Haseeb Budhani, Rafay & Rakesh Singh, Regeneron | AWS re:Invent 2022
(upbeat music) >> Welcome back to theCUBE's live coverage of AWS re:Invent. Friends, it's good to see you. Lisa Martin here with Dave Vellante. This is our fourth day of CUBE wall-to-wall coverage, Dave. I can't believe it. And the expo hall is still going incredibly strong. >> Yeah, it is. It feels like the biggest re:Invent ever. I'm told it's almost as big as 2019. I don't know, maybe I was half asleep at 2019. That's very possible. But I'm excited because in 2017 Andy Jassy came on theCUBE and he said if Amazon had to do it all over again, if it knew then what it had now, we would've done the whole thing in containers or using Lambda, using serverless and using containers. Didn't have that opportunity back then. And I'm excited 'cause Rafay Systems is someone we've worked with a lot as an innovator in this space. >> Yep, and we're going to be talking with Rafay again. I think it's your 10th time Haseeb on the show >> Like once or twice. >> And a great customer who's going to talk about their serverless journey. Haseeb Budhani joins us once again, the CEO of Rafay. Great to see you. Rakesh Singh is here as well, the Head of Cloud and DevOps at Regeneron. Guys, it's great to have you on the program. How you feeling on day four of re:Invent? >> Excitement is as high as ever basically. >> Isn't it amazing? >> Rakesh: That's true. >> Haseeb: I just need some sleep. >> I'm with you on that. Caffeine and sleep. >> So many parties. So many meetings, oh my God. >> But the great thing is, Haseeb, that people want to engage with you. They're loving what Rafay is doing. You guys are a great testament to that, which we're going to uncover on the show. What are some of the things that you're hearing in the booth from customers? What's been some of the feedback? >> So firstly, as I said, it feels like the biggest one ever. I've been coming to re:Invent a long time and I mean, I know the numbers say it's not, but oh my God, this is a lot of people. Every time we've spoken over the last year and the point I always make to you, and we've spoken enough time about this is that enterprises are truly adopting this idea of Kubernetes containers, serverless, et cetera. And they're all trying to figure out what is the enterprise strategy for these things? They're thinking beyond technology and thinking operationalization of these technologies. And that's not the same thing. There's a toy and then there's the real thing. And that's not the same thing. And that's the gap that every enterprise customer I talked to and the booth traffic has been just amazing. I mean, but coming here I was thinking, my God, this is really expensive. And I'm thinking, wow, this is a great investment. Because we met such amazing companies who all essentially are saying exactly the same thing, which is as we go and productize and bring our high value applications to the modern infrastructure space, like Kubernetes, Lambda, et cetera, solving for the automation governance is really, really hard because, well, at one point, I guess when the economy was doing crazy well, I could keep hiring people, but I can't do that anymore either. So they're out looking for automation strategies that allow them to do more with the teams they have. And that's exactly what Rafay is here for. >> Yeah. Lisa, Adam Selipsky in his keynote, I love the, he said, "If you want to save money, the cloud is the place to do it." >> Exactly. Yep. Let's talk about Regeneron. Everyone knows it's a household word especially over the last couple of years, but talk about, Rakesh, Regeneron as a technology company that delivers life-saving pharmaceuticals. And where does cloud and Rafay fit into your strategy? >> So cloud has been a backbone of our compute strategy within Regeneron for a very long time now. The evolution from a traditional compute structure to more serverless compute has been growing at a rapid pace. And I would say like we are seeing exponential growth within the adaption of the compute within containers and Kubernetes world. So we've been on this journey for a long time and I think it's not stopping anytime soon. So we have more and more workload, which is running on Kubernetes containers and we are looking forward to our partnership with Rafay to further enhance it, as Haseeb mentioned, the efficiency is the key. We need to do more with less. Resourcing is critical and cloud is evolved from that journey that do more things in a more efficient manner. >> That was the original catalyst as we got to help our development team, be more productive. >> That's correct. >> Eliminate the heavy lifting. And then you started presumably doing some of the less heavy, but still heavy lifting and we talked off camera and then you're increasingly moving toward serverless. >> Rakesh: That's correct. >> Can you describe that journey? What that's like? >> So I think like with the whole adoption that things are taking a much faster pace. Basically we are putting more compute onto containers and the DevOps journey is increasingly getting more, more faster. >> Go ahead. 'Cause I want to understand where Rafay sits in this whole equation. I was talking about, I'm not a developer, but I was talking to developer yesterday trying to really understand the benefits of containers and serverless and I said, take me through what you have to do when you're using containers. He said, I got to build the container image then I got to deploy an EC2 instance where I got to choose and I got to allocate memory of the fence the app in a VM then I got to run the computing instance against the app. And then, oh by the way, I got to pay 'cause all that EC2 that whole time. Depending on how you approach serverless you're going to eliminate a lot of those steps. >> That is correct. So what we do is basically like in a traditional sense, the computer is sitting idle at quite a lot basically. >> But you're paying. >> And you're still paying for that. Serverless technologies allows us to use the compute as needed basis. So whenever you need it, it is available. You run your workload on that and after that it shuts down or goes to minimal state and you don't need to pay as much as your paying. >> And then where do you guys fit in that whole equation? >> Look, serverless has a paradigm. If you step back from the idea of containers versus Lambda or whatever functions. The idea should be that the list you just read out of what developers have to do. Here's what they really should do. They should write their code, they should check it in, and they never have to think about it again. That should be the case. If they want to debug their application, there should be a nice front end where they go and they interact with their application and that's it. What is Kubernetes? I don't care. That's the right answer. And we did not start this journey as an industry there because usually the initial adopters are developers who do the heavy lifting. Developers want to learn, they want to solve these problems. But then eventually the expectation is that the platform organization and an enterprise is going to own this platform for me so I can go back to doing my job, which is writing code. And that's where Rakesh's team comes in. So Rakesh team is building the standard at Regeneron. Whether you're writing a long-lasting app, which is going to run in a container or you're going to write an event-driven application, which is going to be a function, whatever. You write your app, we will give you the necessary tooling and plumbing to take care of all these things. And this is my problem. My being Rakesh. Rakesh is my customer. He has his customers. We as Rafay, A, we have to make Rakesh's system successful because we have to give them right automation to do all these things so that he can service hundred, or in his case, thousands and thousands of different individuals. But then collectively, we have to make sure that the developer experience is optimal so that truly they just write their code and EC2, they don't want to deal with this. In fact, on Monday evening, in the Kubernetes keynote by Barry Cooks, one of the things he said was that in a CIO sort of survey they did, CIO said, 80% of the time of developers is wasted on infrastructure stuff and not on innovation. We need to bring that 80% back so that a hundred percent of the work is on innovation and today it's not. >> And that's what you do. >> That's what we do. >> In your world as a developer, I only have to worry about my writing my code and what functions I'm going to call. >> That is correct. And it is important because the efficiencies of a developer need to be focused on doing the things which business is asking for. The 80% of the work like to make sure the things are secure, they're done the right way, the standards are followed, scanning part of it, that work if we can offload to a platform, for example, Rafay, saves a lot of works, a lot of work cycles from the developers perspective. >> Thank you for that. It was nice little tutorial on the benefits. >> Absolutely. So you transform the developer experience. >> That's correct. >> How does that impact Regeneron overall business? We uplevel that. Give me that view. >> So with that, like what happens, the key thing is the developers productivity increases. We are able to do more with less. And that is the key thing to our strategy that like with the increase in business demand, with the increase in lot of compute things, which we are doing, we need to do and hiring resources is getting more difficult than ever. And we need to make sure that we are leveraging platforms and tools basically to do, enable our developers to focus on key business activity rather than doing redundant things and things which we can leverage some other tooling and platform for that business. >> Is this something in terms of improving the developer experience and their productivity faster time to market? Is this accelerating? >> That's correct. >> Is this even like accelerating drug discovery in some cases? >> So COVID is like a great example for that. Like we were able to fast track our drug discovery and like we were able to turn it into an experience where we were able to discover new drugs and get it to the market in a much faster pace. That whole process was expedited using these tools and processes basically. So we are very proud of that. >> So my understanding is you're running Rafay with EKS. A lot of choices out there. Why? Why did you choose to go in that direction? >> So Regeneron has heavily invested in cloud recently, over the years basically. And then we are focusing on hybrid cloud now that we we are like, again, these multiple cloud providers of platforms which are coming in are strategies to focus on hybrid cloud and Rafay is big leader in that particular space where we felt that we need to engage or partner with Rafay to enable those capabilities, not just on AWS, but across the board. One single tool, one single process, one single knowledge base helps us achieve more efficiencies. >> Less chaos, less complexity. >> That's correct. Let's say when you're in customer conversations, which I know you've had many this week, but you probably do that all the time. Regeneron is a great use case for Rafay. It's so tangible, life sciences. We all get that, especially coming out of the pandemic. What do you say to customers are the top three differentiators of Rafay and why they should go Rafay on top of EKS? >> What's really interesting about these conversations is that, look, we have some pretty cool features in our product. Obviously we must have something interesting otherwise nobody would buy our product. And we have access management and zero trust models and cluster provisioning, all these very nice things. But it always comes down to exactly the same thing, which is every large enterprise that started a journey, independent or Rafay because they didn't know who we were, it's fine. Last year we were a young company, now we are a larger company and they all are basically building towards a roadmap which Rafay truly understands. And in my opinion, and I'm confident when I say this, we understand their life, their journey better than any other company in the market. The reason why we have the flurry of customers we have, the reason why the product has the capacity that it does is because for whatever reason, look, it's scale lock. That's for the history books. But we have complete clarity on what a pharmaceutical company or financial customers company or a high tech company the journey they will take to the cloud and automation for modern infrastructure, we get it. And what I'm selling them is the is the why, not the what. There's a lot of great answers for the what? What do we do? Rakesh doesn't care. I mean, he's trying to solve a bigger problem. He's trying to get his researchers to go faster. So then when they want to run a model, they should be able to do it right now. That's what he cares about. Then he looks for a tool to solve the business problem. And we figured out how to have that conversation and explain why Rafay helps him, essentially multiply the bandwidth that he has in his organization. And of course to that end we have some great technology/ But that's a secondary issue, the first, to me the why is more important than the what. And then we talk about how, which he has to pay us money. That's the how. But yeah, we get there too. But look, this is the important thing. Every enterprise is on exactly the same journey, Lisa. And that if you think about it from just purely economic efficiencies perspective that is not a good investment for our industry. If everybody's solving the same problem that's a waste of resources. Let's find a way to do, what is the point of the cloud? We used to all build data centers. That was not efficient. We all went to the cloud because it's more efficient to have somebody else, AWS, solve this problem for us so we can now focus on the next level problem. And then Rafay solving that problem so that he can focus on his drug discovery, not on Kubernetes. >> That's correct. It's all about efficiencies. Like doing things, learn from each other's experience and build upon it. So the things have been solved. One way you need to leverage that, reuse it. So the principles are the same. >> So then what's next? You had done an amazing job transforming the company. You're facilitating drug discovery faster than ever before. From an infrastructure perspective, what's next on your journey? >> So right now the roadmap what we have is basically talking about making sure that the workload are running more efficient, they're more secure. As we go into these expandable serverless technology, there are more challenging opportunities for us to solve. Those challenges are coming up. We need to make sure that with the new, the world we are living in, we are more securely doing stuff what we were doing previously. More efficiencies is also the key and more distributed. Like if we can leverage the power of cloud in doing more things on demand is on our roadmap. And I think that is where we are all driving. >> And when you said hybrid, you're talking about connecting to your on-prem tools and data? How about cross cloud? >> We are invested in multiple cloud platform itself and we are looking forward to leveraging a technology, which is truly cloud native and we can leverage things together on that. >> And I presume you're helping with that, obviously. >> Last question for both of you. We're making an Instagram reel. Think of this as a sizzle reel, like a 32nd elevator pitch. Question, first one goes to you, Rakesh. If you had a bumper sticker, you put it on, I don't know, say a DeLorean, I hear those are coming back. What would it say about Regeneron as a technology company that's delivering therapeutics? >> It's a tough question, but I would try my best. The bumper sticker would say, discover drug more faster, more efficient. >> Perfect. Haseeb, question about Rafay. What's the bumper sticker? If you had a billboard in on Highway 101 in Redwood City about Rafay and what it's enabling organizations enterprises across the globe to achieve, what would it say? >> I'll tell you what our customers say. So our customers call us the vCenter for Kubernetes and we all know what a vCenter is. We all know why vCenter's so amazingly successful because it takes IT engineers and gives them superpowers. You can run a data center. What is the vCenter for this new world? It us. So vCenter is obviously a trademark with our friends at VMware, so that's why I'm, but our customers truly call us the vCenter for Kubernetes. And I think that's an incredible moniker because that truly codifies our roadmap. It codifies what we are selling today. >> There's nothing more powerful and potent in the voice of the customer. Thank you both for coming on. Thank you for sharing the Regeneron story. Great to have you back on, Haseeb. You need a pin for the number of times you've been on theCUBE. >> At least a gold star. >> We'll work on that. Guys, thank you. We appreciate your time. >> Haseeb: Thank you very much. >> For our guests and for Dave Vellante, I'm Lisa Martin. You're watching theCUBE, the leader in live enterprise and emerging tech coverage. (upbeat music)
SUMMARY :
And the expo hall is still It feels like the biggest re:Invent ever. Yep, and we're going to again, the CEO of Rafay. Excitement is as I'm with you on that. So many meetings, oh my God. What are some of the and the point I always make to you, the cloud is the place to do it." especially over the last couple of years, We need to do more with less. as we got to help our development some of the less heavy, and the DevOps journey is increasingly of the fence the app in a VM the computer is sitting idle and you don't need to pay is that the platform I only have to worry The 80% of the work like to on the benefits. So you transform the developer experience. How does that impact And that is the key thing to our strategy and get it to the market go in that direction? not just on AWS, but across the board. are the top three differentiators of Rafay And of course to that end we So the things have been solved. So then what's next? sure that the workload and we are looking forward And I presume you're Question, first one goes to you, Rakesh. but I would try my best. across the globe to What is the vCenter for this new world? and potent in the voice of the customer. We appreciate your time. the leader in live enterprise
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Lisa Martin | PERSON | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
Haseeb | PERSON | 0.99+ |
Rakesh | PERSON | 0.99+ |
Regeneron | ORGANIZATION | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
80% | QUANTITY | 0.99+ |
Lisa | PERSON | 0.99+ |
Rafay | PERSON | 0.99+ |
Adam Selipsky | PERSON | 0.99+ |
thousands | QUANTITY | 0.99+ |
Andy Jassy | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Rakesh Singh | PERSON | 0.99+ |
hundred | QUANTITY | 0.99+ |
Haseeb Budhani | PERSON | 0.99+ |
Monday evening | DATE | 0.99+ |
Last year | DATE | 0.99+ |
Rafay | ORGANIZATION | 0.99+ |
2017 | DATE | 0.99+ |
Barry Cooks | PERSON | 0.99+ |
10th time | QUANTITY | 0.99+ |
2019 | DATE | 0.99+ |
first | QUANTITY | 0.99+ |
both | QUANTITY | 0.99+ |
Highway 101 | LOCATION | 0.99+ |
yesterday | DATE | 0.99+ |
EC2 | TITLE | 0.99+ |
twice | QUANTITY | 0.99+ |
Rafay Systems | ORGANIZATION | 0.99+ |
Lambda | TITLE | 0.99+ |
Rakesh | ORGANIZATION | 0.99+ |
once | QUANTITY | 0.99+ |
fourth day | QUANTITY | 0.99+ |
hundred percent | QUANTITY | 0.99+ |
last year | DATE | 0.98+ |
Redwood City | LOCATION | 0.98+ |
VMware | ORGANIZATION | 0.98+ |
this week | DATE | 0.97+ |
one | QUANTITY | 0.96+ |
EKS | ORGANIZATION | 0.96+ |
first one | QUANTITY | 0.95+ |
ORGANIZATION | 0.94+ | |
pandemic | EVENT | 0.94+ |
one single process | QUANTITY | 0.94+ |
Kubernetes | ORGANIZATION | 0.93+ |
vCenter | TITLE | 0.92+ |
zero trust | QUANTITY | 0.91+ |
firstly | QUANTITY | 0.91+ |
one point | QUANTITY | 0.91+ |
day four | QUANTITY | 0.89+ |
cloud | ORGANIZATION | 0.88+ |
three differentiators | QUANTITY | 0.87+ |
One single tool | QUANTITY | 0.86+ |
today | DATE | 0.86+ |
Haseeb Budhani, Rafay & Santhosh Pasula, MassMutual | KubeCon + CloudNativeCon NA 2022
>>Hey guys. Welcome back to Detroit, Michigan. Lisa Martin and John Furrier here live with the cube at Coan Cloud Native Con North America. John, it's been a great day. This is day one of our coverage of three days of coverage. Kubernetes is growing up. Yeah, it's maturing. >>Yeah. We got three days of wall to wall coverage, all about Kubernetes. We about security, large scale, cloud native at scale. That's the big focus. This next segment's gonna be really awesome. You have a fast growing private company and a practitioner, big name, blue chip practitioner, building out next NextGen Cloud first, transforming, then building out the next level. This is classic of what we call super cloud-like, like interview. It's gonna be great. I'm looking forward >>To this anytime we can talk about Super Cloud. All right, please welcome back. One of our alumni, Bani is here, the CEO of Rafe. Great to see you Santos. Ula also joins us, the global head of Cloud SRE at Mass Mutual. Ge. Great to have you on the program. Thanks >>For having us. Thank you for having me. >>So Steve, you've been on the queue many times. You were on just recently with the momentum that that's around us today with the maturation of Kubernetes, the collaboration of the community, the recognition of the community. What are some of the things that you're excited about with on, on day one of the show? >>Wow, so many new companies. I mean, there are companies that I don't know who are here. And I, I, I live in this industry and I'm seeing companies that I don't know, which is a good thing. I mean, it means that the, the community's growing. But at the same time, I'm also seeing another thing, which is I have met more enterprise representatives at this show than other coupons. Like when we hung out at, you know, in Valencia for example, or even, you know, other places. It hasn't been this many people, which means, and this is, this is a good thing that enterprises are now taking Kubernetes seriously. It's not a toy. It's not just for developers. It's enterprises who are now investing in Kubernetes as a foundational component, right. For their applications going forward. And that to me is very, very good. >>Definitely becoming foundational. >>Yep. Well, you guys got a great traction. We had many interviews at the Cube and you got a practitioner here with you. You guys are both pioneering kind of what I call the next gen cloud. First you gotta get through gen one, which you guys done at Mass Mutual, extremely well, take us through the story of your transformation. Cause you're on the, at the front end now of that next inflection point. But take us through how you got here. You had a lot of transformation success at Mass Mutual. >>So I was actually talking about this topic few, few minutes back, right? And, and the whole cloud journey in big companies, large financial institutions, healthcare industry or, or our insurance sector. It takes generations of leadership to get, to get to that perfection level. And, and ideally the, the, the cloud for strategy starts in, and then, and then how do you, how do you standardize and optimize cloud, right? You know, that that's, that's the second gen altogether. And then operationalization of the cloud. And especially if, you know, if you're talking about Kubernetes, you know, in the traditional world, you know, almost every company is running middleware and their applications in middleware. And then containerization is a topic that come, that came in. And docker is, is you know, basically the runtime containerization. So that came in first and from Docker, you know, eventually when companies started adopting Docker, Docker Swarm is one of the technologies that they adopted. And eventually when, when, when we were taking it to a more complicated application implementations or modernization efforts, that's when Kubernetes played a key role. And, and Hasi was pointing out, you know, like you never saw so many companies working on Kubernetes. So that should tell you one story, right? How fast Kubernetes is growing and how important it is for your cloud strategy. So, >>And your success now, and what are you thinking about now? What's on your agenda now as you look forward? What's on your plate? What are you guys doing right now? >>So we are, we are past the stage of, you know, proof of concepts, proof of technologies, pilot implementations. We are actually playing it, you know, the real game now. So in the past I used the quote, you know, like, hello world to real world. So we are actually playing in the real world, not, not in the hello world anymore. Now, now this is where the real time challenges will, will pop up, right? So if you're talking about standardizing it and then optimizing the cloud and how do you put your governance structure in place? How do you make sure your regulations are met? You know, the, the, the demands that come out of regulations are met and, and how, how are you going to scale it and, and, and while scaling, however you wanna to keep up with all the governance and regulations that come with it. So we are in that stage today. >>Has Steve talked about, you talked about the great evolution of what's going on at Mass Mutual has talked a little bit about who, you mentioned one of the things that's surprising you about this Coan and Detroit is that you're seeing a lot more enterprise folks here who, who's deciding in the organization and your customer conversations, Who are the deci decision makers in terms of adoption of Kubernetes these days? Is that elevating? >>Hmm. Well this guy, >>It's usually, you know, one of the things I'm seeing here, and John and I have talked about this in the past, this idea of a platform organization and enterprises. So consistently what I'm seeing is, you know, somebody, a cto, CIO level, you know, individual is making a determin decision. I have multiple internal buss who are now modernizing applications. They're individually investing in DevOps. And this is not a good investment for my business. I'm going to centralize some of this capability so that we can all benefit together. And that team is essentially a platform organization and they're making Kubernetes a shared services platform so that everybody else can come and, and, and sort of, you know, consume it. So what that means to us is our customer is a platform organization and their customer is a developer. So we have to make two constituencies successful. Our customer who's providing a multi-tenant platform, and then their customer who's a developer, both have to be happy. If you don't solve for both, you know, constituencies, you're not gonna be >>Successful. You're targeting the builder of the infrastructure and the consumer of that infrastructure. >>Yes sir. It has to be both. Exactly. Right. Right. So, so that look, honestly, that it, it, you know, it takes iterations to figure these things out, right? But this is a consistent theme that I am seeing. In fact, what I would argue now is that every enterprise should be really stepping back and thinking about what is my platform strategy. Cuz if you don't have a platform strategy, you're gonna have a bunch of different teams who are doing different things and some will be successful and look, some will not be. And that is not good for business. >>Yeah. And, and stage, I wanna get to you, you mentioned that your transformation was what you look forward and your title, global head of cloud sre. Okay, so sre, we all know came from Google, right? Everyone wants to be like Google, but no one wants to be like Google, right? And no one is Google, Google's a unique thing. It's only one Google. But they had the dynamic and the power dynamic of one person to large scale set of servers or infrastructure. But concept is, is, is can be portable, but, but the situation isn't. So board became Kubernetes, that's inside baseball. So you're doing essentially what Google did at their scale you're doing for Mass Mutual. That's kind of what's happening. Is that kind of how I see it? And you guys are playing in there partnering. >>So I I totally agree. Google introduce, sorry, Ty engineering. And, and if you take, you know, the traditional transformation of the roles, right? In the past it was called operations and then DevOps ops came in and then SRE is is the new buzzword. And the future could be something like product engineering, right? And, and, and in this journey, you know, here is what I tell, you know, folks on my side like what worked for Google might not work for a financial company, might not work for an insurance company. So, so, so it's, it's okay to use the word sre, but but the end of the day that SRE has to be tailored down to, to your requirements and and, and the customers that you serve and the technology that you serve. Yep. >>And this is, this is why I'm coming back, this platform engineering. At the end of the day, I think SRE just translates to, you're gonna have a platform engineering team cuz you gotta enable developers to be producing more code faster, better, cheaper guardrails policy. So this, it's kind of becoming the, you serve the business, which is now the developers it used to serve the business Yep. Back in the old days. Hey, the, it serves the business. Yep. Which is a terminal, >>Which is actually true >>Now it the new, it serves the developers, which is the business. Which is the business. Because if digital transformation goes to completion, the company is the app. Yep. >>And the, you know, the, the hard line between development and operations, right? So, so that's thining down over the time, you know, like that that line might disappear. And, and, and that's where asari is fitting in. >>Yeah. And they're building platforms to scale the enablement up that what is, so what is the key challenges you guys are, are both building out together this new transformational direction? What's new and what's the same, The same is probably the business results, but what's the new dynamic involved in rolling it out and making people successful? You got the two constituents, the builders of the infrastructures and the consumers of the services on the other side. What's the new thing? >>So the new thing if, if I may go fast these, so the faster market to, you know, value, right? That we are bringing to the table. That's, that's very important. You know, business has an idea. How do you get that idea implemented in terms of technology and, and take it into real time. So that journey we have cut down, right? Technology is like Kubernetes. It makes, it makes, you know, an IT person's life so easy that, that they can, they can speed up the process in, in, in a traditional way. What used to take like an year or six months can be done in a month today or or less than that, right? So, so there's definitely the losses, speed, velocity, agility in general, and then flexibility. And then the automation that we put in, especially if you have to maintain like thousands of clusters, you know, these, these are today like, you know, it is possible to, to make that happen with a click off a button. In the past it used to take like, you know, probably, you know, a hundred, a hundred percent team and operational team to do it. And a lot of time. But, but, but that automation is happening. You know, and we can get into the technology as much as possible. But, but, you know, blueprinting and all that stuff made >>It possible. Well say that for another interview, we'll do it take time. >>But the, the end user on the other end, the consumer doesn't have the patience that they once had. Right? Right. It's, I want this in my lab now. Now, how does the culture of Mass Mutual, how is it evolv to be able to deliver the velocity that your customers are demanding? >>So if once in a while, you know, it's important to step yourself into the customer's shoes and think it from their, from their, from their perspective, business does not care how you're running your IT shop. What they care about is your stability of the product and the efficiencies of the product and, and, and how, how, how easy it is to reach out to the customers and how well we are serving the customers, right? So whether I'm implementing Docker in the background, Dr. Swam or es you know, business doesn't even care about it. What they really care about it is if your environment goes down, it's a problem. And, and, and if you, if your environment or if your solution is not as efficient as the business needs, that's the problem, right? So, so at that point, the business will step in. So our job is to make sure, you know, from an, from a technology perspective, how fast you can make implement it and how efficiently you can implement it. And at the same time, how do you play within the guardrails of security and compliance. >>So I was gonna ask you if you have VMware in your environment, cause a lot of clients compare what vCenter does for Kubernetes is really needed. And I think that's what you guys got going on. I I can say that you're the v center of Kubernetes. I mean, as a, as an as an metaphor, a place to manage it all is all 1, 1 1 paint of glass, so to speak. Is that how you see success in your environment? >>So virtualization has gone a long way, you know where we started, what we call bare metal servers, and then we virtualized operating systems. Now we are virtualizing applications and, and we are virtualizing platforms as well, right? So that's where Kubernetes basically got. >>So you see the need for a vCenter like thing for Uber, >>Definitely a need in the market in the way you need to think is like, you know, let's say there is, there is an insurance company who actually mented it and, and they gain the market advantage. Right? Now the, the the competition wants to do it as well, right? So, so, so there's definitely a virtualization of application layer that, that, that's very critical and it's, it's a critical component of cloud strategy as >>A whole. See, you're too humble to say it. I'll say you like the V center of Kubernetes, Explain what that means and your turn. If I said that to you, what would you react? How would you react to that? Would say bs or would you say on point, >>Maybe we should think about what does vCenter do today? Right? It's, it's so in my opinion, by the way, well vCenter in my opinion is one of the best platforms ever built. Like ha it's the best platform in my opinion ever built. It's, VMware did an amazing job because they took an IT engineer and they made him now be able to do storage management, networking management, VMs, multitenancy, access management audit, everything that you need to run a data center, you can do from a single, essentially single >>Platform, from a utility standpoint home >>Run. It's amazing, right? Yeah, it is because you are now able to empower people to do way more. Well why are we not doing that for Kubernetes? So the, the premise man Rafa was, well, oh, bless, I should have IT engineers, same engineers now they should be able to run fleets of clusters. That's what people that mass major are able to do now, right? So to that end, now you need cluster management, you need access management, you need blueprinting, you need policy management, you need ac, you know, all of these things that have happened before chargebacks, they used to have it in, in V center. Now they need to happen in other platforms. But for es so should do we do many of the things that vCenter does? Yes. >>Kind >>Of. Yeah. Are we a vCenter for es? Yeah, that is a John Forer question. >>All right, well, I, I'll, the speculation really goes back down to the earlier speed question. If you can take away the, the complexity and not make it more steps or change a tool chain or do something, then the devs move faster and the service layer that serves the business, the new organization has to enable speed. So this, this is becoming a, a real discussion point in the industry is that, oh yeah, we've got new tool, look at the shiny new toy. But if it doesn't move the needle, does it help productivity for developers? And does it actually scale up the enablement? That's the question. So I'm sure you guys are thinking about this a lot, what's your reaction? >>Yeah, absolutely. And one thing that just, you know, hit my mind is think about, you know, the hoteling industry before Airbnb and after Airbnb, right? Or, or, or the taxi industry, you know, before Uber and after Uber, right? So if I'm providing a platform, a Kubernetes platform for my application folks or for my application partners, they have everything ready. All they need to do is like, you know, build their application and deployed and running, right? They, they, they don't have to worry about provisioning of the servers and then building the middleware on top of it and then, you know, do a bunch of testing to make sure, you know, they, they, they iron out all the, all the compatible issues and whatnot. Yeah. Now, now, today, all I, all I say is like, hey, you have, we have a platform built for you. You just build your application and then deploy it in a development environment. That's where you put all the pieces of puzzle together, make sure you see your application working, and then the next thing that, that you do is like, you know, you know, build >>Production, chip, build production, go and chip release it. Yeah, that's the nirvana. But then we're there. I mean, we're there now we're there. So we see the future. Because if you, if that's the case, then the developers are the business. They have to be coding more features, they have to react to customers. They might see new business opportunities from a revenue standpoint that could be creatively built, got low code, no code, headless systems. These things are happening where this I call the architectural list environment where it's like, you don't need architecture, it's already happening. >>Yeah. And, and on top of it, you know, if, if someone has an idea, they want to implement an idea real quick, right? So how do you do it? Right? And, and, and you don't have to struggle building an environment to implement your idea and testers in real time, right? So, so from an innovation perspective, you know, agility plays a key role. And, and that, that's where the Kubernetes platforms or platforms like Kubernetes >>Plays. You know, Lisa, when we talked to Andy Chasy, when he was the CEO of aws, either one on one or on the cube, he always said, and this is kind of happening, companies are gonna be builders where it's not just utility. You need that table stakes to enable that new business idea. And so he, this last keynote, he did this big thing like, you know, think like your developers are the next entrepreneurial revenue generators. And I think that, I think starting to see that, what do you think about that? You see that coming sooner than later? Or is that in, in sight or is that still ways away? >>I, I think it's already happening at a level, at a certain level now. Now the question comes back to, you know, taking it to the reality, right? Yeah. I mean, you can, you can do your proof of concept, proof of technologies, and then, and then prove it out. Like, Hey, I got a new idea. This idea is great. Yeah. And, and it's to the business advantage, right? But we really want to see it in production live where your customers are actually >>Using it and the board meetings, Hey, we got a new idea that came in, generating more revenue, where'd that come from? Agile developer. Again, this is real. Yeah, >>Yeah. >>Absolutely agree. Yeah. I think, think both of you gentlemen said a word in, in your, as you were talking, you used the word guardrails, right? I think, you know, we're talking about rigidity, but you know, the really important thing is, look, these are enterprises, right? They have certain expectations. Guardrails is key, right? So it's automation with the guardrails. Yeah. Guardrails are like children, you know, you know, shouldn't be hurt. You know, they're seen but not hurt. Developers don't care about guard rails. They just wanna go fast. They also bounce >>Around a little bit. Yeah. Off the guardrails. >>One thing we know that's not gonna slow down is, is the expectations, right? Of all the consumers of this, the Ds the business, the, the business top line, and of course the customers. So the ability to, to really, as your website says, let's see, make life easy for platform teams is not trivial. And clearly what you guys are talking about here is you're, you're really an enabler of those platform teams, it sounds like to me. Yep. So, great work, guys. Thank you so much for both coming on the program, talking about what you're doing together, how you're seeing the, the evolution of Kubernetes, why, and really what the focus should be on those platform games. We appreciate all your time and your insights. >>Thank you so much for having us. Thanks >>For our pleasure. For our guests and for John Furrier, I'm Lisa Martin. You're watching The Cube Live, Cobe Con, Cloud Native con from Detroit. We've out with our next guest in just a minute, so stick around.
