value out of that data. And how do you secure that data? And so this is something we think about with customers all the time. So data durability, data protection, data resiliency, and, you know, trust in their data. If you think about running your organization on your data, trust in your data is so important. So, you know, you gotta trust where you're putting your data. You know, people who are putting their data on a platform need to trust that platform will in fact, ensure it's durability, security, resiliency. >>And, you know, we see ourselves AWS as a partner in securing their data, making their data dur durable, making their data resilient, right? So some of that responsibility is on us. Some of that is on so shared responsibility around data protection, data resiliency. And, you know, we think about forever, you know, the notion of, you know, compromise of your infrastructure, but more and more people think about the compromise of their data as data becomes more valuable. And in fact, data is a company's most valuable asset. We've talked about this before. Only second to their people. You know, the people that are most valuable asset, but right next to that is their data. So really important stuff. >>So Nancy, you talked to a lot of customers, but by the way, it always comes back to the data. We've saying this for years, haven't we? So you've got this expanding definition of data protection, you know, governance is in there. You, you think about access cetera. When you talk to customers, what are you hearing from them? How are they thinking about data protection? >>Yeah. So a lot of the customers that Wayne and I have spoken to often come to us seeking thought leadership about, you know, how do I solve this data challenge? How do I solve this data sprawl challenge, but also more importantly, tying it back to data protection and data resiliency is how do I make sure that data is secure, that it's protected against, let's say ransomware events, right. And continuously protected. So there's a lot of mental frameworks that come to mind and a very popular one that comes up in quite a few conversations is this cybersecurity framework, right? And from a data protection perspective is just as important to protect and recover your data as it is to be able to detect different events or be able to respond to those events. Right? So recently I was just having a conversation with a regulatory body of financial institutions in Europe, where we're designing a architecture that could help them make their data immutable, but also continuously protected. So taking a step back, that's really where I see AWS's role in that we provide a wide breadth of primitives to help customers build secure platforms and scaffolding so that they can focus on building the data protection, the data governance controls, and guardrails on top of that platform. >>And, and that's always been AWS's philosophy, you know, make sure that developers have access to those primitives and APIs so that they can move fast and, and essentially build their own if that that's in fact what they wanna do. And as you're saying, when data protection is now this adjacency to cyber security, but there's disaster recoveries in there, business continuance, cyber resilience, et cetera. So, so maybe you could pick up on that and sort of extend how you see AWS, helping customers build out those resilient services. >>Yeah. So, you know, two core pillars to a data protection strategy is around their data durability, which is really an infrastructure element. You know, it's, it's, it's, it's by and large the responsibility of the provider of that infrastructure to make sure that data's durable, cuz if it's not durable, everything else doesn't matter. And then the second pillar is really about data resiliency. So in terms of security, controls and governance, like these are really important, but these are shared responsibility. Like the customers working with us with the services that we provide are there to architect the design, it's really human factors and design factors that get them resiliency, >>Nancy, anything you would add to what Wayne just said. >>Yeah, absolutely. So customers tell us that they want always on data resiliency and data durability, right? So oftentimes in those conversations, three common themes come up, which is they want a centralized solution. They want to be able to transcribe their intent into what they end up doing with their data. And number three, they want something that's policy driven because once you centralize your policies, it's much better and easier to establish control and governance at an organizational level. So keeping that in mind with policy as our interface, there's two managed AWS solutions that I recommend you all check out in terms of data resiliency and data durability. Those are AWS backup, which is our centralized solution for managing protection recovery, and also provides an audit audit capability of how you protect your data across 15 different AWS services, as well as on-premises VMware and for customers whose mission critical data is contained entirely on disk. We also offer AWS elastic disaster recovery services, especially for customers who want to fail over their workloads from on premises to the cloud. >>So you can essentially centralize as a quick follow up, centralize the policy. And like I said, the intent, but you can support a federated data model cuz you're building out this massive, you know, global system, but you can take that policy and essentially bring it anywhere on the AWS cloud. Is that >>Right? Exactly. And actually one powerful integration I want to touch upon is that AWS backup is natively integrated with AWS organizations, which is our defacto multi account federated organization model for how AWS services work with customers, both in the cloud, on the edge, at the edge and on premises. >>So that's really important because as, as we talk about all the time on the cube, this notion of a, a decentralized data architecture data mesh, but the problem is how do you ensure governance and a federated model? So we're clearly moving in that direction. Wayne, I want to ask you about cyber as a board level discussion years ago, I interviewed Dr. Robert Gates, you know, former defense secretary and he sat on a number of boards and I asked him, you know, how important and prominent is security at the board level? Is it really a board level discussion? He said, absolutely. Every time we meet, we talk about cyber security, but not every company at the time, this was kind of early last decade was doing that. That's changed now. Ransomware is front and center. Hear about it all the time. What's AWS. What's your thinking on cyber as a board level discussion and specifically what are you guys doing around ran ransomware? >>Yeah. So, you know, malware in general, ransomware being a particular type of malware. Sure. It's a hot topic and it continues to be a hot topic. And whether at the board level, the C-suite level, I had a chance to listen to Dr. Gates a couple months ago and super motivational, but we think about ransomware and the same way that our customers do. Right? Cause all of us are subject to an incident. Nobody is immune to a ransomware incident. So we think very much the same way. And you, as Nancy said, along the lines of the, this framework, we really think about, you know, how do customers identify their critical access? How do they plan for protecting those assets, right? How do they make sure that they are in fact protected? And if they do detect the ransomware event and ransomware events come from a lot of different places, like there's not one signature, there's not one thumbprint, if you would for ransomware. >>So it's, it's, there's really a lot of vigilance that needs to be put in place, but a lot of planning that needs to be put in place. And once that's detected and a, a, we have to recover, you know, we know that we have to take an action and recover having that plan in place, making sure that your assets are fully protected and can be restored. As you know, ransomware is a insidious type of malware. You know, it sits in your system for a long time. It figures out what's going on, including your backup policies, your protection policies, and figures out how to get around those with some of the things that Nancy talked about in terms of air gaping, your capabilities, being able to, if you would scan your secondary, your backup storage for malware, knowing that it's a good copy. And then being able to restore from that known good copy in the event of an incident is critical. So we think about this for ourselves and the same way that we think about these for our customers. You gotta have a great plan. You gotta have great protection and you gotta be ready to restore in the case of an incident. And we wanna make sure we provide all the capabilities to do >>That. Yeah. So I'll glad you mentioned air gaping. So at the recent re reinforce, I think it was Kurt kufeld was speaking about ransomware and he didn't specifically mention air gaping. I had to leave. So I might have, I might have missed it cause I was doing the cube, but that's a, that's a key aspect. I'm sure there were, were things on the, on the deep dives that addressed air gaping, but Nancy look, AWS has the skills. It has the resources, you know, necessary to apply all these best practices and, you know, share those with customers. But, but what specific investments is AWS making to make the CISO's life easier? Maybe you could talk about that. >>Sure. So following on to your point about the reinforced keynote, Dave, right? CJ Boes talked about how the events of a ransomware, for example, incident or event can take place right on stage where you go from detect to respond and to recover. And specifically on the recovery piece, you mentioned AWS backup, the managed service that protects across 15 different AWS services, as well as on-premises VMware as automated recovery. And that's in part why we've decided to continue that investment and deliver AWS backup audit manager, which helps customers actually prove their posture against how their protection policies are actually mapping back to their organizational controls based on, for example, how they TA tag their data for mission criticality or how sensitive that data is. Right. And so turning to best practices, especially for ransomware events. Since this is very top of mind for a lot of customers these days is I will, will always try to encourage customers to go through game day simulations, for example, identifying which are those most critical applications in their environment that they need up and running for their business to function properly, for example, and actually going through the recovery plan and making sure that their staff is well trained or that they're able to go through, for example, a security orchestration automation, recovery solution, to make sure that all of their mission critical applications are back up and running in case of a ransomware event. >>Yeah. So I love the game day thing. I mean, we know, well just the, in the history of it, you couldn't even test things like disaster recovery, right? Because it was too dangerous with the cloud. You can test these things safely and actually plan out, develop a blueprint, test your blueprint. I love the, the, the game day >>Analogy. Yeah. And actually one thing I'd love to add is, you know, we talked about air gaping. I just wanna kind of tie up that statement is, you know, one thing that's really interesting about the way that the AWS cloud is architected is the identity access and management platform actually allows us to create identity constructs, that air gap, your data perimeter. So that way, when attackers, for example, are able to gain a foothold in your environment, you're still able to air gap your most mission critical and also crown jewels from being infiltrated. >>Mm that's key. Yeah. We've learned, you know, when paying the ransom is not a good strategy, right? Cuz most of the time, many times you don't even get your data back. Okay. So we, we're kind of data geeks here. We love data and we're passionate about it on the cube AWS and you guys specifically are passionate about it. So what excites you, Wayne, you start and then Nancy, you bring us home. What excites you about data and data protection and why? >>You know, we are data nerds. So at the end of the day, you know, there's this expressions we use all the time, but data is such a rich asset for all of us. And some of the greatest innovations that come out of AWS comes out of our analysis of our own data. Like we collect a lot of data on our operations and some of our most critical features for our customers come out of our analysis, that data. So we are data nerds and we understand how businesses view their data cuz we view our data the same way. So, you know, Dave security really started in the data center. It started with the enterprises. And if we think about security, often we talk about securing compute and securing network. And you know, if you, if you secured your compute, you secured your data generally, but we've separated data from compute so that people can get the value from their data no matter how they want to use it. And in doing that, we have to make sure that their data is durable and it's resilient to any sort of incident and event. So this is really, really important to us. And what do I get excited about? You know, again, thinking back to this framework, I know that we as thought leaders alongside our customers who also thought leaders in their space can provide them with the capabilities. They need to protect their data, to secure their data, to make sure it's compliant and always, always, always durable. >>You know, it's funny, you'd say funny it's it's serious actually. Steven Schmidt at reinforc he's the, the, the chief security officer at Amazon used to be the C C ISO of AWS. He said that Amazon sees quadrillions of data points a month. That's 15 zeros. Okay. So that's a lot of data. Nancy bring us home. What's what excites you about data and data protection? >>Yeah, so specifically, and this is actually drawing from conversations that I had with multiple ISV partners at AWS reinforc is the ability to derive value from secondary data, right? Because traditionally organizations have really seen that as a call center, right? You're producing secondary data because most likely you're creating backups of your mission critical workloads. But what if you're able to run analytics and insights and derive insights from that, that secondary data, right? Then you're actually able to let AWS do the undifferentiated heavy lifting of analyzing that secondary data state. So that way us customers or ISV partners can build value on the security layers above. And that is how we see turning cost into value. >>I love it. As you're taking the original premise of the cloud, taking away the under heavy lifting for, you know, D deploying, compute, storage, and networking now bringing up to the data level, the analytics level. So it continues. The cloud continues to expand. Thank you for watching the cubes coverage of AWS storage day 2022.