SUMMARY :
the cube at Coan Cloud Native Con North America. That's the big focus. Ge. Great to have you on the program. Thank you for having me. What are some of the things that you're excited about with on, Like when we hung out at, you know, in Valencia for example, First you gotta get through gen one, which you guys done at Mass Mutual, extremely well, in the traditional world, you know, almost every company is running middleware and their applications So we are, we are past the stage of, you know, It's usually, you know, one of the things I'm seeing here, and John and I have talked about this in the past, You're targeting the builder of the infrastructure and the consumer of that infrastructure. it, you know, it takes iterations to figure these things out, right? And you guys are playing in there partnering. and and, and the customers that you serve and the technology that you serve. So this, it's kind of becoming the, you serve the business, Now it the new, it serves the developers, which is the business. And the, you know, the, the hard line between development and operations, so what is the key challenges you guys are, are both building out together this new transformational direction? In the past it used to take like, you know, probably, you know, a hundred, a hundred percent team and operational Well say that for another interview, we'll do it take time. Mass Mutual, how is it evolv to be able to deliver the velocity that your customers are demanding? So our job is to make sure, you know, So I was gonna ask you if you have VMware in your environment, cause a lot of clients compare So virtualization has gone a long way, you know where we started, you need to think is like, you know, let's say there is, there is an insurance company who actually mented it and, I'll say you like the V center of Kubernetes, networking management, VMs, multitenancy, access management audit, everything that you need to So to that end, now you need cluster management, Yeah, that is a John Forer question. So I'm sure you guys are thinking about this a lot, what's your reaction? Or, or, or the taxi industry, you know, before Uber and after Uber, I call the architectural list environment where it's like, you don't need architecture, it's already happening. So, so from an innovation perspective, you know, agility plays a key role. And I think that, I think starting to see that, what do you think about that? Now the question comes back to, you know, taking it to the reality, Using it and the board meetings, Hey, we got a new idea that came in, generating more revenue, where'd that come from? you know, you know, shouldn't be hurt. Around a little bit. And clearly what you guys are Thank you so much for having us. For our pleasure.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
John | PERSON | 0.99+ |
Steve | PERSON | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
Andy Chasy | PERSON | 0.99+ |
Valencia | LOCATION | 0.99+ |
Mass Mutual | ORGANIZATION | 0.99+ |
ORGANIZATION | 0.99+ | |
John Furrier | PERSON | 0.99+ |
Rafay | PERSON | 0.99+ |
Lisa | PERSON | 0.99+ |
John Forer | PERSON | 0.99+ |
Ula | PERSON | 0.99+ |
Haseeb Budhani | PERSON | 0.99+ |
Bani | PERSON | 0.99+ |
six months | QUANTITY | 0.99+ |
Detroit | LOCATION | 0.99+ |
both | QUANTITY | 0.99+ |
three days | QUANTITY | 0.99+ |
Uber | ORGANIZATION | 0.99+ |
Santhosh Pasula | PERSON | 0.99+ |
second gen | QUANTITY | 0.99+ |
today | DATE | 0.99+ |
an year | QUANTITY | 0.99+ |
First | QUANTITY | 0.98+ |
first | QUANTITY | 0.98+ |
Detroit, Michigan | LOCATION | 0.98+ |
thousands | QUANTITY | 0.98+ |
one story | QUANTITY | 0.98+ |
Rafa | PERSON | 0.98+ |
one | QUANTITY | 0.98+ |
CloudNativeCon | EVENT | 0.98+ |
One | QUANTITY | 0.98+ |
Airbnb | ORGANIZATION | 0.98+ |
Kubernetes | TITLE | 0.98+ |
two constituencies | QUANTITY | 0.97+ |
Swam | PERSON | 0.97+ |
KubeCon | EVENT | 0.97+ |
asari | ORGANIZATION | 0.97+ |
one person | QUANTITY | 0.97+ |
a month | QUANTITY | 0.97+ |
Santos | PERSON | 0.97+ |
single | QUANTITY | 0.96+ |
vCenter | TITLE | 0.96+ |
Cube | ORGANIZATION | 0.96+ |
Docker | ORGANIZATION | 0.95+ |
two constituents | QUANTITY | 0.95+ |
Hasi | PERSON | 0.94+ |
Coan | ORGANIZATION | 0.93+ |
aws | ORGANIZATION | 0.92+ |
Cobe Con | EVENT | 0.92+ |
Coan Cloud Native Con North America | ORGANIZATION | 0.91+ |
gen one | QUANTITY | 0.91+ |
SRE | ORGANIZATION | 0.9+ |
a hundred | QUANTITY | 0.89+ |
Kubernetes | PERSON | 0.89+ |
clusters | QUANTITY | 0.88+ |
Cloud Native con | EVENT | 0.88+ |
one thing | QUANTITY | 0.86+ |
NA 2022 | EVENT | 0.85+ |
Haseeb Budhani & Santhosh Pasula, Rafay | KubeCon + CloudNativeCon NA 2022
(bright upbeat music) >> Hey, guys. Welcome back to Detroit, Michigan. Lisa Martin and John Furrier here live with "theCUBE" at KubeCon CloudNativeCon, North America. John, it's been a great day. This is day one of our coverage of three days of coverage. Kubernetes is growing up. It's maturing. >> Yeah, we got three days of wall-to-wall coverage, all about Kubernetes. We heard about Security, Large scale, Cloud native at scale. That's the big focus. This next segment's going to be really awesome. You have a fast growing private company and a practitioner, big name, blue chip practitioner, building out next-gen cloud. First transforming, then building out the next level. This is classic, what we call Super Cloud-Like interview. It's going to be great. I'm looking forward to this. >> Anytime we can talk about Super Cloud, right? Please welcome back, one of our alumni, Haseeb Budhani is here, the CEO of Rafay. Great to see you. Santhosh Pasula, also joins us, the global head of Cloud SRE at Mass Mutual. Guys, great to have you on the program. >> Thanks for having us. >> Thank you for having me. >> So, Haseeb, you've been on "theCUBE" many times. You were on just recently, with the momentum that's around us today with the maturation of Kubernetes, the collaboration of the community, the recognition of the community. What are some of the things that you're excited about with on day one of the show? >> Wow, so many new companies. I mean, there are companies that I don't know who are here. And I live in this industry, and I'm seeing companies that I don't know, which is a good thing. It means that the community's growing. But at the same time, I'm also seeing another thing, which is, I have met more enterprise representatives at this show than other KubeCons. Like when we hung out at in Valencia, for example, or even other places, it hasn't been this many people. Which means, and this is a good thing that enterprises are now taking Kubernetes seriously. It's not a toy. It's not just for developers. It's enterprises who are now investing in Kubernetes as a foundational component for their applications going forward. And that to me is very, very good. >> Definitely, becoming foundational. >> Haseeb: Yeah. >> Well, you guys got a great traction. We had many interviews at "theCUBE," and you got a practitioner here with you guys, are both pioneering, kind of what I call the next-gen cloud. First you got to get through Gen-One, which you guys done at Mass Mutual extremely well. Take us through the story of your transformation? 'Cause you're on at the front end now of that next inflection point. But take us through how you got here? You had a lot of transformation success at Mass Mutual? >> So, I was actually talking about this topic few minutes back. And the whole cloud journey in big companies, large financial institutions, healthcare industry or insurance sector, it takes generations of leadership to get to that perfection level. And ideally, the cloud for strategy starts in, and then how do you standardize and optimize cloud, right? That's the second-gen altogether, and then operationalization of the cloud. And especially if you're talking about Kubernetes, in the traditional world, almost every company is running middleware and their applications in middleware. And their containerization is a topic that came in. And Docker is basically the runtime containerization. So, that came in first, and from Docker, eventually when companies started adopting Docker, Docker Swarm is one of the technologies that they adopted. And eventually, when we were taking it to a more complicated application implementations or modernization efforts, that's when Kubernetes played a key role. And as Haseeb was pointing out, you never saw so many companies working on Kubernetes. So, that should tell you one story, right? How fast Kubernetes is growing, and how important it is for your cloud strategy. >> And your success now, and what are you thinking about now? What's on your agenda now? As you look forward, what's on your plate? What are you guys doing right now? >> So we are past the stage of proof of concepts, proof of technologies, pilot implementations. We are actually playing it, the real game now. In the past, I used the quote, like "Hello world to real world." So, we are actually playing in the real world, not in the hello world anymore. Now, this is where the real time challenges will pop up. So, if you're talking about standardizing it, and then optimizing the cloud, and how do you put your governance structure in place? How do you make sure your regulations are met? The demands that come out of regulations are met? And how are you going to scale it? And while scaling, how are you going to keep up with all the governance and regulations that come with it? So we are in that stage today. >> Haseeb talked about, you talked about the great evolution of what's going on at Mass Mutual. Haseeb talk a little bit about who? You mentioned one of the things that's surprising you about this KubeCon in Detroit, is that you're seeing a lot more enterprise folks here? Who's deciding in the organization and your customer conversations? Who are the decision makers in terms of adoption of Kubernetes these days? Is that elevating? >> Hmm. Well, this guy. (Lisa laughing) One of the things I'm seeing here, and John and I have talked about this in the past, this idea of a platform organization and enterprises. So, consistently what I'm seeing, is somebody, a CTO, CIO level, an individual is making a decision. I have multiple internal Bus who are now modernizing applications. They're individually investing in DevOps, and this is not a good investment for my business. I'm going to centralize some of this capability so that we can all benefit together. And that team is essentially a platform organization. And they're making Kubernetes a shared services platform so that everybody else can come and sort of consume it. So, what that means to us, is our customer is a platform organization, and their customer is a developer. So we have to make two constituencies successful. Our customer who's providing a multi-tenant platform, and then their customer, who's your developer, both have to be happy. If you don't solve for both, you know, constituencies, you're not going to be successful. >> So, you're targeting the builder of the infrastructure and the consumer of that infrastructure? >> Yes, sir. It has to be both. >> On the other side? >> Exactly, right. So that look, honestly, it takes iteration to figure these things out. But this is a consistent theme that I am seeing. In fact, what I would argue now, is that every enterprise should be really stepping back and thinking about what is my platform strategy? Because if you don't have a platform strategy, you're going to have a bunch of different teams who are doing different things, and some will be successful, and look, some will not be. And that is not good for business. >> Yeah, and Santhosh, I want to get to you. You mentioned your transformations, what you look forward, and your title, Global Head of Cloud, SRE. Okay, so SRE, we all know came from Google, right? Everyone wants to be like Google, but no one wants to be like Google, right? And no one is Google. Google's a unique thing. >> Haseeb: Only one Google. >> But they had the dynamic and the power dynamic of one person to large scale set of servers or infrastructure. But concept can be portable, but the situation isn't. So, Borg became Kubernetes, that's inside baseball. So, you're doing essentially what Google did at their scale, you're doing for Mass Mutual. That's kind of what's happening, is that kind of how I see it? And you guys are playing in there partnering? >> So, I totally agree. Google introduce SRE, Site Reliability Engineering. And if you take the traditional transformation of the roles, in the past, it was called operations, and then DevOps ops came in, and then SRE is the new buzzword. And the future could be something like Product Engineering. And in this journey, here is what I tell folks on my side, like what worked for Google might not work for a financial company. It might not work for an insurance company. It's okay to use the word, SRE, but end of the day, that SRE has to be tailored down to your requirements. And the customers that you serve, and the technology that you serve. >> This is why I'm coming back, this platform engineering. At the end of the day, I think SRE just translates to, you're going to have a platform engineering team? 'Cause you got to enable developers to be producing more code faster, better, cheaper, guardrails, policies. It's kind of becoming the, these serve the business, which is now the developers. IT used to serve the business back in the old days, "Hey, the IT serves the business." >> Yup. >> Which is a term now. >> Which is actually true now. >> The new IT serves the developers, which is the business. >> Which is the business. >> Because if digital transformation goes to completion, the company is the app. >> The hard line between development and operations, so that's thinning down. Over the time, that line might disappear. And that's where SRE is fitting in. >> Yeah, and then building platform to scale the enablement up. So, what is the key challenges? You guys are both building out together this new transformational direction. What's new and what's the same? The same is probably the business results, but what's the new dynamic involved in rolling it out and making people successful? You got the two constituents, the builders of the infrastructures and the consumers of the services on the other side. What's the new thing? >> So, the new thing, if I may go first. The faster market to value that we are bringing to the table, that's very important. Business has an idea. How do you get that idea implemented in terms of technology and take it into real time? So, that journey we have cut down. Technology is like Kubernetes. It makes an IT person's life so easy that they can speed up the process. In a traditional way, what used to take like an year, or six months, can be done in a month today, or less than that. So, there's definitely speed velocity, agility in general, and then flexibility. And then the automation that we put in, especially if you have to maintain like thousands of clusters. These are today, it is possible to make that happen with a click off a button. In the past, it used to take, probably, 100-person team, and operational team to do it, and a lot of time. But that automation is happening. And we can get into the technology as much as possible, but blueprinting and all that stuff made it possible. >> We'll save that for another interview. We'll do it deep time. (panel laughing) >> But the end user on the other end, the consumer doesn't have the patience that they once had, right? It's, "I want this in my lab now." How does the culture of Mass Mutual? How is it evolve to be able to deliver the velocity that your customers are demanding? >> Once in a while, it's important to step yourself into the customer's shoes and think it from their perspective. Business does not care how you're running your IT shop. What they care about is your stability of the product and the efficiencies of the product, and how easy it is to reach out to the customers. And how well we are serving the customers, right? So, whether I'm implementing Docker in the background, Docker Swam or Kubernetes, business doesn't even care about it. What they really care about, it is, if your environment goes down, it's a problem. And if your environment or if your solution is not as efficient as the business needs, that's the problem, right? So, at that point, the business will step in. So, our job is to make sure, from a technology perspective, how fast you can make implement it? And how efficiently you can implement it? And at the same time, how do you play within the guardrails of security and compliance? >> So, I was going to ask you, if you have VMware in your environment? 'Cause a lot of clients compare what vCenter does for Kubernetes is really needed. And I think that's what you guys got going on. I can say that, you're the vCenter of Kubernetes. I mean, as as metaphor, a place to manage it all, is all one paint of glass, so to speak. Is that how you see success in your environment? >> So, virtualization has gone a long way. Where we started, what we call bare metal servers, and then we virtualized operating systems. Now, we are virtualizing applications, and we are virtualizing platforms as well, right? So that's where Kubernetes plays a role. >> So, you see the need for a vCenter like thing for Kubernetes? >> There's definitely a need in the market. The way you need to think is like, let's say there is an insurance company who actually implement it today, and they gain the market advantage. Now, the the competition wants to do it as well, right? So, there's definitely a virtualization of application layer that's very critical, and it's a critical component of cloud strategy as a whole. >> See, you're too humble to say it. I'll say, you're like the vCenter of Kubernetes. Explain what that means in your term? If I said that to you, what would you react? How would you react to that? Would you say, BS, or would you say on point? >> Maybe we should think about what does vCenter do today? So, in my opinion, by the way, vCenter in my opinion, is one of the best platforms ever built. Like it's the best platform in my opinion ever built. VMware did an amazing job, because they took an IT engineer, and they made him now be able to do storage management, networking management, VM's multitenancy, access management, audit. Everything that you need to run a data center, you can do from essentially single platform. >> John: From a utility standpoint, home-run? >> It's amazing. >> Yeah. >> Because you are now able to empower people to do way more. Well, why are we not doing that for Kubernetes? So, the premise man Rafay was, well, I should have IT engineers, same engineers. Now, they should be able to run fleets of clusters. That's what people that Mass Mutual are able to do now. So, to that end, now you need cluster management, you need access management, you need blueprinting, you need policy management. All of these things that have happened before, chargebacks, they used to have it in vCenter, now they need to happen in other platforms but for Kubernetes. So, should we do many of the things that vCenter does? Yes. >> John: Kind of, yeah. >> Are we a vCenter for Kubernetes? >> No. >> That is a John Furrier question. >> All right, well, the speculation really goes back down to the earlier speed question. If you can take away the complexity and not make it more steps, or change a tool chain, or do something, then the Devs move faster. And the service layer that serves the business, the new organization, has to enable speed. This is becoming a real discussion point in the industry, is that, "Yeah, we got new tool. Look at the shiny new toy." But if it move the needle, does it help productivity for developers? And does it actually scale up the enablement? That's the question. So, I'm sure you guys are thinking about this a lot. What's your reaction? >> Yeah, absolutely. And one thing that just hit my mind, is think about the hoteling industry before Airbnb and after Airbnb. Or the taxi industry before Uber and after Uber. So, if I'm providing a platform, a Kubernetes platform for my application folks, or for my application partners, they have everything ready. All they need to do is build their application and deploy it, and run it. They don't have to worry about provisioning of the servers, and then building the Middleware on top of it, and then, do a bunch of testing to make sure they iron out all the compatible issues and whatnot. Now, today, all I say is like, "Hey, we have a platform built for you. You just build your application, and then deploy it in a development environment, that's where you put all the pieces of puzzle together. Make sure you see your application working, and then the next thing that you do is like, do the correction. >> John: Shipping. >> Shipping. You build the production. >> John: Press. Go. Release it. (laughs) That when you move on, but they were there. I mean, we're there now. We're there. So, we need to see the future, because that's the case, then the developers are the business. They have to be coding more features, they have to react to customers. They might see new business opportunities from a revenue standpoint that could be creatively built, got low code, no code, headless systems. These things are happening where there's, I call the Architectural List Environment where it's like, you don't need architecture, it's already happening. >> Yeah, and on top of it, if someone has an idea, they want to implement an idea real quick. So, how do you do it? And you don't have to struggle building an environment to implement your idea and test it in real time. So, from an innovation perspective, agility plays a key role. And that's where the Kubernetes platforms, or platforms like Kubernetes plays. >> You know, Lisa, when we talked to Andy Jassy, when he was the CEO of AWS, either one-on-one or on "theCUBE," he always said, and this is kind of happening, "Companies are going to be builders, where it's not just utility, you need that table stakes to enable that new business idea." And so, in this last keynote, he did this big thing like, "Think like your developers are the next entrepreneurial revenue generators." I think I'm starting to see that. What do you think about that? You see that coming sooner than later? Or is that an insight, or is that still ways away? >> I think it's already happening at a level, at a certain level. Now ,the question comes back to, you know, taking it to the reality. I mean, you can do your proof of concept, proof of technologies, and then prove it out like, "Hey, I got a new idea. This idea is great." And it's to the business advantage. But we really want to see it in production live where your customers are actually using it. >> In the board meetings, "Hey, we got a new idea that came in, generating more revenue, where'd that come from?" Agile Developer. Again, this is real. >> Yeah. >> Yeah. Absolutely agree. Yeah, I think both of you gentlemen said a word as you were talking, you used the word, Guardrails. We're talking about agility, but the really important thing is, look, these are enterprises, right? They have certain expectations. Guardrails is key, right? So, it's automation with the guardrails. Guardrails are like children, you know, shouldn't be heard. They're seen but not heard. Developers don't care about guardrails, they just want to go fast. >> They also bounce around a little bit, (laughs) off the guardrails. >> Haseeb: Yeah. >> One thing we know that's not going to slow down, is the expectations, right? Of all the consumers of this, the Devs, the business, the business top line, and, of course, the customers. So, the ability to really, as your website says, let's say, "Make Life Easy for Platform Teams" is not trivial. And clearly what you guys are talking about here, is you're really an enabler of those platform teams, it sounds like to me. >> Yup. >> So, great work, guys. Thank you so much for both coming on the program, talking about what you're doing together, how you're seeing the evolution of Kubernetes, why? And really, what the focus should be on those platform teams. We appreciate all your time and your insights. >> Thank you so much for having us. >> Thanks for having us. >> Our pleasure. For our guests and for John Furrier, I'm Lisa Martin. You're watching "theCUBE" Live, KubeCon CloudNativeCon from Detroit. We'll be back with our next guest in just a minute, so stick around. (bright upbeat music)
SUMMARY :
This is day one of our coverage building out the next level. Haseeb Budhani is here, the CEO of Rafay. What are some of the things It means that the community's growing. and you got a practitioner And Docker is basically the and how do you put your You mentioned one of the One of the things I'm seeing here, It has to be both. Because if you don't what you look forward, and the power dynamic and the technology that you serve. At the end of the day, I The new IT serves the developers, the company is the app. Over the time, that line might disappear. and the consumers of the So, the new thing, if I may go first. We'll save that for another interview. How is it evolve to be able So, at that point, the if you have VMware in your environment? and then we virtualized operating systems. Now, the the competition If I said that to you, So, in my opinion, by the way, So, to that end, now you the new organization, has to enable speed. that you do is like, You build the production. I call the Architectural List And you don't have to struggle are the next entrepreneurial I mean, you can do your proof of concept, In the board meetings, but the really important thing is, (laughs) off the guardrails. So, the ability to really, as coming on the program, guest in just a minute,
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
John | PERSON | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
Haseeb | PERSON | 0.99+ |
John Furrier | PERSON | 0.99+ |
Andy Jassy | PERSON | 0.99+ |
Lisa | PERSON | 0.99+ |
ORGANIZATION | 0.99+ | |
John Furrier | PERSON | 0.99+ |
Santhosh Pasula | PERSON | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Haseeb Budhani | PERSON | 0.99+ |
Valencia | LOCATION | 0.99+ |
Uber | ORGANIZATION | 0.99+ |
six months | QUANTITY | 0.99+ |
Mass Mutual | ORGANIZATION | 0.99+ |
three days | QUANTITY | 0.99+ |
both | QUANTITY | 0.99+ |
Detroit | LOCATION | 0.99+ |
Airbnb | ORGANIZATION | 0.99+ |
First | QUANTITY | 0.99+ |
100-person | QUANTITY | 0.99+ |
Rafay | PERSON | 0.99+ |
second-gen | QUANTITY | 0.99+ |
today | DATE | 0.99+ |
Detroit, Michigan | LOCATION | 0.99+ |
one | QUANTITY | 0.99+ |
one story | QUANTITY | 0.99+ |
first | QUANTITY | 0.98+ |
KubeCon | EVENT | 0.98+ |
two constituents | QUANTITY | 0.98+ |
CloudNativeCon | EVENT | 0.98+ |
One | QUANTITY | 0.98+ |
Santhosh | PERSON | 0.97+ |
single platform | QUANTITY | 0.97+ |
a month | QUANTITY | 0.97+ |
theCUBE | ORGANIZATION | 0.97+ |
theCUBE | TITLE | 0.96+ |
Mass Mutual | ORGANIZATION | 0.95+ |
one person | QUANTITY | 0.95+ |
Borg | PERSON | 0.95+ |
vCenter | TITLE | 0.95+ |
an year | QUANTITY | 0.95+ |
one thing | QUANTITY | 0.94+ |
thousands of clusters | QUANTITY | 0.94+ |
Docker | ORGANIZATION | 0.94+ |
two constituencies | QUANTITY | 0.93+ |
Kubernetes | TITLE | 0.93+ |
Gen-One | QUANTITY | 0.92+ |
SRE | TITLE | 0.92+ |
Jerome West, Dell Technologies V2
>>We're back with Jerome West, product management security lead at for HCI at Dell Technologies Hyper-converged infrastructure. Jerome, welcome. >>Thank you, David. >>Hey, Jerome, In this series, A blueprint for trusted infrastructure, we've been digging into the different parts of the infrastructure stack, including storage, servers and networking, and now we want to cover hyperconverged infrastructure. So my first question is, what's unique about HCI that presents specific security challenges? What do we need to know? >>So what's unique about Hyperconverge infrastructure is the breadth of the security challenge. We can't simply focus on a single type of IT system, so like a server or a storage system or a virtualization piece of software. I mean, HCI is all of those things. So luckily we have excellent partners like VMware, Microsoft, and internal partners like the Dell Power Edge team, the Dell storage team, the Dell networking team, and on and on. These partnerships, in these collaborations are what make us successful from a security standpoint. So let me give you an example to illustrate. In the recent past, we're seeing growing scope and sophistication in supply chain attacks. This mean an attacker is going to attack your software supply chain upstream so that hopefully a piece of code, malicious code that wasn't identified early in the software supply chain is distributed like a large player, like a VMware or Microsoft or a Dell. So to confront this kind of sophisticated hard to defeat problem, we need short term solutions and we need long term solutions as well. >>So for the short term solution, the obvious thing to do is to patch the vulnerability. The complexity is for our HCI portfolio. We build our software on VMware, so we would have to consume a patch that VMware would produce and provide it to our customers in a timely manner. Luckily, VX Rail's engineering team has co engineered a release process with VMware that significantly shortens our development life cycle so that VMware will produce a patch and within 14 days we will integrate our own code. With the VMware release, we will have tested and validated the update and we will give an update to our customers within 14 days of that VMware release. That as a result of this kind of rapid development process, Vxl had over 40 releases of software updates last year for a longer term solution. We're partnering with VMware and others to develop a software bill of materials. We work with VMware to consume their software manifest, including their upstream vendors and their open source providers to have a comprehensive list of software components. Then we aren't caught off guard by an unforeseen vulnerability and we're more able to easily detect where the software problem lies so that we can quickly address it. So these are the kind of relationships and solutions that we can co engineer with effective collaborations with our, with our partners. >>Great, Thank you for that. That description. So if I had to define what cybersecurity resilience means to HCI or converged infrastructure, and to me my takeaway was you gotta have a short term instant patch solution and then you gotta do an integration in a very short time, you know, two weeks to then have that integration done. And then longer term you have to have a software bill of materials so that you can ensure the providence of all the components help us. Is that a right way to think about cybersecurity resilience? Do you have, you know, a additives to that definition? >>I do. I really think that site cybersecurity and resilience for hci, because like I said, it has sort of unprecedented breadth across our portfolio. It's not a single thing, it's a bit of everything. So really the strength or the secret sauce is to combine all the solutions that our partner develops while integrating them with our own layer. So let me, let me give you an example. So hci, it's a, basically taking a software abstraction of hardware functionality and implementing it into something called the virtualized layer. It's basically the virtual virtualizing hardware functionality, like say a storage controller, you could implement it in a hardware, but for hci, for example, in our VX rail portfolio, we, or our vxl product, we integrate it into a product called vsan, which is provided by our partner VMware. So that portfolio strength is still, you know, through our, through our partnerships. >>So what we do, we integrate these, these security functionality and features in into our product. So our partnership grows to our ecosystem through products like VMware, products like nsx, Verizon, Carbon Black and Bsphere. All of them integrate seamlessly with VMware. And we also leverage VMware's software, par software partnerships on top of that. So for example, VX supports multifactor authentication through bsphere integration with something called Active Directory Federation services for adfs. So there is a lot of providers that support adfs, including Microsoft Azure. So now we can support a wide array of identity providers such as Off Zero or I mentioned Azure or Active Directory through that partnership. So we can leverage all of our partners partnerships as well. So there's sort of a second layer. So being able to secure all of that, that provides a lot of options and flexibility for our customers. So basically to summarize my my answer, we consume all of the security advantages of our partners, but we also expand on that to make a product that is comprehensively secured at multiple layers from the hardware layer that's provided by Dell through Power Edge to the hyper-converged software that we build ourselves to the virtualization layer that we get through our partnerships with Microsoft and VMware. >>Great. I mean that's super helpful. You've mentioned nsx, Horizon, Carbon Black, all the, you know, the VMware component OTH zero, which the developers are gonna love. You got Azure identity, so it's really an ecosystem. So you may have actually answered my next question, but I'm gonna ask it anyway cuz you've got this software defined environment and you're managing servers and networking and storage with this software led approach, how do you ensure that the entire system is secure end to end? >>That's a really great question. So the, the answer is we do testing and validation as part of the engineering process. It's not just bolted on at the end. So when we do, for example, the xra is the market's only co engineered solution with VMware, other vendors sell VMware as a hyperconverged solution, but we actually include security as part of the co-engineering process with VMware. So it's considered when VMware builds their code and their process dovetails with ours because we have a secure development life cycle, which other products might talk about in their discussions with you that we integrate into our engineering life cycle. So because we follow the same framework, all of the, all of the codes should interoperate from a security standpoint. And so when we do our final validation testing when we do a software release, we're already halfway there in ensuring that all these features will give the customers what we promised. >>That's great. All right, let's, let's close pitch me, what would you say is the strong suit summarize the, the strengths of the Dell hyperconverged infrastructure and converged infrastructure portfolio specifically from a security perspective? Jerome? >>So I talked about how hyper hyper-converged infrastructure simplifies security management because basically you're gonna take all of these features that are abstracted in in hardware, they're now abstracted in the virtualization layer. Now you can manage them from a single point of view, whether it would be, say, you know, in for VX rail would be b be center, for example. So by abstracting all this, you make it very easy to manage security and highly flexible because now you don't have limitations around a single vendor. You have a multiple array of choices and partnerships to select. So I would say that is the, the key to making it to hci. Now, what makes Dell the market leader in HCI is not only do we have that functionality, but we also make it exceptionally useful to you because it's co engineered, it's not bolted on. So I gave the example of, I gave the example of how we, we modify our software release process with VMware to make it very responsive. >>A couple of other features that we have specific just to HCI are digitally signed LCM updates. This is an example of a feature that we have that's only exclusive to Dell that's not done through a partnership. So we digitally sign our software updates so you, the user can be sure that the, the update that they're installing into their system is an authentic and unmodified product. So we give it a Dell signature that's invalidated prior to installation. So not only do we consume the features that others develop in a seamless and fully validated way, but we also bolt on our own specific HCI security features that work with all the other partnerships and give the user an exceptional security experience. So for, for example, the benefit to the customer is you don't have to create a complicated security framework that's hard for your users to use and it's hard for your system administrators to manage. It all comes in a package. So it, it can be all managed through vCenter, for example, or, and then the specific hyper, hyper-converged functions can be managed through VxRail manager or through STDC manager. So there's very few pains of glass that the, the administrator or user ever has to worry about. It's all self contained and manageable. >>That makes a lot of sense. So you got your own infrastructure, you're applying your best practices to that, like the digital signatures, you've got your ecosystem, you're doing co-engineering with the ecosystems, delivering security in a package, minimizing the complexity at the infrastructure level. The reason Jerome, this is so important is because SecOps teams, you know, they gotta deal with cloud security, they gotta deal with multiple clouds. Now they have their shared responsibility model going across multiple, They got all this other stuff that they have to worry, they gotta secure containers and the run time and, and, and, and, and the platform and so forth. So they're being asked to do other things. If they have to worry about all the things that you just mentioned, they'll never get, you know, the, the securities is gonna get worse. So what my takeaway is, you're removing that infrastructure piece and saying, Okay guys, you now can focus on those other things that is not necessarily Dell's, you know, domain, but you, you know, you can work with other partners to, and your own teams to really nail that. Is that a fair summary? >>I think that is a fair summary because absolutely the worst thing you can do from a security perspective is provide a feature that's so unusable that the administrator disables it or other key security features. So when I work with my partners to define, to define and develop a new security feature, the thing I keep foremost in mind is, will this be something our users want to use in our administrators want to administer? Because if it's not, if it's something that's too difficult or onerous or complex, then I try to find ways to make it more user friendly and practical. And this is a challenge sometimes because we are, our products operate in highly regulated environments and sometimes they have to have certain rules and certain configurations that aren't the most user friendly or management friendly. So I, I put a lot of effort into thinking about how can we make this feature useful while still complying with all the regulations that we have to comply with. And by the way, we're very successful in a highly regulated space. We sell a lot of VxRail, for example, into the Department of Defense and banks and, and other highly regulated environments, and we're very successful >>There. Excellent. Okay, Jerome, thanks. We're gonna leave it there for now. I'd love to have you back to talk about the progress that you're making down the road. Things always, you know, advance in the tech industry and so would appreciate that. >>I would look forward to it. Thank you very much, Dave. >>You're really welcome. In a moment I'll be back to summarize the program and offer some resources that can help you on your journey to secure your enterprise infrastructure. I wanna thank our guests for their contributions and helping us understand how investments by a company like Dell can both reduce the need for dev sec up teams to worry about some of the more fundamental security issues around infrastructure and have greater confidence in the quality providence and data protection designed in to core infrastructure like servers, storage, networking, and hyper-converged systems. You know, at the end of the day, whether your workloads are in the cloud, OnPrem or at the edge, you are responsible for your own security. But vendor r and d and vendor process must play an important role in easing the burden faced by security devs and operation teams. And on behalf of the cube production content and social teams as well as Dell Technologies, we want to thank you for watching a blueprint for trusted infrastructure. Remember part one of this series as well as all the videos associated with this program, and of course, today's program are available on demand@thecube.net with additional coverage@siliconangle.com. And you can go to dell.com/security solutions dell.com/security solutions to learn more about Dell's approach to securing infrastructure. And there's tons of additional resources that can help you on your journey. This is Dave Valante for the Cube, your leader in enterprise and emerging tech coverage. We'll see you next time.
SUMMARY :
We're back with Jerome West, product management security lead at for HCI So my first question is, So let me give you an example to illustrate. So for the short term solution, the obvious thing to do is to patch bill of materials so that you can ensure the providence of all the components help So really the strength or the secret sauce is to combine all the So basically to summarize my my answer, we consume all of the security So you may have actually answered my next question, but I'm gonna ask it anyway cuz So the, the answer is we do All right, let's, let's close pitch me, what would you say is the strong suit summarize So I gave the example of, I gave the So for, for example, the benefit to the customer is you So you got your own infrastructure, you're applying your best practices to that, all the regulations that we have to comply with. I'd love to have you back to talk about the progress that you're making down Thank you very much, Dave. in the quality providence and data protection designed in to core infrastructure like
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Jerome | PERSON | 0.99+ |
David | PERSON | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
Dave | PERSON | 0.99+ |
Dave Valante | PERSON | 0.99+ |
Jerome West | PERSON | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
demand@thecube.net | OTHER | 0.99+ |
Verizon | ORGANIZATION | 0.99+ |
first question | QUANTITY | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
coverage@siliconangle.com | OTHER | 0.99+ |
last year | DATE | 0.99+ |
second layer | QUANTITY | 0.99+ |
hci | ORGANIZATION | 0.99+ |
today | DATE | 0.99+ |
two weeks | QUANTITY | 0.99+ |
Bsphere | ORGANIZATION | 0.99+ |
Department of Defense | ORGANIZATION | 0.98+ |
HCI | ORGANIZATION | 0.98+ |
14 days | QUANTITY | 0.98+ |
both | QUANTITY | 0.98+ |
nsx | ORGANIZATION | 0.98+ |
VMware | ORGANIZATION | 0.98+ |
VX Rail | ORGANIZATION | 0.98+ |
Azure | TITLE | 0.98+ |
dell.com/security | OTHER | 0.98+ |
single thing | QUANTITY | 0.97+ |
over 40 releases | QUANTITY | 0.97+ |
vCenter | TITLE | 0.96+ |
VxRail | TITLE | 0.96+ |
Carbon Black | ORGANIZATION | 0.96+ |
single point | QUANTITY | 0.92+ |
single vendor | QUANTITY | 0.85+ |
part one | QUANTITY | 0.84+ |
xra | TITLE | 0.81+ |
Power Edge | TITLE | 0.8+ |
single type | QUANTITY | 0.75+ |
Vxl | ORGANIZATION | 0.73+ |
SecOps | ORGANIZATION | 0.72+ |
Cube | ORGANIZATION | 0.71+ |
Horizon | ORGANIZATION | 0.69+ |
Carbon | ORGANIZATION | 0.68+ |
bsphere | ORGANIZATION | 0.67+ |
VX | TITLE | 0.64+ |
VxRail | ORGANIZATION | 0.62+ |
Off Zero | ORGANIZATION | 0.61+ |
Power | COMMERCIAL_ITEM | 0.59+ |
vsan | ORGANIZATION | 0.56+ |
Directory | TITLE | 0.51+ |
Edge | ORGANIZATION | 0.5+ |
Blueprint for Trusted Insfrastructure Episode 2 Full Episode 10-4 V2
>>The cybersecurity landscape continues to be one characterized by a series of point tools designed to do a very specific job, often pretty well, but the mosaic of tooling is grown over the years causing complexity in driving up costs and increasing exposures. So the game of Whackamole continues. Moreover, the way organizations approach security is changing quite dramatically. The cloud, while offering so many advantages, has also created new complexities. The shared responsibility model redefines what the cloud provider secures, for example, the S three bucket and what the customer is responsible for eg properly configuring the bucket. You know, this is all well and good, but because virtually no organization of any size can go all in on a single cloud, that shared responsibility model now spans multiple clouds and with different protocols. Now that of course includes on-prem and edge deployments, making things even more complex. Moreover, the DevOps team is being asked to be the point of execution to implement many aspects of an organization's security strategy. >>This extends to securing the runtime, the platform, and even now containers which can end up anywhere. There's a real need for consolidation in the security industry, and that's part of the answer. We've seen this both in terms of mergers and acquisitions as well as platform plays that cover more and more ground. But the diversity of alternatives and infrastructure implementations continues to boggle the mind with more and more entry points for the attackers. This includes sophisticated supply chain attacks that make it even more difficult to understand how to secure components of a system and how secure those components actually are. The number one challenge CISOs face in today's complex world is lack of talent to address these challenges. And I'm not saying that SecOps pros are not talented, They are. There just aren't enough of them to go around and the adversary is also talented and very creative, and there are more and more of them every day. >>Now, one of the very important roles that a technology vendor can play is to take mundane infrastructure security tasks off the plates of SEC off teams. Specifically we're talking about shifting much of the heavy lifting around securing servers, storage, networking, and other infrastructure and their components onto the technology vendor via r and d and other best practices like supply chain management. And that's what we're here to talk about. Welcome to the second part in our series, A Blueprint for Trusted Infrastructure Made Possible by Dell Technologies and produced by the Cube. My name is Dave Ante and I'm your host now. Previously we looked at what trusted infrastructure means and the role that storage and data protection play in the equation. In this part two of the series, we explore the changing nature of technology infrastructure, how the industry generally in Dell specifically, are adapting to these changes and what is being done to proactively address threats that are increasingly stressing security teams. >>Now today, we continue the discussion and look more deeply into servers networking and hyper-converged infrastructure to better understand the critical aspects of how one company Dell is securing these elements so that dev sec op teams can focus on the myriad new attack vectors and challenges that they faced. First up is Deepak rang Garage Power Edge security product manager at Dell Technologies. And after that we're gonna bring on Mahesh Nagar oim, who was consultant in the networking product management area at Dell. And finally, we're close with Jerome West, who is the product management security lead for HCI hyperconverged infrastructure and converged infrastructure at Dell. Thanks for joining us today. We're thrilled to have you here and hope you enjoy the program. Deepak Arage shoes powered security product manager at Dell Technologies. Deepak, great to have you on the program. Thank you. >>Thank you for having me. >>So we're going through the infrastructure stack and in part one of this series we looked at the landscape overall and how cyber has changed and specifically how Dell thinks about data protection in, in security in a manner that both secures infrastructure and minimizes organizational friction. We also hit on the storage part of the portfolio. So now we want to dig into servers. So my first question is, what are the critical aspects of securing server infrastructure that our audience should be aware of? >>Sure. So if you look at compute in general, right, it has rapidly evolved over the past couple of years, especially with trends toward software defined data centers and with also organizations having to deal with hybrid environments where they have private clouds, public cloud locations, remote offices, and also remote workers. So on top of this, there's also an increase in the complexity of the supply chain itself, right? There are companies who are dealing with hundreds of suppliers as part of their supply chain. So all of this complexity provides a lot of opportunity for attackers because it's expanding the threat surface of what can be attacked, and attacks are becoming more frequent, more severe and more sophisticated. And this has also triggered around in the regulatory and mandates around the security needs. >>And these regulations are not just in the government sector, right? So it extends to critical infrastructure and eventually it also get into the private sector. In addition to this, organizations are also looking at their own internal compliance mandates. And this could be based on the industry in which they're operating in, or it could be their own security postures. And this is the landscape in which servers they're operating today. And given that servers are the foundational blocks of the data center, it becomes extremely important to protect them. And given how complex the modern server platforms are, it's also extremely difficult and it takes a lot of effort. And this means protecting everything from the supply chain to the manufacturing and then eventually the assuring the hardware and software integrity of the platforms and also the operations. And there are very few companies that go to the lens that Dell does in order to secure the server. We truly believe in the notion and the security mentality that, you know, security should enable our customers to go focus on their business and proactively innovate on their business and it should not be a burden to them. And we heavily invest to make that possible for our customers. >>So this is really important because the premise that I set up at the beginning of this was really that I, as of security pro, I'm not a security pro, but if I were, I wouldn't want to be doing all this infrastructure stuff because I now have all these new things I gotta deal with. I want a company like Dell who has the resources to build that security in to deal with the supply chain to ensure the providence, et cetera. So I'm glad you you, you hit on that, but so given what you just said, what does cybersecurity resilience mean from a server perspective? For example, are there specific principles that Dell adheres to that are non-negotiable? Let's say, how does Dell ensure that its customers can trust your server infrastructure? >>Yeah, like when, when it comes to security at Dell, right? It's ingrained in our product, so that's the best way to put it. And security is nonnegotiable, right? It's never an afterthought where we come up with a design and then later on figure out how to go make it secure, right? Our security development life cycle, the products are being designed to counter these threats right from the big. And in addition to that, we are also testing and evaluating these products continuously to identify vulnerabilities. We also have external third party audits which supplement this process. And in addition to this, Dell makes the commitment that we will rapidly respond to any mitigations and vulnerability, any vulnerabilities and exposures found out in the field and provide mitigations and patches for in attacking manner. So this security principle is also built into our server life cycle, right? Every phase of it. >>So we want our products to provide cutting edge capabilities when it comes to security. So as part of that, we are constantly evaluating what our security model is done. We are building on it and continuously improving it. So till a few years ago, our model was primarily based on the N framework of protect, detect and rigor. And it's still aligns really well to that framework, but over the past couple of years, we have seen how computers evolved, how the threads have evolved, and we have also seen the regulatory trends and we recognize the fact that the best security strategy for the modern world is a zero trust approach. And so now when we are building our infrastructure and tools and offerings for customers, first and foremost, they're cyber resilient, right? What we mean by that is they're capable of anticipating threats, withstanding attacks and rapidly recurring from attacks and also adapting to the adverse conditions in which they're deployed. The process of designing these capabilities and identifying these capabilities however, is done through the zero press framework. And that's very important because now we are also anticipating how our customers will end up using these capabilities at there and to enable their own zero trust IT environments and IT zero trusts deployments. We have completely adapted our security approach to make it easier for customers to work with us no matter where they are in their journey towards zero trust option. >>So thank you for that. You mentioned the, this framework, you talked about zero trust. When I think about n I think as well about layered approaches. And when I think about zero trust, I think about if you, if you don't have access to it, you're not getting access, you've gotta earn that, that access and you've got layers and then you still assume that bad guys are gonna get in. So you've gotta detect that and you've gotta response. So server infrastructure security is so fundamental. So my question is, what is Dell providing specifically to, for example, detect anomalies and breaches from unauthorized activity? How do you enable fast and easy or facile recovery from malicious incidents, >>Right? What is that is exactly right, right? Breachers are bound to happen and given how complex our current environment is, it's extremely distributed and extremely connected, right? Data and users are no longer contained with an offices where we can set up a perimeter firewall and say, Yeah, everything within that is good. We can trust everything within it. That's no longer true. The best approach to protect data and infrastructure in the current world is to use a zero trust approach, which uses the principles. Nothing is ever trusted, right? Nothing is trusted implicitly. You're constantly verifying every single user, every single device, and every single access in your system at every single level of your ID environment. And this is the principles that we use on power Edge, right? But with an increased focus on providing granular controls and checks based on the principles of these privileged access. >>So the idea is that service first and foremost need to make sure that the threats never enter and they're rejected at the point of entry, but we recognize breaches are going to occur and if they do, they need to be minimized such that the sphere of damage cost by attacker is minimized so they're not able to move from one part of the network to something else laterally or escalate their privileges and cause more damage, right? So the impact radius for instance, has to be radius. And this is done through features like automated detection capabilities and automation, automated remediation capabilities. So some examples are as part of our end to end boot resilience process, we have what they call a system lockdown, right? We can lock down the configuration of the system and lock on the form versions and all changes to the system. And we have capabilities which automatically detect any drift from that lockdown configuration and we can figure out if the drift was caused to authorized changes or unauthorized changes. >>And if it is an unauthorize change can log it, generate security alerts, and we even have capabilities to automatically roll the firm where, and always versions back to a known good version and also the configurations, right? And this becomes extremely important because as part of zero trust, we need to respond to these things at machine speed and we cannot do it at a human speed. And having these automated capabilities is a big deal when achieving that zero trust strategy. And in addition to this, we also have chassis inclusion detection where if the chassis, the box, the several box is opened up, it logs alerts, and you can figure out even later if there's an AC power cycle, you can go look at the logs to see that the box is opened up and figure out if there was a, like a known authorized access or some malicious actor opening and chain something in your system. >>Great, thank you for that lot. Lot of detail and and appreciate that. I want to go somewhere else now cuz Dell has a renowned supply chain reputation. So what about securing the, the supply chain and the server bill of materials? What does Dell specifically do to track the providence of components it uses in its systems so that when the systems arrive, a customer can be a hundred percent certain that that system hasn't been compromised, >>Right? And we've talked about how complex the modern supply chain is, right? And that's no different for service. We have hundreds of confidence on the server and a lot of these form where in order to be configured and run and this former competence could be coming from third parties suppliers. So now the complexity that we are dealing with like was the end to end approach and that's where Dell pays a lot of attention into assuring the security approach approaching and it starts all the way from sourcing competence, right? And then through the design and then even the manufacturing process where we are wetting the personnel leather factories and wetting the factories itself. And the factories also have physical controls, physical security controls built into them and even shipping, right? We have GPS tagging of packages. So all of this is built to ensure supply chain security. >>But a critical aspect of this is also making sure that the systems which are built in the factories are delivered to the customers without any changes or any tapper. And we have a feature called the secure component verification, which is capable of doing this. What the feature does this, when the system gets built in a factory, it generates an inventory of all the competence in the system and it creates a cryptographic certificate based on the signatures presented to this by the competence. And this certificate is stored separately and sent to the customers separately from the system itself. So once the customers receive the system at their end, they can run out to, it generates an inventory of the competence on the system at their end and then compare it to the golden certificate to make sure nothing was changed. And if any changes are detected, we can figure out if there's an authorized change or unauthorize change. >>Again, authorized changes could be like, you know, upgrades to the drives or memory and ized changes could be any sort of temper. So that's the supply chain aspect of it and bill of metal use is also an important aspect to galing security, right? And we provide a software bill of materials, which is basically a list of ingredients of all the software pieces in the platform. So what it allows our customers to do is quickly take a look at all the different pieces and compare it to the vulnerability database and see if any of the vulner which have been discovered out in the wild affected platform. So that's a quick way of figuring out if the platform has any known vulnerabilities and it has not been patched. >>Excellent. That's really good. My last question is, I wonder if you, you know, give us the sort of summary from your perspective, what are the key strengths of Dell server portfolio from a security standpoint? I'm really interested in, you know, the uniqueness and the strong suit that Dell brings to the table, >>Right? Yeah. We have talked enough about the complexity of the environment and how zero risk is necessary for the modern ID environment, right? And this is integral to Dell powered service. And as part of that like you know, security starts with the supply chain. We already talked about the second component verification, which is a beneath feature that Dell platforms have. And on top of it we also have a silicon place platform mode of trust. So this is a key which is programmed into the silicon on the black service during manufacturing and can never be changed after. And this immutable key is what forms the anchor for creating the chain of trust that is used to verify everything in the platform from the hardware and software integrity to the boot, all pieces of it, right? In addition to that, we also have a host of data protection features. >>Whether it is protecting data at risk in news or inflight, we have self encrypting drives which provides scalable and flexible encryption options. And this couple with external key management provides really good protection for your data address. External key management is important because you know, somebody could physically steam the server walk away, but then the keys are not stored on the server, it stood separately. So that provides your action layer of security. And we also have dual layer encryption where you can compliment the hardware encryption on the secure encrypted drives with software level encryption. Inion to this we have identity and access management features like multifactor authentication, single sign on roles, scope and time based access controls, all of which are critical to enable that granular control and checks for zero trust approach. So I would say like, you know, if you look at the Dell feature set, it's pretty comprehensive and we also have the flexibility built in to meet the needs of all customers no matter where they fall in the spectrum of, you know, risk tolerance and security sensitivity. And we also have the capabilities to meet all the regulatory requirements and compliance requirements. So in a nutshell, I would say that you know, Dell Power Service cyber resident infrastructure helps accelerate zero tested option for customers. >>Got it. So you've really thought this through all the various things that that you would do to sort of make sure that your server infrastructure is secure, not compromised, that your supply chain is secure so that your customers can focus on some of the other things that they have to worry about, which are numerous. Thanks Deepak, appreciate you coming on the cube and participating in the program. >>Thank you for having >>You're welcome. In a moment I'll be back to dig into the networking portion of the infrastructure. Stay with us for more coverage of a blueprint for trusted infrastructure and collaboration with Dell Technologies on the cube, your leader in enterprise and emerging tech coverage. We're back with a blueprint for trusted infrastructure and partnership with Dell Technologies in the cube. And we're here with Mahesh Nager, who is a consultant in the area of networking product management at Dell Technologies. Mahesh, welcome, good to see you. >>Hey, good morning Dell's, nice to meet, meet to you as well. >>Hey, so we've been digging into all the parts of the infrastructure stack and now we're gonna look at the all important networking components. Mahesh, when we think about networking in today's environment, we think about the core data center and we're connecting out to various locations including the cloud and both the near and the far edge. So the question is from Dell's perspective, what's unique and challenging about securing network infrastructure that we should know about? >>Yeah, so few years ago IT security and an enterprise was primarily putting a wrapper around data center out because it was constrained to an infrastructure owned and operated by the enterprise for the most part. So putting a rapid around it like a parameter or a firewall was a sufficient response because you could basically control the environment and data small enough control today with the distributed data, intelligent software, different systems, multi-cloud environment and asset service delivery, you know, the infrastructure for the modern era changes the way to secure the network infrastructure In today's, you know, data driven world, it operates everywhere and data has created and accessed everywhere so far from, you know, the centralized monolithic data centers of the past. The biggest challenge is how do we build the network infrastructure of the modern era that are intelligent with automation enabling maximum flexibility and business agility without any compromise on the security. We believe that in this data era, the security transformation must accompany digital transformation. >>Yeah, that's very good. You talked about a couple of things there. Data by its very nature is distributed. There is no perimeter anymore, so you can't just, as you say, put a rapper around it. I like the way you phrase that. So when you think about cyber security resilience from a networking perspective, how do you define that? In other words, what are the basic principles that you adhere to when thinking about securing network infrastructure for your customers? >>So our belief is that cybersecurity and cybersecurity resilience, they need to be holistic, they need to be integrated, scalable, one that span the entire enterprise and with a co and objective and policy implementation. So cybersecurity needs to span across all the devices and running across any application, whether the application resets on the cloud or anywhere else in the infrastructure. From a networking standpoint, what does it mean? It's again, the same principles, right? You know, in order to prevent the threat actors from accessing changing best destroy or stealing sensitive data, this definition holds good for networking as well. So if you look at it from a networking perspective, it's the ability to protect from and withstand attacks on the networking systems as we continue to evolve. This will also include the ability to adapt and recover from these attacks, which is what cyber resilience aspect is all about. So cybersecurity best practices, as you know, is continuously changing the landscape primarily because the cyber threats also continue to evolve. >>Yeah, got it. So I like that. So it's gotta be integrated, it's gotta be scalable, it's gotta be comprehensive, comprehensive and adaptable. You're saying it can't be static, >>Right? Right. So I think, you know, you had a second part of a question, you know, that says what do we, you know, what are the basic principles? You know, when you think about securing network infrastructure, when you're looking at securing the network infrastructure, it revolves around core security capability of the devices that form the network. And what are these security capabilities? These are access control, software integrity and vulnerability response. When you look at access control, it's to ensure that only the authenticated users are able to access the platform and they're able to access only the kind of the assets that they're authorized to based on their user level. Now accessing a network platform like a switch or a rotor for example, is typically used for say, configuration and management of the networking switch. So user access is based on say roles for that matter in a role based access control, whether you are a security admin or a network admin or a storage admin. >>And it's imperative that logging is enable because any of the change to the configuration is actually logged and monitored as that. Talking about software's integrity, it's the ability to ensure that the software that's running on the system has not been compromised. And, and you know, this is important because it could actually, you know, get hold of the system and you know, you could get UND desire results in terms of say validation of the images. It's, it needs to be done through say digital signature. So, so it's important that when you're talking about say, software integrity, a, you are ensuring that the platform is not compromised, you know, is not compromised and be that any upgrades, you know, that happens to the platform is happening through say validated signature. >>Okay. And now, now you've now, so there's access control, software integrity, and I think you, you've got a third element which is i I think response, but please continue. >>Yeah, so you know, the third one is about civil notability. So we follow the same process that's been followed by the rest of the products within the Dell product family. That's to report or identify, you know, any kind of a vulnerability that's being addressed by the Dell product security incident response team. So the networking portfolio is no different, you know, it follows the same process for identification for tri and for resolution of these vulnerabilities. And these are addressed either through patches or through new reasons via networking software. >>Yeah, got it. Okay. So I mean, you didn't say zero trust, but when you were talking about access control, you're really talking about access to only those assets that people are authorized to access. I know zero trust sometimes is a buzzword, but, but you I think gave it, you know, some clarity there. Software integrity, it's about assurance validation, your digital signature you mentioned and, and that there's been no compromise. And then how you respond to incidents in a standard way that can fit into a security framework. So outstanding description, thank you for that. But then the next question is, how does Dell networking fit into the construct of what we've been talking about Dell trusted infrastructure? >>Okay, so networking is the key element in the Dell trusted infrastructure. It provides the interconnect between the service and the storage world. And you know, it's part of any data center configuration for a trusted infrastructure. The network needs to have access control in place where only the authorized nels are able to make change to the network configuration and logging off any of those changes is also done through the logging capabilities. Additionally, we should also ensure that the configuration should provide network isolation between say the management network and the data traffic network because they need to be separate and distinct from each other. And furthermore, even if you look at the data traffic network and now you have things like segmentation isolated segments and via VRF or, or some micro segmentation via partners, this allows various level of security for each of those segments. So it's important you know, that, that the network infrastructure has the ability, you know, to provide all this, this services from a Dell networking security perspective, right? >>You know, there are multiple layer of defense, you know, both at the edge and in the network in this hardware and in the software and essentially, you know, a set of rules and a configuration that's designed to sort of protect the integrity, confidentiality, and accessibility of the network assets. So each network security layer, it implements policies and controls as I said, you know, including send network segmentation. We do have capabilities sources, centralized management automation and capability and scalability for that matter. Now you add all of these things, you know, with the open networking standards or software, different principles and you essentially, you know, reach to the point where you know, you're looking at zero trust network access, which is essentially sort of a building block for increased cloud adoption. If you look at say that you know the different pillars of a zero trust architecture, you know, if you look at the device aspect, you know, we do have support for security for example, we do have say trust platform in a trusted platform models tpms on certain offer products and you know, the physical security know plain, simple old one love port enable from a user trust perspective, we know it's all done via access control days via role based access control and say capability in order to provide say remote authentication or things like say sticky Mac or Mac learning limit and so on. >>If you look at say a transport and decision trust layer, these are essentially, you know, how do you access, you know, this switch, you know, is it by plain hotel net or is it like secure ssh, right? And you know, when a host communicates, you know, to the switch, we do have things like self-signed or is certificate authority based certification. And one of the important aspect is, you know, in terms of, you know, the routing protocol, the routing protocol, say for example BGP for example, we do have the capability to support MD five authentication between the b g peers so that there is no, you know, manages attack, you know, to the network where the routing table is compromised. And the other aspect is about second control plane is here, you know, you know, it's, it's typical that if you don't have a control plane here, you know, it could be flooded and you know, you know, the switch could be compromised by city denial service attacks. >>From an application test perspective, as I mentioned, you know, we do have, you know, the application specific security rules where you could actually define, you know, the specific security rules based on the specific applications, you know, that are running within the system. And I did talk about, say the digital signature and the cryptographic check that we do for authentication and for, I mean rather for the authenticity and the validation of, you know, of the image and the BS and so on and so forth. Finally, you know, the data trust, we are looking at, you know, the network separation, you know, the network separation could happen or VRF plain old wheel Ls, you know, which can bring about sales multi 10 aspects. We talk about some microsegmentation as it applies to nsx for example. The other aspect is, you know, we do have, with our own smart fabric services that's enabled in a fabric, we have a concept of c cluster security. So all of this, you know, the different pillars, they sort of make up for the zero trust infrastructure for the networking assets of an infrastructure. >>Yeah. So thank you for that. There's a, there's a lot to unpack there. You know, one of the premise, the premise really of this, this, this, this segment that we're setting up in this series is really that everything you just mentioned, or a lot of things you just mentioned used to be the responsibility of the security team. And, and the premise that we're putting forth is that because security teams are so stretched thin, you, you gotta shift the vendor community. Dell specifically is shifting a lot of those tasks to their own r and d and taking care of a lot of that. So, cuz scop teams got a lot of other stuff to, to worry about. So my question relates to things like automation, which can help and scalability, what about those topics as it relates to networking infrastructure? >>Okay, our >>Portfolio, it enables state of the automation software, you know, that enables simplifying of the design. So for example, we do have, you know, you know the fabric design center, you know, a tool that automates the design of the fabric and you know, from a deployment and you know, the management of the network infrastructure that are simplicities, you know, using like Ansible s for Sonic for example are, you know, for a better sit and tell story. You know, we do have smart fabric services that can automate the entire fabric, you know, for a storage solution or for, you know, for one of the workloads for example. Now we do help reduce the complexity by closely integrating the management of the physical and the virtual networking infrastructure. And again, you know, we have those capabilities using Sonic or Smart Traffic services. If you look at Sonic for example, right? >>It delivers automated intent based secure containerized network and it has the ability to provide some network visibility and Avan has and, and all of these things are actually valid, you know, for a modern networking infrastructure. So now if you look at Sonic, you know, it's, you know, the usage of those tools, you know, that are available, you know, within the Sonic no is not restricted, you know, just to the data center infrastructure is, it's a unified no, you know, that's well applicable beyond the data center, you know, right up to the edge. Now if you look at our north from a smart traffic OS 10 perspective, you know, as I mentioned, we do have smart traffic services which essentially, you know, simplifies the deployment day zero, I mean rather day one, day two deployment expansion plans and the lifecycle management of our conversion infrastructure and hyper and hyper conversion infrastructure solutions. And finally, in order to enable say, zero touch deployment, we do have, you know, a VP solution with our SD van capability. So these are, you know, ways by which we bring down the complexity by, you know, enhancing the automation capability using, you know, a singular loss that can expand from a data center now right to the edge. >>Great, thank you for that. Last question real quick, just pitch me, what can you summarize from your point of view, what's the strength of the Dell networking portfolio? >>Okay, so from a Dell networking portfolio, we support capabilities at multiple layers. As I mentioned, we're talking about the physical security for examples, say disabling of the unused interface. Sticky Mac and trusted platform modules are the things that to go after. And when you're talking about say secure boot for example, it delivers the authenticity and the integrity of the OS 10 images at the startup. And Secure Boot also protects the startup configuration so that, you know, the startup configuration file is not compromised. And Secure port also enables the workload of prediction, for example, that is at another aspect of software image integrity validation, you know, wherein the image is data for the digital signature, you know, prior to any upgrade process. And if you are looking at secure access control, we do have things like role based access control, SSH to the switches, control plane access control that pre do tags and say access control from multifactor authentication. >>We do have various tech ads for entry control to the network and things like CSE and PRV support, you know, from a federal perspective we do have say logging wherein, you know, any event, any auditing capabilities can be possible by say looking at the clog service, you know, which are pretty much in our transmitter from the devices overts for example, and last we talked about say network segment, you know, say network separation and you know, these, you know, separation, you know, ensures that are, that is, you know, a contained say segment, you know, for a specific purpose or for the specific zone and, you know, just can be implemented by a, a micro segmentation, you know, just a plain old wheel or using virtual route of framework VR for example. >>A lot there. I mean I think frankly, you know, my takeaway is you guys do the heavy lifting in a very complicated topic. So thank you so much for, for coming on the cube and explaining that in in quite some depth. Really appreciate it. >>Thank you indeed. >>Oh, you're very welcome. Okay, in a moment I'll be back to dig into the hyper-converged infrastructure part of the portfolio and look at how when you enter the world of software defined where you're controlling servers and storage and networks via software led system, you could be sure that your infrastructure is trusted and secure. You're watching a blueprint for trusted infrastructure made possible by Dell Technologies and collaboration with the cube, your leader in enterprise and emerging tech coverage, your own west product management security lead at for HCI at Dell Technologies hyper-converged infrastructure. Jerome, welcome. >>Thank you Dave. >>Hey Jerome, in this series of blueprint for trusted infrastructure, we've been digging into the different parts of the infrastructure stack, including storage servers and networking, and now we want to cover hyperconverged infrastructure. So my first question is, what's unique about HCI that presents specific security challenges? What do we need to know? >>So what's unique about hyper-converge infrastructure is the breadth of the security challenge. We can't simply focus on a single type of IT system. So like a server or storage system or a virtualization piece of software, software. I mean HCI is all of those things. So luckily we have excellent partners like VMware, Microsoft, and internal partners like the Dell Power Edge team, the Dell storage team, the Dell networking team, and on and on. These partnerships in these collaborations are what make us successful from a security standpoint. So let me give you an example to illustrate. In the recent past we're seeing growing scope and sophistication in supply chain attacks. This mean an attacker is going to attack your software supply chain upstream so that hopefully a piece of code, malicious code that wasn't identified early in the software supply chain is distributed like a large player, like a VMware or Microsoft or a Dell. So to confront this kind of sophisticated hard to defeat problem, we need short term solutions and we need long term solutions as well. >>So for the short term solution, the obvious thing to do is to patch the vulnerability. The complexity is for our HCI portfolio. We build our software on VMware, so we would have to consume a patch that VMware would produce and provide it to our customers in a timely manner. Luckily VX rail's engineering team has co engineered a release process with VMware that significantly shortens our development life cycle so that VMware would produce a patch and within 14 days we will integrate our own code with the VMware release we will have tested and validated the update and we will give an update to our customers within 14 days of that VMware release. That as a result of this kind of rapid development process, VHA had over 40 releases of software updates last year for a longer term solution. We're partnering with VMware and others to develop a software bill of materials. We work with VMware to consume their software manifest, including their upstream vendors and their open source providers to have a comprehensive list of software components. Then we aren't caught off guard by an unforeseen vulnerability and we're more able to easily detect where the software problem lies so that we can quickly address it. So these are the kind of relationships and solutions that we can co engineer with effective collaborations with our, with our partners. >>Great, thank you for that. That description. So if I had to define what cybersecurity resilience means to HCI or converged infrastructure, and to me my takeaway was you gotta have a short term instant patch solution and then you gotta do an integration in a very short time, you know, two weeks to then have that integration done. And then longer term you have to have a software bill of materials so that you can ensure the providence of all the components help us. Is that a right way to think about cybersecurity resilience? Do you have, you know, a additives to that definition? >>I do. I really think that's site cybersecurity and resilience for hci because like I said, it has sort of unprecedented breadth across our portfolio. It's not a single thing, it's a bit of everything. So really the strength or the secret sauce is to combine all the solutions that our partner develops while integrating them with our own layer. So let me, let me give you an example. So hci, it's a, basically taking a software abstraction of hardware functionality and implementing it into something called the virtualized layer. It's basically the virtual virtualizing hardware functionality, like say a storage controller, you could implement it in hardware, but for hci, for example, in our VX rail portfolio, we, our Vxl product, we integrated it into a product called vsan, which is provided by our partner VMware. So that portfolio of strength is still, you know, through our, through our partnerships. >>So what we do, we integrate these, these security functionality and features in into our product. So our partnership grows to our ecosystem through products like VMware, products like nsx, Horizon, Carbon Black and vSphere. All of them integrate seamlessly with VMware and we also leverage VMware's software, part software partnerships on top of that. So for example, VX supports multifactor authentication through vSphere integration with something called Active Directory Federation services for adfs. So there's a lot of providers that support adfs including Microsoft Azure. So now we can support a wide array of identity providers such as Off Zero or I mentioned Azure or Active Directory through that partnership. So we can leverage all of our partners partnerships as well. So there's sort of a second layer. So being able to secure all of that, that provides a lot of options and flexibility for our customers. So basically to summarize my my answer, we consume all of the security advantages of our partners, but we also expand on them to make a product that is comprehensively secured at multiple layers from the hardware layer that's provided by Dell through Power Edge to the hyper-converged software that we build ourselves to the virtualization layer that we get through our partnerships with Microsoft and VMware. >>Great, I mean that's super helpful. You've mentioned nsx, Horizon, Carbon Black, all the, you know, the VMware component OTH zero, which the developers are gonna love. You got Azure identity, so it's really an ecosystem. So you may have actually answered my next question, but I'm gonna ask it anyway cuz you've got this software defined environment and you're managing servers and networking and storage with this software led approach, how do you ensure that the entire system is secure end to end? >>That's a really great question. So the, the answer is we do testing and validation as part of the engineering process. It's not just bolted on at the end. So when we do, for example, VxRail is the market's only co engineered solution with VMware, other vendors sell VMware as a hyper converged solution, but we actually include security as part of the co-engineering process with VMware. So it's considered when VMware builds their code and their process dovetails with ours because we have a secure development life cycle, which other products might talk about in their discussions with you that we integrate into our engineering life cycle. So because we follow the same framework, all of the, all of the codes should interoperate from a security standpoint. And so when we do our final validation testing when we do a software release, we're already halfway there in ensuring that all these features will give the customers what we promised. >>That's great. All right, let's, let's close pitch me, what would you say is the strong suit summarize the, the strengths of the Dell hyper-converged infrastructure and converged infrastructure portfolio specifically from a security perspective? Jerome? >>So I talked about how hyper hyper-converged infrastructure simplifies security management because basically you're gonna take all of these features that are abstracted in in hardware, they're now abstracted in the virtualization layer. Now you can manage them from a single point of view, whether it would be, say, you know, in for VX rail would be b be center, for example. So by abstracting all this, you make it very easy to manage security and highly flexible because now you don't have limitations around a single vendor. You have a multiple array of choices and partnerships to select. So I would say that is the, the key to making it to hci. Now, what makes Dell the market leader in HCI is not only do we have that functionality, but we also make it exceptionally useful to you because it's co engineered, it's not bolted on. So I gave the example of spo, I gave the example of how we, we modify our software release process with VMware to make it very responsive. >>A couple of other features that we have specific just to HCI are digitally signed LCM updates. This is an example of a feature that we have that's only exclusive to Dell that's not done through a partnership. So we digitally signed our software updates so the user can be sure that the, the update that they're installing into their system is an authentic and unmodified product. So we give it a Dell signature that's invalidated prior to installation. So not only do we consume the features that others develop in a seamless and fully validated way, but we also bolt on our own a specific HCI security features that work with all the other partnerships and give the user an exceptional security experience. So for, for example, the benefit to the customer is you don't have to create a complicated security framework that's hard for your users to use and it's hard for your system administrators to manage it all comes in a package. So it, it can be all managed through vCenter, for example, or, and then the specific hyper, hyper-converged functions can be managed through VxRail manager or through STDC manager. So there's very few pains of glass that the, the administrator or user ever has to worry about. It's all self contained and manageable. >>That makes a lot of sense. So you've got your own infrastructure, you're applying your best practices to that, like the digital signatures, you've got your ecosystem, you're doing co-engineering with the ecosystems, delivering security in a package, minimizing the complexity at the infrastructure level. The reason Jerome, this is so important is because SecOps teams, you know, they gotta deal with cloud security, they gotta deal with multiple clouds. Now they have their shared responsibility model going across multiple cl. They got all this other stuff that they have to worry, they gotta secure the containers and the run time and and, and, and, and the platform and so forth. So they're being asked to do other things. If they have to worry about all the things that you just mentioned, they'll never get, you know, the, the securities is gonna get worse. So what my takeaway is, you're removing that infrastructure piece and saying, Okay guys, you now can focus on those other things that is not necessarily Dell's, you know, domain, but you, you know, you can work with other partners to and your own teams to really nail that. Is that a fair summary? >>I think that is a fair summary because absolutely the worst thing you can do from a security perspective is provide a feature that's so unusable that the administrator disables it or other key security features. So when I work with my partners to define, to define and develop a new security feature, the thing I keep foremost in mind is, will this be something our users want to use and our administrators want to administer? Because if it's not, if it's something that's too difficult or onerous or complex, then I try to find ways to make it more user friendly and practical. And this is a challenge sometimes because we are, our products operate in highly regulated environments and sometimes they have to have certain rules and certain configurations that aren't the most user friendly or management friendly. So I, I put a lot of effort into thinking about how can we make this feature useful while still complying with all the regulations that we have to comply with. And by the way, we're very successful in a highly regulated space. We sell a lot of VxRail, for example, into the Department of Defense and banks and, and other highly regulated environments and we're very successful there. >>Excellent. Okay, Jerome, thanks. We're gonna leave it there for now. I'd love to have you back to talk about the progress that you're making down the road. Things always, you know, advance in the tech industry and so would appreciate that. >>I would look forward to it. Thank you very much, Dave. >>You're really welcome. In a moment I'll be back to summarize the program and offer some resources that can help you on your journey to secure your enterprise infrastructure. I wanna thank our guests for their contributions in helping us understand how investments by a company like Dell can both reduce the need for dev sec up teams to worry about some of the more fundamental security issues around infrastructure and have greater confidence in the quality providence and data protection designed in to core infrastructure like servers, storage, networking, and hyper-converged systems. You know, at the end of the day, whether your workloads are in the cloud, on prem or at the edge, you are responsible for your own security. But vendor r and d and vendor process must play an important role in easing the burden faced by security devs and operation teams. And on behalf of the cube production content and social teams as well as Dell Technologies, we want to thank you for watching a blueprint for trusted infrastructure. Remember part one of this series as well as all the videos associated with this program and of course today's program are available on demand@thecube.net with additional coverage@siliconangle.com. And you can go to dell.com/security solutions dell.com/security solutions to learn more about Dell's approach to securing infrastructure. And there's tons of additional resources that can help you on your journey. This is Dave Valante for the Cube, your leader in enterprise and emerging tech coverage. We'll see you next time.