SUMMARY :
Great to see you again. So Wayne, let's talk about how organizations should be thinking about this term data So data durability, data protection, data resiliency, and, you know, And, you know, we think about forever, you know, the notion of, you know, So Nancy, you talked to a lot of customers, but by the way, it always comes back to the data. about, you know, how do I solve this data challenge? And, and that's always been AWS's philosophy, you know, make sure that developers have access it's, it's, it's by and large the responsibility of the provider of that infrastructure to make sure that data's durable, how you protect your data across 15 different AWS services, as well as on-premises VMware And like I said, the intent, but you can support a federated data model cuz you're building both in the cloud, on the edge, at the edge and on premises. data mesh, but the problem is how do you ensure governance and a federated model? along the lines of the, this framework, we really think about, you know, how do customers identify you know, we know that we have to take an action and recover having that plan in place, you know, necessary to apply all these best practices and, And specifically on the recovery piece, you mentioned AWS backup, you couldn't even test things like disaster recovery, right? I just wanna kind of tie up that statement is, you know, one thing that's really interesting Cuz most of the time, many times you don't even get your data back. So at the end of the day, you know, there's this expressions we use What's what excites you about data and data protection? at AWS reinforc is the ability to derive value from secondary data, you know, D deploying, compute, storage, and networking now bringing up to the data level,
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Nancy | PERSON | 0.99+ |
Nancy Wong | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
Steven Schmidt | PERSON | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Dave Valante | PERSON | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Europe | LOCATION | 0.99+ |
Wayne | PERSON | 0.99+ |
Boston | LOCATION | 0.99+ |
15 | QUANTITY | 0.99+ |
Kurt kufeld | PERSON | 0.99+ |
CJ Boes | PERSON | 0.99+ |
Nancy Wang | PERSON | 0.99+ |
Robert Gates | PERSON | 0.99+ |
two | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
Gates | PERSON | 0.99+ |
first line | QUANTITY | 0.99+ |
second pillar | QUANTITY | 0.99+ |
one | QUANTITY | 0.99+ |
Wayne Duso | PERSON | 0.99+ |
both | QUANTITY | 0.98+ |
15 zeros | QUANTITY | 0.98+ |
one thumbprint | QUANTITY | 0.98+ |
one signature | QUANTITY | 0.97+ |
two core pillars | QUANTITY | 0.96+ |
early last decade | DATE | 0.96+ |
three common themes | QUANTITY | 0.95+ |
a month | QUANTITY | 0.9+ |
second | QUANTITY | 0.88+ |
couple months ago | DATE | 0.85+ |
Dr. | PERSON | 0.84+ |
two cube | QUANTITY | 0.77+ |
VMware | TITLE | 0.71+ |
Day 2022 | EVENT | 0.71+ |
three | QUANTITY | 0.66+ |
years | DATE | 0.65+ |
game | EVENT | 0.57+ |
day | EVENT | 0.52+ |
2022 | DATE | 0.45+ |
Cube | ORGANIZATION | 0.35+ |
Wayne Durso & Nancy Wang | AWS Storage Day 2022
[Music] okay we're back my name is dave vellante and this is thecube's coverage of aws storage day you know coming off of reinforce i wrote that the cloud was a new layer of defense in fact the first line of defense in a cyber security strategy that brings new thinking and models for protecting data data protection specifically traditionally thought of as backup and recovery it's become a critical adjacency to security and a component of a comprehensive cyber security strategy we're here in our studios outside of boston with two cube alums and we're going to discuss this and other topics wayne dusso is the vice president for aws storage edge and data services and nancy wong as general manager of aws backup and data protection services guys welcome great to see you again thanks for coming on of course always a pleasure dave good to see you dave all right so wayne let's talk about how organizations should be thinking about this term data protection it's an expanding definition isn't it it is an expanded definition dave last year we talked about uh data and the importance of data to companies every company um is becoming a data company uh you know the amount of data they generate uh the amount of data they can use to uh create models to do predictive analytics and frankly uh to find ways of innovating uh is is growing uh rapidly and you know there's this tension between access to all that data right getting the value out of that data and how do you secure that data and so this is something we think about with customers all the time so data durability data protection data resiliency and you know trust in their data if you think about running your organization on your data trust in your data is so important so you know you got to trust where you're putting your data you know people who are putting their data on a platform need to trust that platform will in fact ensure its durability security resiliency and you know we see ourselves uh aws as a partner uh in securing their data making their data they're built durable making their data resilient all right so some of that responsibility is on us some of that is on amazon responsibility around data protection data resiliency and you know um we think about forever you know the notion of um you know compromise of your infrastructure but more and more people think about the compromise of their data as data becomes more valuable in fact data is a company's most valuable asset we've talked about this before only second to their people you know the people who are the most valuable asset but right next to that is their data so really important stuff so nancy you talk to a lot of customers but by the way it always comes back to the data we've been saying this for years haven't we so you've got this expanding definition of data protection you know governance is in there you think about access etc when you talk to customers what are you hearing from them how are they thinking about data protection yeah so a lot of the customers that wayne and i have spoken to often come to us seeking thought leadership about you know how do i solve this data challenge how do i solve this data sprawl challenge but also more importantly tying it back to data protection and data resiliency is how do i make sure that data is secure that it's protected against let's say ransomware events right and continuously protected so there's a lot of mental frameworks that come to mind and a very popular one that comes up in quite a few conversations is in this cyber security framework right and from a data protection perspective it's just as important to protect and recover your data as it is to be able to detect different events or be able to respond to those events right so recently i was just having a conversation with a regulatory body of financial institutions in europe where we're designing a architecture that could help them make their data immutable but also continuously protected so taking a step back that's really where i see aws's role in that we provide a wide breadth of primitives to help customers build secure platforms and scaffolding so that they can focus on building the data protection the data governance controls and guardrails on top of that platform and that's always been aws philosophy make sure that developers have access to those primitives and apis so that they can move fast and essentially build their own if that that's in fact what they want to do and as you're saying when data protection is now this adjacency to cyber security but there's disaster recoveries in there business continuance cyber resilience etc so so maybe you could pick up on that and sort of extend how you see aws helping customers build out those resilient services yeah so you know two uh core pillars to a data protection strategy is around their data durability which is really an infrastructural element you know it's it's it's by and large the responsibility of the provided that infrastructure to make sure that data is durable because if it's not durable and everything else doesn't matter um and the second pillar is really about data resiliency so in terms of security controls and governance like these are really important but these are a shared responsibility like the customers working with us with the services that we provide are there to architect the design it's really human factors and design factors that get them resiliency nancy anything you would add to what wayne just said yeah absolutely so customers tell us that they want always on data resiliency and data durability right so oftentimes in those conversations three common themes come up which is they want a centralized solution they want to be able to transcribe their intent into what they end up doing with their data and number three they want something that's policy driven because once you centralize your policies it's much better and easier to establish control and governance at an organizational level so keeping that in mind with policy as our interface there's two managed aws solutions that i recommend you all check out in terms of data resiliency and data durability those are aws backup which is our centralized solution for managing protection recovery and also provides an audit audit capability of how you protect your data across 15 different aws services as well as on-premises vmware and for customers whose mission-critical data is contained entirely on disk we also offer aws elastic disaster recovery services especially for customers who want to fail over their workloads from on-premises to the cloud so you can essentially centralize as a quick follow-up centralize the policy and as you said the intent but you can support a federated data model because you're building out this massive you know global system but you can take that policy and essentially bring it anywhere on the aws cloud is that right exactly and actually one powerful integration i want to touch upon is that aws backup is natively integrated with aws organizations which is our de facto multi-account federated organization model for how aws services work with customers both in the cloud on the edge at the edge and on premises so that's really important because as we talk about all the time on the cube this notion of a decentralized data architecture data mesh but the problem is how do you ensure governance in a federated model so we're clearly moving in that direction when i want to ask you about cyber as a board level discussion years ago i interviewed dr robert gates you know former defense secretary and he sat on a number of boards and i asked him you know how important and prominent is security at the board level is it really a board level discussion he said absolutely every time we meet we talk about cyber security but not every company at the time this was kind of early last decade was doing that that's changed um now ransomware is front and center hear about it all the time what's aws what's your thinking on cyber as a board level discussion and specifically what are you guys doing around ransomware yeah so you know malware in general ransomware being a particular type of malware um it's a hot topic and it continues to be a hot topic and whether at the board level the c-suite level um i had a chance to listen to uh dr gates a couple months ago and uh it was super motivational um but we think about ransomware in the same way that our customers do right because all of us are subject to an incident nobody is uh uh immune to a ransomware incident so we think very much the same way and as nancy said along the lines of the nist framework we really think about you know how do customers identify their critical access how do they plan for protecting those assets right how do they make sure that they are in fact protected and if they do detect a ransomware event and ransomware events come from a lot of different places like there's not one signature there's not one thumb print if you would for ransomware so it's it's there's really a lot of vigilance uh that needs to be put in place but a lot of planning that needs to be put in place and once that's detected and a we have to recover you know we know that we have to take an action and recover having that plan in place making sure that your assets are fully protected and can be restored as you know ransomware is a insidious uh type of malware you know it sits in your system for a long time it figures out what's going on including your backup policies your protection policies and figures out how to get around those with some of the things that nancy talked about in terms of air gapping your capabilities being able to if you would scan your secondary your backup storage for malware knowing that it's a good copy and then being able to restore from that known good copy in the event of an incident is critical so we think about this for ourselves in the same way that we think about these for our customers you've got to have a great plan you've got to have great protection and you've got to be ready to restore in the case of an incident and we want to make sure we provide all the capabilities to do that yeah so i'm glad you mentioned air gapping so at the recent reinforce i think it was kurt kufeld was speaking about ransomware and he didn't specifically mention air gapping i had to leave so i might i might have missed it because i'm doing the cube but that's a that's a key aspect i'm sure there were things in the on the deep dives that addressed air gapping but nancy look aws has the skills it has the resources you know necessary to apply all these best practices and you know share those as customers but but what specific investments is aws making to make the cso's life easier maybe you could talk about that sure so following on to your point about the reinforced keynote dave right cj moses talked about how the events of a ransomware for example incident or event can take place right on stage where you go from detect to respond and to recover and specifically on the recover piece he mentioned aws backup the managed service that protects across 15 different aws services as well as on-premises vmware as automated recovery and that's in part why we've decided to continue that investment and deliver aws backup audit manager which helps customers actually prove their posture against how their protection policies are actually mapping back to their organizational controls based on for example how they tag their data for mission criticality or how sensitive that data is right and so turning to best practices especially for ransomware events since this is very top of mind for a lot of customers these days is i will always try to encourage customers to go through game day simulations for example identifying which are those most critical applications in their environment that they need up and running for their business to function properly for example and actually going through the recovery plan and making sure that their staff is well trained or that they're able to go through for example a security orchestration automation recovery solution to make sure that all of their mission critical applications are back up and running in case of a ransomware event yeah so i love the game date thing i mean we know well just in the history of it you couldn't even test things like disaster recovery be right because it was too dangerous with the cloud you can test these things safely and actually plan out develop a blueprint test your blueprint i love the the game day analogy yeah and actually one thing i love to add is you know we talked about air gapping i just want to kind of tie up that statement is you know one thing that's really interesting about the way that the aws cloud is architected is the identity access and management platform actually allows us to create identity constructs that air gap your data perimeter so that way when attackers for example are able to gain a foothold in your environment you're still able to air gap your most mission critical and also crown jewels from being infiltrated that's key yeah we've learned you know when paying the ransom is not a good strategy right because most of the time many times you don't even get your data back okay so we we're kind of data geeks here we love data um and we're passionate about it on the cube aws and you guys specifically are passionate about it so what excites you wayne you start and then nancy you bring us home what excites you about data and data protection and why you know we are data nerds uh so at the end of the day um you know there's there's expressions we use all the time but data is such a rich asset for all of us some of the greatest innovations that come out of aws comes out of our analysis of our own data like we collect a lot of data on our operations and some of our most critical features for our customers come out of our analysis that data so we are data nerds and we understand how businesses uh view their data because we view our data the same way so you know dave security really started in the data center it started with the enterprises and if we think about security often we talk about securing compute and securing network and you know if you if you secured your compute you secured your data generally but we've separated data from compute so that people can get the value from their data no matter how they want to use it and in doing that we have to make sure that their data is durable and it's resilient to any sort of incident event so this is really really important to us and what do i get excited about um you know again thinking back to this framework i know that we as thought leaders alongside our customers who also thought leaders in their space can provide them with the capabilities they need to protect their data to secure their data to make sure it's compliant and always always always durable you know it's funny you'd say it's not funny it's serious actually steven schmidt uh at reinforce he's the the chief security officer at amazon used to be the c c iso of aws he said that amazon sees quadrillions of data points a month that's 15 zeros okay so that's a lot of data nancy bring us home what's what excites you about data and data protection yeah so specifically and this is actually drawing from conversations that i had with multiple isv partners at aws reinforce is the ability to derive value from secondary data right because traditionally organizations have really seen that as a cost center right you're producing secondary data because most likely you're creating backups of your mission critical workloads but what if you're able to run analytics and insights and derive insights from that secondary data right then you're actually able to let aws do the undifferentiated heavy lifting of analyzing that secondary data as state so that way you as customers or isv partners can build value on the security layers above and that is how we see turning cost into value i love it you're taking the original premise of the cloud taking away the undifferentiated heavy lifting for you know deploying compute storage and networking now bringing up to the data level the analytics level so it continues the cloud continues to expand thank you for watching thecube's coverage of aws storage day 2022