SUMMARY :
So the game of Whackamole continues. But the diversity of alternatives and infrastructure implementations continues to how the industry generally in Dell specifically, are adapting to We're thrilled to have you here and hope you enjoy the program. We also hit on the storage part of the portfolio. So all of this complexity provides a lot of opportunity for attackers because it's expanding and the security mentality that, you know, security should enable our customers to go focus So I'm glad you you, you hit on that, but so given what you just said, what And in addition to this, Dell makes the commitment that we will rapidly how the threads have evolved, and we have also seen the regulatory trends and So thank you for that. And this is the principles that we use on power Edge, So the idea is that service first and foremost the chassis, the box, the several box is opened up, it logs alerts, and you can figure Great, thank you for that lot. So now the complexity that we are dealing with like was So once the customers receive the system at their end, do is quickly take a look at all the different pieces and compare it to the vulnerability you know, give us the sort of summary from your perspective, what are the key strengths of And as part of that like you know, security starts with the supply chain. And we also have dual layer encryption where you of the other things that they have to worry about, which are numerous. Technologies on the cube, your leader in enterprise and emerging tech coverage. So the question is from Dell's perspective, what's unique and to secure the network infrastructure In today's, you know, data driven world, it operates I like the way you phrase that. So if you look at it from a networking perspective, it's the ability to protect So I like that. kind of the assets that they're authorized to based on their user level. And it's imperative that logging is enable because any of the change to and I think you, you've got a third element which is i I think response, So the networking portfolio is no different, you know, it follows the same process for identification for tri and And then how you respond to incidents in a standard way has the ability, you know, to provide all this, this services from a Dell networking security You know, there are multiple layer of defense, you know, both at the edge and in the network in And one of the important aspect is, you know, in terms of, you know, the routing protocol, the specific security rules based on the specific applications, you know, that are running within the system. really that everything you just mentioned, or a lot of things you just mentioned used to be the responsibility design of the fabric and you know, from a deployment and you know, the management of the network and all of these things are actually valid, you know, for a modern networking infrastructure. just pitch me, what can you summarize from your point of view, is data for the digital signature, you know, prior to any upgrade process. can be possible by say looking at the clog service, you know, I mean I think frankly, you know, my takeaway is you of the portfolio and look at how when you enter the world of software defined where you're controlling different parts of the infrastructure stack, including storage servers this kind of sophisticated hard to defeat problem, we need short term So for the short term solution, the obvious thing to do is to patch bill of materials so that you can ensure the providence of all the components help So really the strength or the secret sauce is to combine all the So our partnership grows to our ecosystem through products like VMware, you know, the VMware component OTH zero, which the developers are gonna love. life cycle, which other products might talk about in their discussions with you that we integrate into All right, let's, let's close pitch me, what would you say is the strong suit summarize So I gave the example of spo, I gave the example of how So for, for example, the benefit to the customer is you The reason Jerome, this is so important is because SecOps teams, you know, they gotta deal with cloud security, And by the way, we're very successful in a highly regulated space. I'd love to have you back to talk about the progress that you're making down the Thank you very much, Dave. in the quality providence and data protection designed in to core infrastructure like
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Jerome | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
Dave Valante | PERSON | 0.99+ |
Deepak | PERSON | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
Mahesh Nager | PERSON | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
Jerome West | PERSON | 0.99+ |
Mahesh | PERSON | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
demand@thecube.net | OTHER | 0.99+ |
Department of Defense | ORGANIZATION | 0.99+ |
Dave Ante | PERSON | 0.99+ |
second part | QUANTITY | 0.99+ |
first question | QUANTITY | 0.99+ |
VX rail | ORGANIZATION | 0.99+ |
First | QUANTITY | 0.99+ |
two weeks | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
Deepak Arage | PERSON | 0.99+ |
14 days | QUANTITY | 0.99+ |
second component | QUANTITY | 0.99+ |
second layer | QUANTITY | 0.99+ |
one | QUANTITY | 0.99+ |
today | DATE | 0.99+ |
A Blueprint for Trusted Infrastructure Made Possible | TITLE | 0.99+ |
hundreds | QUANTITY | 0.99+ |
one part | QUANTITY | 0.99+ |
both | QUANTITY | 0.98+ |
VMware | ORGANIZATION | 0.98+ |
VHA | ORGANIZATION | 0.98+ |
coverage@siliconangle.com | OTHER | 0.98+ |
hundred percent | QUANTITY | 0.98+ |
each | QUANTITY | 0.98+ |
vSphere | TITLE | 0.98+ |
dell.com/security | OTHER | 0.98+ |
Jerome West, Dell Technologies
(upbeat music) >> We're back with Jerome West, the Product Management Security Lead for HCI at Dell Technologies Hyper-Converged Infrastructure. Jerome, welcome. >> Thank you, Dave. >> Hey, Jerome, in this series "A Blueprint for Trusted Infrastructure," we've been digging into the different parts of the infrastructure stack, including storage servers and networking, and now we want to cover hyper-converged infrastructure. So my first question is what's unique about HCI that presents specific security challenges? What do we need to know? >> So what's unique about hyper-converged infrastructure is the breadth of the security challenge. We can't simply focus on a single type of IT system, so like a server or a storage system or a virtualization piece of software. I mean, HCI is all of those things. So luckily we have excellent partners like VMware, Microsoft and internal partners, like the Dell Power Edge Team, the Dell Storage Team, the Dell Networking Team, and on and on. These partnerships and these collaborations are what make us successful from a security standpoint. So let me give you an example to illustrate. In the recent past, we're seeing growing scope and sophistication in supply chain attacks. This means an attacker is going to attack your software supply chain upstream, so that hopefully a piece of code, malicious code that wasn't identified early in the software supply chain is distributed like a large player, like a VMware or a Microsoft or a Dell. So to confront this kind of sophisticated hard to defeat problem, we need short-term solutions and we need long-term solutions as well. So for the short-term solution, the obvious thing to do is to patch the vulnerability. The complexity is for our HCI portfolio, we build our software on VMware. So we would have to consume a patch that VMware would produce and provide it to our customers in a timely manner. Luckily, VxRail's engineering team has co engineered a release process with VMware that significantly shortens our development life cycle, so that VMware will produce a patch, and within 14 days we will integrate our own code with the VMware release. We will have tested and validated the update, and we will give an update to our customers within 14 days of that VMware release. That as a result of this kind of rapid development process, VxRail had over 40 releases of software updates last year. For a longer term solution, we're partnering with VMware and others to develop a software bill of materials. We work with VMware to consume their software manifest including their upstream vendors and their open source providers to have a comprehensive list of software components. Then we aren't caught off guard by an unforeseen vulnerability, and we're more able to easily detect where the software problem lies so that we can quickly address it. So these are the kind of relationships and solutions that we can co-engineer with effective collaborations with our partners. >> Great, thank you for that description. So if I had to define what cybersecurity resilience means to HCI or converged infrastructure, to me, my takeaway was you got to have a short-term instant patch solution and then you got to do an integration in a very short time, you know, two weeks to then have that integration done. And then longer-term, you have to have a software bill of materials so that you can ensure the provenance of all the components. Help us, is that a right way to think about cybersecurity resilience? Do you have, you know, additives to that definition? >> I do. I really think that cybersecurity and resilience for HCI, because like I said it has sort of unprecedented breadth across our portfolio. It's not a single thing. It's a bit of everything. So really the strength or the secret sauce is to combine all the solutions that our partner develops while integrating them with our own layer. So let me give you an example. So HCI, it's a basically taking a software abstraction of hardware functionality and implementing it into something called the virtualized layer. It's basically the virtualizing hardware functionality, like say a storage controller. You could implement it in the hardware, but for HCI, for example, in our VxRail portfolio, our VxRail product, we integrated it into a product called vSan which is provided by our partner VMware. So that portfolio strength is still, you know, through our partnerships. So what we do, we integrate these security functionality and features into our product. So our partnership grows through our ecosystem through products like VMware products, like NSX, Horizon, Carbon Black and vSphere. All of them integrate seamlessly with VMware. And we also leverage VMware's software partnerships on top of that. So for example, VxRail supports multifactor authentication through vSphere's integration with something called Active Directory Federation Services or ADFS. So there is a lot of providers that support ADFS, including Microsoft Azure. So now we can support a wide array of identity providers such as Auth0, or I mentioned Azure or Active Directory through that partnership. So we can leverage all of our partners' partnerships as well. So there's sort of a second layer. So being able to secure all of that, that provides a lot of options and flexibility for our customers. So basically to summarize my answer, we consume all of the security advantages of our partners, but we also expand on them to make a product that is comprehensively secured at multiple layers from the hardware layer that's provided by Dell through Power Edge to the hyper-converged software that we build ourselves to the virtualization layer that we get through our partnerships with Microsoft and VMware. >> Great, I mean, that's super helpful. You've mentioned NSX, Horizon, Carbon Black, all the you know, the VMware component, Auth0, which the developers are going to love. You got Azure Identity. So it's really an ecosystem. So you may have actually answered my next question, but I'm going to ask it anyway cause you've got this software-defined environment, and you're managing servers and networking and storage with this software-led approach. How do you ensure that the entire system is secure end to end? >> That's a really great question. So the answer is we do testing and validation as part of the engineering process. It's not just bolted on at the end. So when we do, for example VxRail is the market's only co-engineered solution with VMware. Other vendors sell VMware as a hyper-converged solution, but we actually include security as part of the co-engineering process with VMware. So it's considered when VMware builds their code, and their process dovetails with ours because we have a secure development lifecycle which other products might talk about in their discussions with you, that we integrate into our engineering lifecycle. So because we follow the same framework, all of the code should inter-operate from a security standpoint. And so when we do our final validation testing, when we do a software release, we're already halfway there in ensuring that all these features will give the customers what we promised. >> That's great. All right, let's close. Pitch me. What would you say is the strong suit, summarize the the strengths of the Dell hyper-converged infrastructure and converged infrastructure portfolio, specifically from a security perspective, Jerome? >> So I talked about how hyper-converged infrastructure simplifies security management because basically you're going to take all of these features that are abstracted in hardware. They're not abstracted in the virtualization layer. Now you can manage them from a single point of view, whether it would be say, you know, for VxRail it would be vCenter, for example. So by abstracting all this, you make it very easy to manage security and highly flexible because now you don't have limitations around a single vendor. You have a multiple array of choices and partnerships to select. So I would say that is the key to making, to HCI. Now what makes Dell the market leader in HCI is not only do we have that functionality, but we also make it exceptionally useful to you because it's co-engineered. It's not bolted on. So I gave the example of SBOM. I gave the example of how we modify our software release process with VMware to make it very responsive. A couple of other features that we have specific just to HCI are digitally signed LCM updates. This is an example of a feature that we have that's only exclusive to Dell. It's not done through a partnership. So we digitally sign our software updates. So the user can be sure that the update that they're installing into their system is an authentic and unmodified product. So we give it a Dell signature that's invalidated prior to installation. So not only do we consume the features that others develop in a seamless and fully validated way, but we also bolt on our own specific HCI security features that work with all the other partnerships and give the user an exceptional security experience. So for example, the benefit to the customer is you don't have to create a complicated security framework. That's hard for your users to use, and it's hard for your system administrators to manage. It all comes in a package, so it can be all managed through vCenter, for example. And then the specific hyper-converged functions can be managed through VxRail manager or through STDC manager. So there's very few panes of glass that the administrator or user ever has to worry about. It's all self-contained and manageable. >> That makes a lot of sense. So you've got your own infrastructure. You're applying your best practices to that like the digital signatures. You've got your ecosystem. You're doing co-engineering with the ecosystems, delivering security in a package, minimizing the complexity at the infrastructure level. The reason, Jerome, this is so important is because SecOps teams, you know, they got to deal with Cloud security. They got to deal with multiple Clouds. Now they have their shared responsibility model going across multiple. They got all this other stuff that they have to worry. They got to secure the containers and the run time and the platform and so forth. So they're being asked to do other things. If they have to worry about all the things that you just mentioned, they'll never get, you know, the security is just going to get worse. So my takeaway is you're removing that infrastructure piece and saying, okay, guys, you now can focus on those other things that is not necessarily Dell's, you know, domain, but you, you know, you can work with other partners and your own teams to really nail that. Is that a fair summary? >> I think that is a fair summary because absolutely the worst thing you can do from a security perspective is provide a feature that's so unusable that the administrator disables it or other key security features. So when I work with my partners to define and develop a new security feature, the thing I keep foremost in mind is will this be something our users want to use and our administrators want to administer? Because if it's not, if it's something that's too difficult or onerous or complex, then I try to find ways to make it more user-friendly and practical. And this is a challenge sometimes because our products operate in highly regulated environments, and sometimes they have to have certain rules and certain configurations that aren't the most user friendly or management friendly. So I put a lot of effort into thinking about how can we make this feature useful while still complying with all the regulations that we have to comply with. And by the way, we're very successful in a highly regulated space. We sell a lot of VxRail, for example, into the Department of Defense and banks and other highly regulated environments. And we're very successful there. >> Excellent, okay, Jerome, thanks. We're going to leave it there for now. I'd love to have you back to talk about the progress that you're making down the road. Things always, you know, advance in the tech industry, and so would appreciate that >> I would look forward to it. Thank you very much, Dave. >> You're really welcome. In a moment, I'll be back to summarize the program and offer some resources that can help you on your journey to secure your enterprise infrastructure. (upbeat music)
SUMMARY :
the Product Management Security Lead and now we want to cover So for the short-term solution, So if I had to define what So really the strength or the secret sauce all the you know, the VMware component, So the answer is we do of the Dell hyper-converged infrastructure So for example, the So they're being asked to do other things. that aren't the most user I'd love to have you back Thank you very much, Dave. and offer some resources that can help you
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Jerome | PERSON | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
Dave | PERSON | 0.99+ |
Jerome West | PERSON | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
first question | QUANTITY | 0.99+ |
Department of Defense | ORGANIZATION | 0.99+ |
second layer | QUANTITY | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
two weeks | QUANTITY | 0.99+ |
HCI | ORGANIZATION | 0.99+ |
last year | DATE | 0.99+ |
VMware | ORGANIZATION | 0.99+ |
VxRail | ORGANIZATION | 0.99+ |
14 days | QUANTITY | 0.99+ |
A Blueprint for Trusted Infrastructure | TITLE | 0.98+ |
NSX | ORGANIZATION | 0.98+ |
VxRail | TITLE | 0.97+ |
Dell Networking Team | ORGANIZATION | 0.97+ |
vCenter | TITLE | 0.97+ |
over 40 releases | QUANTITY | 0.95+ |
Azure | TITLE | 0.95+ |
Auth0 | ORGANIZATION | 0.94+ |
single thing | QUANTITY | 0.94+ |
single vendor | QUANTITY | 0.92+ |
vSan | TITLE | 0.91+ |
Dell Storage Team | ORGANIZATION | 0.91+ |
SBOM | ORGANIZATION | 0.9+ |
Horizon | ORGANIZATION | 0.89+ |
vSphere | TITLE | 0.89+ |
single point | QUANTITY | 0.89+ |
Carbon Black | ORGANIZATION | 0.85+ |
Azure Identity | TITLE | 0.84+ |
ADFS | TITLE | 0.81+ |
Dell Power Edge Team | ORGANIZATION | 0.78+ |
Power Edge | TITLE | 0.75+ |
single type | QUANTITY | 0.74+ |
vSphere | ORGANIZATION | 0.69+ |
couple | QUANTITY | 0.68+ |
VMware | TITLE | 0.6+ |
HCI | TITLE | 0.47+ |
SecOps | ORGANIZATION | 0.45+ |
HCI | OTHER | 0.38+ |
Supercloud Enablers and Blockers | Supercloud22
>>Welcome back everyone to Supercloud 22. This is the Cube's live presentation streaming out virtually our inaugural event, kind of a pilot I'm John Furo of the cube with Dave ante. Got a great panel here to discuss the enablers and blockers question mark for superclouds. We got, we got kit Culbert, CTO of VMware basketball, Gor CEO platform nine, and has Pani who is the CEO of RA systems. We got a mix of the big leader, VMware and the upstart companies growing into the same space, all cloud native friends of the cube. Great to see you guys. Thanks for coming on. Thank >>You. >>Start. All right. So there's no debate cloud native is booming. We see that clearly Kubernetes became a unifying force. It's an ops layer kind of almost like a kind of a midline between dev and ops DevSecOps is happening at scale. What are the blockers and what are the enablers for super cloud? What do we need? Let's see what do get your take? >>Sure. So UN I spoke about this a little bit in, at New York summit, the big trend I'm seeing, and it's, it's a blocker that's being sort of taken care of by enterprises, which is, you know, until very recently, Kubernetes was effectively a project that NA would take on. They'd try things out, they'd go to the cloud, they'd spin things up. And then the next team would come and they'd do the same things. And there was no consistency. There was no ization, it's a mess, right? It's all over the place. Some things are moving fast. Some things are not going fast and this is not how enterprises do business, right? That's not how things work. Traditionally enterprises have had it organizations that create standards, right? So those it organizations now kind of are starting to think like a platform organization. So centrally come up with the right framework for all application teams to consume infrastructure, modern infrastructure. So I'm not using the word Kubernetes here because Kubernetes is an enabler. We are a Kubernetes company, obviously, but it's about modern applications, modern infrastructure. So stepping back and thinking about it as to how an enterprise will do this across the board is the right answer. And I'm seeing this happen in a pretty significant way across all the large enterprises I talked to. >>That's why you've had a great career. And we talked before you came on Opia you did a turnaround there, we, you even go back to the old days of the web web 1.0 and early software. You've seen the movie before. >>Yes. >>You know, complexity is not solved way more complexity. This is kind of the old enterprise way. And they don't want that. They've seen the benefits of self-service. They see architecture and standards as being an enabler. Where are we in here in the market? Is, are we positioned in your opinion for customers to get the value of a super cloud? >>Absolutely. So if you think about, first of all, I think the topic of cloud native developers and app developers picking containers and Kubernetes, that's a done deal, right? That has already happened. So every cloud native developer is already using these tools. Now, I think as has been discussed today in you, in the earlier sessions, is, are the operations and infrastructure catching up or they're lagging behind, right? As more and more developers are using multi-cloud technologies, enterprises are creating a choice, I think operations and what we also strongly believe that's actually part of the name of our company is, is a platform. The platform of which a company uses to transform itself to be cloud native is the big opportunity. I don't think it's a blocker, but it's a huge opportunity. And I think this is where, you know, as you can't stop developers from developing on different clouds, private, public, multi edge, that's gonna happen. Innovation is gonna continue. But then how does the infrastructure in the platform make it seamless? Right? And almost treat all these different clouds as a single pan super cloud platform. That's I think is the >>Opportunity. So we in a platform more than with other companies, or is there one unified platform called cloud native? We know customers been buying tools from security they're they got so many tools in, in their tools shed, so to speak. What is that platform? I mean, is it more unique, fragmentation? Is it unified? >>I mean, if you think about it, a couple of it's a combination of tools that are stitched together to reach a purpose, right? So if you think about, you know, APIs continued APIs that's been discussed earlier today, I think that's, that should be standardized. The other thing is always on monitoring because I think that's a very key aspect. Once you build it, then as the enterprises are using it, the always on monitoring becomes. So I think it's a combination of capabilities that are stitched together to enable the acceleration for companies to become cloud native. >>I, I have a thought on a blocker. None of you guys are gonna like it. Oh, maybe you can come. Maybe some of you guys probably won't but comment, but maybe John will. I think AWS is a blocker to Supercloud cuz they, they don't want those cross cloud service. It's like they, they, for years they wouldn't even say multicloud. The first time I heard it was in Boston three weeks ago, I actually heard it. So Hey, you see, >>You know, I'm gonna disagree with that. Okay. >>But, but okay, go ahead. All >>So we'll get their reaction. So my, we just heard from the last panel that the security should be leading the consortium. Yeah. Because they're, they're not the enemy they're actually, >>Maybe they should be >>Well back in the old web days, when standards were driving things, you had a common enemy, proprietary NASAs, proprietary networking stack. So the evil empire was at and T that's owned Unix. If you remember, they copyright that. >>So you think they're greasing the skids for, >>I think Supercloud, I think the hyperscalers could cuz they're driving the CapEx, they're providing the value. So in my opinion, Amazon and Azure, whoever does the right thing first can win every, maybe >>This is how Google could catch up >>It. It could be a, it could be a Slingshot move. It could, you know, boomerang, someone to the front of the line or extend. Amazon's already huge lead. So if I'm AWS, if I'm Adam Slosky and I'm talking to Andy Jassy, he says, how am I gonna differentiate myself? I'd say, I'm gonna come in and own multicloud. I'm gonna own Supercloud we are the Supercloud and you work with AWS's primitives in a way that makes services work. I would go for that. I'd be like, okay, show me more. What do you >>Think? I, I, I don't think think any one company is going to be a super cloud because I think yes, there is going to be a lot of workloads on public clouds, but there's a huge amount of workloads at the enterprise at the edge at the store. I think those will continue for various reasons, whether it's data, sovereignty regulations. So I think it's going to be a combination. Everybody's not gonna go to one, you know, cloud, it's going to be an amalgamation. >>Okay. But I I've argued that snowflake is a form of a super data cloud and a very specific use case, you know, Aviatrix is trying to be a network, you know, layer and you know, sneak in a security, let me on and on, on a lot of small you get, you get super cloud stove pipes, but, but nonetheless you're, you're still abstracting. I mean, we've this industry attractions, right? >>Well this, this concept I completely agree with, right? This idea that, so, so one of the, my is that right now enterprises buy 500 different technologies and they have to become PhDs in 500 different things. It's just never gonna happen skills issue, which is no way. Right. So what's gonna happen is all of these providers are gonna essentially become managed service providers. Cloud is in manifestation of that. Snowflake is a ation data breaks is a manifestation of that. Right? So in our general industry, there's gonna be a handful of platforms. Right. And they're gonna work across these clouds. Amazon may have one too. Right? Look, they, they, they, for the longest time sort of ignored OnPrem, but now they have something called SSA, which runs on Preem. Right. Why, why would they bother? Because, well, obviously there's a lot of money to be made in a data center as well. >>So I, my sense is they get it completely understand and appreciate that there's other things outside of Amazon. But in terms of what Bosco was talking about, my sense is, you know, these multiple platforms will come about. And to the point we were making earlier about standardization and I, I mean, is it gonna be one company or is it gonna be standards that everybody will else will adopt? There's a topic that the three of us have talked about before, which is this vCenter for Kubernetes. Right. And all due respect to kit. Right. My sense is that there there's gonna be multiple companies that are gonna start working towards a vCenter for Kubernetes. And it is right. I mean, that's how I've, I mean, I've been thinking about this before and a half years, including >>VMware. >>Yeah. And you know, and we, we should compare notes. Right. But what's gonna happen is there was a, there was a distinct advantage VMware had back in the day because ESX was their product. Right. And that was a standard right now. What's the ESX in the new it's sort of Kubernetes, right. I mean, it's on bare metal for the most part or whatever VMs. So that's a standard, that's got standardized APIs, the things around it are standardized APIs. So what is the unfair advantage that one company has other than execution? >>Nothing. Well also composability if you over rotate on Kubernetes, for example, and not take advantage of say C two, for instance. Totally, >>Totally. >>It's a mix and match. >>Yeah. But I think, I think if you get too focused on Kubernetes, it's a means to an end. Yeah. But at the end of the day, it it's a mean to end end. And I think all these tools, there's a lot of standardization happening that's gonna happen. Right. And no one vendor is gonna control that. Right. It's it's going to be, it's gonna continue. I think how you bring these together and orchestrate right. And manage the service. Because I think that if you think about the lack of skills to keep up with the operations and platforms is one of the largest inhibitors right now for enterprises to move as fast as they want to become cloud native. >>And you have the shiny new toy problem kit where people just go and grab it. You know, Keith Townsend has a, as a quote, he says, look, we essentially move at the speed of the CIO or else we're going too fast or too slow. So, so the, to, to the point about the new toy now I've got new skills. >>Yep. Well, so this has been a really good discussion. And I think so there's a couple of things, right. Going back to the, the paper that we wrote, right. How we have these different sort of layers of multi-cloud services or, or categories of multi-cloud services. And it's exactly to capture some of the ex different examples you just mentioned. And yeah, the challenge is that each of them by themselves are a little bit of an island today. Like you don't have that extra level of integration. And so what the platform teams typically do is try to add that extra glue to make the experience more seamless for the, the, the, you know, developers at that company. And so like, you know, for instance, things like identity. So the nice thing about going to a single public cloud is that there's one, usually one identity system for everything. And that's great. All the different services roles are, you know, are back all that. Stuff's all centralized, but you don't have that when you're going across many different multicloud services. So what does that look like? So I think there's some of these different crosscutting concerns that we need to look at how we standardize on as an industry. And that's, again, one of the things >>You felt that part. And I think, I think also the other key thing is yes, you can always say I'll put everything in one world, world garden and I'm done. Yeah. Okay. But that's not the reality because at some point you need, the flexibility and cost comes into play and flexibility to move comes into play. And I think that is a key factor. Yep. Right. >>Yeah. And so like, so then the question is, what degrees of freedom do you give yourself there? And I think that's the architectural question is how you, how do you design it? What sort of abstractions do you leverage? And I think that goes back to some of our discussion before, which is, do you directly go on top of a native cloud service or do you use a multi-cloud service? >>But I think it's a combination of, I don't think it's either or no, it's not, it's not an either or you have to have the ability to choose a public cloud or do it private. Yeah. At the same time you don't change. It's like a common dictionary, right. You're not gonna change every time the accent changes, you know? So that's, >>So here's a question for you guys. So what has to happen for super clouds, be existing assume that AWS and Azure and Google, aren't gonna sit still assume that maybe they normalize into some sort of swim lane or position that they have to rationalize. What, assuming they're not gonna sit still, what has to happen for super clouds to, to actually work >>Well? Well, I think, you know, really quick going back to the platform team point, I would say that the platform teams at various companies, and we got one at VMware two, they're creating a rudimentary form of a super cloud. Right. Cause they, you know, absolutely like if, if they are supporting multiple clouds, like all the things they're stitching together and all that work, that is a super cloud. The problem is that there's not really a standard approach or architecture or reusable things to enable that. I think that's really what's missing. >>Yeah. But I think the key here is standard us reusable. Because for example, we have customers who are in doesn't matter where they are, some of their loads are in public cloud. Some are in private, some are at the edge, but they're still using the same platform. Yeah. Right. So it is a standard open source based technology. So it is standard. There's no lock in for them from an infrastructure point of view. Yep. And it gives them the flexibility because certain apps, you wanna put it on the public cloud, certain apps, you do not, you need the, I mean, for example, some of the AI, I think earlier discussion that was going on about chips and AI and ML workloads. I mean, think about moving all of that to a public cloud, to, and I think a lot of machine learning and AI applications are going to happen where the data is getting created at the edge. Yeah. At the edge >>Public cloud. It's not gonna happen cloud. It's gonna be real time in, >>It's gonna the end time. And so therefore you have to decide based on your workload, what are you gonna move all the way to a public cloud? And what are you need to do to make business decisions at this spot where the data is created? >>That's a huge disruptor potentially to Supercloud. This is a whole new architecture that emerges at the edge with a whole new set of economics. I >>Think the edge is gonna be like massively disruptive. >>I think it's gonna think about, if you think about the edge, go beyond just the classic definition of edge. Think about branches in stores, retail stores. Yeah. Right. I mean, you cannot shut down retail store because you lost connectivity to the network or something you still have to serve your company >>Edge is a disruptive enabler. I think it's gonna change potentially change the position of the players in the business. Whoever embraces the edge. >>Yeah. Maybe going back to the question that you had asked before, which is what is, what is a framework for a super cloud? So you said something that is important, which is your team's burning one. Yeah. I met that team. Actually. They seem to be very sharp guys. >>They're they're mine. They're my are great. They're awesome. >>We got a deal going on here. Yeah. >>I tried. We have >>It. >>So this is the interesting part, right? So I will pause it that the super cloud of the future will be a company that owns zero servers and no network. >>Okay. >>That's gonna happen. Okay. So I just kind of it's >>Full point you >>Made before I made that point just about the public cloud, just so Mr. >>Yeah, yeah, yeah, yeah. No, that really interesting. Not >>We that, so I've thought about this a long time that in my opinion, and I've, I'm, I'm sure I've said this to you, John, that, you know, the one company that I've always believed has the best shot at doing this well is actually VMware because that's the one company that's, you know, that there's, there's no, you know, infrastructure back haul. Right. You know, that you're carrying, but, but in terms of thinking and getting there, you know, being, being a company that can do it is not the same as being the company who has done it. That's a, there's a distance, but >>I have to defend that now because hyperscalers are not gonna be able to super cloud. They're not now it's hype. See, agreed, great point. Public clouds will be part of the super cloud. Yeah, totally. But they will not, the hyperscalers are not building super clouds. Totally. They're blocking it. Right. Yeah. >>They're enabling it. >>We agree on >>No, they're enabling >>Because it's, it's not in there to their advantage. Right. Look, the, the snowflake example you gave is the pivotal example in this conversation. Yep. Right. Why does snowflake exist at all when Redshift exists and all these other things exist because they provide value that is beyond a single clouds purview. Right. And at that point, just step back from our platforms and what we sell. Forget about that for a minute. Right. It's it's about, look, I think, I think this, we are, this market is early, we're out early, right. 10 years from now, what will a company look like? That actually solves a superly problem they're gonna solve for yeah. Kubernetes, whatever. Right. But they're gonna solve for truly modern applications. >>Yeah. They're gonna refactor application that has new economics new value, right. >>At that point, this idea of edge and cloud, forget about it. Right. This is all distribution issues, right. It doesn't really matter. Is it retail or not? Yeah, absolutely. These are places, but, but the way, the right way to think about this is not about edge versus cloud, right? This is about an app. Sometimes it needs to run in one location and it's good enough. Sometimes it needs to run in 10,000 locations and, and it's a distribution issue. I've always believed there's this idea of edge versus cloud. This is BS, right? Because it, it is a cloud over a different size. Sure. But, but I'm making a slightly different point. Sure. Which is, it's a distribution problem. Right. If you step back and think about distribution, my app could run in Azure or AWS or in a retail store, in a branch or whatever. Right. >>And once that is done, the question is, how am I in, in making all this happen? There was a point made in the prior conversation, in the, in the session about a database kind of popping up in the place where I needed to run. Okay. Nobody does that today, by the way. Right. At least truly well right about that, sir, that will come. Right? Yeah. But when that comes, my application is a conglomerate of compute data. I don't know a, a service bus and network and all these things and they will all kind of pop together. That company does not exist >>Today. Well, we'll, we will be documenting which we have more time. We're gonna document it. We have to unfortunately stop this panel because it's awesome. We can go for another hour. Sure. Let's bring you guys back, but that's it. The super cloud of the future will look like something and we're gonna debate it. And speaking of snowflake, we have the co-founder here next to sit down with us to talk about what he thinks about this super cloud. He, he probably heard the comment, come back more coverage. This break with the co-founder of snowflake after the short break. >>Do thank you.
SUMMARY :
Great to see you guys. What are the blockers So stepping back and thinking about it as to how an enterprise will do this across the board is the right answer. And we talked before you came on Opia you did a turnaround there, we, This is kind of the old enterprise And I think this is where, you know, So we in a platform more than with other companies, or is there one unified platform called cloud So if you think about, you know, APIs continued APIs that's been discussed earlier today, I think AWS is a blocker to Supercloud cuz they, they don't want those You know, I'm gonna disagree with that. But, but okay, go ahead. So my, we just heard from the last panel that the security should be leading Well back in the old web days, when standards were driving things, you had a common enemy, proprietary NASAs, I think Supercloud, I think the hyperscalers could cuz they're driving the CapEx, they're providing the value. I'm gonna own Supercloud we are the Supercloud and you work with AWS's primitives in a way Everybody's not gonna go to one, you know, cloud, it's going to be an amalgamation. use case, you know, Aviatrix is trying to be a network, you know, layer and you know, So in our general industry, there's gonna be a handful of platforms. But in terms of what Bosco was talking about, my sense is, you know, these multiple platforms I mean, it's on bare metal for the most part or whatever VMs. Well also composability if you over rotate on Kubernetes, for example, and not take advantage of say C Because I think that if you think about the lack of skills to And you have the shiny new toy problem kit where people just go and grab it. So the nice thing about going to a single public cloud is that And I think, I think also the other key thing is yes, you can always say I'll put everything in one world, And I think that goes back to some of our discussion before, which is, do you directly go on top of a native cloud But I think it's a combination of, I don't think it's either or no, it's not, it's not an either or you have to have the ability So here's a question for you guys. Well, I think, you know, really quick going back to the platform team point, I would say that the And it gives them the flexibility because certain apps, you wanna put it on the public cloud, It's gonna be real time in, And so therefore you have to decide based on your workload, what are you gonna move That's a huge disruptor potentially to Supercloud. I think it's gonna think about, if you think about the edge, go beyond just the classic definition of edge. I think it's gonna change potentially change the position of the players in So you said something that is important, which is your team's burning one. They're they're mine. We got a deal going on here. I tried. of the future will be a company that owns zero servers and no network. That's gonna happen. No, that really interesting. actually VMware because that's the one company that's, you know, that there's, there's no, you know, infrastructure back I have to defend that now because hyperscalers are not gonna be able to super cloud. And at that point, just step back from our platforms and what we sell. If you step back and think about distribution, my app could run in Azure or AWS or in a retail store, And once that is done, the question is, how am I in, in making all this happen? Let's bring you guys back, but that's it.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Adam Slosky | PERSON | 0.99+ |
John | PERSON | 0.99+ |
Andy Jassy | PERSON | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Keith Townsend | PERSON | 0.99+ |
Boston | LOCATION | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
ORGANIZATION | 0.99+ | |
John Furo | PERSON | 0.99+ |
Bosco | ORGANIZATION | 0.99+ |
Aviatrix | ORGANIZATION | 0.99+ |
10,000 locations | QUANTITY | 0.99+ |
Pani | PERSON | 0.99+ |
three | QUANTITY | 0.99+ |
three weeks ago | DATE | 0.99+ |
ESX | TITLE | 0.99+ |
NASAs | ORGANIZATION | 0.99+ |
Today | DATE | 0.99+ |
today | DATE | 0.99+ |
one location | QUANTITY | 0.99+ |
VMware | ORGANIZATION | 0.99+ |
500 different technologies | QUANTITY | 0.99+ |
one | QUANTITY | 0.98+ |
Unix | ORGANIZATION | 0.97+ |
Supercloud | ORGANIZATION | 0.97+ |
each | QUANTITY | 0.97+ |
first | QUANTITY | 0.97+ |
500 different things | QUANTITY | 0.97+ |
single | QUANTITY | 0.96+ |
Azure | ORGANIZATION | 0.96+ |
Supercloud22 | ORGANIZATION | 0.96+ |
one company | QUANTITY | 0.96+ |
first time | QUANTITY | 0.93+ |
zero servers | QUANTITY | 0.92+ |
Dave ante | PERSON | 0.92+ |
Kubernetes | TITLE | 0.91+ |
kit Culbert | PERSON | 0.91+ |
RA systems | ORGANIZATION | 0.9+ |
NA | ORGANIZATION | 0.9+ |
Cube | ORGANIZATION | 0.87+ |
single clouds | QUANTITY | 0.86+ |
one world | QUANTITY | 0.86+ |
Kubernetes | ORGANIZATION | 0.85+ |
CapEx | ORGANIZATION | 0.85+ |
superclouds | ORGANIZATION | 0.85+ |
Supercloud 22 | EVENT | 0.84+ |
CTO | PERSON | 0.83+ |
VMware | TITLE | 0.82+ |
one identity system | QUANTITY | 0.81+ |
single pan | QUANTITY | 0.8+ |
multicloud | ORGANIZATION | 0.79+ |
earlier today | DATE | 0.78+ |
nine | QUANTITY | 0.76+ |
VMware basketball | ORGANIZATION | 0.76+ |
vCenter for Kuberne | TITLE | 0.76+ |
Gor | ORGANIZATION | 0.74+ |
Redshift | TITLE | 0.73+ |
Snowflake | TITLE | 0.73+ |
OnPrem | ORGANIZATION | 0.73+ |
Azure | TITLE | 0.7+ |
Opia | ORGANIZATION | 0.68+ |
New York | EVENT | 0.67+ |
SSA | TITLE | 0.66+ |
C two | TITLE | 0.6+ |
10 years | QUANTITY | 0.59+ |
half years | QUANTITY | 0.59+ |
Chris Wolf, VMware | VMware Explore 2022
>>Hey guys. Good morning. And welcome back to the cube. Lisa Martin here with John furrier. This is the Cube's third day of Wal Dal coverage of VMware Explorer. We're very pleased to welcome one of our alumni back to the program. Chris Wolf joins us chief research and innovation officer at VMware. Chris, welcome back to the >>Cube. Yeah. Thanks Lisa. It's always a pleasure. >>This has been a great event. We, we, the key note was standing room only on Tuesday morning. We've had great conversations with VMware's ecosystem and VMware of course, what are some of the, the hot things going on from an R and D perspective? >>Yeah, there's, there's a lot. I mean, we're, we have about four or five different priorities. And these look at this is looking at sovereign clouds and multi-cloud edge computing, modern applications and data services. We're doing quite a bit of work in machine learning as well as insecurity. So we're, we're relatively large organization, but at the same time, we really look to pick our bets. So when we're doing something in ML or security, then we wanna make sure that it's high quality and it's differentiated and adds value for VMware, our partners and our customers. >>Where are our customers in the mix in terms of being influential in the roadmap? >>Very, very much in the mix. What we, what we like to do is in early stage R and D, we want to have five to 10 customers as design partners. And that really helps. And in addition to that, as we get closer to go to market, we look to a lineup between one and three of our SI partners as well, to really help us, you know, in a large company, sometimes your organic innovations can get lost in the shuffle. Yeah. And when we have passionate SI that are like, yes, we want to take this forward with you together. That's just awesome. And it also helps us to understand at a very early stage, what are the integration requirements? So we're not just thinking about the, the core product itself, but how would it play in the ecosystem equally important? >>We had hit Culbert on CTO, great work. He's dealing with the white paper and cross cloud, obviously vSphere, big release, lot of this stuff. Dave ante had mentioned that in the analyst session, you had a lot of good stuff you were talking about. That's coming around the corner. That's shipping coming outta the oven and a big theme this year is multi-cloud cloud native. The relationship what's one's ahead. Bleed dog. No one, you kinda get a feel for multi-cloud. It's kind of out front right now, but now cloud native's got the most history what's coming out of the oven right now in terms of hitting the market. That's not yet in this, in the, in the, in the numbers, in terms of sales, like there's, there's some key cloud native stuff coming out. Where's the action. Can you share what you've shared at the analyst meeting? >>Yeah. So at the analyst meeting, what I was going through was a number of our new innovation projects or projects. And, and these are things that are typically close to being product or service at VMware, you know, somewhere in the year out timeframe. Some, some of these are just a few months out. So let me just go through some of them, I'll start with project keek. So keek is super exciting because when you think about edge, what we're hearing from customers is the, the notion of a single platform, a single piece of hardware that can run their cloud services, their containers, their VMs, their network, and security functions. Doing all of this on one platform, gives them the flexibility that as changes happen, it's a software update. They don't have to buy another piece of hardware, but if we step back, what's the management experience you want, right? >>Simple get ops oriented, simple life cycle and configuration management, very low touch. I don't need technical skills to deploy these types of devices. So this is where keek comes in. So what keek is doing is exposing a Kubernetes API above the ESXi hypervisor and taking a complete, get op style of management. So imagine now, when you need to do an update for infrastructure, you're logging into GitHub, you're editing a YAML file and pushing the update. We're doing the same thing for the applications that reside. I can do all of this through GitHub. So this is very, I would say, even internally disruptive to VMware, but super exciting for our customers and partners that we've shared this with. >>What else is happening? What else on the cloud native side Tansu Monterey those lot areas. >>Oh, there's so much. So if we look at project Monterey, I had a presentation within Invidia yesterday. We're really talking through this. And what I'm seeing now is there's a couple of really interesting inflection points with DPU. The first thing is the performance that you're getting and the number of cores that you can save on an X 86 host is actually providing a very strong business case now to bring DPU into the servers, into the data center. So that's one. So now you have a positive ROI. Number two, you start to decouple core services now from the X 86 host itself. So think about a distributed firewall that I can run on a PCI adapter. Now that's DEC coupled, physically from the server, and it really allows me to scale out east west security in a way that I could not do before. So again, I think that's really exciting and that's where we're seeing a lot of buzz from customers. >>So that DPU, which got a lot of buzz, by the way, Lisa, I never, you had trouble interviews on this. I had to the Dell folks too, V X RS taking the advantage of it, the performances, I see the performance angle on that and deep user hot. Can you talk about that security east west thing? Cuz Tom Gillis was on yesterday talking about that's a killer advantage for the security side. Can you touch on that real >>Quick? Yeah. A hundred percent. So what I can now do is take a, a firewall and run it isolated from the X 86 host that it's trying to protect. So it's right next to the host. I can get line rate speeds in terms of analytics and processing of my network and security traffic. So that's also huge. So I'm running line rate on the host and I'm able to run one of these firewall instances on every host in my data center, you cannot do that. You can never afford it with physical appliances. So to me, this is an inflection point because this is the start of network and security functions moving off of hardware appliances and onto DPU. And if you're the ecosystem vendors, this is how they're going to be able to scale some of their services and offerings into the public >>Cloud. So a lot of good stuff happening within the VMware kind of the hardware, low level atoms and the bits as well as the software. The other thing I wanna get your thoughts on relative to the next question is that takes to the next level is the super cloud world we're living in is about cloud native developers, which is DevOps dev security ops and data ops are now big parts of the, the challenges that the people are reigning in the chaos that that's being reigned in. How does VMware look at the relationship to the cloud providers? Cause we heard cloud universal. We had the cloud. If you believe in multi-cloud, which you guys are saying, people are agreeing with, then you gotta have good tight couple coupled relationships with the cloud services, >>A hundred percent. >>We can be decoupled, but highly cohesive, but you gotta connect in via APIs. What's the vision for the VMware customers who want to connect say AWS, for instance, is that seamless? What makes that happen? What's that roadmap look like for taking that VMware on premises hybrid and making it like turbo charging it to be like public cloud hybrid together? >>Yeah, I think there's some lessons that can be learned here. You know, an analogy I've been using lately is look at the early days of virtualization when VMware had vCenter, right? What was happening was you saw the enterprise management vendors try to do this overlay above virtualization management and say, we can manage all hypervisors. And at the end of the day, these multi hypervisor managers, no one bought 'em because they can do 20% of the functionality of a tool from VMware or Microsoft. And that's the lesson that we have to take to multi-cloud. We don't have to overlay every functionality. There's really good capabilities that the cloud providers are offering through their own tooling and APIs. Right? But you, you, if you step back, you say, well, what do I wanna centralize? I wanna have a centralized, secure software supply chain and I can get that through VMware tan zoo and, and where we're going with Kubernetes. When you're going with native cloud services, you might say, you know what, I wanna have a central view of, of visibility for compliance. So that's what we're doing with secure state or a central view of cost management. And we're doing that with cloud health. So you can have some brokering and governance, but then you also have to look from a surgical perspective as to what are the things that I really need to centralize versus what do I not need to centralize? >>One of the themes that we heard on the keynote on Tuesday was the, the different phases and that a lot of customers are still in the cloud chaos phase. We talked a lot about that in the last couple days with VMware, with its partner ecosystem. And, but the goal of getting to cloud smart, how does the R and D organization, how do, how are you helping customers really navigate that journey from the chaos that they're in, maybe they've inherited multi-cloud environment to getting to cloud smart. And what does cloud smart mean from your perspective >>Cloud? Smartt from my perspective means pragmatism. It means really thinking about what should I do here first, right? I don't want to just go somewhere because I can, right. I want to be really mindful of the steps I'm going to take. So one ex one example of this is I've met with a customer this morning and we were talking about using our vRealize network insight tool, because what that allows 'em to do is get a map of all of their application dependencies in their data center. And they can learn like, well, I can move this to the cloud or maybe I can't move this cuz it has all these other dependencies and it would be really difficult. So that's that's one example. It also means really thinking through issues around data sovereignty, you know, what do I wanna hold onto a customer? I just met with yesterday. They were talking about how valuable their data is and their services that they want to use via SA in the cloud. But then there's also services, which is their core research. They wanna make sure that they can maintain that in their data centers and maintain full control because they see researchers will leave. And now all of a sudden, so that intellectual property has actually gone with the person and they need to, they need to have, you know, better accountability there. >>Yeah. One of the things about that we discovered at our super cloud event was is that, you know, we kind didn't really kind of put too much structure on other than our, our vision. It's, it's not just SaaS on cloud and it's not just, multi-cloud, it's a new kind of application end state or reality that if you believe in digital transformation, then technology is everywhere. And like it in the old days, it powered the back office and then terminals and PCs and whatnot, wasn't powering the boardroom obviously or other business. But if, if it happens like that digital transformation, the company is the app, the app is the company. So you're all digital. So that means the operating expenses has to drive an income statement and the CapEx handled by the cloud provides a lot of goodness. So I think everyone's gonna realize that AWS and the hyperscalers are providing great CapEx gifts. They do all the work and you only pay when you've made your success. So that's a great business model. >>Absolutely >>That's and then combine that with open source, which is now growing so fast, going next level, the software industry's open source. That's not even a debate Mo in some circles, maybe like telco, cloud's got the CapEx. The new operating model is this cloud layer. That's going to transform the companies finally in a hundred percent. Okay. That's super cloud. If that's the case, does it really matter who provides the electricity or the power? It's the coders that are in charge. It's the developers that have to make the calls because if the application is the core, the developers are, are not only the front lines, they are the company. This is really kind of where the sea change is. So if, if we believe that, I'm sure you, you agree with that generally? >>Yeah, of >>Course. Okay. So then what's the VMware customer roadmap here. So to me, that's the big story here at the show is that we're at this point in time where the VMware customers are, have to go there >>A hundred percent, >>What's that path. What is the path for the VMware customer to go from here to there? And what's this order of operations or is there a roadmap? Can, can you share your thoughts on >>That? Yeah, I think part of it is, is with these disruptive technologies, you have to start small, you know, whether it's in your data center, into cloud, you have to build the own institutional knowledge of your team members in the organization. It's much easier than trying to attract outside talent, for least for many of our customers. So I think that's important. The other part of this when with the developer and control, like in my organization, I want my innovators to innovate any other noise around them. I don't want them to have to worry about it. And it's the same thing with our customers. So if your developers are building the technologies that is really differentiating your company, then things like security and cryptography shouldn't have to be things they worry about. So we've been doing a lot of work. Like one of the projects we announced this week was around being able to decouple cryptography from the applications themselves. And we can expose that through a proxy through service mesh. And that's really exciting because now it ops can make these changes. Our SecOps teams can make these changes without having to impact the application. So that's really key is focusing the developers on innovation and then really being mindful about how you can build the right automation around everything else. And certainly open source is key to all >>That. So that's so, so then if you, if that's happening, which I'm, I'm not gonna debate that then in essence, what's really going on here is that the companies are decomposing their entire businesses down to levels that are manageable completely different than the way they did them 20, 30 years ago. >>Absolutely. You, you, you could take a modular approach to how you're solving business problems. And we do the same thing with technology, where there might be a ML algorithms that we've developed that we're exposing as SA service, but then all of the interconnects around that service are open source and very flexible so that the businesses and the customers and the VMware partners can decide what's the right way to build a puzzle for a given problem. >>We were talking on day one, I was riffing with an executives. It was Ragu and Victoria. And the concept around cross cloud was if you get to this Nirvana state, which is we, people want to get to this or composability mode, you're not coding, you're composing cuz coding's kinda happening open source and not the old classic, write some code and write that app. It's more orchestrate, compose and orchestrate. Do you, what's your thoughts on >>That? Yeah, yeah. Yeah. I, I agree. And it's it's I would add one more part to it too, which is scope. You know, I think sometimes we see projects fail because the, the initial scope is just too big. You know, what is the problem that you need to solve, scope it properly and then continuously calibrate. So even like our customers have to listen to their customers and we have to be thinking about our customers' customers, right? Because that's really how we innovate because then we can really be mindful of a holistic solution for them. >>You know, Lisa, when we had a super cloud event, you know, one of the panels was called the innovators dilemma with a question mark. And of course everyone kinds of quotes that book innovators dilemma, but one of the panelists, Chris ho beaker on Twitter said, let's change the name from the innovator's dilemma to the integrator's dilemma. And we all kind of got chuckled. We all kind of paused and said, Hey, that's actually a good point. Yeah. If you're now in a cloud and you're seeing some of the ecosystem floor vendors out there talking in this game too, they're all kind of fitting in snapping in almost like modular, like you said, so this is a Lego game. Now it feels like, it feels like, you know, let's compose, let's orchestrate, let's integrate. Now I integrations API driven. Now you're seeing a lot more about API security in the news and we've been covering at least I've probably interviewed six companies in the past, you know, six months that are doing API security, who would've thought API, that's the link, frankly, with the web. Now that's now a target area for hackers. >>Oh. And that's such an innovation area for VMware, John. Okay. >>There it is. So, I mean, this is, again, this means the connected tissue is being attacked yet. We need it to grow. No one's debating that is wrong, but it's under siege. >>Yes. Yes. So something else we introduced this week was a project. We called project Trinidad. And the way, the way you can think about it is a lot of the anomaly detection software today is looking at point based anomalies. Like this API header looks funny where we, where we've gone further is we can look at full sequence based anomalies so we can learn the sequences of transactions at an application takes and really understand what is expected behavior within those API calls within the headers, within the payloads. And we can model legitimate application behavior based on what those expectations are. So like a, like a common sequence might be doing an e-commerce checkout, right? There's lots of operations that happen logging into the site, searching, finding a product, going through the cart. Right. All of those things. Right. So if something's out of sequence, like all of a sudden somebody's just trying to do a checkout, but they haven't actually added to the cart. Right. This just seems odd. Right. So we can start to, and that's a simplistic example, but we're able now to use our algorithms to model legitimate application behavior through the entire sequence of how applications behave and then we can start to trap on anomalies. That's very differentiating IP and, and we think it's gonna be really important for the industry. Yeah. >>Because a lot of the hacks, sometimes on the API side, even as a example, are not necessarily on the API, it's the business logic in them. That's what you're getting at here. Yes. The APIs are hard. Oh our APIs are secure. Right. Well, yeah, but you're not actually securing the business logic internally. That's what you're getting at. If I read >>That right. Or exactly. Exactly. Yeah. Yeah. And it, it's the thing it's right. It's great that you can, you can look at a header, but what's the payload, right? What is what's, what's the actual data flow, right. That's associated with the call and that's what we want to really hone in on. And that's just a, it's, it's a, it's a far different level of sophistication in being able to understand east west vulnerabilities, you know, log for JX voice and these kind of things. So we have some real, it's interesting technology >>There. Security conversations now are not about security there about defense ability because security's a state of time, your secure here, you're not secure or someone might be in the network or in the app, but can you defend yourself from, and in >>That's it, you know, our, our, our malware software, right. That we're building to prevent and respond has to be more dynamic than the threats we face. Right. And this is why machine learning is so essential in, in these types of applications. >>Let me ask you a question. So just now zooming out riffing here since day, three's our conversational day where we debate and just riff more like a podcast style. If you had to do a super cloud or build a NextGen cloud multi-cloud with abstraction layer, that's, you know, all singing and dancing and open everyone's happy hardware below it's working ISAs and then apps are killed. Can ass what's in that. What does it look like to you if you had to architect the, the ultimate super cloud enabler, that something that would disrupt the next 10 years, what would it look like and how does, and assuming, and trying to do where everybody wins go, you have 10 seconds. No, >>Yeah, yeah. So the, you know, first of all, there has to be open source at all of the intersections. I think that's really important. And, and this is, this goes from networking constructs to our database, as a service layers, you know, everything in between, you know, the, the, the participants should be able to win on merit there. The other part of super cloud though, that hasn't happened that I probably is the most important area of innovation is going to be decoupled control planes. We have a number of organizations building sovereign cloud initiatives. They wanna have flexibility in where their services physically run. And you're not going to have that with a limited number of control planes that live in very specific public cloud data centers. So that's an area, give >>An example of what a, a, a, a narrowly defined control plane is. >>Yeah, sure. So my database as a service layer, so the, the, the actual portal that the customer is going into to provision databases, right. Rep managed replication, et cetera. Right. I should be able to run that in a colo. I should be able to run that somewhere in region that is guaranteed, that I'm going to have data stay physically in region. You know, we still have some of these challenges in networking in terms of being able to constrain traffic flows and be able to predict and audit them within a particular region as well. >>It's interesting. You bring up region again, more complexity. You know, you got catalogs here, catalogs different. I mean, this is where the chaos really comes down. I mean, it's, it's advancing, but it's advancing the state of functionality, but making it hella complex, I mean, come on. Don't you think it's like pretty amazingly hard to reign in that? Well, or is it maybe you guys making it easier? I just think I just, my mind just went, oh my God, I gotta, I gotta provision to that region, but then it's gotta be the same over there. And >>When you go back to modular architecture constructs, it gets far easier. This has been really key for how VMware is even building our own clouds internally is so that we have a, a shared services platform for the different apps and services that we're building, so that you do have that modularized approach. Like I said, the, the examples of innovation projects I've shared have been really driven by the fact that, you know, what, I don't know how customers are gonna consume it, and I don't have to know. And if you have the right modular architecture, the right APIs around it, you don't have to limit a particular project or technology's future at the time you build >>It. Okay. So your super would have multiple control planes that you can move, manage with that within one place. I get that. What about the data control plane? That seems to be something that used to be the land grab in, in conversations from vendors. But that seems to be much more of a customer side, cuz if I'm a customer, I want my control plane data plane to be, you know, mine. Like I don't want to have anyone cuz data's gotta move around, gotta be secure. >>Oh exactly. >>And that's gonna be complicated. How does, how do you see the data planes emerging? >>Yeah. Yeah. We, we see an opportunity really around having a, a centralized view that can give me consistent indexing and consistent awareness of data, no matter where it resides. And then being able to have that level of integration now between my data services and my applications, because you're right, you know, right now we have data in different places, but we could have a future where data's more perpetually in motion. You know, we're already looking at time sensitive fabrics where we're expecting microservices to sometimes run in different cell towers depending on the SLA that they need to achieve. So then you have data parts that's going to follow, right? That may not always be in the same cloud data center. So there's, this is enormously complicated, not just in terms of meeting application SLAs, but auditing and security. Right. That makes it even further. So having these types of data layers that can give me a consistent purview of data, regardless of where it is, allow me to manage and life cycle data globally, that's going to be super important, I believe going forward. >>Yeah. Awesome. Well, my one last question, Lisa, gonna get a question in here. It's hard. Went for her. I'm getting all the, all the questions in, sorry, Lisa that's okay. What's your favorite, most exciting thing that you think's going on right now that people should pay attention to of all the things you're looking at, the most important thing that that's happening and maybe something that's super important that people aren't talking about or it could be the same thing. So the, the most important thing that you think that's happening in the industry for cloud next today and, and maybe something that you think people should look at and pay more attention to. >>Okay. Yeah, those are good questions. And that's hard to answer because there's, there's probably so much happening. I I've been on here before I've talked about edge. I still think that's really important. I think the value of edge soft of edge velocity being defined by software updates, I think is quite powerful. And that's, that's what we're building towards. And I would say the industry is as well. If you look at AWS and Azure, when they're packaging a service to go out to the edge it's package as a container. So it's already quite flexible and being able to think about how can I have a single platform that can give me all of this flexibility, I think is really, really essential. We're building these capabilities into cars. We have a version of our Velo cloud edge device. That's able to run on a ruggedized hardware in a police car today. We're piloting that with a customer. So there is a shift happening where you can have a core platform that can now allow you to layer on applications that you're not thinking about in the future. So I think that's probably obvious. A lot of people are like, yeah. Okay. Yes. Let's talk about edge, big deal. >>Oh it's, it's, it's big. Yes. It's >>Exploding, but >>It's complicated too. It's not easy. It's not obvious. Right. And it's merging >>There's new things coming every day. Yeah. Yeah. And related to that though, there is this kind of tension that's existing between machine learning and privacy and that's really important. So an area of investment that I don't think enough people are paying attention to today is federated machine learning. There's really good projects in open source that are having tangible impact on, in a lot of industries in VMware. We are, we're investing in a, in a couple of those projects, namely fate in the Linux foundation and open FFL. And in these use cases like the security product I mentioned to you that is looking at analyzing API sequence API call sequences. We architected that originally so that it can run in public cloud, but we're also leveraging now federated machine learning so that we can ensure that those API calls and metadata associated with that is staying on premises for the customers to ensure privacy. So I think those intersections are really important. Federated learning, I think is a, an area not getting enough attention. All right. All >>Right, Chris, thanks so much for coming on. Unfortunately we are out of time. I know you guys could keep going. Yeah. Good stuff. But thank you for sharing. What's going on in R and D the customer impact the outcomes that you're enabling customers to achieve. We appreciate your >>Insights. We're just getting started >>In, in early innings, right? Yeah. Awesome. Good stuff for guest and John furrier. I'm Lisa Martin. You're watching the cube live from VMware Explorer, 2022. Our next guest joins us momentarily. >>Okay.