**Summary and Sentiment Analysis are not been shown because of improper transcript**
ENTITIES
Entity | Category | Confidence |
---|---|---|
amazon | ORGANIZATION | 0.99+ |
aws | ORGANIZATION | 0.99+ |
kurt kufeld | PERSON | 0.99+ |
europe | LOCATION | 0.99+ |
last year | DATE | 0.99+ |
boston | LOCATION | 0.99+ |
wayne dusso | PERSON | 0.99+ |
steven schmidt | PERSON | 0.99+ |
Nancy Wang | PERSON | 0.99+ |
two | QUANTITY | 0.98+ |
Wayne Durso | PERSON | 0.98+ |
uh aws | ORGANIZATION | 0.98+ |
first line | QUANTITY | 0.97+ |
AWS | ORGANIZATION | 0.97+ |
dave vellante | PERSON | 0.97+ |
dave | PERSON | 0.97+ |
one signature | QUANTITY | 0.97+ |
three common themes | QUANTITY | 0.96+ |
one thumb | QUANTITY | 0.96+ |
wayne | PERSON | 0.96+ |
nancy | PERSON | 0.95+ |
second pillar | QUANTITY | 0.94+ |
15 zeros | QUANTITY | 0.94+ |
one | QUANTITY | 0.92+ |
15 different | QUANTITY | 0.92+ |
both | QUANTITY | 0.92+ |
dr robert gates | PERSON | 0.91+ |
second | QUANTITY | 0.91+ |
a month | QUANTITY | 0.9+ |
one thing | QUANTITY | 0.88+ |
vmware | TITLE | 0.81+ |
a couple months ago | DATE | 0.81+ |
early last decade | DATE | 0.8+ |
years ago | DATE | 0.78+ |
lot of customers | QUANTITY | 0.76+ |
lot | QUANTITY | 0.76+ |
15 different | QUANTITY | 0.74+ |
a lot of customers | QUANTITY | 0.74+ |
dr gates | PERSON | 0.67+ |
day 2022 | EVENT | 0.65+ |
data | QUANTITY | 0.63+ |
cube | ORGANIZATION | 0.63+ |
ransomware | TITLE | 0.62+ |
nancy | ORGANIZATION | 0.59+ |
three | QUANTITY | 0.54+ |
Day 2022 | EVENT | 0.53+ |
years | QUANTITY | 0.48+ |
core | QUANTITY | 0.48+ |
nancy wong | PERSON | 0.47+ |
thecube | PERSON | 0.47+ |
cloud | TITLE | 0.36+ |
Dion Hinchcliffe, Constellation Research | CUBE Conversation, October 2021
(upbeat music) >> Welcome to this Cube conversation sponsored by Citrix. This is the third and final installment in the Citrix launchpad series. We're going to be talking about the launchpad series for work. Lisa Martin here with Dion Hinchcliffe, VP and principal analyst at Constellation research. Dion, welcome to the program. >> No, thanks Lisa. Great to be here. >> So we have seen a tremendous amount of change in the last 18, 19 months. You know, we saw this massive scatter to work from home a year and a half ago. Now we're in this sort of distributed environment. That's been persisting for a long time. Talk to me about, we're going to be talking about some of the things that Citrix is seeing and some of the things that they're doing to help individuals and teams, but give me your lens from Constellation's perspective. What are some of the major challenges with this distributed environment that you've seen? >> Sure. Well, so we've gone from this, you know, the world of work, the way that it was now, we're all very decentralized, you know, work from anywhere. Remote work is really dominating, you know, white collar types of activities in the workplace and workplaces that in our homes for most of us even today. But that started to change. Some people are going back. Although I just recently spoke to a panel of CIOs that says they have no plans anytime soon, but they're very aware that they need to have workable plans for when we start sending people back to the office and there's this big divide. How are we going to make sure that we have one common culture? We have a collaborative organization when, you know, a good percentage of our workers are in the office, but also maybe as much as half the organization is at home. And so, how to make processes seamless, how to make people collaborate and make sure there's equity and inclusion so that the people at home aren't left out and then people in the office, maybe you don't have an unfair advantage. So those are all the conversations. And of course, because this is a technology revolution, remote work was enabled by technology. We're literally looking at it again for this hybrid work, this, you know, this divided organization that we're going to have. >> You mentioned culture that's incredibly important, but also challenging to do with this distribution. I was looking at some research that Citrix provided, asking individuals from a productivity perspective, and two thirds said, hey, for our organizations that have given us more tools for collaboration and communication, yes, we are absolutely more productive. But the kicker is, the same amount of people, about two thirds that answered the survey said, we've now got about ten tools. So complexity is more challenging. It's harder to work individually. It's harder to work in teams. And so Citrix is really coming to the table here with the launchpad series for work, saying let's help these individuals and these teams, because as we, we think, and I'm sure you have insight Dion on this as well, this hybrid model that we're starting to see emerge is going to be persistent for a while. >> Yeah. For the foreseeable future. Cause we don't know what the future holds. So we'll have to hold the hybrid model as the primary model. And we may eventually go back to the way that we were. But for the next several years, there's going to be that. And so we're trying to wrap our arms around that. And I think that we're seeing with things like the Citrix announcements, a wave of responses saying, all right, let's really design properly for these changes. You know, we kind of just adapted quickly when everyone went to remote last year and now we're actually adding features to streamline, to reduce the friction, to simplify remote work, which does use, you have to use more applications. You have to switch between different things. You have to, you know, your employee experience in the digital world is just more cluttered and complicated, but it doesn't have to be. And so I, you know, we can look to some of these announcements for last year, I think address some of that. >> Let's break some of that down because to your point, it doesn't have to be complex complicated. It shouldn't be. Initially this scatter was, let's do everything we can to ensure that our teams and our people can be productive, can communicate, can collaborate. And now, since this is going to be persistent for quite some time, to your point, let's design for this distributed environment, this hybrid workforce of the future. Talk to me about the, one of the things that Citrix is doing with Citrix workspace, the app personalization, I can imagine as an individual contributor, but also as a team leader, the ability to customize this to the way that I work best is critical. >> And it really is, especially when you know, you have workers, you know, 18 or 19 months worth of new hires that you've never met. They don't really feel like, you know, this is maybe their organization. But if you allow them to shape it a little bit, make it contextual for them. So they don't just come into this cookie cutter digital experience that actually is kind of more meaningful for them. It makes it easier for them to get their job done and things are the way that they want them and where they want them. I think that makes a lot of sense. And so the app personalization announcements is important for remote workers in particular, but all workers to say, hey, can I start tailoring, you know, parts of my employee experience? So they make more sense for me. And I feel like I belong a little bit more. I think it's significant. >> It is. Let's talk about it from a security perspective though. We've seen massive changes in the security landscape in the last year and a half. We've seen some Citrix data that I was looking at, said between 2019 and 2020, ransomware up 435%, malware up 358%. And of course the weakest link being humans. Talk to me from a Citrix workspace perspective about some of the things that they've done to ensure that those security policies can be applied. >> Well, and the part that I really liked about the launchpad announcements around work in terms of security was this much more intelligent analysis. You know, one of the most frustrating things is you're trying to get work done remotely and maybe you're you're in crunch mode and all of a sudden the security system clamps down because they think you're doing something that, you know, you might be sharing information you shouldn't be and now you can't, get your deadline met. I really liked how the analytics inside the new security features really try to make sure they're applying intelligent analysis of behavior. And only when it's clear that a bad actor is in there doing something, then they can restrict access, protect information. And so I have no doubt they'll continue to evolve the product so that it's even even more effective in terms of how it can include or exclude bad actors from doing things inside your system. And so this is the kind of intelligence security increasingly based on AI type technologies that I think that will keep our workers productive, but clamp down on the much higher rate of that activity we see out there. Because we do have so many more endpoints there's a thousand or more times more endpoints in today's organizations because of remote work. >> Right. And one of the things that we've seen with ransomware, I mentioned those numbers that Citrix was sharing. It's gotten so much more personalized, so it's harder and harder to catch these things. One of the things that I found interesting, Dion, that from a secure collaboration perspective, that Citrix is saying is that, you know, we need to go, security needs to go beyond the devices and the endpoints and the apps that an employee is using, which of which we said, there are at least 10 apps that are being used today and it needs to actually be applied at a content level, the content creation level. Talk to me about your thoughts about that. >> I think that's exactly right. So if you know the profile of that worker and the types of things they normally do, and you see unusual behavior that is uncharacteristic to that worker, because you know their patterns, the types of content, the locations of that content that they might normally have access to. And if they're just accessing things, you know, periodically, that's usually not a problem. When they suddenly access a large volume of information and appear to be downloading it, those are the types of issues and especially of content they don't normally use for their work. Then you can intervene and take more intelligent actions as opposed to just trying to limit all content for example. So that knowledge workers can actually get access to all that great information in your IT systems. You can now give them access to it, but when clearly something, something bad is happening, the system automatically does it and steps in. >> I was looking at some of the data with respect to updates to Citrix analytics that it can now auto change permissions on shared files to read only, I think you alluded to this earlier, when it detects that excess sharing is going on. >> And, inappropriate access sharing. So sometimes it's okay for a worker to access, you know, documents. But the big fear is that a bad actor gets access. They get a USB key and they download a bunch of files and they get a whole bunch of IP or important knowledge. Well, when you have a system that's continually monitoring and you know, the unblinking gaze of Citrix security capabilities are looking at the patterns, not just the content alone or just the device alone, but at the, at the usage patterns and saying, I can make this read only because that's clearly the, you know, we don't want them to be able to download this because this activity is completely out of bounds or very unusual. >> Right. One of the things also that Citrix is doing is integrating with Microsoft teams. I was listening to a fun quiz show the other day that said, what were the top two apps downloaded in 2020? And I guessed one of them correctly, Tiktok though. I still don't know how to use it. And the second one was Zoom, and I'm sure Microsoft teams is way up there. I was looking at some stats that said, I think as of the spring of 2020, there were 145 million daily users of Microsoft teams. So that, from a collaboration perspective, something that a lot of folks are dependent on during the pandemic. And now within Teams, I can access Microsoft workspace? Citrix workspace. >> Yes. Well, and it's more significant than it sounds because there's a real hunger to find a center of gravity for the employee experience. What do I put that? Where should they be spending most of their time? Where should I be training them to focus most of their attention? And obviously workers collaborate a lot and Teams as part of Office 365, is a juggernaut? You know, the rise of it during the pandemic has been incredible. And just to show this, I have a digital workplace advisory board. Its companies who are heading, are the farthest along in designing digital employee experiences, and 31% of them said, this January, they're planning on centralizing the employee experience in Teams. Now, if you're a Citrix customer, you have workspace you go, how do I, I don't want to be left out. This announcement allows you to say, you can have the goodness of teams and its capabilities and the power of Citrix workspace, and you have them in one place and really creating a true center of gravity and simplifying and streamlining the employee experience. You don't have this fragmented pieces. Everything's right there in one place, in one pane of glass. And so I like this announcement. It brings Citrix up to parody with a lot of their competitors and actually eclipses several of them as well. So I really like to see this. >> So then from within teams, I can access Citrix workspace. I can share documents with team members and collaborate as well as that kind of the idea. >> Yes. That is the idea, and of course, they'll continue to evolve that, but now you can do your work in Citrix workspace and when documents are involved and you want to bring your team in, they're already right there inside that experience. >> That ability to streamline things, so critical, given the fact that we're still in this distributed environment, I'm sure families are still dealing with some, some amount of remote learning, or there's still distractions from the, do I live at work, do I work from home environment? One of the grips I really felt for when this happened, Dion, was the contact center. I thought these poor people, more people now with shorter and shorter fuses trying to get updates on whatever it was that they were, if they had something ordered and of course all the shipping delays. And the contact center of course went (blowing sound) scattered as well. And we've got people working from home, trying to do their jobs. Talk to me about some of those things that Citrix is doing to enable with Google, those contact center workers to have a good experience so that ultimately the employee experience is good, so is the customer experience? >> The contact center worker has the toughest of all of the different employee profiles I've seen, they have the most they have to learn, the most number of applications. They're typically not highly skilled workers. So they might only just have a, you know, high school education. Yet, they're being asked to cram all of these technologies, each one with a different employee experience, and they don't stay very long as a result of that. You might train them for two months before they're effective and they only stay for six months on average. And so, both businesses really