SUMMARY :
This is the Cube's third day of Wal Dal coverage of VMware Explorer. We've had great conversations with VMware's ecosystem and VMware of course, And these look at this is looking at sovereign clouds and multi-cloud edge computing, And in addition to that, as we get closer to go to market, we look to a It's kind of out front right now, but now cloud native's got the most history what's coming out So keek is super exciting because when you think So imagine now, when you need to do an update for infrastructure, you're logging into GitHub, you're editing a YAML What else on the cloud native side Tansu Monterey those Now that's DEC coupled, physically from the server, and it really allows me to scale out east west security So that DPU, which got a lot of buzz, by the way, Lisa, I never, you had trouble interviews on this. So I'm running line rate on the How does VMware look at the relationship to the cloud providers? We can be decoupled, but highly cohesive, but you gotta connect in via APIs. And that's the lesson that we have to take to multi-cloud. but the goal of getting to cloud smart, how does the R and D organization, how do, how are you helping customers they need to have, you know, better accountability there. They do all the work and you only pay when you've made your It's the developers that have to make the calls because if the application is the core, So to me, that's the big story here at the show What is the path for the VMware customer to go from here to there? So that's really key is focusing the developers on innovation to levels that are manageable completely different than the way they did them 20, so that the businesses and the customers and the VMware partners can decide what's the right way to build And the concept around cross cloud was if So even like our customers have to listen to their customers and we have to be thinking about And of course everyone kinds of quotes that book innovators dilemma, but one of the Oh. And that's such an innovation area for VMware, John. We need it to grow. And the way, the way you can think about it is a lot of the anomaly detection software today is looking at point Because a lot of the hacks, sometimes on the API side, even as a example, are not necessarily on And it, it's the thing it's right. but can you defend yourself from, and in That's it, you know, our, our, our malware software, right. What does it look like to you if you had to architect the, the ultimate super cloud enabler, So the, you know, first of all, there has to be open the customer is going into to provision databases, right. Don't you think it's like pretty amazingly hard to reign in the right APIs around it, you don't have to limit a particular project or technology's future customer, I want my control plane data plane to be, you know, mine. How does, how do you see the data planes emerging? So then you have data parts that's going to follow, right? in the industry for cloud next today and, and maybe something that you think people should look So there is a shift happening where you can have a core platform that can now allow It's And it's merging So an area of investment that I don't think enough people are paying attention to today is federated What's going on in R and D the customer impact the outcomes We're just getting started Yeah.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Lisa Martin | PERSON | 0.99+ |
Chris | PERSON | 0.99+ |
five | QUANTITY | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
Chris Wolf | PERSON | 0.99+ |
Tom Gillis | PERSON | 0.99+ |
Lisa | PERSON | 0.99+ |
20% | QUANTITY | 0.99+ |
Tuesday morning | DATE | 0.99+ |
John | PERSON | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
three | QUANTITY | 0.99+ |
VMware | ORGANIZATION | 0.99+ |
10 seconds | QUANTITY | 0.99+ |
one | QUANTITY | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Invidia | ORGANIZATION | 0.99+ |
yesterday | DATE | 0.99+ |
six companies | QUANTITY | 0.99+ |
Tuesday | DATE | 0.99+ |
one platform | QUANTITY | 0.99+ |
one example | QUANTITY | 0.99+ |
10 customers | QUANTITY | 0.99+ |
telco | ORGANIZATION | 0.99+ |
six months | QUANTITY | 0.99+ |
John furrier | PERSON | 0.99+ |
this week | DATE | 0.99+ |
today | DATE | 0.98+ |
2022 | DATE | 0.98+ |
this year | DATE | 0.98+ |
One | QUANTITY | 0.98+ |
third day | QUANTITY | 0.98+ |
single platform | QUANTITY | 0.97+ |
ESXi | TITLE | 0.97+ |
Nirvana | LOCATION | 0.97+ |
one last question | QUANTITY | 0.97+ |
VMware Explorer | TITLE | 0.97+ |
Lego | ORGANIZATION | 0.97+ |
hundred percent | QUANTITY | 0.96+ |
one place | QUANTITY | 0.96+ |
Chris ho beaker | PERSON | 0.95+ |
this morning | DATE | 0.95+ |
CapEx | ORGANIZATION | 0.95+ |
ORGANIZATION | 0.95+ | |
Kubernetes | TITLE | 0.94+ |
one more part | QUANTITY | 0.93+ |
first thing | QUANTITY | 0.91+ |
Victoria | PERSON | 0.89+ |
vCenter | TITLE | 0.89+ |
one example | QUANTITY | 0.87+ |
DevOps | TITLE | 0.86+ |
first | QUANTITY | 0.85+ |
Azure | ORGANIZATION | 0.82+ |
Ragu | PERSON | 0.82+ |
Mark Nickerson & Paul Turner | VMware Explore 2022
(soft joyful music) >> Welcome back everyone to the live CUBE coverage here in San Francisco for VMware Explore '22. I'm John Furrier with my host Dave Vellante. Three days of wall to wall live coverage. Two sets here at the CUBE, here on the ground floor in Moscone, and we got VMware and HPE back on the CUBE. Paul Turner, VP of products at vSphere and cloud infrastructure at VMware. Great to see you. And Mark Nickerson, Director of Go to Mark for Compute Solutions at Hewlett-Packard Enterprise. Great to see you guys. Thanks for coming on. >> Yeah. >> Thank you for having us. >> So we, we are seeing a lot of traction with GreenLake, congratulations over there at HPE. The customers changing their business model consumption, starting to see that accelerate. You guys have the deep partnership, we've had you guys on earlier yesterday. Talked about the technology partnership. Now, on the business side, where's the action at with the HP and you guys with the customer? Because, now as they go cloud native, third phase of the inflection point, >> Yep. >> Multi-cloud, hybrid-cloud, steady state. Where's the action at? >> So I think the action comes in a couple of places. Um, one, we see increased scrutiny around, kind of not only the cost model and the reasons for moving to GreenLake that we've all talked about there, but it's really the operational efficiencies as well. And, this is an area where the long term partnership with VMware has really been a huge benefit. We've actually done a lot of joint engineering over the years, continuing to do that co-development as we bring products like Project Monterey, or next generations of VCF solutions, to live in a GreenLake environment. That's an area where customers not only see the benefits of GreenLake from a business standpoint, um, on a consumption model, but also around the efficiency operationally as well. >> Paul, I want to, I want to bring up something that we always talk about on the CUBE, which is experience in the enterprise. Usually it's around, you know, technology strategy, making the right product market fit, but HPE and VMware, I mean, have exceptional depth and experience in the enterprise. You guys have a huge customer base, doesn't churn much, steady state there, you got vSphere, killer product, with a new release coming out, HP, unprecedented, great sales force. Everyone knows that you guys have great experience serving customers. And, it seems like now the fog is clearing, we're seeing clear line of sight into value proposition, you know, what it's worth, how do you make money with it, how do partners make money? So, it seems like the puzzle's coming together right now with consumption, self-service, developer focus. It just seems to be clicking. What's your take on all this because... >> Oh, absolutely. >> you got that engine there at VMware. >> Yeah. I think what customers are looking for, customers want that cloud kind of experience, but they want it on their terms. So, the work that we're actually doing with the GreenLake offerings that we've done, we've released, of course, our subscription offerings that go along with that. But, so, customers can now get cloud on their terms. They can get systems services. They know that they've got the confidence that we have integrated those services really well. We look at something like vSphere 8, we just released it, right? Well, immediately, day zero, we come out, we've got trusted integrated servers from HPE, Mark and his team have done a phenomenal job. We make sure that it's not just the vSphere releases but VSAN and we get VSAN ready nodes available. So, the customers get that trusted side of things. And, you know, just think about it. We've... 200,000 joined customers. >> Yeah, that's a lot. >> We've a hundred thousand kind of enabled partners out there. We've an enormous kind of install base of customers. But also, those customers want us to modernize. And, you know, the fact that we can do that with GreenLake, and then of course with our new features, and our new releases. >> Yeah. And it's nice that the products market fits going well on both sides. But can you guys share, both of you share, the cadence of the relationship? I mean, we're talking about vSphere, every two years, a major release. Now since 6, vSphere 6, you guys are doing three months' releases, which is amazing. So you guys got your act together there, doing great. But, you guys, so many joint customers, what's the cadence? As stuff comes out, how do you guys put that together? How tightly integrated? Can you share a quick... insight into that dynamic? >> Yeah, sure. So, I mean Mark can and add to this too, but the teams actually work very closely, where it's every release that we do is jointly qualified. So that's a really, really important thing. But it's more interesting is this... the innovation side of things. Right? If you just think about it, 'cause it's no use to just qualify. That's not that interesting. But, like I said, we've released with vSphere 8 you know... the new enhanced storage architecture. All right? The new, next generation of vSphere. We've got that immediately qualified, ready on HPE equipment. We built out new AI servers, actually with Invidia and with HPE. And, we're able to actually push the extremes of... AI and intelligence... on systems. So that's kind of work. And then, of course, our Project Monterey work. Project Monterey Distributed Services Engine. That's something we're really excited about, because we're not just building a new server anymore, we're actually going to change the way servers are built. Monterey gives us a new platform to build from that we're actually jointly working. >> So double click on that, and then to explain how HPE is taking advantage of it. I mean, obvious you have more diversity of XPU's, you've got isolation, you've got now better security, and confidential computing, all that stuff. Explain that in some detail, and how does HPE take advantage of that? >> Yeah, definitely. So, if you think about vSphere 8, vSphere 8 I can now virtualize anything. I can virtualize your CPU's, your GPU's, and now what we call DPU's, or data processing units. A data processing unit, it's... think of it as we're running, actually, effectively another version of ESX, sitting down on this processor. But, that gives us an ability to run applications, and some of the virtualization services, actually down on that DPU. It's separated away from where you run your application. So, all your applications get to consume all your CPU. It's all available to you. Your DPU is used for that virtualization and virtualization services. And that's what we've done. We've been working with HPE and HPE and Pensando. Maybe you can talk some of the new systems that we've built around this too. >> Yeah. So, I mean, that's one of the... you talked about the cadence and that... back to the cadence question real briefly. Paul hit on it. Yeah, there's a certain element of, "Let's make sure that we're certified, we're qualified, we're there day zero." But, that cadence goes a lot beyond it. And, I think Project Monterey is a great example of where that cadence expands into really understanding the solutioning that goes into what the customer's expecting from us. So, to Paul's point, yeah, we could have just qualified the ESX version to go run on a DPU and put that in the market and said, "Okay, great. Customers, We know that it works." We've actually worked very tightly with VMware to really understand the use case, what the customer needs out of that operating environment, and then provide, in the first instantiation, three very discrete product solutions aimed at different use cases, whether that's a more robust use case for customers who are looking at data intensive, analytic intensive, environments, other customers might be looking at VDI or even edge applications. And so, we've worked really closely with VMware to engineer solutions specific to those use cases, not just to a qualification of an operating environment, not just a qualification of certain software stack, but really into an understanding of the use case, the customer solution, and how we take that to market with a very distinct point of view alongside our partners. >> And you can configure the processors based on that workload. Is that right? And match the workload characteristics with the infrastructure is that what I'm getting? >> You do, and actually, well, you've got the same flexibility that we've actually built in why you love virtualization, why people love it, right? You've got the ability to kind of bring harness hardware towards your application needs in a very dynamic way. Right? So if you even think about what we built in vSphere 8 from an AI point of view, we're able to scale. We built the ability to actually take network device cards, and GPU cards, you're to able to build those into a kind of composed device. And, you're able to provision those as you're provisioning out VM's. And, the cool thing about that, is you want to be able to get extreme IO performance when you're doing deep learning applications, and you can now do that, and you can do it very dynamically, as part of the provisioning. So, that's the kind of stuff. You've got to really think, like, what's the use case? What's the applications? How do we build it? And, for the DPU side of things, yes, we've looked at how do we take some of our security services, some of our networking services, and we push those services down onto the SmartNIC. It frees up processors. I think the most interesting thing, that you probably saw on the keynote, was we did benchmarks with Reddit databases. We were seeing 20 plus, I'm sure the exact number, I think it was 27%, I have to get exact number, but a 27% latency improvement, to me... I came from the database background, latency's everything. Latency's king. It's not just... >> Well it's... it's number one conversation. >> I mean, we talk about multi-cloud, and as you start getting into hybrid. >> Right. >> Latency, data movement, efficiency, I mean, this is all in the workload mindset that the workhorses that you guys have been working at HPE with the compute, vSphere, this is heart center of the discussion. I mean, it is under the hood, and we're talking about the engine here, right? >> Sure. >> And people care about this stuff, Mark. This is like... Kubernetes only helps this better with containers. I mean, it's all kind of coming together. Where's that developer piece? 'Cause remember, infrastructure is code, what everybody wants. That's the reality. >> Right. Well, I think if you take a look at... at where the Genesis of the desire to have this capability came from, it came directly out of the fact that you take a look at the big cloud providers, and sure, the ability to have a part of that operating environment, separated out of the CPU, free up as much processing as you possibly can, but it was all in this very lockdown proprietary, can't touch it, can't develop on it. The big cloud guys owned it. VMware has come along and said, "Okay, we're going to democratize that. We're going to make this available for the masses. We're opening this up so that developers can optimize workloads, can optimize applications to run in this kind of environment." And so, really it's about bringing that cloud experience, that demand that customers have for that simplicity, that flexibility, that efficiency, and then marrying it with the agility and security of having your on premises or hybrid cloud environment. And VMware is kind of helping with that... >> That's resonating with the customer, I got to imagine. >> Yeah. >> What's the feedback you're hearing? When you talk to customers about that, the like, "Wait a minute, we'd have to like... How long is that going to take? 'Cause that sounds like a one off." >> Yeah. I'll tell you what... >> Everything is a one off now. You could do a one off. It scales. >> What I hear is give me more. We love where we're going in the first instantiation of what we can do with the Distributed Services Engine. We love what we're seeing. How do we do more? How do we drive more workloads in here? How do we get more efficiency? How can we take more of the overhead out of the CPU, free up more cores. And so, it's a tremendously positive response. And then, it's a response that's resonating with, "Love it. Give me more." >> Oh, if you're democratizing, I love that word because it means democratization, but someone's being democratized. Who's... What's... Something when... that means good things are happening, which means someone's not going to be winning out. Who's that? What... >> Well it, it's not necessarily that someone's not winning out. (laughs) What you read, it comes down to... Democratizing means you've got to look at it, making it widely available. It's available to all. And these things... >> No silos. No gatekeepers. Kind of that kind of thing. >> It's a little operationally difficult to use. You've got... Think about the DPU market. It was a divergent market with different vendors going into that market with different kind of operating systems, and that doesn't work. Right? You've got to actually go and virtualize those DPU's. So then, we can actually bring application innovation onto those DPU's. We can actually start using them in smart ways. We did the same thing with GPU's. We made them incredibly easy to use. We virtualized those GPU's, we're able to, you know, you can provision them in a very simple way. And, we did the same thing with Kubernetes. You mentioned about container based applications and modern apps in the one platform now, you can just set a cluster and you can just say, "Hey I want that as a modern apps enabled cluster." And boom. It's done. And, all of the configurations, set up, Kubernetes, it's done for you. >> But the thing that just GreenLake too, the democratization aspect of how that changed the business model unleashes... >> Right. >> ...efficiency and just simplicity. >> Oh yeah, absolutely. >> But the other thing was the 20% savings on the Reddit's benchmark, with no change required at the application level, correct? >> No change at the application level. In the vCenter, you have to set a little flag. >> Okay. You got to tick a box. >> You got to tick a little box... >> So I can live with that. But the point I'm making is that traditionally, we've had... We have an increasing amount of waste to do offloads, and now you're doing them much more efficiently, right? >> Yes. >> Instead of using the traditional x86 way of doing stuff, you're now doing purpose built, applying that to be much more efficient >> Totally agree. And I think it's becoming, it's going to become even more important. Look at, we are... our run times for our applications, We've got to move to a world where we're building completely confidential applications at all time. And that means that they are secured, encrypted, all traffic is encrypted, whether it's storage traffic, whether it's IO traffic, we've got to make sure we've got complete route of trust of the applications. And so, to do all of that is actually a... compute intensive. It just is. And so, I think as we move forward and people build much more complete, confidential, compute secured environments, you're going to be encrypting all traffic all the time. You're going to be doing micro-zoning and firewalling down at the VM level so that you've got the protection. You can take a VM, you can move it up to the cloud, it will inherit all of its policies, will move with it. All of that will take compute capacity. >> Yup. >> The great thing is that the DPU's give us this ability to offload and to use some of that spare compute capacity. >> And isolate so the application chance can't just tunnel in and get access to that >> You guys got so much going on. You can have your own CUBE show, just on the updating, what's going on between the two companies, and then the innovation. We got one minute left. Just quickly, what's the goal in the partnership? What's next? You guys going to be in the field together, doing joint customer work? Is there bigger plans? Is there events out there? What are some of your plans together in the marketplace? >> That's you. >> Yup. So, I think, Paul kind of alluded to it. Talk about the fact that you've got a hundred thousand partners in common. The venn diagram of looking at the HPE channel and the VMware channel, clearly there's an opportunity there to continue to drive a joint, go to market message, through both of our sales organizations, and through our shared channel. We have a 25,000 strong... solution architect... force that we can leverage. So as we get these exciting things to talk about, I mean, you talk about Project Monterey, the Distributed Services Engine. That's big news. There's big news around vSphere 8. And so, having those great things to go talk about with that strong sales team, with that strong channel organization, I think you're going to see a lot stronger partnership between VMware and HPE as we continue to do this joint development and joint selling >> Lots to get enthused about, pretty much there. >> Oh yeah! >> Yeah, I would just add in that we're actually in a very interesting point as well, where Intel's just coming out with Next Rev systems, we're building the next gen of these systems. I think this is a great time for customers to look at that aging infrastructure that they have in place. Now is a time we can look at upgrading it, but when they're moving it, they can move it also to a cloud subscription based model, you know can modernize not just what you have in terms of the capabilities and densify and get much better efficiency, but you can also modernize the way you buy from us and actually move to... >> Real positive change transformation. Checks the boxes there. And put some position for... >> You got it. >> ... cloud native development. >> Absolutely. >> Guys, thanks for coming on the CUBE. Really appreciate you coming out of that busy schedule and coming on and give us the up... But again, we can do a whole show some... all the moving parts and innovation going on with you guys. So thanks for coming on. Appreciate it. Thank you. I'm John Dave Vellante we're back with more live coverage day two, two sets, three days of wall to wall coverage. This is the CUBE at VMware Explorer. We'll be right back.
SUMMARY :
Great to see you guys. You guys have the deep partnership, Where's the action at? kind of not only the cost and experience in the enterprise. just the vSphere releases and then of course with our new features, both of you share, but the teams actually work very closely, and then to explain how HPE and some of the virtualization services, and put that in the market and said, And match the workload characteristics We built the ability to actually number one conversation. and as you start getting into hybrid. that the workhorses that That's the reality. the ability to have a part of customer, I got to imagine. How long is that going to take? Everything is a one off now. in the first instantiation I love that word because It's available to all. Kind of that kind of thing. We did the same thing with GPU's. But the thing that just GreenLake too, In the vCenter, you have But the point I'm making and firewalling down at the VM level the DPU's give us this ability just on the updating, and the VMware channel, Lots to get enthused about, the way you buy from us Checks the boxes there. and innovation going on with you guys.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Dave Vellante | PERSON | 0.99+ |
Mark Nickerson | PERSON | 0.99+ |
Paul Turner | PERSON | 0.99+ |
Mark | PERSON | 0.99+ |
Paul | PERSON | 0.99+ |
John Dave Vellante | PERSON | 0.99+ |
VMware | ORGANIZATION | 0.99+ |
HPE | ORGANIZATION | 0.99+ |
John Furrier | PERSON | 0.99+ |
27% | QUANTITY | 0.99+ |
Hewlett-Packard Enterprise | ORGANIZATION | 0.99+ |
San Francisco | LOCATION | 0.99+ |
HP | ORGANIZATION | 0.99+ |
Moscone | LOCATION | 0.99+ |
two companies | QUANTITY | 0.99+ |
Monterey | ORGANIZATION | 0.99+ |
Pensando | ORGANIZATION | 0.99+ |
25,000 | QUANTITY | 0.99+ |
two sets | QUANTITY | 0.99+ |
one minute | QUANTITY | 0.99+ |
vSphere | TITLE | 0.99+ |
both sides | QUANTITY | 0.99+ |
vSphere 8 | TITLE | 0.99+ |
three months' | QUANTITY | 0.99+ |
ESX | TITLE | 0.99+ |
three days | QUANTITY | 0.99+ |
ORGANIZATION | 0.99+ | |
Invidia | ORGANIZATION | 0.99+ |
Two sets | QUANTITY | 0.99+ |
vSphere 6 | TITLE | 0.99+ |
both | QUANTITY | 0.99+ |
one platform | QUANTITY | 0.98+ |
20 plus | QUANTITY | 0.98+ |
first instantiation | QUANTITY | 0.98+ |
Project Monterey | ORGANIZATION | 0.97+ |
6 | TITLE | 0.97+ |
GreenLake | ORGANIZATION | 0.97+ |
VMware Explorer | ORGANIZATION | 0.95+ |
Kubernetes | TITLE | 0.94+ |
Three days | QUANTITY | 0.94+ |
day two | QUANTITY | 0.94+ |
vCenter | TITLE | 0.93+ |
hundred thousand | QUANTITY | 0.92+ |
third phase | QUANTITY | 0.92+ |
200,000 joined customers | QUANTITY | 0.92+ |
one | QUANTITY | 0.91+ |
Project Monterey | ORGANIZATION | 0.89+ |
Intel | ORGANIZATION | 0.85+ |
8 | TITLE | 0.84+ |
VCF | ORGANIZATION | 0.84+ |
vSphere | COMMERCIAL_ITEM | 0.83+ |
vSphere | ORGANIZATION | 0.81+ |
20% savings | QUANTITY | 0.81+ |
VMware Explore '22 | EVENT | 0.81+ |
every two years | QUANTITY | 0.8+ |
CUBE | ORGANIZATION | 0.79+ |
hundred thousand partners | QUANTITY | 0.79+ |
three very discrete product | QUANTITY | 0.79+ |
Distributed Services Engine | ORGANIZATION | 0.76+ |
Garima Kapoor, Minio | VMware Explore 2022
>>Hey, welcome back everyone. Through the cubes coverage of VMware Explorer, 22, I'm John Fett, Dave ante, formerly world, our 12th year extracting the signal from the noise. A lot of great guests. It's very vibrant right here. The floor's great. The expo halls booming, the keynotes went great. We just had a keynote announce. So our next first guest here on day one is car Capor C co-founder and COO min IO. Welcome to the cube. Thanks for joining us. >>Thank you for having >>Me. You're also angel investor of variety of companies of Q alumnis and been in the valley for a long time. Thanks for coming on sharing. What's going on. So, first of all, obviously VMware still on the wave. They've always been relevant and they've always been part of it. Yes. But as that's changing a lot's going on security data's big conversation. Yeah. And now with their multi-cloud we call super cloud. But their multi-cloud it's it's about hyperscaler participation. Yes. Yes. Cloud universal. Yes. It's clear that VMware has to be successful in every cloud. Okay. And that's really important. And storage is one of it. You guys do that? So talk about how you guys relate with min IO, the vision, how that connects with what's happening here. >>Yeah. So like you already said, right? Most of the enterprises are become data enterprises in itself and storage is a foundation layer of how, and you do need a system that is simple, scalable, and high perform it at scale. Right? So that's where min IO fits into the picture. And we are software defined, open source. So, you know, like VMware has traditionally been focused on enterprise it, but that world is fast changing. They are making a move in terms, developer first approach and min IO, because it's open source. It's simple enough to start, get, start deploying object storage and cloud native applications on top. So that's where we come in. We have around 1.3 million DACA downloads a day. So we own the developer market overall. And that is where I feel the partnership with VMware as they are coming into multi-cloud on their own min IO is a foundational layer. >>So just to elaborate on it, whenever you talk about multi-cloud, there are two pieces to it. One is the compute side and one is on the storage side. So compute Kubernetes takes care of the compute sites. Once you containerize an application, you can deploy it any cloud, but the data has gravity and all the clouds that you see AWS, your Google cloud, they're inherently incompatible with each other. So you need a consistent storage layer with industry standard APIs that you can just deploy it around with your application without a single line of code change. So that's what we >>Do. Oh, so you got a great value proposition, love the story. So just kind of connect on something. So we heard the keynote today. We gotta win the developers. They didn't say that, but they said, they said that they have the ops lockdown, but DevOps is now the new developer. Yes. We've been covering a lot of the poop coupon as you know, and shifting left everyone's in the C I C D pipeline. So developers are driving all the action and it has to be self-service. Absolutely. It has to be high velocity. Can't be slow. Yes. Gotta be fast. So that sounds like you're winning that piece. >>Yes. Yes. And I think more than that, what is most important is it needs to be simple. It needs to get your job done in a very simple and efficient way. And I think that is very important to the developers overall. They don't like complex appliances or complex piece of software. They just want to get their job done and move on the next thing in order to build their application and deploy it successfully. So whatever you do, it needs to be very simple. And of course, you know, it needs to be feature rich and high performant and whatnot that comes with the, with the flow in itself. But I think simplicity is what wins, the developers, hearts and minds overall. >>So object storage always been simple, get put right. Pretty simple, you know, paradigm. Yes. But it was sort of the backwater before, you know, Amazon, you know, launched. Yes. You know, it's cloud. How have you seen object evolve? You mentioned performance. So I presume yes. Yes. You're not just for cheap and deep you're for cheap bin performance. So you could describe that a little bit if you would, >>For, for sure. Like you mentioned, right. When AWS was launched, S3 was the foundation layer. They launched S3 first and then came everything else around it. So object storage is the foundation of any cloud that you go with. And over a period of time, when we started the company back in 20 end of 2014, beginning 2015, it was all about cheap and deep storage. You know, you just get, put it into one basket, but over years, if you see, because the scale of data has increased quite a bit, new applications have emerged as well. That require high performance. That is where we partnered very closely with Intel early on. And I have to give it to them. Intel was the one who convinced us that you need to do high performance. You need to optimize your software with all the AVX five, 12 instruction set and so on. >>So we partnered very closely with them and we were the first one to come up with, you know, you need high performance, object storage and that in collaboration with Intel. So that's something that we take a lot of pride in, in terms of being the leader in that direction of bringing high performance object storage to the market, especially for big data workloads, AI ML, workloads, they're all object first, like even, you know, new age applications like snowflake and data bricks, they are not built on sand or file system. Right. They're all built on object storage rates. So that's where the, you need >>Performance. And I think the, I think the data bricks, snowflake examples. Good. And then you mentioned in 2014, when you started yes. At that time, big data was Hudu and you know, data, legs, data swamp. Yes. Yes. But the ones that were successful, the ones who optimize had the right bets, like you guys. Yeah. Now we're in an era. Okay. I gotta deploy this. So you got great downloads and update from developers. Now we see ops struggling to keep up yes. With the velocity of the development cycle. Yes. And with DevOps driving the cloud native yeah. Security data ops becomes important. Okay. Exactly. Security and data. A lot with storage going on there. Yes. How do you guys see that emerging? Cuz that becomes a lot of the conversations now in the architecture of the ops teams. I want to be supportive in enablement of dev. Yes. Yes. Do you guys target that world too? Or >>Yeah, we, we do target that. So the good thing about object storage is that if you look at the architecture in itself, it's very granular in terms of the controls that it can give to the end user. Right? So you can really customize in terms of, you know, what objects need to be accessible to whom what kind of policies you need to implement on the bucket level, what kind of access controls and provisions that you need to do. And especially like with ransomware attacks and what not, you can enable immutability and so on, so forth. So that's an important part of it. Especially I think the ransomware threats have increased quite a bit, especially with, you know, the macro, you know, situation with war and stuff. So we see that come up quite a bit. And that's where I think, you know, the data IU immutability, the data governance and compliance becomes extremely, extremely important for organizations. So we, we are partnering very closely with a lot of big organizations just for this use case itself. >>So how's it work if I want to build some kind of multi-cloud whatever X, right. Okay. I, I can use S three APIs or Azure blah. Okay. And I, and are all different. Yes. But if I want to use min IO, what's the experience like describe how I go about doing >>So if you've had any experience working with AWS, you don't need to even change a single line of code with us. You can just bring your applications directly onto min IO and it just behaves and act same way transparently what you would've experienced in AWS. Now you can just lift and shift that application and deploy it wherever you need it to be. Whether it is Azure, blah, whether it is Google cloud or even on edge. Like what we are seeing is that data is getting generated outside of public cloud. And most of the data that, you know, the emerging trend is that we see that data gets generated on edge quite a bit, whether it is autonomous cars, whether it is IOT, manufacturing units and so on. And you cannot push all that data back in the central cloud, it's extremely expensive for bandwidth and latency reasons. >>So you need to have an environment that looks and feels exactly what you have experienced at the central cloud on the edge itself. So a lot of our use cases are also getting deployed with Mani on the edge itself, whether it is on top of VMware because of the footprint of that VMware has within all these organizations itself. So we see that emerging quite a bit as well. And then you can tier the data off to any cloud, whether it is mid IO cloud, whether it is AWS, Azure, Google cloud, and so on. So you can have like a true multi-cloud environment. >>So you would follow VMware to the edge and be the object store there, or not necessarily if it's not VMware Kubernetes or whatever. >>Exactly. Exactly. Depending on the skill set that the organization has within, within their setup, if their DevOps savvy Kubernetes is becomes a very natural choice. If they are traditional enterprise, it, VMware is an ideal choice. So yeah. >>So you're seeing a lot of edge action you're saying, and we, >>We, we have seen starting it increasing yes. And >>Are customers. So they're persisting data at the edge. Yes. Yes they >>Are. Okay. >>It's not just the femoral and >>No, they are not because what the cost of putting all the data through bandwidth is extremely expansive to push all the data in central cloud and then process it and then store it. So we see that the data gets persisted on edge cloud as well in terms of processing and only the data that you need for, for the processing through whatever application systems that you, whether it is snowflake or data, bricks and whatnot, you know, you choose what applications from compute side, you want to bring on top of storage. And that can just seamlessly and transparently work. Yeah. >>Maria, you were saying that multi-cloud yeah. Games around Kubernetes. You, yes. That Kubernetes is all about multi-cloud that's the game. >>Yes. >>Yes. Can you explain what you mean by that? Why is multi-cloud a Kubernetes game? >>So multi-cloud has two foundations to it. One is the compute side. Another one is the storage side. Compute Kubernetes makes it extremely simple to deploy any application that is containerized. Once you containerize an application, it's no longer tied to the underlying infrastructure. You can actually deploy it no matter where you go. So Kubernetes makes that task extremely easy. And from storage standpoint, you know, the state of applications need to be held somewhere. You know, it's it, people say it's cloud, but it's computer somewhere. Right? So >>Exactly it's the >>Container. It needs, it needs to be stored somewhere. So that's where, you know, storage systems like man IO come into play where you can just take the storage and deploy it wherever you go. So it gets tightly bound with application itself, just like Kubernetes is for compute. Mano is for storage. >>I saw Scott Johnson, the CEO of Docker in Palo Alto last week did yeah. The spring to his step. So to speak Dockers doing pretty well as a result, they got, you know, starting to see certifications. Yes. So people are really rallying around containers in a more open way. Yes. But that's open source, but it's the Kubernetes, that's the action. Absolutely. That the container's really there now Docker's got a great business. Yes. Right now going yes. With how they're handling. I thought they did a great job. Yeah. But the Docker's now lingua Franco, right? Yes. That's the standard. It >>Is. It is. And I think where Kubernetes really makes it easy is in terms of when the scale is involved. Right. If there are, if the scale is small, it's okay. You can, you can work around it. But Kubernetes makes it extremely simple. If you have the right Kubernetes skill, I just need to put a disclaimer around there because not lot of people are Kubernetes expert, at least not yet. So if you have the expertise, Kubernetes makes the task extremely simple, predictable and automate and automated scale. I think that is what is >>The, so take me through a use case, cuz I've talked to a lot of enterprises, multiple versions, we're lifting and shifting to the cloud, that's kind of the, you know, get started, get your feet wet. Yes. Then there's like, okay, now we're refactoring really doing some native development and they're like, we don't have a staff on Kubernetes. We do a managed service. Yeah. So how does, how do you see that evolution piece taking place? Cause that's a critical adoption component as they start figuring out their Kubernetes relationship yes. To compute yes. How they roll it out. Yes. How do you see that playing out as a big part of this growth for a customer? >>Yeah. So we see a mix, you know, we see organizations that are born within cloud. Like they have just been in mono cloud like AWS. Now they are thinking about two things, right. With the economy being, you know, and the state that it is, they're getting hurt on the margin. Some of the SaaS companies that were born in cloud. So they are now actively thinking in terms of what mode they can do to bring the cost down. So they are partnering with min IO either to, you know, be in a colocation at Equinix, like data centers or go to other clouds to optimize for the compute modes and so on. So that's one thing that we see increasingly amongst enterprise. Second thing that we see is that because you know of that whole multi-cloud and cloud does go down, it's not like it, you know, and it's been evident over the last year or so that, you know, we've seen instances where Amazon was down or Google cloud was down. So they want to make sure that the data is available across the clouds in a consistent way. So with man IO, with the active, active application and so on, you can make the data available across the cloud. So your applications, even if one cloud is down for Dr. Purposes and so on, you can, you know, transparently, move the applications to another cloud and make sure that your business is not affected. So from business continuity reasons as well, the customers are partnering with us. So like I said, it's a mix. >>So the Tansu, you know, 1.3, the application development platform that we heard in the keynotes this morning, critical, you have to have that for cross cloud services. If you don't have a consistent experience, absolutely forget it. I mean it's table stake. Absolutely. But there's a lot of chatter on Twitter. A lot of skepticism that VMware can appeal to developers, some folk John as well chimed in saying, well, you know, it's, don't forget about the op side of the equation as well. They need security and consistency. Yes. What are you seeing in the marketplace in terms of VMware, specifically their customers and, and what do you, what do you, how do you rate their chances in terms of them being able to track the developer crowd, your, your peeps? >>Yeah. So VMware has a very strong hold on enterprise. It, you know, you have to give it to them. I don't come across any organization that does not have VMware, you know, for, with 500,000 customers. Right. Right. So they have done something really right for themselves. And if you have such a strong hold on the customers, it's not that hard to make the transition over to the developer mindset as well. And that is where with VMware partnership with partners like us, they can make, make that jump happen. So we partnered with them very closely for the data persistence layer and they wanted to bring Kubernetes the VMware tan natively to the VSAN interface itself. So we partnered with them, you know, we were their design partner and in, I think, 2020 or something, and we were their launch partner for that platform service. So now through the vCenter itself, you can provision object storage as a service for the developers. So I think they are working in terms of bridging the gap and they have the right mindset. It's all about execution like this. Right. >>They gotta get it >>Justed >>And it's the execution and timing. Exactly. And if they overshoot and the, it shifts over here, you know, this comes up a lot in our conversations. I want to get your reaction to this because I think that's a really great point. You guys are a nice foundational element. Yes. For VMware that plugs into them. That makes everything kind of float for them. Yes. Now we would, we were comparing OpenStack back in the day, how that had so much promise. Yes it did. If you remember, and storage was a big part of that conversation. It, it did. But the one thing that a lot of people didn't factor in on those industry discussions was Amazon was just ramping. Yes. So assuming that the hyper scales aren't stopping, innovating. Yeah. How does the multi-cloud fit with the constant struggles? Cuz abs is not rah multi-cloud cause they're there for the cloud, but customers are using Azure for yeah. Say office productivity teams or whatever, and then they have apps over here and then I'll see on private, private. Right. So hybrids there we get hybrid. Yeah. The clouds aren't changing. Yes. How does that change the dynamics in the market? Because it's a moving train. Some say, >>You know, it is, I would not characterize it like that because you know, AWS strength is that it is AWS, but also that it is not outside of AWS. Right. So it comes with the strengths and weaknesses and same goes for Azure. And same goes for Google cloud where VMware strength lies is the enterprise customers that it has. And I think if they can bridge the gap between the developers, enterprise customers and also the cloud, I think they have a really fair shot at, you know, making sure that the organizations and enterprise have the right experiences in terms of, you know, everyone needs to innovate. There is just no nothing that you can just sit back and relax. Everyone needs to innovate. And I think the good part about VMware is the partnership ecosystem that they have developed over the years and also making sure that their partners are successful along with them. And I think that is, that is going to be a key determining factor in terms of how well and how fast they can execute because nobody can do it alone in, in the enterprise world. So I think that that would be the >>Key, well, gua you're a great guest. Thanks for coming on and sharing you for having perspective on the cube. And obviously you've been on a, this from day 1, 20 15. Yes. I mean that's early and you guys made some great moves. Thank you. In a great position with VMware. Thank you. I like how you're the connective tissue and bridge to developers without a lot of disruption. Right? Real enablement. I think the question is can the VMware customers get there? So congratulations. No, thank you. And we got a couple minutes left. Take a minute to explain what's going on with the company that you co-founded, the team what's going on. Any updates funding very well, well funded. Yeah. How many people do you have? What's new. Are you gonna hire where take a minute to give the plug, give the commercial real quick >>For sure. So we started in 24 15, so it has been like seven, eight years now that we are at it. And I think we've been just very focused with the S3 compatible object storage, being AWS S3 for rest of the world. Like we get characterized at and over the years we've been like now we, we are used 60% in fortune 500 companies in some shape or format. So in terms of the scale and growth, we couldn't be more happier. We are about to touch a billion dollar billion Docker downloads in September. So that's something that we, we are very excited about. And in terms of the funding, we closed the, our series B sometime I think end of December last year and it's a billion dollar valuation and we have great partners in Intel capital and Dell ventures and soft bank. So we couldn't be in a more happier >>Spot. You're a unicorn soon to be decor. Right. >>What's next? Yes. I think, I think what is exciting for us is that the market, we could not be more happier with how the market is coming together with our vision, what we saw in 2015 and how everything is coming together nicely with, from the, the organization, realizing that multi-cloud is the core foundation and strategy of whatever they do next and lot has been accelerated due to COVID as well. Yeah. So in those terms, I think from market and product alignment, we just couldn't be more happier. >>Yeah. We think multi-cloud hybrids here. Steady state multi-cloud is gonna be a reality. Yeah. It becomes super cloud with the new dynamics. And again, David and I were talking last night, storage, networking, compute never goes away, never goes the operating. System's still gonna be out there. Just gonna be looked different and that >>Differently. Yes. I mean, yeah. And like, you know, in 10 years from now, Kubernetes might or might not be there as the foundation for, you know, compute, but storage is something that is always going to be there. People still need to persist the data. People still need a performance data store. People still need something that can scale to hundreds and hundreds of petabytes. So we are here. You bet against data >>As indie gross head once, you know, let chaos rain, rain in the chaos. There you go. Chaos cloud is gonna be simplified. Yeah. That's what innovation looks like. That's, >>That's what it is. >>Thanks for coming on the queue. Appreciate thank you for having me more coverage here. I'm John furrier with Dave Alane. Thanks for watching. More coverage. Three days just getting started. We'll be right back.