want to be able to streamline onboarding and provisioning a and getting them set up and effective. And they want it too, if you want happy contact center workers making your customers happy and staying around. And so this announcements really allows you to deploy pre-configured Citrix workspaces on, on Chrome OS so that, you know, if you need to field a whole bunch of workers or you have a big dose say you're a relief company and you have a lot of disaster care workers. You can certainly this issue that these devices very easily, they're ready to go with their employee experience and all the right things in place so they can be effective with the least amount of effort. So I guess, it's a big step forward for a worker that is often neglected and underserved. >> Right. Definitely often neglected. And you, you brought up a good point there. And one of the things that, that peaked in my mind, as you talked about, you know, the onboarding experience, the retention, well, these contact center folks are the front lines to the customer. So from a brand reputation perspective, that's on the line, for companies in every industry where people with short fuses are dealing with contact center folks. So the ability to onboard them to give them a much more seamless experience is critical for the brand reputation, customer retention for every industry, I would imagine. >> Absolutely. Especially when you're setting up a contact center or you have a new product launching and you want, you know, you've got to bring, onboard all these new workers, you can do it, and they are going to have the least challenges. They're going to be ready to go right out of the box, be able to receive their package, with their device and their Citrix employee experience, ready to go. You know, just turn the machine on and they're off to the races. And that's the vision and that's the right one. So I was glad to see that as well. >> Yeah. Fantastic. One of the things also that Citrix did, the Citrix workspace app builder, so that Citrix workspace can now be a system of record for certain things like collaboration, surveys, maybe even COVID-19 information, that system of record. Talk to me about why that's so critical for the distributed worker. >> So we've had this, this longstanding challenge in that we've had our systems of record, you know, these are CRM systems, ERP, things like that, which we use to run our business. And then we've had our collaboration tools and they're separate, even though we're collaborating on sales deals and we're collaborating on our supply chain. And so like, the team's announcement was in the same game. We can say, let's close that gap between our systems of record and our collaboration tools. Well, this announcement says, all right, well, we still have these isolated systems of record. How can we streamline them to build and start connecting together a little bit so that we have processes that might cross all of those things, right? It's still going to order comes in from the CRM system. Then you can complete it in the, in the ERP system, you know, ordering that product for them. So they actually get it. You know, and that's probably overkill, that scenario for this particular example. But for example, collecting data from workers saying, let's build some forms and collect some data and then feed it to this process, or this system record. You can do it much more easily than before, before you would have to hire a development team or a contractor to develop another system that would integrate, you know, CRM or ERP or whatever. Now you can do it very quickly inside that builder. First simple, basic applications, and get a lot of the low hanging fruit off your plate and more automated inside of your Citrix workspace. >> And automation has been one of the keys that we've seen to streamlining worker productivity in the last 18 months. Another thing that I was looking at is, you know, the fact that we have so many different apps and we're constantly switching apps, context is constantly changing. Is this sort of system of record going to allow or reduce the amount of context switching that employees have to do? >> Yep. Almost all of these announcements have some flavor to that saying, can we start bringing more systems together in one place? So you're not switching between applications. You don't have different and disconnected sets of data that if you need to, and if they are disconnected, you can connect them, right. That's what the app builder announcement again is about saying, all right, if you're already, always using these three applications to do something, and you're switching between them, maybe you can just build something that connect them into one experience and, you know, maybe a low level of IT person, or even a business user can do that. That's the big trend right now. >> That's so important for that continued productivity, as things will continue to be a little bit unstable, I guess, for awhile. One more thing that I saw that Citrix is announcing is integrations with, Wrike I've been a Wrike user myself. I like to have program project management tools that I can utilize to keep track of projects, but they've done a number of integrations, one of them with Wrike Signature, which I thought was really cool. So for, to secure e-signature within Wrike, based on a program or a project that you're working on. Talk to me about some of the boosts to Wrike that they've done and how you think that's going to be influential in the employee experience. >> Well, first let's just say that the Wrike acquisition was a really important one for Citrix to go above just the basic digital workplace and simple systems of record. This is a really a mass collaboration tool for managing work itself. And so they're, this is taking Citrix up the stack in the more sophisticated work scenarios. And, and when you, we are in more sophisticated work scenarios, you want to be able to pull in different data sets. So, you know, they have the Citrix ShareFile support. You want to be able to bring in really important things like, you know, signing contracts or signing sales deals or mortgage applications, or all sorts of exciting things that actually run in your business. And so, Wrike Signatures, support's really important so that when you have key processes that involve people putting signatures on documents, you can just build collaborative work management flows that, that take all that into account without having to leave the experience. Everything's in one place as much as possible. And this is the big push and we need to have all these different systems. We don't have too many apps. What we have is too many touchpoints, so lets start combining some of these. And so the Wrike integrations, really help you do that. >> Well, and ultimately it seems like what Citrix is doing with the work launchpad series. All the announcements here is really helping workers to work how and where they want to work. Which is very similar to what we say when we're talking about the end user customer experience. When tech companies like Citrix say, we have to meet our customers where they are, it sounds like that's the same thing that's happening here. >> It is. And I would just add on top of that and to make it all safe. So you can bring all these systems together, work from anywhere, and you can feel confident that you're going to do so securely and safely. And it's that whole package I think that's really critical here. >> You're right, I'm glad you brought up that security. All right, Dion take out your crystal ball for me. As we wrap things up, you're saying, you know, going into the future, we're going to be moving from this distributed workforce to this hybrid. What are some of the things that you see as really critical happening in the next six to nine months? >> Well, there's a real push to say, we need to bring in all the workers that we've hired over the last year. Maybe not bringing them in, in person, but can we use these collaborative tools and technologies to bring them, hold them closer so they get to know us. And so, you know, things like, having Microsoft teams integrated right into your Citrix workspace makes it easier for you to collaborate with remote workers and inside any process wherever you are. So whether you're in the office or not, it should bring workers closer, especially those remote ones that are at risk of being left out as they move to hybrid work. And then it's really important. And so the things like the app builder are going to also allow building those connections. And I think that workers and businesses are really going to try and build those bridges, because the number one thing I'm hearing from business leaders and IT leaders is, is it, you know, we're worried about splitting into two different organizations, the ones that are remote and the ones that are in the office and any way that we can bring all of them together in an easy way, in a natural way, situate the digital employee experience so that we really back or back to one company, one common culture, everybody has equal access and equity to the employee experience. That's going to be really important. And I think that Citrix launchpad announcements around work really are a step, a major step in the right direction for that. There's still more things that have to be done and all, all vendors are working on that. But it's nice to see. I really liked what Citrix is doing here to move the ball forward towards where we're all going. >> It is nice to see, and those connections are critically important. I happen to be at an in-person event last week, and several folks had just had been hired during the pandemic and just got to meet some of their teams. So in terms of, of getting that cultural alignment, once again, this is a great step towards that. Dion thank you for joining me on the program, talking about the Citrix launchpad series for work, all the great new things that they're announcing and sharing with us as some of the things that you see coming down the pike. We appreciate your time. >> Thanks Lisa, for having me. >> For Dion Hinchcliffe. I'm Lisa Martin. You're watching this Cube conversation. (upbeat music)
SUMMARY :
in the Citrix launchpad series. Great to be here. about some of the things that and inclusion so that the and I'm sure you have And so I, you know, the ability to customize this And so the app And of course the weakest and all of a sudden the And one of the things that and appear to be downloading it, I think you alluded to this earlier, and you know, And the second one was Zoom, and you have them in one place I can share documents with and you want to bring your team in, and of course all the shipping delays. and all the right things in place So the ability to onboard and they are going to One of the things also that Citrix did, and get a lot of the low that employees have to do? that if you need to, and of the boosts to Wrike And so the Wrike integrations, it sounds like that's the same that and to make it all safe. happening in the next six to nine months? And so the things like the all the great new things that (upbeat music)
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Lisa Martin | PERSON | 0.99+ |
Dion Hinchcliffe | PERSON | 0.99+ |
Dion | PERSON | 0.99+ |
Lisa | PERSON | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
six months | QUANTITY | 0.99+ |
2020 | DATE | 0.99+ |
October 2021 | DATE | 0.99+ |
18 | QUANTITY | 0.99+ |
145 million | QUANTITY | 0.99+ |
two months | QUANTITY | 0.99+ |
spring of 2020 | DATE | 0.99+ |
last year | DATE | 0.99+ |
19 months | QUANTITY | 0.99+ |
First | QUANTITY | 0.99+ |
third | QUANTITY | 0.99+ |
ORGANIZATION | 0.99+ | |
Wrike | ORGANIZATION | 0.99+ |
Citrix | ORGANIZATION | 0.99+ |
31% | QUANTITY | 0.99+ |
last week | DATE | 0.99+ |
Chrome OS | TITLE | 0.99+ |
One | QUANTITY | 0.99+ |
one | QUANTITY | 0.99+ |
one place | QUANTITY | 0.98+ |
one pane | QUANTITY | 0.98+ |
one company | QUANTITY | 0.98+ |
today | DATE | 0.98+ |
first | QUANTITY | 0.98+ |
three applications | QUANTITY | 0.97+ |
second one | QUANTITY | 0.97+ |
a year and a half ago | DATE | 0.97+ |
2019 | DATE | 0.97+ |
both businesses | QUANTITY | 0.97+ |
Citrix | TITLE | 0.97+ |
Office 365 | TITLE | 0.97+ |
one place | QUANTITY | 0.96+ |
one experience | QUANTITY | 0.96+ |
last year and a half | DATE | 0.96+ |
half | QUANTITY | 0.94+ |
two different organizations | QUANTITY | 0.94+ |
about two thirds | QUANTITY | 0.94+ |
each one | QUANTITY | 0.91+ |
David Piester, Io-Tahoe & Eddie Edwards, Direct Energy | AWS re:Invent 2019
>>long from Las Vegas. It's the Q covering a ws re invent 2019. Brought to you by Amazon Web service is and in along with its ecosystem partners. >>Hey, welcome back to the cubes. Coverage of AWS 19 from Las Vegas. This is Day two of our coverage of three days. Two sets, lots of cute content. Lisa Martin here with Justin Warren, founder and chief analyst. A pivot nine. Justin and I are joined by a couple of guests New to the Cube. We've got David Meister next to meet Global head of sales for Io Tahoe. Welcome. Eddie Edwards with a cool name. Global Data Service is director from Direct Energy. Welcome, Eddie. Thank you. Okay, So, David, I know we had somebody from Io Tahoe on yesterday, but I'd love for you to give her audience an overview of Io Tahoe, and then you gotta tell us what the name means. >>Okay. Well, day pie stir. Io Tahoe thinks it's wonderful event here in AWS and excited to be here. Uh, I, oh, Tahoe were located in downtown on Wall Street, New York on and I Oh, Tahoe. Well, there's a lot of different meanings, but mainly Tahoe for Data Lake Input output into the lake is how it was originally meant So But ah, little background on Io Tahoe way are 2014. We came out way started in stealth came out of stealth in 2017 with two signature clients. When you're going to hear from in a moment direct energy, the other one g e and we'll speak to those in just a moment I owe Tahoe takes a unique approach way have nine machine learning machine learning algorithms 14 future sets that interrogates the data. At the data level, we go past metadata, so solving that really difficult data challenge and I'm gonna let Eddie describe some of the use cases that were around data migration, P II discovery, and so over to you >>a little bit about direct energy. What, you where you're located, What you guys do and how data is absolutely critical to your business. Yeah, >>sure. So direct energy. Well, it's the largest residential energy supplier in the er us around 5000 employees. Loss of this is coming from acquisitions. So as you can imagine, we have a vast amount of data that we need some money. Currently, I've got just under 1700 applications in my portfolio. Onda a lot. The challenges We guys are around the cost, driving down costs to serve so we can pass that back onto our consumers on the challenge that with hard is how best to gain that understanding. Where I alter whole came into play, it was vainly around off ability to use the products quickly for being able to connect to our existing sources to discover the data. What, then, that Thio catalog that information to start applying the rules around whether it be legislation like GDP, are or that way gets a lot of cases where these difference between the states on the standings and definitions so the product gives us the ability to bring a common approach So that information a good success story, would be about three months ago, we took the 30 and applications for our North America home business. We were able to running through the product within a week on that gave us the information to them, consolidate the estate downwards, working with bar business colleagues Thio, identify all the data we don't see the archival retention reels on, bring you no more meaning to the data on actually improve ourselves opportunities by highlights in that rich information that was not known >>previously. Yes, you mentioned that you growing through acquisition. One thing that people tend to underestimate around I t. Is that it's not a heterogeneous. It's not a homogeneous environments hatred genius. Like as soon as you buy another company, you've got another. You got another silent. You got another day to say. You got something else. So walk us through how iota who actually deals with that very disparity set of data that you've night out inherited from just acquiring all of these different companies? >>Yeah, so exactly right. You know, every time we a private organization, they would have various different applications that were running in the estate. Where would be an old article? I say, Hey, sequel tap environment. What we're able to do is use the products to plug in a name profile to understand what's inside knowledge they have around their customer base and how we can number in. That's in to build up a single view and offer additional products value adding products or rewards for customers, whether that be, uh on our hay truck side our heat in a ventilation and air con unit, which again we have 4600 engineers in that space. So it's opening up new opportunities and territories to us. >>Go ahead, >>say additionally to that, we're across multiple sectors, but the problem death by Excel was in the financial service is we're located on Wall Street. As I mentioned on this problem of legacy to spirit, data, sources and understanding, and knowing your data was a common problem, banks were just throwing people at the problem. So his use case with 1700 applications, a lot of them legacy is fits right into what we d'oh and cataloging is he mentioned. We catalogue with that discover in search engine that we have. We enable search cross enterprise. But Discovery we auto tag and auto classify the sensitive data into the catalog automatically, and that's a key part of what we do. And it >>was that Dave is something in thinking of differentiation, wanting to know what is unique about Iota. What was the opportunity that you guys saw? But is the cataloging and the sensitive information one of the key things that makes it a difference >>Way enabled data governance. So it's not just sensitive information way catalog, entire data set multiple data sets. And what makes us what differentiates us is that the machine learning way Interrogate in brute force The data So every single so metadata beyond so 1,000,000,000 rose. 100,000 columns. Large, complex data sets way. Interrogate every field value. And we tell you what this looks like A phone number. This looks like an address. This looks like a first name. This looks like the last name and we tagged at to the catalog. And then anything that sensitive in nature will color coded red green, highly sensitive, sensitive. So that's our big differentiator. >>So is that like 100% visibility into the granularity of what is in this data? >>Yes, that's that's one of the issues is who were here ahead of us. We're finding a lot of folks are wanting to go to the cloud, but they can't get access to the data. They don't know their data. They don't understand it. On DSO where that bridge were a key strategic partner for aws Andi we're excited about the opportunity that's come about in the last six months with AWS because we're gonna be that key geese for migration to the cloud >>so that the data like I love the name iota, How But in your opinion, you know, you could hear so many different things about Data Lake Data's turning into data Swamp is there's still a lot of value and data lakes that customers just like you're saying before, you just don't know what they have. >>Well, what's interesting in this transition to one of other clients? But on I just want to make a note that way actually started in the relational world. So we're already a mess. We're across header genius environment so but Tahoe does have more to do with Lake. But at a time a few years back, everybody was just dumping data into the lake. They didn't understand what what was in there, and it's created in this era of privacy, a big issue, and Comcast had this problem. The large Terry Tate instance just dumping into the lake, not understanding data flows, how they're data's flowing, not understanding what's in the lake, sensitivity wise, and they want to start, you know they want enable b I. They want they want to start doing analytics, but you gotta understand and know the data, right? So for Comcast, we enable data ops for them automatically with our machine learning. So that was one of the use cases. And then they put the information and we integrated with Apache Atlas, and they have a large JW aws instance, and they're able to then better govern their data on S O N G. Digital. One other customer very complex use case around their data. 36 e. R. P s being migrated toe one virtually r p in the lake. And think about finance data How difficult that is to manage and understand. So we were a key piece in helping that migration happen in weeks rather than months. >>David, you mentioned cloud. Clearly weird. We're at a cloud show, but you mentioned knowing your data. One of the aspect of that cloud is that it moves fast, and it's a much bigger scale than what we've been used to. So I'm interested. Maybe, Eddie, you can. You can fill us in here as well about the use of a tool to help you know your data when we're not creating any less stated. There's just more and more data. So at this speed and this scale, how important is it that you actually have tooling to provide to the to the humans who have to go on that operate on all of this data >>building on what David was saying around the speed in the agility side, you know, now all our information I would know for North America home business is in AWS Hold on ns free bucket. We are already starting work with AWS connect on the call center side. Being able to stream that information through so we're getting to the point now is an organization where we're able to profile the data riel. Time on. Take that information Bolts predict what the customers going going to do is part that machine learning side. So we're starting to trial where we will interject into a call to say, Well, you know, a customer might be on your digital site trying to do a journey. You can see the challenges around data, and you could Then they go in with a chop using, say, the new AWS trap that's just coming through at the moment. So >>one of the things that opportunities I'm here. Sorry, Eddie is the opportunity to leverage the insights into the data to deliver more. You mentioned like customer words, are more personalized experience or a call center agent. Knowing this is the problem of this customer is experiencing this way. Have tried X, y and Z to resolve, or this customer is loyal to pay their bills on time. They should be eligible for some sort of reward program. I think consumers that I think amazon dot com has created us this demanding consumer that way expect you to know us. I expect you to serve us up things that you think we want. Talk to me about the opportunity that I owe Ty was is giving your business to be able to delight customers in ways that you probably couldn't even have predicted? >>Well, they touched on the tagging earlier, you know, survive on the stunned in the data that's coming through. Being able to use the data flow technology on dhe categorizing were able than telling kidding with wider estate. So David mentioned Comcast around 36 e. R. P. You know, we've just gone through the same in other parts of our organization. We're driving the additional level of value, turning away from being a manually labor intensive task. So I used to have 20 architects that daily goal through trying to build an understanding the relationship. I do not need that now. I just have a couple of people that are able to take the outputs and then be able to validate the information using the products. >>And I like that. There's just so much you mentioned customer 360. Example at a call centre. There's so much data ops that has to happen to make that happen on. That's the most difficult challenge to solve. And that's where we come in. And after you catalogue the data, I just want to touch on this. We enable search for the enterprise so you're now connected to 50 115 100 sources with our software. Now you've catalogued it. You profiled it. Now you can search Karen Kim Kim Smith, So your your your engineers, your architect, your data stewards influences your business analysts. This is folks can now search anything they want and find anything sensitive. Find that person find an invoice, and that helps enable. But you mentioned the customer >>360. But I can Also. What I'm hearing is, as it has the potential to enable a better relationship between I t in the business. >>Absolutely. It brings those both together because they're so siloed. In this day and age, your data siloed and your business is siloed in a different business unit. So this helps exactly collaborate crowdsource, bring it all together. One platform >>and how many you so 1700 applications. How many you mentioned the 36 or so air peace. What percentage? If you can guess who have you been able to reduce duplicate triplicate at center applications? And what are some of the overarching business benefits that direct energy is achieving? >>So incentive the direct senator, decide that we're just at the beginning about journey. We're about four months in what? We've already decommissioned 12. The applications I was starting to move out to the wider side in terms of benefits are oh, I probably around 300% of the moment >>in a 300% r A y in just a few months. >>Just now, you know you've got some of the basic savings around the story side. We're also getting large savings from some of the existing that support agreements that we have in place. David touched on data Rob's. I've been able to reduce the amount of people that are required to support the team. There is now a more common on the standing within the organization and have money to turn it more into a self care opportunity with the business operations by pushing the line from being a technical problem to a business challenge. And at the end of the day, they're the experts. They understand the data better than any IittIe fault that sat in a corner, right? So I'm >>gonna ask you one more question. What gave you the confidence that I Oh, Tahoe was the right solution for you >>purely down Thio three Open Soul site. So we come from a you know I've been using. I'll tell whole probably for about two years in parts of the organization. We were very early. Adopters are over technologies in the open source market, and it was just the ability thio on the proof of concept to be able to turn it around iTunes, where you'll go to a traditional vendor, which would take a few months large business cases. They need any of that. We were able to show results within 24 48 hours on now buys the confidence. And I'm sure David would take the challenge of being able to plug in some day. It says on to show you the day. >>Cool stuff, guys. Well, thank you for sharing with us what you guys are doing. And I have a Iot Tahoe keeping up data Lake Blue and the successes that you're cheating in such a short time, but direct energy. I appreciate your time, guys. Thank you. Excellent. Our pleasure. >>No, you'll day. >>Exactly know your data. My guests and my co host, Justin Warren. I'm Lisa Martin. I'm gonna go often. Learn my data. Now you've been watching the Cube and AWS reinvent 19. Thanks for watching
SUMMARY :
Brought to you by Amazon Web service Justin and I are joined by a couple of guests New to the Cube. P II discovery, and so over to you critical to your business. the products quickly for being able to connect to our existing sources to discover You got another day to say. That's in to build up a single view and offer but the problem death by Excel was in the financial service is we're But is the cataloging and the sensitive information one of the key things that makes it And we tell you what this looks like A phone number. in the last six months with AWS because we're gonna be that key geese for so that the data like I love the name iota, How But in does have more to do with Lake. So at this speed and this scale, how important is it that you actually have tooling into a call to say, Well, you know, a customer might be on your digital site Sorry, Eddie is the opportunity to leverage I just have a couple of people that are able to take the outputs and then be on. That's the most difficult challenge to solve. What I'm hearing is, as it has the potential to enable So this helps exactly How many you mentioned the 36 or so So incentive the direct senator, decide that we're just at the beginning about journey. reduce the amount of people that are required to support the team. Tahoe was the right solution for you It says on to show you the day. Well, thank you for sharing with us what you guys are doing. Exactly know your data.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
David | PERSON | 0.99+ |
Justin Warren | PERSON | 0.99+ |
Comcast | ORGANIZATION | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
Eddie | PERSON | 0.99+ |
David Meister | PERSON | 0.99+ |
Justin | PERSON | 0.99+ |
Eddie Edwards | PERSON | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
2017 | DATE | 0.99+ |
Las Vegas | LOCATION | 0.99+ |
David Piester | PERSON | 0.99+ |
100% | QUANTITY | 0.99+ |
2014 | DATE | 0.99+ |
Karen Kim Kim Smith | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
North America | LOCATION | 0.99+ |
three days | QUANTITY | 0.99+ |
20 architects | QUANTITY | 0.99+ |
Two sets | QUANTITY | 0.99+ |
300% | QUANTITY | 0.99+ |
4600 engineers | QUANTITY | 0.99+ |
1,000,000,000 | QUANTITY | 0.99+ |
Rob | PERSON | 0.99+ |
1700 applications | QUANTITY | 0.99+ |
One platform | QUANTITY | 0.99+ |
North America | LOCATION | 0.99+ |
Io-Tahoe | PERSON | 0.99+ |
30 | QUANTITY | 0.99+ |
Direct Energy | ORGANIZATION | 0.99+ |
Excel | TITLE | 0.99+ |
100,000 columns | QUANTITY | 0.98+ |
Wall Street | LOCATION | 0.98+ |
36 | QUANTITY | 0.98+ |
yesterday | DATE | 0.98+ |
Global Data Service | ORGANIZATION | 0.98+ |
iTunes | TITLE | 0.98+ |
amazon dot com | ORGANIZATION | 0.98+ |
one | QUANTITY | 0.98+ |
12 | QUANTITY | 0.98+ |
first name | QUANTITY | 0.98+ |
both | QUANTITY | 0.97+ |
Io Tahoe | ORGANIZATION | 0.97+ |
aws | ORGANIZATION | 0.97+ |
Day two | QUANTITY | 0.97+ |
14 future sets | QUANTITY | 0.97+ |
around 5000 employees | QUANTITY | 0.96+ |
two signature clients | QUANTITY | 0.96+ |
around 300% | QUANTITY | 0.96+ |
under 1700 applications | QUANTITY | 0.96+ |
One | QUANTITY | 0.96+ |
one more question | QUANTITY | 0.95+ |
about two years | QUANTITY | 0.95+ |
24 48 hours | QUANTITY | 0.95+ |
2019 | DATE | 0.95+ |
Amazon Web | ORGANIZATION | 0.94+ |
Thio | ORGANIZATION | 0.94+ |
Terry Tate | PERSON | 0.94+ |
a week | QUANTITY | 0.94+ |
One thing | QUANTITY | 0.94+ |
about four months | QUANTITY | 0.94+ |
Discovery | ORGANIZATION | 0.91+ |
nine | QUANTITY | 0.91+ |
last six months | DATE | 0.9+ |
Andi | PERSON | 0.89+ |
Iota | TITLE | 0.89+ |
Tahoe | ORGANIZATION | 0.89+ |
Data Lake Data | ORGANIZATION | 0.88+ |
DSO | ORGANIZATION | 0.88+ |
Wall Street, New York | LOCATION | 0.86+ |
David Raymond, Virginia Tech | AWS Imagine 2019
>> from Seattle WASHINGTON. It's the Q covering AWS Imagine brought to you by Amazon Web service is >> Hey, welcome back already, Jeffrey. Here with the cue, we're in downtown Seattle at the AWS. Imagine, Edie, you event. It's a small conference. It's a second year, but it'll crow like a weed like everything else does the of us. And it's all about Amazon and a degree. As for education, and that's everything from K through 12 community college, higher education, retraining vets coming out of the service. It's a really big area. And we're really excited to have fresh off his keynote presentations where he changed his title on me from what it was >> this morning tow. It was the senator duties >> David Raymond, the director of what was the Virginia Cyber Range and now is the U. S. Cyber range. Virginia Tech. David, Great to see you. >> Yeah, Thank you. Thanks. So the Virginia cyber age actually will continue to exist in its current form. Okay, Well, it'll still serve faculty and students in the in the Commonwealth of Virginia, funded by the state of Virginia. Now the U. S. Cyber Angel fund will provide service to folks outside over, >> so we jumped ahead. So? So it's back up. A step ladder is the Virginia, >> So the Virginia Cyber Range provides courseware and infrastructure so students could do hands on cyber security, educational activities in Virginia, high schools and colleges so funded by the state of Virginia and, um provides this service at no charge to the schools >> and even in high school, >> even in high school. Yes, so now that there are now cybersecurity courses in the Virginia Department of Education course catalogue as of two years ago, and I mean they've grown like wildfire, >> I'm just so a ton of talk here about skills gap. And there's tremendous skills gap. Even the machine's gonna take everybody's job. There's a whole lot of jobs are filled, but what's interesting? I mean, it's the high school angle is really weird. I mean, how do you Most high school kids haven't even kind of clued in tow, privacy and security, opting in and opting out. It's gotta be a really interesting conversation when now you bring security into that a potential career into that and directly reflects on all those things that you do on your phone. >> Well, I would argue that that's exactly the problem. Students are not exposed to cyber security, you know. They don't want the curia potentials are they really don't understand what it is we talked about. We talked about teenagers being digital natives. Really? They know how to use smartphones. They know how to use computers, but they don't understand how they work. And they don't understand the security aspects that go along with using all this technology. And I would argue that by the time a student gets into college they have a plan, right? So I have a student in college. He's he's gonna be a doctor. He knows what a doctor is. He heard of that his whole life. And in high school, he was able to get certified as a nursing assistant. We need cyber security in that same realm, right? If we start students in high school and we and we expose them to cybersecurity courses, they're all elective courses. Some of the students will latch onto it, and I'll say, Hey, this is what I want to be when I grew up. And in Virginia, we have we have this dearth of cyber security expertise and this is true across the country. In Virginia, right now, we have over 30,000 cyber security jobs that are unfilled. That's about 1/3 of the cyber security jobs in this state. And I mean, that's a serious problem, not only in Virginia but