SUMMARY :
So our next first guest here on day one is car Capor So talk about how you guys relate with and storage is a foundation layer of how, and you do need a system that is simple, So just to elaborate on it, whenever you talk about multi-cloud, there are two pieces to it. as you know, and shifting left everyone's in the C I C D pipeline. And of course, you know, it needs to be feature rich and high performant and whatnot that comes with the, So you could describe that a little bit if you would, So object storage is the foundation of any cloud that you go with. So we partnered very closely with them and we were the first one to come up with, you know, you need high performance, So you got great downloads and update from developers. So the good thing about object storage is that if you look at So how's it work if I want to build some kind of multi-cloud whatever X, right. And most of the data that, you know, the emerging trend is that we see that data gets generated So you need to have an environment that looks and feels exactly what you have experienced at the central cloud on So you would follow VMware to the edge and be the object store there, or not necessarily if So yeah. We, we have seen starting it increasing yes. So they're persisting data at the edge. data that you need for, for the processing through whatever application systems that you, Maria, you were saying that multi-cloud yeah. Why is multi-cloud a Kubernetes game? And from storage standpoint, you know, the state of applications need to be held somewhere. So that's where, you know, So to speak Dockers doing pretty well as a result, they got, you know, starting to see certifications. So if you have the expertise, Kubernetes makes the task extremely So how does, how do you see that evolution piece taking With the economy being, you know, and the state that it is, they're getting hurt on the margin. So the Tansu, you know, 1.3, the application development platform that we heard in the keynotes So we partnered with them, you know, we were their design partner and So assuming that the hyper scales aren't stopping, innovating. the cloud, I think they have a really fair shot at, you know, Take a minute to explain what's going on with the company that you co-founded, the team what's going on. So in terms of the scale and growth, we couldn't be more happier. Right. So in those terms, I think from market and product alignment, we just couldn't be more happier. networking, compute never goes away, never goes the operating. And like, you know, As indie gross head once, you know, let chaos rain, rain in the chaos. Appreciate thank you for having me more coverage here.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
David | PERSON | 0.99+ |
2015 | DATE | 0.99+ |
Dave Alane | PERSON | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
September | DATE | 0.99+ |
2014 | DATE | 0.99+ |
Maria | PERSON | 0.99+ |
Garima Kapoor | PERSON | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
John Fett | PERSON | 0.99+ |
Palo Alto | LOCATION | 0.99+ |
VMware | ORGANIZATION | 0.99+ |
60% | QUANTITY | 0.99+ |
two pieces | QUANTITY | 0.99+ |
Scott Johnson | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
John | PERSON | 0.99+ |
seven | QUANTITY | 0.99+ |
Docker | ORGANIZATION | 0.99+ |
last week | DATE | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
Equinix | ORGANIZATION | 0.99+ |
20 end of 2014 | DATE | 0.99+ |
12th year | QUANTITY | 0.99+ |
2020 | DATE | 0.99+ |
Three days | QUANTITY | 0.99+ |
500,000 customers | QUANTITY | 0.99+ |
One | QUANTITY | 0.99+ |
two things | QUANTITY | 0.99+ |
one thing | QUANTITY | 0.99+ |
Second thing | QUANTITY | 0.99+ |
12 instruction | QUANTITY | 0.99+ |
eight years | QUANTITY | 0.99+ |
last year | DATE | 0.98+ |
Intel | ORGANIZATION | 0.98+ |
John furrier | PERSON | 0.98+ |
today | DATE | 0.98+ |
first guest | QUANTITY | 0.98+ |
500 companies | QUANTITY | 0.97+ |
one basket | QUANTITY | 0.97+ |
first one | QUANTITY | 0.97+ |
last night | DATE | 0.97+ |
around 1.3 million | QUANTITY | 0.97+ |
Kubernetes | TITLE | 0.97+ |
20 15 | DATE | 0.97+ |
one | QUANTITY | 0.96+ |
single line | QUANTITY | 0.96+ |
end of December last year | DATE | 0.96+ |
S3 | TITLE | 0.96+ |
ORGANIZATION | 0.96+ | |
DevOps | TITLE | 0.96+ |
S3 | COMMERCIAL_ITEM | 0.95+ |
Tansu | ORGANIZATION | 0.95+ |
Minio | PERSON | 0.94+ |
two foundations | QUANTITY | 0.94+ |
Azure | TITLE | 0.92+ |
a day | QUANTITY | 0.9+ |
OpenStack | TITLE | 0.9+ |
AVX five | COMMERCIAL_ITEM | 0.9+ |
this morning | DATE | 0.89+ |
ORGANIZATION | 0.88+ | |
first | QUANTITY | 0.88+ |
vCenter | TITLE | 0.87+ |
COVID | OTHER | 0.86+ |
Hudu | ORGANIZATION | 0.86+ |
billion dollar | QUANTITY | 0.86+ |
DACA | TITLE | 0.85+ |
Snehal Antani, Horizon3.ai | CUBE Conversation
(upbeat music) >> Hey, everyone. Welcome to theCUBE's presentation of the AWS Startup Showcase, season two, episode four. I'm your host, Lisa Martin. This topic is cybersecurity detect and protect against threats. Very excited to welcome a CUBE alumni back to the program. Snehal Antani, the co-founder and CEO of Horizon3 joins me. Snehal, it's great to have you back in the studio. >> Likewise, thanks for the invite. >> Tell us a little bit about Horizon3, what is it that you guys do? You were founded in 2019, got a really interesting group of folks with interesting backgrounds, but talk to the audience about what it is that you guys are aiming to do. >> Sure, so maybe back to the problem we were trying to solve. So my background, I was a engineer by trade, I was a CIO at G Capital, CTO at Splunk and helped grow scale that company. And then took a break from industry to serve within the Department of Defense. And in every one of my jobs where I had cyber security in my responsibility, I suffered from the same problem. I had no idea I was secure or that we were fixing the right vulnerabilities or logging the right data in Splunk or that our tools and processes and people worked together well until the bad guys had showed up. And by then it was too late. And what I wanted to do was proactively verify my security posture, make sure that my security tools were actually effective, that my people knew how to respond to a breach before the bad guys were there. And so this whole idea of continuously verifying my security posture through security testing and pen testing became a passion project of mine for over a decade. And through my time in the DOD found the right group of an early people that had offensive cyber experience, that had defensive cyber experience, that knew how to build and ship and deliver software at scale. And we came together at the end of 2019 to start Horizon3. >> Talk to me about the current threat landscape. We've seen so much change in flux in the last couple of years. Globally, we've seen the threat actors are just getting more and more sophisticated as is the different types of attacks. What are you seeing kind of horizontally across the threat landscape? >> Yeah, the biggest thing is attackers don't have to hack in using Zero-days like you see in the movies. Often they're able to just log in with valid credentials that they've collected through some mechanism. As an example, if I wanted to compromise a large organization, say United Airlines, one of the things that an attacker's going to go off and do is go to LinkedIn and find all of the employees that work at United Airlines. Now you've got say, 7,000 pilots. Of those pilots, you're going to figure out quickly that their user IDs and passwords or their user IDs at least are first name, last initial @united.com. Cool, now I have 7,000 potential logins and all it takes is one of them to reuse a compromised password for their corporate email, and now you've got an initial user in the system. And most likely, that initial user has local admin on their laptops. And from there, an attacker can dump credentials and find a path to becoming a domain administrator. And what happens oftentimes is, security tools don't detect this because it looks like valid behavior in the organization. And this is pretty common, this idea of collecting information on an organization or a target using open source intelligence, using a mix of credential spraying and kind of low priority or low severity exploitations or misconfigurations to get in. And then from there, systematically dumping credentials, reusing those credentials, and finding a path towards compromise. And less than 2% of CVEs are actually used in exploits. Most of the time, attackers chain together misconfigurations, bad product defaults. And so really the threat landscape is, attackers don't hack in, they log in. And organizations have to focus on getting the basics right and fundamentals right first before they layer on some magic easy button that is some security AI tools hoping that that's going to save their day. And that's what we found systemically across the board. >> So you're finding that across the board, probably pan-industry that a lot of companies need to go back to basics. We talk about that a lot when we're talking about security, why do you think that is? >> I think it's because, one, most organizations are barely treading water. When you look at the early rapid adopters of Horizon3's pen testing product, autonomous pen testing, the early adopters tended to be teams where the IT team and the security team were the same person, and they were barely treading water. And the hardest part of my job as a CIO was deciding what not to fix. Because the bottleneck in the security process is the actual capacity to fix problems. And so, fiercely prioritizing issues becomes really important. But the tools and the processes don't focus on prioritizing what's exploitable, they prioritize by some arbitrary score from some arbitrary vulnerability scanner. And so we have as a fundamental breakdown of the small group of folks with the expertise to fix problems tend to be the most overworked and tend to have the most noise to need to sift through. So they don't even have time to get to the basics. They're just barely treading water doing their day jobs and they're often sacrificing their nights and weekends. All of us at Horizon3 were practitioners at one point in our career, we've all been called in on the weekend. So that's why what we did was fiercely focus on helping customers and users fix problems that truly matter, and allowing them to quickly reattack and verify that the problems were truly fixed. >> So when it comes to today's threat landscape, what is it that organizations across the board should really be focused on? >> I think, systemically, what we see are bad password or credential policies, least access privileged management type processes not being well implemented. The domain user tends to be the local admin on the box, no ability to understand what is a valid login versus a malicious login. Those are some of the basics that we see systemically. And if you layer that with it's very easy to say, misconfigure vCenter, or misconfigure a piece of Cisco gear, or you're not going to be installing, monitoring security observability tools on that HPE Integrated Lights Out server and so on. What you'll find is that you've got people overworked that don't have the capacity to fix. You have the fundamentals or the basics not well implemented. And you have a whole bunch of blind spots in your security posture. And defenders have to be right every time, attackers only have to be right once. And so what we have is this asymmetric fight where attackers are very likely to get in, and we see this on the news all the time. >> So, and nobody, of course, wants to be the next headline, right? Talk to me a little bit about autonomous pen testing as a service, what you guys are delivering, and what makes it unique and different than other tools that have been out, as you're saying, that clearly have gaps. >> Yeah. So first and foremost was the approach we took in building our product. What we set upfront was, our primary users should be IT administrators, network engineers, and that IT intern who, in three clicks, should have the power of a 20-year pen testing expert. So the whole idea was empower and enable all of the fixers to find, fix, and verify their security weaknesses continuously. That was the design goal. Most other security products are designed for security people, but we already know they're task saturated, they've got way too many tools under the belt. So first and foremost, we wanted to empower the fixers to fix problems that truly matter. The second part was, we wanted to do that without having to install credentialed agents all over the place or writing your own custom attack scripts, or having to do a bunch of configurations and make sure that it's safe to run against production systems so that you could test your entire attack surface. Your on-prem, your cloud, your external perimeter. And this is where AWS comes in to be very important, especially hybrid customers where you've got a portion of your infrastructure on AWS, a portion on-prem, and you use Horizon3 to be able to attack your complete attack surface. So we can start on-prem and we will find say, the AWS credentials file that was mistakenly saved on a shared drive, and then reuse that to become admin in the cloud. AWS didn't do anything wrong, the cloud team didn't do anything wrong, a developer happened to share a password or save a password file locally. That's how attackers get in. So we can start from on-prem and show how we can compromise the cloud, start from the cloud and show how we can compromise on-prem. Start from the outside and break in. And we're able to show that complete attack surface at scale for hybrid customers. >> So showing that complete attack surface sort of from the eyes of the attacker? >> That's exactly right, because while blue teams or the defenders have a very specific view of their environment, you have to look at yourself through the eyes of the attacker to understand what are your blind spots, what do they see that you don't see. And it's actually a discipline that is well entrenched within military culture. And that's also important for us as the company. We're about a third of Horizon3 served in US special operations or the intelligence community with the United States, and then DOD writ large. And a lot of that red team mindset, view yourself through the eyes of the attacker, and this idea of training like you fight and building muscle memory so you know how to react to the real incident when it occurs is just ingrained in how we operate, and we disseminate that culture through all of our customers as well. >> And at this point in time, every business needs to assume an attacker's going to get in. >> That's right. There are way too many doors and windows in the organization. Attackers are going to get in, whether it's a single customer that reused their Netflix password for their corporate email, a patch that didn't get applied properly, or a new Zero-day that just gets published. A piece of Cisco software that was misconfigured, not buy anything more than it's easy to misconfigure these complex pieces of technology. Attackers are going to get in. And what we want to understand as customers is, once they're in, what could they do? Could they get to my crown jewel's data and systems? Could they borrow and prepare for a much more complicated attack down the road? If you assume breach, now you want to understand what can they get to, how quickly can you detect that breach, and what are your ways to stifle their ability to achieve their objectives. And culturally, we would need a shift from talking about how secure I am to how defensible are we. Security is kind of a point in time state of your organization. Defensibility is how quickly you can adapt to the attacker to stifle their ability to achieve their objective. >> As things are changing constantly. >> That's exactly right. >> Yeah. Talk to me about a typical customer engagement. If there's, you mentioned folks treading water, obviously, there's the huge cybersecurity skills gap that we've been talking about for a long time now, that's another factor there. But when you're in customer conversations, who are you talking to? Typically, what are they coming to you for help? >> Yeah. One big thing is, you're not going to win and win a customer by taking 'em out to steak dinners. Not anymore. The way we focus on our go to market and our sales motion is cultivating champions. At the end of the proof of concept, our internal measure of successes is, is that person willing to get a Horizon3 tattoo? And you do that, not through steak dinners, not through cool swag, not through marketing, but by letting your results do the talking. Now, part of those results should not require professional services or consulting. The whole experience should be self-service, frictionless, and insightful. And that really is how we've designed the product and designed the entire sales motion. So a prospect will learn or discover about us, whether it's through LinkedIn, through social, through the website, but often because one of their friends or colleagues heard about us, saw our result, and is advocating on our behalf when we're not in the room. From there, they're going to be able to self-service, just log in to our product through their LinkedIn ID, their Google ID. They can engage with a salesperson if they want to. They can run a pen test right there on the spot against their home without any interaction with a sales rep. Let those results do the talking, use that as a starting point to engage in a more complicated proof of value. And the whole idea is we don't charge for these, we let our results do the talking. And at the end, after they've run us to find problems, they've gone off and fixed those issues, and they've rerun us to verify that what they've fixed was properly fixed, then they're hooked. And we have a hundred percent technical win rate with our prospects when they hit that find-fix-verify cycle, which is awesome. And then we get the tattoo for them, at least give them the template. And then we're off to the races. >> Sounds like you're making the process more simple. There's so much complexity behind it, but allowing users to be able to actually test it out themselves in a simplified way is huge. Allowing them to really focus on becoming defensible. >> That's exactly right. And the value is, especially now in security, there's so much hype and so much noise. There's a lot more time being spent self-discovering and researching technologies before you engage in a commercial discussion. And so what we try to do is optimize that entire buying experience around enabling people to discover and research and learn. The other part, remember is, offensive cyber and ethical hacking and so on is very mysterious and magical to most defenders. It's such a complicated topic with many nuance tools that they don't have the time to understand or learn. And so if you surface the complexity of all those attacker tools, you're going to overwhelm a person that is already overwhelmed. So we needed the experience to be incredibly simple and optimize that find-fix-verify aha moment. And once again, be frictionless and be insightful. >> Frictionless and insightful. Excellent. Talk to me about results, you mentioned results. We love talking about outcomes. When a customer goes through the PoC, PoV that you talked about, what are some of the results that they see that hook them? >> Yeah, the biggest thing is, what attackers do today is they will find a low from machine one plus a low from machine two equals compromised domain. What they're doing is they're chaining together issues across multiple parts of your system or your organization to opone your environment. What attackers don't do is find a critical vulnerability and exploit that single machine. It's always a chain, always multiple steps in the attack. And so the entire product and experience in, actually, our underlying tech is around attack paths. Here is the path, the attack path an attacker could have taken. That node zero our product took. Here is the proof of exploitation for every step along the way. So you know this isn't a false positive. In fact, you can copy and paste the attacker command from the product and rerun it yourself and see it for yourself. And then here is exactly what you have to go fix and why it's important to fix. So that path, proof, impact, and fix action is what the entire experience is focused on. And that is the results doing the talking, because remember, these folks are already overwhelmed, they're dealing with a lot of false positives. And if you tell them you've got another critical to fix, their immediate reaction is "Nope, I don't believe you. This is a false positive. I've seen this plenty of times, that's not important." So you have to, in your product experience and sales process and adoption process, immediately cut through that defensive or that reflex. And it's path, proof, impact. Here's exactly what you fix, here are the exact steps to fix it, and then you're off to the races. What I learned at Splunk was, you win hearts and minds of your users through amazing experience, product experience, amazing documentation. >> Yes. >> And a vibrant community of champions. Those are the three ingredients of success, and we've really made that the core of the product. So we win on our documentation, we win on the product experience, and we've cultivated pretty awesome community. >> Talk to me about some of those champions. Is there a customer story that you think really articulates the value of node zero and what it is that you are doing? >> Yeah, I'll tell you a couple. Actually, I just gave this talk at Black Hat on war stories from running 10,000 pen tests. And I'll try to be gentle on the vendors that were involved here, but the reality is, you got to be honest and authentic. So a customer, a healthcare organization ran a pen test and they were using a very well-known managed security services provider as their security operations team. And so they initiate the pen test and they wanted to audit their response time of their MSSP. So they run the pen test and we're in and out. The whole pen test runs two hours or less. And in those two hours, the pen test compromises the domain, gets access to a bunch of sensitive data, laterally maneuvers, rips the entire environment apart. It took seven hours for the MSSP to send an email notification to the IT director that said, "Hey, we think something suspicious is going on." >> Wow. >> Seven hours! >> That's a long time. >> We were in and out in two, seven hours for notification. And the issue with that healthcare company was, they thought they had hired the right MSSP, but they had no way to audit their performance. And so we gave them the details and the ammunition to get services credits to hold them accountable and also have a conversation of switching to somebody else. >> Accountability is key, especially when we're talking about the threat landscape and how it's evolving day to day. >> That's exactly right. Accountability of your suppliers or your security vendors, accountability of your people and your processes, and not having to wait for the bad guys to show up to test your posture. That's what's really important. Another story that's interesting. This customer did everything right. It was a banking customer, large environment, and they had Fortinet installed as their EDR type platform. And they initiate us as a pen test and we're able to get code execution on one of their machines. And from there, laterally maneuver to become a domain administrator, which in security is a really big deal. So they came back and said, "This is absolutely not possible. Fortinet should have stopped that from occurring." And it turned out, because we showed the path and the proof and the impact, Fortinet was misconfigured on three machines out of 5,000. And they had no idea. >> Wow. >> So it's one of those, you want to don't trust that your tools are working, don't trust your processes, verify them. Show me we're secure today. Show me we're secure tomorrow. And then show me again we're secure next week. Because my environment's constantly changing and the adversary always has a vote. >> Right, the constant change in flux is huge challenge for organizations, but those results clearly speak for themselves. You talked about speed in terms of time, how quickly can a customer deploy your technology, identify and remedy problems in their environment? >> Yeah, this find-fix-verify aha moment, if you will. So traditionally, a customer would have to maybe run one or two pen tests a year. And then they'd go off and fix things. They have no capacity to test them 'cause they don't have the internal attack expertise. So they'd wait for the next pen test and figure out that they were still exploitable. Usually, this year's pen test results look identical than last year's. That isn't sustainable. So our customers shift from running one or two pen tests a year to 40 pen tests a month. And they're in this constant loop of finding, fixing, and verifying all of the weaknesses in their infrastructure. Remember, there's infrastructure pen testing, which is what we are really good at, and then there's application level pen testing that humans are much better at solving. >> Okay. >> So we focus on the infrastructure side, especially at scale. But can you imagine, 40 pen tests a month, they run from the perimeter, the inside from a specific subnet, from work from home machines, from the cloud. And they're running these pen tests from many different perspectives to understand what does the attacker see from each of these locations in their organization and how do they systemically fix those issues? And what they look at is, how many critical problems were found, how quickly were they fixed, how often do they reoccur. And that third metric is important because you might fix something, but if it shows up again next week because you've got bad automation, you're in a rat race. So you want to look at that reoccurrence rate also. >> The reoccurrence rate. What are you most excited about as, obviously, the threat landscape continues to evolve, but what are you most excited about for the company and what it is that you're able to help organizations across industries achieve in such tumultuous times? >> Yeah. One of the coolest things is, because I was a customer for many of these products, I despised threat intelligence products. I despised them. Because there were basically generic blog posts. Maybe delivered as a data feed to my Splunk environment or something. But they're always really generic. Like, "You may have a problem here." And as a result, they weren't very actionable. So one of the really cool things that we do, it's just part of the product is this concept of flares, flares that we shoot up. And the idea is not to cause angst or anxiety or panic, but rather we look at threat intelligence and then because all of the insights we have from your pen test results, we connect those two together and say, "Your VMware Horizon instance at this IP is exploitable. You need to fix it as fast as possible, or is very likely to be exploited. And here is the threat intelligence and in the news from CSAI and elsewhere that shows why it's important." So I think what is really cool is we're able to take together threat intelligence out in the wild combined with very precise understanding of your environment to give you very accurate and actionable starting points for what you need to go fix or test or verify. And when we do that, what we see is almost like, imagine this ball bouncing, that is the first drop of the ball, and then that drives the first major pen test. And then they'll run all these subsequent pen tests to continue to find and fix and verify. And so what we see is this tremendous amount of excitement from customers that we're actually giving them accurate, detailed information to take advantage of, and we're not causing panic and we're not causing alert and fatigue as a result. >> That's incredibly important in this type of environment. Last question for you. If autonomous pen testing is obviously critical and has tremendous amount of potential for organizations, but it's only part of the equation. What's the larger vision? >> Yeah, we are not a pen testing company and that's something we decided upfront. Pen testing is a sensor. It collects and understands a tremendous amount of data for your attack surface. So the natural next thing is to analyze the pen test results over time to start to give you a more accurate understanding of your governance, risk, and compliance posture. So now what happens is, we are able to allow customers to go run 40 pen tests a month. And that kind of becomes the initial land or flagship product. But then from there, we're able to upsell or increase value to our customers and start to compete and take out companies like Security Scorecard or RiskIQ and other companies like that, where there tended to be, I was a user of all those tools, a lot of garbage in, garbage out. Where you can't fill out a spreadsheet and get an accurate understanding of your risk posture. You need to look at your detailed pen test results over time and use that to accurately understand what are your hotspots, what's your recurrence rate and so on. And being able to tell that story to your auditors, to your regulators, to the board. And actually, it gives you a much more accurate way to show return on investment of your security spend also. >> Which is huge. So where can customers and those that are interested go to learn more? >> So horizonthree.ai is the website. That's a great starting point. We tend to very much rely on social channels, so LinkedIn in particular, to really get our stories out there. So finding us on LinkedIn is probably the next best thing to go do. And we're always at the major trade shows and events also. >> Excellent. Snehal, it's been a pleasure talking to you about Horizon3, what it is that you guys are doing, why, and the greater vision. We appreciate your insights and your time. >> Thank you, likewise. >> All right. For my guest, I'm Lisa Martin. We want to thank you for watching the AWS Startup Showcase. We'll see you next time. (gentle music)
SUMMARY :
of the AWS Startup Showcase, but talk to the audience about what it is that my people knew how to respond Talk to me about the and do is go to LinkedIn and that across the board, the early adopters tended to that don't have the capacity to fix. to be the next headline, right? of the fixers to find, fix, to understand what are your blind spots, to assume an attacker's going to get in. Could they get to my crown coming to you for help? And at the end, after they've Allowing them to really and magical to most defenders. Talk to me about results, And that is the results doing Those are the three and what it is that you are doing? to the IT director that said, And the issue with that and how it's evolving day to day. the bad guys to show up and the adversary always has a vote. Right, the constant change They have no capacity to test them to understand what does the attacker see the threat landscape continues to evolve, And the idea is not to cause but it's only part of the equation. And that kind of becomes the initial land to learn more? So horizonthree.ai is the website. to you about Horizon3, what it is the AWS Startup Showcase.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Lisa Martin | PERSON | 0.99+ |
Snehal | PERSON | 0.99+ |
two hours | QUANTITY | 0.99+ |
2019 | DATE | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
one | QUANTITY | 0.99+ |
United Airlines | ORGANIZATION | 0.99+ |
two | QUANTITY | 0.99+ |
20-year | QUANTITY | 0.99+ |
Seven hours | QUANTITY | 0.99+ |
seven hours | QUANTITY | 0.99+ |
Snehal Antani | PERSON | 0.99+ |
next week | DATE | 0.99+ |
Splunk | ORGANIZATION | 0.99+ |
Netflix | ORGANIZATION | 0.99+ |
Cisco | ORGANIZATION | 0.99+ |
ORGANIZATION | 0.99+ | |
three machines | QUANTITY | 0.99+ |
less than 2% | QUANTITY | 0.99+ |
tomorrow | DATE | 0.99+ |
5,000 | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
G Capital | ORGANIZATION | 0.99+ |
Department of Defense | ORGANIZATION | 0.99+ |
second part | QUANTITY | 0.99+ |
CUBE | ORGANIZATION | 0.99+ |
end of 2019 | DATE | 0.99+ |
Fortinet | ORGANIZATION | 0.99+ |
Horizon3 | ORGANIZATION | 0.99+ |
first | QUANTITY | 0.99+ |
third metric | QUANTITY | 0.99+ |
today | DATE | 0.99+ |
7,000 pilots | QUANTITY | 0.99+ |
DOD | ORGANIZATION | 0.98+ |
each | QUANTITY | 0.98+ |
US | LOCATION | 0.98+ |
One | QUANTITY | 0.98+ |
one point | QUANTITY | 0.98+ |
hundred percent | QUANTITY | 0.97+ |
three clicks | QUANTITY | 0.97+ |
@united.com | OTHER | 0.97+ |
single machine | QUANTITY | 0.97+ |
two pen tests | QUANTITY | 0.97+ |
Horizon3 | TITLE | 0.97+ |
three ingredients | QUANTITY | 0.97+ |
40 pen tests | QUANTITY | 0.97+ |
7,000 potential logins | QUANTITY | 0.96+ |
theCUBE | ORGANIZATION | 0.95+ |
first major pen test | QUANTITY | 0.94+ |
this year | DATE | 0.94+ |
last couple of years | DATE | 0.94+ |
machine two | QUANTITY | 0.93+ |
first name | QUANTITY | 0.92+ |
10,000 pen tests | QUANTITY | 0.92+ |
United States | LOCATION | 0.91+ |
over a decade | QUANTITY | 0.91+ |
single customer | QUANTITY | 0.9+ |
40 pen tests a month | QUANTITY | 0.89+ |
Startup Showcase | EVENT | 0.86+ |
a year | QUANTITY | 0.86+ |
One big thing | QUANTITY | 0.85+ |
RiskIQ | ORGANIZATION | 0.85+ |
VMware | ORGANIZATION | 0.83+ |
ORGANIZATION | 0.82+ | |
first drop of | QUANTITY | 0.82+ |
Snehal Antani S2 E4 Final
>>Hey everyone. Welcome to the Cube's presentation of the AWS startup showcase. Season two, episode four, I'm your host. Lisa Martin. This topic is cybersecurity detect and protect against threats. Very excited to welcome a Cub alumni back to the program. SNA hall, autonomy, the co-founder and CEO of horizon three joins me SNA hall. It's great to have you back in the studio. >>Likewise, thanks for the invite. >>Tell us a little bit about horizon three. What is it that you guys do you we're founded in 2019? Got a really interesting group of folks with interesting backgrounds, but talk to the audience about what it is that you guys are aiming to do. >>Sure. So maybe back to the problem we were trying to solve. So my background, I was a engineer by trade. I was a CIO at G capital CTO at Splunk and helped, helped grows scale that company and then took a break from industry to serve within the department of defense. And in every one of my jobs where I had cyber security in my responsibility, I suffered from the same problem. I had no idea I was secure or that we were fixing the right vulnerabilities or logging the right data in Splunk or that our tools and processes and people worked together well until the bad guys had showed up. And by then it was too late. And what I wanted to do was proactively verify my security posture, make sure that my security tools were actually effective, that my people knew how to respond to a breach before the bad guys were there. And so this whole idea of continuously verifying my security posture through security testing and pen testing became a, a passion project of mine for over a decade. And I, through my time in the DOD found the right group of an early people that had offensive cyber experience that had defensive cyber experience that knew how to build and ship and, and deliver software at scale. And we came together at the end of 2019 to start horizon three. >>Talk to me about the current threat landscape. We've seen so much change in flux in the last couple of years globally. We've seen, you know, the threat actors are just getting more and more sophisticated as is the different types of attacks. What are you seeing kind of horizontally across the threat landscape? >>Yeah. The biggest thing is attackers don't have to hack in using zero days. Like you see in the movies. Often they're able to just log in with valid credentials that they've collected through some mechanism. As an example, if I wanted to compromise a large organization, say United airlines, one of the things that an attacker's gonna go off and do is go to LinkedIn and find all of the employees that work at United airlines. Now you've got, say 7,000 pilots of those pilots. You're gonna figure out quickly that their use varie and passwords or their use varie@leastarefirstnamelastinitialatunited.com. Cool. Now I have 7,000 potential logins and all it takes is one of them to reuse a compromise password for their corporate email. And now you've got an initial user in the system and most likely that initial user has local admin on their laptops. And from there, an attacker can dump credentials and find a path to becoming a domain administrator. >>And what happens oftentimes is security tools. Don't detect this because it looks like valid behavior in the organization. And this is pretty common. This idea of collecting information on an organization or a topic or target using open source intelligence, using a mix of credentialed spraying and kinda low priority or low severity exploitations or misconfigurations to get in. And then from there systematically dumping credentials, reusing those credentials and finding a path towards compromise and almost less than 2% of, of CVEs are actually used in exploits. Most of the time attackers chain together misconfigurations bad product defaults. And so really the threat landscape is attackers don't hack in. They log in and organizations have to focus on getting the basics right and fundamentals right first, before they layer on some magic, easy button that is some security AI tools hoping that that's gonna save their day. And that's what we found systemically across the board. >>So you're finding that across the board, probably pan industry, that, that a lot of companies need to go back to basics. We talk about that a lot when we're talking about security, why do you think that >>Is? I think it's because one, most organizations are barely treading water. When you look at the early rapid adopters of horizon threes, pen testing, product, autonomous pen testing, the early adopters tended to be teams where the it team and the security team were the same person and they were barely treading water. And the hardest part of my job as a CIO was deciding what not to fix because the bottleneck in the security processes, the actual capacity to fix problems. And so fiercely prioritizing issues becomes really important, but the, the tools and the processes don't focus on prioritizing what's exploitable, they prioritize, you know, by some arbitrary score from some arbitrary vulnerability scanner. And so we have as a fundamental breakdown of the small group of folks with the expertise to fix problems, tend to be the most overworked and tend to have the most noise to need to sift through. So they don't even have time to get to the basics. They're just barely treading water doing their day jobs. And they're often sacrificing their nights and weekends. All of us at horizon three were practitioners at one point in our career, we've all been called in on the weekend. So that's why, what we did was fiercely focus on helping customers and users fix problems that truly matter, and allowing them to quickly retack and verify that the problems were truly fixed. >>So when it comes to today's threat landscape, what is it that organizations across the board should really be focused on? >>I think systemically what we see are bad password or credential policies, least access, privileged management type processes, not being well implemented. The domain user tends to be the local admin on the box, no ability to understand what is a valid login versus a, a malicious login. Those are some of the basics that we see systemically. And if you layer that with, it's very easy to say misconfigure vCenter, or misconfigure a piece of