nationwide. And one of the ways to fix that is to get high school students exposed to cybersecurity classes, give them some real hands on opportunities. So they're really doing it, not just learning the words and passing the test, and I mean really again in Virginia, this is this is grown like wildfire and really thinks revolutionized cybersecurity education in the state. >> And what are some of the topics that say, a high school level, where you know you're kind of getting versed on the vocabulary and the terminology vs when they go into into college and start to take those types, of course, is >> yeah, so in Virginia, there's actually cybersecurity courses across the C T E career pathways. And so SETI is the career and technical education curricula. And so there are courses like cyber security and health care, where students learn about personal health data and how to secure that specific specific kinds of data, they learn about the regulations behind that data. There's healthcare in manufacturing, where students learn about industrial control systems and you know how those things need to be secured and how they're different from a laptop or a phone. And the way those air secured and what feeds into all of those courses is an introductory course. Cyber security fundamentals, where students learn some of the very basics they learn the terminology. They learn things like the C I. A. Triad right, confidentiality, integrity and availability of the three basic components of security that you try to maintain for any system. So they start out learning the basics. But still they're doing that hands on. So they're so they're in a network environment where they see that you know that later on in the course during Capstone exercises, they might see someone trying to attack a computer that they're that they're tasked to defend and a defender of what does that look like? What are the things that I'm going to do? That computer? You know, I might install anti virus. I might have a firewall on the computer. And how do I set that up and etcetera etcetera. So high school start with the basics. As as students progressed through their high school years, there are opportunities to take further more advanced classes in the high schools. And then when they get to college, some of those students are gonna have latched onto cyber security as a potential career field. Now, now we've got him right way, get him into the right into the right majors and into the right courses. And our hope is that that's gonna sort of kick start this pipeline of students in Virginia colleges, >> right? And then I wonder if you could >> talk a little bit about the support at the state level. And it's pretty interesting that you had him from the state level we heard earlier today about supported the state level. And it was Louisiana for for another big initiative. So you know that the fact that the governor and the Legislature are basically branding this at the state level, not the individual school district level, is a pretty strong statement of the prioritization that they're putting on this >> that has been critical to our success. If we didn't have state level support, significant state level support, there's no way we could be where we are. So the previous governor of Virginia, Terry McAuliffe, he latched on to cyber security education as one of his signature initiatives. In fact, he was the president of the State Governors Association, and in that role he cybersecurity was one of his condition. So so he felt strongly about educating K 12 education college students feeding that cybersecurity pipeline Onda Cyberangels one of one of a handful of different initiatives. So they were veterans scholarships, and there were some community college scholarships and other other initiatives. Some of those are still ongoing so far are not. But but Cyber Range has been very successful. Funded by the state provides a service at no cost to high schools and colleges on Dad's Been >> critically, I can't help. We're at our say earlier this year, and I'm just thinking of all the CEOs that I was sitting with over the course of a couple of days that are probably looking for your phone number right now. Make introduction. But I'm curious. Are are the company's security companies. I mean, Arcee is a huge show. Amazon just had their first ever security conference means a lot of money being invested in this space. Are they behind it? Have you have you looked for in a kind of private company participation to help? Because they desperately need these employees? >> Definitely. So we've just started down that road, Really? I mean, our state funding has kept us strong to this point in our state funding is gonna continue into the foreseeable future. But you're right. There are definitely opportunities to work with industry. Certainly a DBS has been a very strong partner of our since the very beginning. They really I mean, without without the help of some, some of their cloud architects and other technical folks way could not have built what we built in the eight of us. Cloud. We've also been talking to Palo Alto about using some of their virtual appliances in our network environments. So yeah, so we're definitely going down the road of industry partners and that will continue to grow, I'm sure >> So then fast forward today to the keynote and your your announcement that now you taking it beyond just Virginia. So now it's the U. S. Cyber range. Have that come apart? Come about. What does that mean? >> Yes, So we've been We've been sharing the story of the Virginia cyber range for the last couple of years, and I goto national conferences and talk about it. And, um, just to just sort of inform other states, other other school systems what Virginia's doing. How could you? How could you potentially match what we're doing and what The question that I keep getting is I don't want to reinvent the wheel. How can I buy what you have? And that's been sort of a constant drumbeat over the last couple of years. So we decided fairly early on that we might want to try to expand beyond Virginia, and it just sort of the conditions were right about six months ago. So we set a mark on the wall, he said. In Summer of 2019 we're gonna make this available to folks outside of Virginia. And so, so again, the Virginia Cyberangels still exist. Funded by the Commonwealth of Virginia, the U. S cyber range is still part of Virginia Tech. So within Virginia Tech, but we will have to we will have to essentially recoup our costs so we'll have to spend money on cloud infrastructure and We'll have to spend salary money on folks who support this effort. And so we'll recoup costs from folks that are outside of Virginia using our service. But, um, we think the costs are gonna be very competitive compared to similar efforts. And we're looking forward to some successes here. >> And do you think you're you're kind of breakthrough will be at the high school level, the You know, that underground level, you know, where do you kind of see the opportunities? You've got the whole thing covered with state support in Virginia. How does that get started in California? How's that get started here? Yeah, that's a Washington state. >> That's a great question. So really, when we started this, I thought we were building a thing for higher ed. That's my experience. I've been teaching cyber security and higher ed for several years, and I knew I knew what I would want if I was using it, and I do use it. So I teach classes at Virginia Tech Graduate program. So I I used the Virginia side in my class, and, um, what has happened is that the high schools have latched onto this as I mentioned, and Most of our users are high schools. In Virginia, we have 180. Virginia High School is using the Virgin Cyber. That's almost >> 188 1 >> 180. That's almost half the high schools in the state using the Virginia cyber age. So we think. And if you think about, you know, higher. Ed has been teaching cybersecurity classes that the faculty members who have been teaching them a lot of them have set up their own network infrastructure. They have it set up the way they want it, and it ties into their existing courseware, and you know they're going to use that, At least for now. What we provide is is something that makes it so that a high school or a community college doesn't have to figure out how to fund or figure out how to actually put this network architecture together. They just come to us. They have the flexibility of the flexibility to use, just are very basic plug and play network environments, or they have flexibility to, um, make modifications depending on how sophisticated they themselves are with with, you know, manipulating systems and many playing the network so so Our expectation is that the biggest growth is going to be in the high school market, >> right? That's great, because when you say cyber range God, finally, Donna me use it like a target range. It's like a place to go practice >> where the name comes from, right? >> Absolutely. If I finally like okay, I get it. So because it's not only the curriculum and the course where and everything else but it's actually an environment, it depends on the stage things and do things exactly >> So students could d'oh offensive, offensive and defensive cybersecurity activities. And so early on, when we were teaching students howto hack essentially in colleges, you know, there were people who were concerned about that on the military case we make for that is you can't teach somebody how to defend unless they understand how they're gonna be attacked. The same is true in this case. So all of our all of our course, where has lots of ethics and no other legal and other other discussions embedded throughout. So students understand the implications of what their actions would be if they do it somewhere else. And, um, right, these are all isolated network environments their places where students can get hands on in a place where they can essentially do whatever they want without causing trouble on the school network or on the Internet. And it's very much akin to a rifle range, >> right? Like you said, you can have different scenarios. And I would imagine there's probably gonna be competitions of you think. Fact. You know what's going on in the robotics world for lots of all these things, right? Like white hat, black hat hacker. Well, very, very exciting. David, Congratulations. And it sounds like you're well on your way. Thanks. Great. Alright, >> He's David. I'm Jeff. You're watching The Cube were at Washington State Convention Centre just across the street at a W s. Imagine. Thanks for watching. We'll see you next time. >> Thanks.
SUMMARY :
AWS Imagine brought to you by Amazon Web service else does the of us. this morning tow. David Raymond, the director of what was the Virginia Cyber Range and now is the U. So the Virginia cyber age actually will continue to exist in its current form. A step ladder is the Virginia, Yes, so now that there are now cybersecurity courses in the Virginia Department of Education I mean, it's the high school angle is really weird. That's about 1/3 of the cyber security jobs in this state. And the way those air secured and what feeds into all of those courses is And it's pretty interesting that you had him from the Funded by the state provides a service at no cost to high schools and colleges on Dad's Been all the CEOs that I was sitting with over the course of a couple of days that are probably looking in our state funding is gonna continue into the foreseeable future. So now it's the U. S. Cyber range. And so, so again, the Virginia Cyberangels still exist. the You know, that underground level, you know, happened is that the high schools have latched onto this as I mentioned, and Most of our users so Our expectation is that the biggest growth is going to be in the high school market, That's great, because when you say cyber range God, finally, Donna me use it like a target range. So because it's not only the curriculum and the course where and everything So all of our all of our course, where has lots of you think. the street at a W s. Imagine.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Virginia | LOCATION | 0.99+ |
California | LOCATION | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Jeff | PERSON | 0.99+ |
Jeffrey | PERSON | 0.99+ |
David Raymond | PERSON | 0.99+ |
Terry McAuliffe | PERSON | 0.99+ |
David | PERSON | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
today | DATE | 0.99+ |
State Governors Association | ORGANIZATION | 0.99+ |
Washington | LOCATION | 0.99+ |
Virginia Tech | ORGANIZATION | 0.99+ |
DBS | ORGANIZATION | 0.99+ |
Washington State Convention Centre | LOCATION | 0.99+ |
second year | QUANTITY | 0.99+ |
Edie | PERSON | 0.99+ |
one | QUANTITY | 0.99+ |
Cyber Range | ORGANIZATION | 0.99+ |
The Cube | TITLE | 0.99+ |
Summer of 2019 | DATE | 0.98+ |
over 30,000 cyber security jobs | QUANTITY | 0.98+ |
Palo Alto | LOCATION | 0.98+ |
Virginia Department of Education | ORGANIZATION | 0.98+ |
Virginia Cyber Range | ORGANIZATION | 0.98+ |
Virginia High School | ORGANIZATION | 0.98+ |
first | QUANTITY | 0.97+ |
eight | QUANTITY | 0.97+ |
180 | QUANTITY | 0.96+ |
Virginia Tech Graduate | ORGANIZATION | 0.96+ |
two years ago | DATE | 0.96+ |
Arcee | ORGANIZATION | 0.96+ |
U. S. Cyber range | LOCATION | 0.95+ |
C I. A. Triad | TITLE | 0.95+ |
earlier this year | DATE | 0.93+ |
last couple of years | DATE | 0.93+ |
earlier today | DATE | 0.92+ |
Seattle WASHINGTON | LOCATION | 0.91+ |
U. S | LOCATION | 0.91+ |
Commonwealth of | LOCATION | 0.91+ |
Virginia Cyberangels | ORGANIZATION | 0.9+ |
12 community college | QUANTITY | 0.89+ |
Virgin Cyber | ORGANIZATION | 0.87+ |
2019 | DATE | 0.87+ |
Commonwealth of | ORGANIZATION | 0.85+ |
about 1/3 | QUANTITY | 0.83+ |
about six months ago | DATE | 0.83+ |
188 | QUANTITY | 0.82+ |
three basic components | QUANTITY | 0.82+ |
downtown Seattle | LOCATION | 0.79+ |
this morning | DATE | 0.78+ |
W s. Imagine | ORGANIZATION | 0.76+ |
governor | PERSON | 0.75+ |
S. Cyber Angel | OTHER | 0.73+ |
U. | ORGANIZATION | 0.72+ |
signature initiatives | QUANTITY | 0.71+ |
Range | ORGANIZATION | 0.65+ |
Louisiana | LOCATION | 0.63+ |
Onda Cyberangels | ORGANIZATION | 0.63+ |
Capstone | TITLE | 0.61+ |
K 12 | OTHER | 0.6+ |
U. S. Cyber range | LOCATION | 0.6+ |
David Chang, HelloSign, a Dropbox Company | Coupa Insp!re19
>> from the Cosmopolitan Hotel in Las Vegas, Nevada. It's the Cube covering Cooper inspired. 2019. Brought to you by Cooper. >> Welcome to the Cube. Lisa Martin on the ground at Cooper Inspire 19 at the Cosmopolitan, the chic Cosmopolitan in Las Vegas. Very pleased to be joined by my friend David Chang, the VP of business from Hello. Sign a drop box company. David, Welcome to the Cube. >> Thank you for having me on. >> Great to have you here. It is a lot of fun. You could really geek out talking technology all day >> too much. So, >> yeah, there's that >> play that you gotta gamble. It'll keep it real. >> You know, I have no skills in that whatsoever, but maybe I'll try it. I'll take your advice. Give her audience an overview of Hello. Sign. Sure. Drop box Company. What? You guys are what you do. All that good stuff. >> Great. Great. So hello. Sign is today one of the fastest growing, if not the fastest growing electronic signature company in market place today and today we host, I think, over 100,000 paying businesses that use one of our products and over 150 different countries. today we actually were acquired by Dropbox. Sure, everybody's familiar Dropbox or one of the biggest brands in the Internet industry today by the leader in consumer and business files Thinking chair. So John Box actually purchased this, you know, for a number of reasons. First of all, even amazing product and cultural fit with them. But also, Electronic Signature Day is an enormous market. It is one piece of the overall digital transformation, but Elektronik, six year alone, analysts view, is probably a $25,000,000,000 industry, which we've only barely scratched the surface. So it's a huge opportunity, absolutely, and it's that big. That's exactly the you know. That's actually what's shocking about how big it is, because if you think about almost in every business, there are not just one, but probably dozens of different use cases where you need to sign documents. So electronic signature honestly is relevant for everything from all your sales agreements to all of your HR and offer letter and on boarding agreement. It's relevant specifically for all of your procurement and buying agreements, all your vendors contracts that need to be signed, your supply agreements that needs to be signed and D A s o purchase orders. All these documents need to be signed. And today you know, only a few of these use cases have been brought into the digital arena. So there's a whole huge area to grow. And with Dropbox being a leader and content management, where you normally store your documents, >> right, it's >> a natural workflow extension two haven't signed by. Hello, son. >> Excellent. Well, one of the things that we've been talking a lot about we talk about this in every show is the effects of consumer is Asian. And we talked about this yesterday with Rob Bernstein, Cooper's CEO in a number of gas yesterday and today is that we're consumers every day, even when we're at work. Oh, I forgot. I gotta buy this when we go on Amazon, we know we could get it in a day, but now we have the same expectations whether we're buying business, you know, software or what not? And we also want to be able to do things from our mobile phone, including sign. Hey, I got this new job offer or whatever happens to be without having out. Oh my God, there's a pdf. I have to go home, get to my desktop, talk to me about PDS because I can imagine when people either fill them out manually, then they scanning back in and somebody's gotta print it out or fax it. That date is stuck in Pdf. How does hello sign work to free dot data in a Pierre? >> Sure, our design philosophy really is about, you know, make making a superior user experience both for the person who needs to get a document, a document side, but also somebody who's actually gonna be signing it. So when we designed our products, you might as easy as possible for user's to sign that and recognizing some of the difficulties with P D EFS and signing on your mobile phone. We've made our products specifically Mobley responsive, so they don't have to pension, screen, pension, pension scan and all that kind of stuff and typing data. We make it very easy walking through the data entry process to streamline the whole process. We just want to make user customer satisfaction first and foremost >> moving the friction, probably getting documents signed much faster. >> Absolutely. I mean the base, you know, benefits associated the signature. Overall you know, our honestly getting your documents signed significantly faster and more efficiently. We have customers that used to take up to two weeks to get a contract signed. And, you know, as a salesperson, that gets your real nervous, right? So we've seen those contracts now get signed in less than a day. Also, Elektronik senator provides a tonic transparency. So throughout the process, we can actually provide notifications that let the sales people know that somebody's opened up the the >> end. Lt >> looked at the document, reviewed it, signed it, completed it. And even if the document has been signed, the consent of reminders to make sure to sign it. And the third thing is, you know you can't can't emphasize this enough. The value associate with productivity increases. Come on. Everyone's gone out. Printed out the document, walked it over to the scanning machine, you know, then uploading it back in your computer, you know that that whole step, you know, should be completely digital and automated as >> much as >> possible. So we see productivity increases to some of our customers between two x three x for X right in the number in reducing the number of man hours people have to spend to get >> documents only. Is that a cost savings? But all of the you can think of all the other benefits like we're talking about, even for the procurement officers were talking about it at Kuba inspires. It's not just saving money. It's all of the other ripple effects that cost savings, resource, reallocations, speed. All enable this digital transformation, which then enables the business Thio capture new customers. Increased customer, lifetime value, shareholder value. There's a lot of upside to this, >> especially for a company like Cooper. First of all, it's an incredible fit for what we do. Procurement documents. That whole host, um, they need to be signed but by, you know, utilizing Hello, son. We really facilitate that whole experience, and we're very excited to expand our partnership today. We're Cooper Advantage partner. >> Tell me about the Cooper Advantage program benefits. Who wins your >> coop? Advantage is this very unique marketplace that Cooper's brought together. They're pulling together both their customers, some of their lead customers and their matching them with some of the suppliers selected suppliers that provide their customers. Ah, whole host of service is that they need so it could be everything from goods and office supplies. All the way to service is like travel service is, and staffing service is all the way to software key software that their customers would utilize in conjunction with their procurement business. Spend management So companies like close on. So by matchmaking it for the suppliers, they get some pre negotiated discounts that offer them immediate savings off of buying direct from retail and then from ah, supplier side. We get huge benefits because we get to meet some of the most targeted companies that we want. So Cooper effectively is one of our favorite matchmakers. >> Nice. So, yeah, there's a tremendous amount of suppliers in their program. I forget the number and I don't want to misquote it. But I can imagine Cooper customer that's using them for procurement and expenses and invoices and payments. I talked a lot about Cooper pains of new things today. Well, then have the opportunity through the Cooper Advantage program to do prick human contract Scorpios with Hello sign as the e signature. >> Exactly, really, exactly. And that that is, like I said, a great match for what their customers need and by being virtue of a coupe advantage part. Sorry. Keep advantage Supplier. We've been pre vetted by Cooper have also worked out some special pre negotiated discounts with Cooper to make sure we passed that value on to their customers. >> So some of the things that came out today regarding yesterday as well with the Amazon extension you and I talked about the consumer ization affect a few minutes ago. What opportunities is that? Open up to Hello, sign for Cooper paid to be able to enable I t folks to have this visibility for the entire software from search to management. With this consume arised approach, open up doors for Hello Sign. >> Well, I think you know, if you look at the total life cycle of any purchase right from from beginning to end from everything from identifying the products that you want to being able to, you know, negotiate and secure a price that is good for you, you know that whole process. There's always tradition, but a lot of friction there. So the same way that there's friction on the e commerce side, we'll check out and purchase right and getting lining up your payment and Internet payment information Cooper. Streamlining that whole thing for the customer so long without sod is if there's documents they're associated with that with that workflow than by using companies like Hello Sign and our products were able to continue that process of digital izing the end and purchase cycle. >> And I imagine, from an information security perspective, everything >> Come on the old >> days usedto signed >> a contract and I thought, Oh, my boss's desk, Anybody could come by and pick that up So nowadays we you know nowadays we keep it stored securely in the cloud. We have some of the highest security requirements of any signature company out there, and that really matches Cupid's philosophy as well. They go overboard on security, which we really appreciate. That mission is completely lard with each other. >> Awesome. So last few seconds here. I know that you guys are early in the acquisition with Dropbox. What's exciting You for the rest of the calendar. 19. Since all these fiscal years are different. And what's next with you guys in Cuba? Yeah, >> So first of all, with Dropbox, we're just excited to be part of an enormous community of over 500,000,000 users globally So it's It's It's the reach is insane. >> I know >> my mom. Yeah, I think everybody has a DROPBOX account on >> eso getting introduced to their segments, whether it's a consumer segment, SMB and increasingly, the business segment offers huge brand recognition and the potential for new customers with Dropbox. So there's a great synergy from a go to market perspective, and with Cooper, we're very excited about the next stage of our partnership is entering the Cooper Link program. So, uh, you know said Now Cooper customers will be able to sign and send for signature from within the Cooper clr module. Eso any of their contracts vendor agreements that are stored within Cooper without ever having to leave Cooper. You consent for signature and seek the document back. And for a company like Cooper, this is a great strategic value. A because of the benefit it brings its customers, but also with all the great features that Cooper's coming out with leading edge. They want to keep a cz much of that procurement experience from within Cooper. They want Cooper to be that system of record per se and system of transaction for all your business. Ben Management So now you don't have to leave Cooper to perform to get your contract signed. You can do it from all within one place within Cooper, and we enable that. >> That's awesome. That's that's what we want. Keep him. In the experience of that, they actually adopted. They get it done. They're more efficient and and and well, David, it's been such a pleasure to >> have you on >> the Cube. Thank you for joining me today. >> Thanks, Lisa. >> All right, we'll see you next. Time for David Chang. I'm Lisa Martin. You're watching the Cube from Cooper Inspired 19. Thanks for watching.
SUMMARY :
Brought to you by Cooper. the chic Cosmopolitan in Las Vegas. Great to have you here. So, play that you gotta gamble. You guys are what you do. That's exactly the you know. a natural workflow extension two haven't signed by. Well, one of the things that we've been talking a lot about we talk about this in every show is Sure, our design philosophy really is about, you know, make making a superior user experience I mean the base, you know, benefits associated the signature. And the third thing is, you know you can't can't emphasize right in the number in reducing the number of man hours people have to spend to get But all of the you can think of all the other benefits like we're you know, utilizing Hello, son. Tell me about the Cooper Advantage program benefits. and staffing service is all the way to software key software that their customers would utilize in I forget the number and I don't want And that that is, like I said, a great match for what their customers So some of the things that came out today regarding yesterday end from everything from identifying the products that you want to being able to, We have some of the highest security And what's next with you guys in Cuba? So first of all, with Dropbox, we're just excited to be part of an enormous community of over Yeah, I think everybody has a DROPBOX account on A because of the benefit it brings its customers, but also with all the great features that Cooper's coming In the experience of that, they actually adopted. All right, we'll see you next.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
David Chang | PERSON | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
Cooper | PERSON | 0.99+ |
David | PERSON | 0.99+ |
$25,000,000,000 | QUANTITY | 0.99+ |
Rob Bernstein | PERSON | 0.99+ |
Cuba | LOCATION | 0.99+ |
2019 | DATE | 0.99+ |
Dropbox | ORGANIZATION | 0.99+ |
today | DATE | 0.99+ |
yesterday | DATE | 0.99+ |
Lisa | PERSON | 0.99+ |
six year | QUANTITY | 0.99+ |
less than a day | QUANTITY | 0.99+ |
Cooper | ORGANIZATION | 0.99+ |
Scorpios | ORGANIZATION | 0.99+ |
two | QUANTITY | 0.99+ |
Las Vegas | LOCATION | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
both | QUANTITY | 0.99+ |
three | QUANTITY | 0.99+ |
one | QUANTITY | 0.99+ |
over 150 different countries | QUANTITY | 0.98+ |
third thing | QUANTITY | 0.98+ |
Ben | PERSON | 0.98+ |
one piece | QUANTITY | 0.98+ |
one place | QUANTITY | 0.97+ |
John Box | PERSON | 0.97+ |
Las Vegas, Nevada | LOCATION | 0.97+ |
over 100,000 paying businesses | QUANTITY | 0.97+ |
over 500,000,000 users | QUANTITY | 0.96+ |
First | QUANTITY | 0.96+ |
Sign | ORGANIZATION | 0.96+ |
DROPBOX | ORGANIZATION | 0.95+ |
Cosmopolitan Hotel | ORGANIZATION | 0.93+ |
dozens of different use cases | QUANTITY | 0.93+ |
Drop box Company | ORGANIZATION | 0.92+ |
HelloSign | ORGANIZATION | 0.91+ |
Cosmopolitan | ORGANIZATION | 0.9+ |
Hello | TITLE | 0.89+ |
few minutes ago | DATE | 0.89+ |
a day | QUANTITY | 0.88+ |
Kuba | ORGANIZATION | 0.84+ |
Hello Sign | ORGANIZATION | 0.81+ |
up to two weeks | QUANTITY | 0.79+ |
Electronic Signature Day | EVENT | 0.79+ |
first | QUANTITY | 0.77+ |
Hello sign | TITLE | 0.76+ |
Inspire 19 | ORGANIZATION | 0.75+ |
Rahul Pawar, Commvault | Commvault GO 2018
>> Announcer: Live from Nashville, Tennessee, it's theCUBE, covering Commvault GO 2018. Brought to you by Commvault. >> Welcome back to Nashville, Tennessee, the home of hot chicken and Commvault GO this week. I'm Stu Miniman with my co-host, Keith Townsend. Keith wasn't expecting that one. >> I'm looking forward to the hot chicken. >> Absolutely. And happy to welcome to the program first-time guest, Rahul Pawar, who is the head of R&D, research and development, at Commvault. Thank you so much for joining us. >> Thanks for having me on this one. >> Alright, we said, like the hot chicken, I said we need to roll up our sleeves and really get into the sauce-- >> Rahul: Yes, yes. of what we're talking. Alright, enough of the puns on my standpoint. But tell us a little bit about R&D inside, what's your role, what's your team, what's your charter? >> So, we have a team of about 650 very dynamic, young engineers. And what my role, and I'm very excited about that role, is I get to talk with a lot of our customers and partners and understand their pain points. And the majority of my research comes from what the customer is really looking to do and what is hurting them, and trying to solve that and describe. And once I have a problem defined, the team is very, very intelligent at solving them and they come up with various ways to solve it. And then getting that customer satisfaction high is what gives me the high and that's really what's kept me at Commvault for over 17 years now. >> Yeah, 17 years, Rahul. I think back so, 17 years ago, I was working for a storage company. And we talked about data, but it was usually about storing data or protecting data. Now we're talking about how we can get more value out of data. One of the things I was looking at coming into this show is like, okay, you talk about the AI and the ML. Well, how does that fit into this environment? Maybe you can explain why is it different now in 2018? What can you do now that you wouldn't have been able to do 10 years or even five years ago? >> So Stu, you made a good point. Back up, especially, was make a copy, put it on tape, send it to somewhere. Iron mountain, typically. And that has changed now. Everything is available online all the time. And even our thermostat is much smarter than what it was five years back, so we really are expecting, everybody's expecting, a lot more from the retail that is available from all the information that is there and they want to make use of that. So backup can no longer be, hey, I'm backing up these five servers and go figure it out. Backup is now getting tons of VM's, tons of new application swapping in various cloud applications that are coming in. So the IT team is really, really in the middle of this data revolution and getting so much information thrown their way. So that data, and that data is the liquid gold, like Bob and I like to call it, and that has a lot of valuable information. It has information about your patterns, it has information about who is accessing what files, and should they really be accessing it, what data is really, really not needed, and what is the sensitive data that is lurking behind and it could become a problem for you? So that data is a goldmine and the systems and the hard disks are becoming so much cheaper. Storage has become so much cheaper, so having that data accessible all the time, we take it for granted. >> So Rahul, I'd like to say scale breaks things. When I was a young administrator, I literally had a spreadsheet to keep track of my tapes, of where my tapes were, what systems were backed up. So even if I lost my index and my software backup product, I could know where my tapes were at. Now, with organizations with petabytes and petabytes of data, how important is ML, AI to knowing where your data is at and how important is the index to that relationship? >> I really want to say that ML and AI has become what deduplication was five years back, and pretty much everybody is expecting you to have it. Like I said, if my car knows it, if my home knows it, my thermostat knows it, even my phone knows it, like where I'm going, like every week if I travel to a certain place and it knows it, it is something that is expected to be known. And our backup environment has become so dynamic. There's network failures and there's tons of things beyond the control of the backup admin, even the storage admin or the DB-ers or the app developers who are putting in there, that just come in place. And with all of that happening, you need a system that is learning from what is happening and being very smart about doing stuff. So, we learned from yesterday's failures or the failures that were on the backups, we look at the network load that is on right now, the disk load that is on right now, and adapt our backup schedules accordingly. So we know your SLAs. You're trying to get an SLA of a certain number of hours versus minutes, and based on that, we prioritize certain servers over others, or certain VM's that we see brand new over other VM's, and then VM's around certain data stores over others because we want to keep the load on the data storage server or even your network and the proxies minimum, but at the same time we know we are racing against the clock because we want everything to be backed up and even have a secondary copy and all of that. So there we are prioritizing and re-prioritizing our backups and schedules and everything. >> One of the challenges when you talk about automation is there's the technology and then there's the people and in the open to the keynote this morning, the poet was using the GPS analogy >> Yes. and talked about, okay, you have arrived. Well, the admins today, they kind of have their turf that they control versus do I trust that it's doing the job and can automate some of those things and I shouldn't have to worry about it. Does your team get involved in that dynamic? Because I know you listen to the customers how do you help bridge that gap and help? I think of autonomous cars, we said we will soon get to the point, sometime hopefully in the not-too-distant future, where it's not that I don't trust the computers, it's really that I trust them more than I do the people. >> Okay so I'll tell you, trust develops as you use it more. There's a reason why autonomous driving cars still have a steering wheel and a break because, I'm not sure whether I can trust it. But on the other hand, as time passes by, you really see the software in action and you want to see that its really doing the smart thing, and you yield control to it more and more. Like today, I'm like old era, so when I have something important I make an extra copy. Versus my kids, they are on Google files system or cloud files systems. They never even think about making an extra copy. The same thing is going to happen. We do have people who can take control and they can put on their priorities and all of that but we are saying, hey guys, you shouldn't be doing it we are here to help you and we are going to show you and in case you don't like it you can always put your brake on that self driving car or the self driving backup. >> So Rahul would we be remised if we had a researcher on theCUBE and we didn't talk about the art of the possible looking a few years ahead, or even a couple of years ahead. If you've ever been a backup administrator, nothing beats bandwidth. The bandwidth of a station wagon full of tapes. However in this modern digital transformative environment, we have to get data to the cloud as soon as possible. What are some of the unique ways Commvault is tackling getting Big Data from where it's ingested and to the cloud provider so that we can take advantage of stuff like AI, ML, base workloads, and Amazon or Google? >> One thing we have done with the cloud or anything is we have always kept data independent of where it is going. So even if I am taking data from on-print to a cloud provider we will play to their full strength, but we will still keep the data independent where, in case you want to move from one cloud window to another you have that flexibility with Commvault. As for us taking the cloud and its efficiency and using its efficiency what we have done is we always only send re-duplicated encrypted data to the cloud and we have various ways of consuming the cloud. So the cloud is where your storage has become so cheap that you don't have to think about it. In fact, I had a customer who got rid of their whole secondary DR data center, and now they are using the cloud as their DR location and every three months they do the DR test with Commvault, wherein they bring the infrastructure machines up, and its all scripted and orchestrated, they bring the infrastructure machines up, followed by all the VM's and the applications in a certain order. Like database has to come up before AD has to come before exchange anytime it has to come before web server. So all of that happens after their testing is done they have SLA's of four hours and 24 hours on certain servers. After all of that is done they power it off, they get rid of the infrastructure, and then they are back to paying only the storage bill on the cloud. That's just one usage but the cloud has made life so flexible that I don't have to think about my rack space and where does the server go and when do I order it and when does it ship, If I need something I experiment with it, I give it more memory and size and do stuff. Protecting that data and the cloud, and protecting it well, is what we do. We have taken use of all the technologies, like replicating across regions, taking it and replicating it across clouds we have done all of that. >> Keith: Well let's talk about the importance of metadata in all of that. So if I have bits and pieces of data distributed across cloud providers on-prem, how do I keep track of that data? >> That's where our furi index comes in play key because all that is happening is the data is spreading faster than some of the cloud growth because you have data with so many copies and people have made extra copies just to be safe that keeping track of everything, and knowing what is where, and who has access to what, and people change roles, some people leave, who has access after all of that is done? It's very vital and critical for an organization to function So our furi index is keeping track of not just the bare minimum of who has the files and what the files are what we have done is we have worked with several customers where we have allowed them to insert their own custom tags and custom information along with the data. So it's not just the file and file information or the file content awareness. They are able to keep third party extra data along with every piece that is automatically queried from their other databases and inserted in that file. So those are the custom properties that are tagged a lot. >> Stu: Yeah its interesting, you think about metadata I remember five or 10 years ago we were talking about the importance of metadata, but it seems like it's the convergence of the intelligence and the AI paired with that, because it used to be, oh, make sure you tag your files or set up your ontologies or things like that, and now, on our phones, it does a lot of that for us and therefore the enterprise is following a similar methodology. Did we hit a certain kind of tipping-point recently, or is it just some of these technologies coming together? >> I think a lot of that was in the making. We used to have this technology called index cards, where we were keeping track of things, who ever thinks of that, right? Now everything is by search, and that's the new normal. Searching for your thing, thinking that somebody will know what I'm trying to do and telling me ahead of time is where the future is. That's what we are trying to keep up with. >> You're saying my kids don't know the Dewey decimal system because they have Amazon and you know, and now we have a similar thing in business. >> It really to strikes you, for a calculator on a Windows desktop when the kids go and search on the web for a calculator instead of using the calculator app on the desktop, you really know that things have changed and shifted a lot. >> Keith: So thinking about that change and shift before I'm able to add these custom tags to net new data, I'm going to throw you a softball from a use case perspective, but it's a hard technical challenge is, I have 20 years of Commvault data that are data I've backed up with Commvault. Wouldn't it be great if I could teach an ML or AI algorithm to go back and tag that data based on how I tag new data, any requests for that or roadmaps to add that type of capability? >> Alright so if you are a 20 year old Commvault veteran customer, first of all, thank you. (laughing) >> Secondly, the fact that you're index is there and we have built on our existing index and added a lot more attributes to it, we already know a lot about you. If you are starting to beam to our cloud, we know a lot more about how your backups are, and how much you are backing up, and how your licensing is, and what are the typical workloads, and the top error rates, and how the health conditions are, and a lot of that. That is even on your own server dashboard. You don't have to beam it to any public cloud. You could see it on your own dashboard, all those statistics. So we already know all of that information. What we have come and started doing is we are inserting even more and more pieces of intelligence that we are finding because things have changed over the last 20 years. So what used to be just file metadata, user and all of that, now we have a lot more attributes that the file has. >> One of the biggest challenges we see is, I'm a networking person, and when I go to like the Cisco show this year, the network administrator, most of the network that they are responsible for isn't under their purview, and I think we have the same thing in data, a lot of the data that I'm concerned about in my business it's no longer in my four walls and it's spread out in so many different environments. Opportunity? Challenge? Both? >> For us it's very exciting and opportunistic. For our customers and a lot of IT admins if you are dealing with multiple tools to handle that kind of thing its a big challenge. I have met several customers and they wouldn't admit it, but they know that even though their company policy is not to use certain clouds, the people are using it. If their company policy is not to use some doc sharing, people are using it. So, there are two ways you can look at it. You could forget it and then risk. Or you could accept it and analyze everything with Commvault and go ahead. >> So let's talk about Commvault and this ability to know where your data is at with adjacent technology you know data protection is about protecting the data not just from 'oops I lost my data' or even ran somewhere specifically, but security. What is the role of the index or metadata In protecting your data from intruders? >> So as far as 'ran somewhere' is concerned, we have taken a few things. One is, and we are not a 'ran somewhere' production per se, but what we have done is because we are in there and we look at your backup, how often they happen, how much data is changing, adjusted that to seasonality we know per quarter if you have a lot of files changing versus weekends and how things change, adjusted to seasonality if we something that is out of the norm, we are going to alert you. At that point that alert is an actionable alert where you could say, hey, I want to disable data edging on this particular client, or I want to take away access of someone on that. So even data risks like a rogue admin or an accidental admin what we did is we have added almost a two-signature kind of stuff. So if somebody accidentally deletes a client or a storage policy, one admin won't be able to do that. The business workflow says: 'do you also have authentication from Stu?' That 'hey, Keith is trying to delete this'. That's to approve of this and it's and email to which you reply 'yes' or 'no'. The moment it is done, it goes ahead and it deletes it versus it may stop and 'oops' that was an accident Keith didn't really want to do that. So there's that aspect, the second thing is our own media, what we have done is it is completely protected with our drivers, wherein you can't get to it. Only Commvault authenticated processes are able to write to write to our media. When the customer came in this morning and was talking about it, all their infrastructure was affected, but Commvault really hasn't because we had it secured and the ransomer couldn't attack that because they simply were unable to write to it. >> Stu: Alright well Rahul Pawar we really appreciate you giving us an update. Look forward to catching up in the future where we'll see exactly where the research is going. Alright, for Keith Townsend I'm Stu Miniman, we'll be back with lots more coverage here from Commvault GO, in Nashville, Tenessee. Thanks for watching theCUBE. >> Rahul: Thank you Keith, thank you Stu. >> Keith: Thank you.
SUMMARY :
Brought to you by Commvault. the home of hot chicken and Commvault GO this week. And happy to welcome to the program first-time guest, Alright, enough of the puns on my standpoint. and they come up with various ways to solve it. and the ML. So that data is a goldmine and the systems and how important is the index to that relationship? but at the same time we know we are racing against the clock and talked about, okay, you have arrived. and in case you don't like it you can always put your brake and to the cloud provider so that we can take advantage So the cloud is where your storage has become so cheap Keith: Well let's talk about the importance because all that is happening is the data and the AI paired with that, because it used to be, oh, Now everything is by search, and that's the new normal. and now we have a similar thing in business. It really to strikes you, I'm going to throw you a softball Alright so if you are a 20 year old Commvault and how the health conditions are, and a lot of that. One of the biggest challenges we see is, is not to use certain clouds, the people are using it. So let's talk about Commvault and this ability to know that is out of the norm, we are going to alert you. Look forward to catching up in the future
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Keith Townsend | PERSON | 0.99+ |
Keith | PERSON | 0.99+ |
Rahul Pawar | PERSON | 0.99+ |
2018 | DATE | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Stu Miniman | PERSON | 0.99+ |
20 years | QUANTITY | 0.99+ |
Rahul | PERSON | 0.99+ |
four hours | QUANTITY | 0.99+ |
Commvault | ORGANIZATION | 0.99+ |
five servers | QUANTITY | 0.99+ |
ORGANIZATION | 0.99+ | |
20 year old | QUANTITY | 0.99+ |
Both | QUANTITY | 0.99+ |
yesterday | DATE | 0.99+ |
17 years ago | DATE | 0.99+ |
Stu | PERSON | 0.99+ |
five | DATE | 0.99+ |
second thing | QUANTITY | 0.99+ |
17 years | QUANTITY | 0.99+ |
Nashville, Tennessee | LOCATION | 0.98+ |
first-time | QUANTITY | 0.98+ |
Bob | PERSON | 0.98+ |
Cisco | ORGANIZATION | 0.98+ |
One | QUANTITY | 0.98+ |
10 years ago | DATE | 0.98+ |
five years back | DATE | 0.98+ |
today | DATE | 0.97+ |
24 hours | QUANTITY | 0.97+ |
two ways | QUANTITY | 0.97+ |
over 17 years | QUANTITY | 0.97+ |
about 650 | QUANTITY | 0.96+ |
this morning | DATE | 0.96+ |
five years ago | DATE | 0.96+ |
one | QUANTITY | 0.96+ |
two-signature | QUANTITY | 0.95+ |
Secondly | QUANTITY | 0.94+ |
Dewey | PERSON | 0.94+ |
one cloud | QUANTITY | 0.92+ |
Windows | TITLE | 0.91+ |
furi index | TITLE | 0.9+ |
this week | DATE | 0.89+ |
tons of VM's | QUANTITY | 0.87+ |
last 20 years | DATE | 0.86+ |
every three months | QUANTITY | 0.83+ |
tons of new application | QUANTITY | 0.83+ |
Commvault GO | ORGANIZATION | 0.8+ |
this year | DATE | 0.79+ |
One thing | QUANTITY | 0.78+ |
R&D | ORGANIZATION | 0.71+ |
dynamic, | QUANTITY | 0.69+ |
Nashville, Tenessee | LOCATION | 0.68+ |
years | QUANTITY | 0.66+ |
Commvault GO 2018 | EVENT | 0.57+ |
things | QUANTITY | 0.57+ |
first | QUANTITY | 0.55+ |
10 | QUANTITY | 0.53+ |
years | DATE | 0.52+ |
Action Item Quick Take | Jim Kobielus - Mar 2018
(Upbeat music) (Coughs) >> Hi, I'm Peter Burris with another Wikibooks action item quick take. Jim Kobielus, IBM's up to some good with new tooling for managing data. What's going on? >> Yes Peter, it's not brand new tooling but its important because it actually is a foreshadowing of what's going to be universal. I think it's a capability for programming the uni grade as we've been discussing. Essentially this week at the IBM Signature event Sam Whitestone of IBM discussed with Dave Valente a product they have called Queryplex which is on the market for money even more. Essentially it's a data virtualization environment for distributor query processing in a mesh fabric. And what's important about Queryplex to understand, in a uni grade context, is it enables link binding distributed computation to find the lowest latency path between... Across very fairly complex edge clouds. So to speed up queries no matter where the data may reside and so forth in a fairly real time dynamic fashion. So I think the important things to know about Queryplex are A- that it prioritizes connections with lowest latency based on ongoing computations that are performed and is able to distribute this computation to find the lowest path across the network to prevent the query... The computation controller from being a bottle neck. I think that's a fundamental, architectural capability we're going to see more of with the advent or the growth of the uni grade as a broad concept for building up a distributor cloud computing environment. >> And very importantly there are still a lot of applications that run the businesses on top of IBM machines. Jim Kabielus thanks very much talking about IBM Queryplex and some of the next steps coming. This is Peter Burris with another Wikibooks action item quick take. (upbeat music)
SUMMARY :
Hi, I'm Peter Burris with this computation to find the lowest path a lot of applications that run
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Jim Kobielus | PERSON | 0.99+ |
Jim Kabielus | PERSON | 0.99+ |
Sam Whitestone | PERSON | 0.99+ |
Dave Valente | PERSON | 0.99+ |
Peter Burris | PERSON | 0.99+ |
IBM | ORGANIZATION | 0.99+ |
Mar 2018 | DATE | 0.99+ |
Peter | PERSON | 0.99+ |
this week | DATE | 0.96+ |
IBM Signature | EVENT | 0.93+ |
Wikibooks | ORGANIZATION | 0.69+ |
Queryplex | TITLE | 0.59+ |
Wikibooks | TITLE | 0.55+ |