Cisco gear, or you're not gonna be installing monitoring and OB observa security observability tools on that. HP integrated lights out server. And so on. What you'll find is that you've got people overworked that don't have the capacity to fix. You have the fundamentals or the basics, not, not well implemented. And you have a whole bunch of blind spots in your security posture, and defenders have to be right. Every time attackers only have to be right once. And so what we have is this asymmetric fight where attackers are very likely to get in. And we see this on the news all the time. >>So, and, and nobody of course wants to be the next headline. Right? Talk to me a little bit about autonomous pen testing as a service, what you guys are delivering and what makes it unique and different than other tools that have been out there as, as you're saying that clearly have >>Gaps. Yeah. So first and foremost was the approach we took in building our product. What we set up front was our primary users should be it administrators, network, engineers, and P. And that, that it intern who in three clicks should have the power of a 20 year pen testing expert. So the whole idea was empower and enable all of the fixers to find, fix in verify their security weaknesses continuously. That was the design goal. Most other security products are designed for security people, but we already know they're they're task saturated. They've got way too many tools under the belt. So first and foremost, we wanted to empower the fixers to fix problems. That truly matter, the second part was we wanted to do that without having to install credentialed agents all over the place or writing your own custom attack scripts, or having to do a bunch of configurations and make sure that it's safe to run against production systems so that you could, you could test your entire attack surface your on-prem, your cloud, your external perimeter. >>And this is where AWS comes in to be very important, especially hybrid customers where you've got a portion of your infrastructure on AWS, a portion on-prem and you use horizon three to be able to attack your complete attack surface. So we can start on Preem and we will find, say the AWS credentials file that was mistakenly saved on a, a share drive, and then reuse that to become admin in the cloud. AWS didn't do anything wrong. The cloud team didn't do anything wrong. A developer happened to share a password or save a password file locally. That's how attackers get in. So we can start from on-prem and show how we can compromise the cloud, start from the cloud and, and, and show how we can compromise. On-prem start from the outside and break in. And we're able to show that complete attack surface at scale for hybrid customers. >>So showing that complete attack surface sort of from the eyes of the attacker, >>That's exactly right, because while blue teams or the defenders have a very specific view of their environment, you have to look at yourself through the eyes of the attacker to understand what are your blind spots? What do do they see that you don't see? And it's actually a discipline that is well entrenched within military culture. And that's also important for us as the company. We're about a third of horizon, three served in us special operations or the intelligence community with the United States, and then do OD writ large. And a lot of that red team mindset view yourself through the eyes of the attacker and this idea of training. Like you fight in building muscle memories. So you know how to react to the real incident when it occurs is just ingrained in how we operate. And we disseminate that culture through all of our customers as well. >>And, and at this point in time, it's, every business needs to assume an attacker's gonna get in >>That's right. There are way too many doors and windows in the organization. Attackers are going to get in, whether it's a single customer that reused their Netflix password for their corporate email, a patch that didn't get applied properly, or a new zero day that just gets published a piece of Cisco software that was misconfigured, you know, not by anything more than it's easy to misconfigure. These complex pieces of technology attackers are going to get in. And what we want to understand as customers is once they're in, what could they do? Could they get to my crown Jewel's data and systems? Could they borrow and prepare for a much more complicated attack down the road? If you assume breach, now you wanna understand what can they get to, how quickly can you detect that breach and what are your ways to stifle their ability to achieve their objectives. And culturally, we would need a shift from talking about how secure I am to how defensible are we. Security is kind of a state, a point in time, state of your organization, defense ability is how quickly you can adapt to the attacker to stifle their ability to achieve their objective >>As things are changing >>Constantly. That's exactly right. >>Yeah. Talk to me about a typical customer engagement. If there's, you mentioned folks treading water, obviously there's the huge cybersecurity skills gap that we've been talking about for a long time. Now that's another factor there, but when you're in customer conversations, who were you talking to? What typically are, what are they coming to you for help? >>Yeah. One big thing is you're not gonna win and, and win a customer by taking 'em out to steak dinners. Not anymore. The way we focus on, on our go to market and our sales motion is cultivating champions. At the end of the proof of concept, our internal measure of successes is that person willing to get a horizon three tattoo. And you do that, not through state dinners, not through cool swag, not through marketing, but by letting your results do the talking. Now, part of those results should not require professional services or consulting it. The whole experience should be self-service frictionless and insightful. And that really is how we've designed the product and designed the entire sales motion. So a prospect will learn or discover about us, whether it's through LinkedIn, through social, through the website, but often because one of their friends or colleagues heard about us saw our result and is advocating on our behalf. >>When we're not in the room from there, they're gonna be able to self-service just log to our product through their LinkedIn ID, their Google ID. They can engage with a salesperson if they want to, they can run a pen test right there on the spot against their home, without any interaction with a sales rep, let those results do the talking, use that as a starting point to engage in a, in a more complicated proof of value. And the whole idea is we don't charge for these. We let our results do the talking. And at the end, after they've run us to find problems they've gone off and fixed those issues. And they've rerun us to verify that what they've fixed was properly fixed, then they're hooked. And we have a hundred percent technical win rate with our prospects when they hit that fine fix verify cycle, which is awesome. And then we get the tattoo for them, at least give them the template. And then we're off to the races >>That it sounds like you're making the process more simple. There's so much complexity behind it, but allowing users to be able to actually test it out themselves in a, in a simplified way is huge. Allowing them to really focus on becoming defensible. >>That's exactly right. And you know, the value is we're all, especially now in security, there's so much hype and so much noise. There's a lot more time being spent, self discovering and researching technologies before you engage in a commercial discussion. And so what we try to do is optimize that entire buying experience around enabling people to discover and research and learn the other part, right. Remember is offensive cyber and ethical hacking. And so on is very mysterious and magical to most defenders. It's such a complicated topic with many nuance tools that they don't have the time to understand or learn. And so if you surface the complexity of all those attacker tools, you're gonna overwhelm a person that is already overwhelmed. So we needed the, the experience to be incredibly simple and, and optimize that fine fix verify aha moment. And once again, be frictionless and be insightful, >>Frictionless and insightful. Excellent. Talk to me about results. You mentioned results. We, we love talking about outcomes. When a customer goes through the, the POC POB that you talked about, what are some of the results that they see that hook them? >>Yeah. The biggest thing is what attackers do today is they will find a low from machine one, plus a low from machine two equals compromised domain. What they're doing is they're chaining together issues across multiple parts of your system or your organization to hone your environment. What attackers don't do is find a critical vulnerability and exploit that single machine it's always a chain is always, always multiple steps in the attack. And so the entire product and experience in actually our underlying tech is around attack pads. Here is the path, the attack path an attacker could have taken. You know, that node zero, our product took here is the proof of exploitation for every step along the way. So, you know, this isn't a false positive, in fact, you can copy and paste the attacker command from the product and rerun it yourself and see it for yourself. >>And then here is exactly what you have to go fix and why it's important to fix. So that path proof impact and fix action is what the entire experience is focused on. And that is the results doing the talking, because remember, these folks are already overwhelmed. They're dealing with a lot of false positives. And if you tell them you've got another critical to fix their immediate reaction is Nope. I don't believe you. This is a false positive. I've seen this plenty of times. That's not important. So you have to in your product experience in sales process and adoption process immediately cut through that defensive or that reflex and its path proof impact. Here's exactly what you fix here are the exact steps to fix it. And then you're off to the races. What I learned at Splunk was you win hearts and minds of your users through amazing experience, product experience, amazing documentation, yes, and a vibrant community of champions. Those are the three ingredients of success, and we've really made that the core of the product. So we win on our documentation. We win on the product experience and we've cultivated pretty awesome community. >>Talk to me about some of those champions. Is there a customer story that you think really articulates the value of no zero and what it is that, that you are doing? Yeah. >>I'll tell you a couple. Actually, I just gave this talk at black hat on war stories from running 10,000 pen tests. And I'll try to be gentle on the vendors that were involved here, but the reality is you gotta be honest and authentic. So a customer, a healthcare organization ran a pen test and they were using a very well known, managed security services provider as their, as their security operations team. And so they initiate the pen test and they were, they wanted to audit their response time of their MSSP. So they run the pen test and we're in and out. The whole pen test runs two hours or less. And in those two hours, the pen test compromises, the domain gets access to a bunch of sensitive data. Laterally, maneuvers rips the entire entire environment apart. It took seven hours for the MSSP to send an email notification to the it director that said, Hey, we think something's suspicious is wow. Seven hours. That's >>A long time >>We were in and out in two, seven hours for notification. And the issue with that healthcare company was they thought they had hired the right MSSP, but they had no way to audit their performance. And so we gave them the, the details and the ammunition to get services credits to hold them accountable and also have a conversation of switching to somebody else. >>That accountability is key, especially when we're talking about the, the threat landscape and how it's evolving day to day. That's >>Exactly right. Accountability of your suppliers or, or your security vendors, accountability of your people and your processes, and not having to wait for the bad guys to show up, to test your posture. That's, what's really important. Another story is interesting. This customer did everything right. It was a banking customer, large environment, and they had Ford net installed as their, as their EDR type platform. And they, they initiate us as a pen test and we're able to get code execution on one of their machines. And from there laterally maneuver to become a domain administrator, which insecurity is a really big deal. So they came back and said, this is absolutely not possible. Ford net should have stopped that from occurring. And it turned out because we showed the path and the proof and the impact Forder net was misconfigured on three machines out of 5,000. And they had no idea. Wow. So it's one of those you wanna don't trust that your tools are working. Don't trust your processes. Verify them, show me we're secure today. Show me we're secured tomorrow. And then show me again, we're secure next week, because my environment's constantly changing. And the, and the adversary always has a vote, >>Right? The, the constant change in flux is, is huge challenge for organizations, but those results clearly speak for themselves. You, you talked about the speed in terms of time, how quickly can a customer deploy your technology, identify and remedy problems in their environment. >>Yeah. You know, this fine fix verify aha moment. If you will. So traditionally a customer would have to maybe run one or two pen tests a year and then they'd go off and fix things. They have no capacity to test them cuz they don't have the internal attack expertise. So they'd wait for the next pen test and figure out that they were still exploitable. Usually this year's pen test results look identical the last years that isn't sustainable. So our customers shift from running one or two pen tests a year to 40 pen tests a month. And they're in this constant loop of finding, fixing and verifying all of the weaknesses in their infrastructure. Remember there's infrastructure, pen testing, which is what we are really good at. And then there's application level pen testing that humans are much better at solving. Okay. So we focus on the infrastructure side, especially at scale, but can you imagine so 40 pen tests a month, they run from the perimeter, the inside from a specific subnet from work from home machines, from the cloud. And they're running these pen tests from many different perspectives to understand what does the attacker see from each of these locations in their organization and how do they systemically fix those issues? And what they look at is how many critical problems were found, how quickly were they fixed? How often do they reoccur? And that third metric is important because you might fix something. But if it shows up again next week, because you've got bad automation, you're not gonna you're in a rat race. So you wanna look at that reoccurrence rate also >>The recurrence rate. What are you most excited about as obviously the threat landscape continues to evolve, but what are you most excited about for the company and what it is that you're able to help organizations across industries achieve in such tumultuous times? Yeah. You >>Know, one of the coolest things is back because I was a customer for many of these products, I, I despised threat intelligence products. I despised them because they were basically generic blog posts maybe delivered as a, as a, as a data feed to my Splunk environment or something. But they're always really generic. Like you may have a problem here. And as a result, they weren't very actionable. So one of the really cool things that we do, it's just part of the product is this concept of, of flares flares that we shoot up. And the idea is not to be, to cause angst or anxiety or panic, but rather we look at threat intelligence and then because all, all the insights we have from your pen test results, we connect those two together and say your VMware horizon instance at this IP is exploitable. You need to fix it as fast as possible or as very likely to be exploited. >>And here is the threat intelligence and in the news from CSUN elsewhere, that shows why it's important. So I think what is really cool is we're able to take together threat intelligence out in the wild combined with very precise understanding of your environment, to give you very accurate and actionable starting points for what you need to go fix or test or verify. And when we do that, what we see is almost like, imagine this ball bouncing, that is the first drop of the ball. And then that drives the first major pen test. And then they'll run all these subsequent pen tests to continue to find and fix and verify. And so what we see is this tremendous amount of AC excitement from customers that we're actually giving them accurate, detailed information to take advantage of, and we're not causing panic and we're not causing alert, fatigue as a result. >>That's incredibly important in this type of environment. Last question for you. If, if autonomous pen testing is obviously critical and has tremendous amount of potential for organizations, but it's not, it's only part of the equation. What's the larger vision. >>Yeah. You know, we are not a pen testing company and that's something we decided upfront. Pen testing is a sensor. It collects and understands a tremendous amount of data for your attack surface. So the natural next thing is to analyze the pen test results over time, to start to give you a more accurate understanding of your governance risk and compliance posture. So now what happens is we are able to allow customers to go run 40 pen tests a month. And that kind of becomes the, the initial land or flagship product. But then from there we're able to upsell or increase value to our customers and start to compete and take out companies like security scorecard or risk IQ and other companies like that, where there tended to be. I was a user of all those tools, a lot of garbage in garbage out, okay, where you can't fill out a spreadsheet and get an accurate understanding of your risk posture. You need to look at your detailed pen, test results over time and use that to accurately understand what are your hotspots, what's your recurrence rate and so on. And being able to tell that story to your auditors, to your regulators, to the board. And actually it gives you a much more accurate way to show return on investment of your security spend also, which >>Is huge. So where can customers and, and those that are interested go to learn more. >>So horizon three.ai is the website. That's a great starting point. We tend to very much rely on social channels. So LinkedIn in particular to really get our stories out there. So finding us on LinkedIn is probably the next best thing to go do. And we're always at the major trade shows and events also. >>Excellent SNA. It's been a pleasure talking to you about horizon three. What it is that you guys are doing, why and the greater vision we appreciate your insights and your time. >>Thank you, likewise. >>All right. For my guest. I'm Lisa Martin. We wanna thank you for watching the AWS startup showcase. We'll see you next time.
SUMMARY :
It's great to have you back in the studio. What is it that you guys do you we're founded in 2019? that my people knew how to respond to a breach before the bad guys were there. Talk to me about the current threat landscape. And now you've got an initial user in the system and And so really the threat landscape is attackers don't hack in. that, that a lot of companies need to go back to basics. And so we have as a fundamental breakdown of the small group of folks with the expertise And you have a whole bunch of blind spots in your security posture, and defenders testing as a service, what you guys are delivering and what makes it unique and different and make sure that it's safe to run against production systems so that you could, you could test your entire attack surface three to be able to attack your complete attack surface. And a lot of that red team mindset And culturally, we would need a shift from talking That's exactly right. What typically are, what are they coming to you for help? And you And at the end, after they've run us to find problems Allowing them to really focus on becoming defensible. And so if you surface the complexity of all those attacker tools, you're gonna overwhelm a POB that you talked about, what are some of the results that they see that hook them? And so the entire product and experience in actually our underlying tech is And then here is exactly what you have to go fix and why it's important to fix. Talk to me about some of those champions. And I'll try to be gentle on the vendors that were involved here, but the reality is you gotta be honest and the details and the ammunition to get services credits to hold them accountable and also to day. And from there laterally maneuver to become You, you talked about the speed And that third metric is important because you might fix something. to evolve, but what are you most excited about for the company and what it is that you're able to help organizations across And the idea is not to be, And here is the threat intelligence and in the news from CSUN elsewhere, that shows why it's important. but it's not, it's only part of the equation. And being able to tell that story to your auditors, to your regulators, to the board. So where can customers and, and those that are interested go to learn more. So LinkedIn in particular to really get our stories out there. It's been a pleasure talking to you about horizon three. We wanna thank you for watching the AWS startup showcase.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Lisa Martin | PERSON | 0.99+ |
two hours | QUANTITY | 0.99+ |
2019 | DATE | 0.99+ |
two | QUANTITY | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Seven hours | QUANTITY | 0.99+ |
one | QUANTITY | 0.99+ |
HP | ORGANIZATION | 0.99+ |
seven hour | QUANTITY | 0.99+ |
tomorrow | DATE | 0.99+ |
next week | DATE | 0.99+ |
ORGANIZATION | 0.99+ | |
Cisco | ORGANIZATION | 0.99+ |
CSUN | ORGANIZATION | 0.99+ |
20 year | QUANTITY | 0.99+ |
Netflix | ORGANIZATION | 0.99+ |
Splunk | ORGANIZATION | 0.99+ |
zero days | QUANTITY | 0.99+ |
5,000 | QUANTITY | 0.99+ |
second part | QUANTITY | 0.99+ |
first | QUANTITY | 0.99+ |
United airlines | ORGANIZATION | 0.99+ |
first drop | QUANTITY | 0.99+ |
third metric | QUANTITY | 0.99+ |
7,000 pilots | QUANTITY | 0.98+ |
today | DATE | 0.98+ |
this year | DATE | 0.98+ |
Ford net | ORGANIZATION | 0.98+ |
hundred percent | QUANTITY | 0.98+ |
three machines | QUANTITY | 0.98+ |
one point | QUANTITY | 0.97+ |
seven hours | QUANTITY | 0.97+ |
three clicks | QUANTITY | 0.97+ |
three ingredients | QUANTITY | 0.97+ |
single machine | QUANTITY | 0.97+ |
each | QUANTITY | 0.97+ |
varie@leastarefirstnamelastinitialatunited.com | OTHER | 0.96+ |
end of 2019 | DATE | 0.96+ |
Cub | ORGANIZATION | 0.96+ |
40 pen | QUANTITY | 0.96+ |
DOD | ORGANIZATION | 0.96+ |
three | QUANTITY | 0.95+ |
less than 2% | QUANTITY | 0.95+ |
single customer | QUANTITY | 0.95+ |
Forder net | ORGANIZATION | 0.95+ |
G capital CTO | ORGANIZATION | 0.95+ |
last years | DATE | 0.94+ |
two pen tests | QUANTITY | 0.94+ |
7,000 potential logins | QUANTITY | 0.93+ |
Snehal Antani | PERSON | 0.92+ |
zero day | QUANTITY | 0.91+ |
40 pen tests | QUANTITY | 0.9+ |
horizon three | TITLE | 0.89+ |
United States | LOCATION | 0.88+ |
horizon | ORGANIZATION | 0.87+ |
last couple of years | DATE | 0.87+ |
SNA hall | ORGANIZATION | 0.86+ |
a year | QUANTITY | 0.86+ |
40 pen tests a month | QUANTITY | 0.86+ |
machine two | QUANTITY | 0.85+ |
10,000 pen tests | QUANTITY | 0.84+ |
over a decade | QUANTITY | 0.84+ |
machine one | QUANTITY | 0.82+ |
a month | QUANTITY | 0.81+ |
Cube | PERSON | 0.76+ |
episode four | OTHER | 0.75+ |
S2 | COMMERCIAL_ITEM | 0.74+ |
once | QUANTITY | 0.73+ |
Haseeb Budhani, Rafay & Kevin Coleman, AWS | AWS Summit New York 2022
(gentle music) (upbeat music) (crowd chattering) >> Welcome back to The City That Never Sleeps. Lisa Martin and John Furrier in New York City for AWS Summit '22 with about 10 to 12,000 of our friends. And we've got two more friends joining us here today. We're going to be talking with Haseeb Budhani, one of our alumni, co-founder and CEO of Rafay Systems, and Kevin Coleman, senior manager for Go-to Market for EKS at AWS. Guys, thank you so much for joining us today. >> Thank you very much for having us. Excited to be here. >> Isn't it great to be back at an in-person event with 10, 12,000 people? >> Yes. There are a lot of people here. This is packed. >> A lot of energy here. So, Haseeb, we've got to start with you. Your T-shirt says it all. Don't hate k8s. (Kevin giggles) Talk to us about some of the trends, from a Kubernetes perspective, that you're seeing, and then Kevin will give your follow-up. >> Yeah. >> Yeah, absolutely. So, I think the biggest trend I'm seeing on the enterprise side is that enterprises are forming platform organizations to make Kubernetes a practice across the enterprise. So it used to be that a BU would say, "I need Kubernetes. I have some DevOps engineers, let me just do this myself." And the next one would do the same, and then next one would do the same. And that's not practical, long term, for an enterprise. And this is now becoming a consolidated effort, which is, I think it's great. It speaks to the power of Kubernetes, because it's becoming so important to the enterprise. But that also puts a pressure because what the platform team has to solve for now is they have to find this fine line between automation and governance, right? I mean, the developers, you know, they don't really care about governance. Just give me stuff, I need to compute, I'm going to go. But then the platform organization has to think about, how is this going to play for the enterprise across the board? So that combination of automation and governance is where we are finding, frankly, a lot of success in making enterprise platform team successful. I think, that's a really new thing to me. It's something that's changed in the last six months, I would say, in the industry. I don't know if, Kevin, if you agree with that or not, but that's what I'm seeing. >> Yeah, definitely agree with that. We see a ton of customers in EKS who are building these new platforms using Kubernetes. The term that we hear a lot of customers use is standardization. So they've got various ways that they're deploying applications, whether it's on-prem or in the cloud and region. And they're really trying to standardize the way they deploy applications. And Kubernetes is really that compute substrate that they're standardizing on. >> Kevin, talk about the relationship with Rafay Systems that you have and why you're here together. And two, second part of that question, why is EKS kicking ass so much? (Haseeb and Kevin laughing) All right, go ahead. First one, your relationship. Second one, EKS is doing pretty well. >> Yep, yep, yep. (Lisa laughing) So yeah, we work closely with Rafay, Rafay, excuse me. A lot of joint customer wins with Haseeb and Co, so they're doing great work with EKS customers and, yeah, love the partnership there. In terms of why EKS is doing so well, a number of reasons, I think. Number one, EKS is vanilla, upstream, open-source Kubernetes. So customers want to use that open-source technology, that open-source Kubernetes, and they come to AWS to get it in a managed offering, right? Kubernetes isn't the easiest thing to self-manage. And so customers, you know, back before EKS launched, they were banging down the door at AWS for us to have a managed Kubernetes offering. And, you know, we launched EKS and there's been a ton of customer adoption since then. >> You know, Lisa, when we, theCUBE 12 years, now everyone knows we started in 2010, we used to cover a show called OpenStack. >> I remember that. >> OpenStack Summit. >> What's that now? >> And at the time, at that time, Kubernetes wasn't there. So theCUBE was present at creation. We've been to every KubeCon ever, CNCF then took it over. So we've been watching it from the beginning. >> Right. And it reminds me of the same trend we saw with MapReduce and Hadoop. Very big promise, everyone loved it, but it was hard, very difficult. And Hadoop's case, big data, it ended up becoming a data lake. Now you got Spark, or Snowflake, and Databricks, and Redshift. Here, Kubernetes has not yet been taken over. But, instead, it's being abstracted away and or managed services are emerging. 'Cause general enterprises can't hire enough Kubernetes people. >> Yep. >> They're not that many out there yet. So there's the training issue. But there's been the rise of managed services. >> Yep. >> Can you guys comment on what your thoughts are relative to that trend of hard to use, abstracting away the complexity, and, specifically, the managed services? >> Yeah, absolutely. You want to go? >> Yeah, absolutely. I think, look, it's important to not kid ourselves. It is hard. (Johns laughs) But that doesn't mean it's not practical, right. When Kubernetes is done well, it's a thing of beauty. I mean, we have enough customer to scale, like, you know, it's like a, forget a hockey stick, it's a straight line up, because they just are moving so fast when they have the right platform in place. I think that the mistake that many of us make, and I've made this mistake when we started this company, was trivializing the platform aspect of Kubernetes, right. And a lot of my customers, you know, when they start, they kind of feel like, well, this is not that hard. I can bring this up and running. I just need two people. It'll be fine. And it's hard to hire, but then, I need two, then I need two more, then I need two, it's a lot, right. I think, the one thing I keep telling, like, when I talk to analysts, I say, "Look, somebody needs to write a book that says, 'Yes, it's hard, but, yes, it can be done, and here's how.'" Let's just be open about what it takes to get there, right. And, I mean, you mentioned OpenStack. I think the beauty of Kubernetes is that because it's such an open system, right, even with the managed offering, companies like Rafay can build really productive businesses on top of this Kubernetes platform because it's an open system. I think that is something that was not true with OpenStack. I've spent time with OpenStack also, I remember how it is. >> Well, Amazon had a lot to do with stalling the momentum of OpenStack, but your point about difficulty. Hadoop was always difficult to maintain and hiring against. There were no managed services and no one yet saw that value of big data yet. Here at Kubernetes, people are living a problem called, I'm scaling up. >> Yep. And so it sounds like it's a foundational challenge. The ongoing stuff sounds easier or manageable. >> Once you have the right tooling. >> Is that true? >> Yeah, no, I mean, once you have the right tooling, it's great. I think, look, I mean, you and I have talked about this before, I mean, the thesis behind Rafay is that, you know, there's like 8, 12 things that need to be done right for Kubernetes to work well, right. And my whole thesis was, I don't want my customer to buy 10, 12, 15 products. I want them to buy one platform, right. And I truly believe that, in our market, similar to what vCenter, like what VMware's vCenter did for VMs, I want to do that for Kubernetes, right. And that the reason why I say that is because, see, vCenter is not about hypervisors, right? vCenter is about hypervisor, access, networking, storage, all of the things, like multitenancy, all the things that you need to run an enterprise-grade VM environment. What is that equivalent for the Kubernetes world, right? So what we are doing at Rafay is truly building a vCenter, but for Kubernetes, like a kCenter. I've tried getting the domain. I couldn't get it. (Kevin laughs) >> Well, after the Broadcom view, you don't know what's going to happen. >> Ehh. (John laughs) >> I won't go there! >> Yeah. Yeah, let's not go there today. >> Kevin, EKS, I've heard people say to me, "Love EKS. Just add serverless, that's a home run." There's been a relationship with EKS and some of the other Amazon tools. Can you comment on what you're seeing as the most popular interactions among the services at AWS? >> Yeah, and was your comment there, add serverless? >> Add serverless with AKS at the edge- >> Yeah. >> and things are kind of interesting. >> I mean, so, one of the serverless offerings we have today is actually Fargate. So you can use Fargate, which is our serverless compute offering, or one of our serverless compute offerings with EKS. And so customers love that. Effectively, they get the beauty of EKS and the Kubernetes API but they don't have to manage nodes. So that's, you know, a good amount of adoption with Fargate as well. But then, we also have other ways that they can manage their nodes. We have managed node groups as well, in addition to self-managed nodes also. So there's a variety of options that customers can use from a compute perspective with EKS. And you'll continue to see us evolve the portfolio as well. >> Can you share, Haseeb, can you share a customer example, a joint customer example that you think really articulates the value of what Rafay and AWS are doing together? >> Yeah, absolutely. In fact, we announced a customer very recently on this very show, which is MoneyGram, which is a joint AWS and Rafay customer. Look, we have enough, you know, the thing about these massive customers is that, you know, not everybody's going to give us their logo to use. >> Right. >> But MoneyGram has been a Rafay plus EKS customer for a very, very long time. You know, at this point, I think we've earned their trust, and they've allowed us to, kind of say this publicly. But there's enough of these financial services companies who have, you know, standardized on EKS. So it's EKS first, Rafay second, right. They standardized on EKS. And then they looked around and said, "Who can help me platform EKS across my enterprise?" And we've been very lucky. We have some very large financial services, some very large healthcare companies now, who, A, EKS, B, Rafay. I'm not just saying that because my friend Kevin's here, (Lisa laughs) it's actually true. Look, EKS is a brilliant platform. It scales so well, right. I mean, people try it out, relative to other platforms, and it's just a no-brainer, it just scales. You want to build a big enterprise on the backs of a Kubernetes platform. And I'm not saying that's because I'm biased. Like EKS is really, really good. There's a reason why so many companies are choosing it over many other options in the market. >> You're doing a great job of articulating why the theme (Kevin laughs) of the New York City Summit is scale anything. >> Oh, yeah. >> There you go. >> Oh, yeah. >> I did not even know that but I'm speaking the language, right? >> You are. (John laughs) >> Yeah, absolutely. >> One of the things that we're seeing, also, I want to get your thoughts on, guys, is the app modernization trend, right? >> Yep. >> Because unlike other standards that were hard, that didn't have any benefit downstream 'cause they were too hard to get to, here, Kubernetes is feeding into real app for app developer pressure. They got to get cloud-native apps out. It's fairly new in the mainstream enterprise and a lot of hyperscalers have experience. So I'm going to ask you guys, what is the key thing that you're enabling with Kubernetes in the cloud-native apps? What is the key value? >> Yeah. >> I think, there's a bifurcation happening in the market. One is the Kubernetes Engine market, which is like EKS, AKS, GKE, right. And then there's the, you know, what, back in the day, we used to call operations and management, right. So the OAM layer for Kubernetes is where there's need, right. People are learning, right. Because, as you said before, the skill isn't there, you know, there's not enough talent available to the market. And that's the opportunity we're seeing. Because to solve for the standardization, the governance, and automation that we talked about earlier, you know, you have to solve for, okay, how do I manage my network? How do I manage my service mesh? How do I do chargebacks? What's my, you know, policy around actual Kubernetes policies? What's my blueprinting strategy? How do I do add-on management? How do I do pipelines for updates of add-ons? How do I upgrade my clusters? And we're not done yet, there's a longer list, right? This is a lot, right? >> Yeah. >> And this is what happens, right. It's just a lot. And really, the companies who understand that plethora of problems that need to be solved and build easy-to-use solutions that enterprises can consume with the right governance automation, I think they're going to be very, very successful here. >> Yeah. >> Because this is a train, right? I mean, this is happening whether, it's not us, it's happening, right? Enterprises are going to keep doing this. >> And open-source is a big driver in all of this. >> Absolutely. >> Absolutely. >> And I'll tag onto that. I mean, you talked about platform engineering earlier. Part of the point of building these platforms on top of Kubernetes is giving developers an easier way to get applications into the cloud. So building unique developer experiences that really make it easy for you, as a software developer, to take the code from your laptop, get it out of production as quickly as possible. The question is- >> So is that what you mean, does that tie your point earlier about that vertical, straight-up value once you've set up it, right? >> Yep. >> Because it's taking the burden off the developers for stopping their productivity. >> Absolutely. >> To go check in, is it configured properly? Is the supply chain software going to be there? Who's managing the services? Who's orchestrating the nodes? >> Yep. >> Is that automated, is that where you guys see the value? >> That's a lot of what we see, yeah. In terms of how these companies are building these platforms, is taking all the component pieces that Haseeb was talking about and really putting it into a cohesive whole. And then, you, as a software developer, you don't have to worry about configuring all of those things. You don't have to worry about security policy, governance, how your app is going to be exposed to the internet. >> It sounds like infrastructure is code. >> (laughs) Yeah. >> Come on, like. >> (laughs) Infrastructure's code is a big piece of it, for sure, for sure. >> Yeah, look, infrastructure's code actually- >> Infrastructure's sec is code too, the security. >> Yeah. >> Huge. >> Well, it all goes together. Like, we talk about developer self-service, right? The way we enable developer self-service is by teaching developers, here's a snippet of code that you write and you check it in and your infrastructure will just magically be created. >> Yep. >> But not automatically. It's going to go through a check, like a check through the platform team. These are the workflows that if you get them right, developers don't care, right. All developers want is I want to compute. But then all these 20 things need to happen in the back. That's what, if you nail it, right, I mean, I keep trying to kind of pitch the company, I don't want to do that today. But if you nail that, >> I'll give you a plug at the end. >> you have a good story. >> But I got to, I just have a tangent question 'cause you reminded me. There's two types of developers that have emerged, right. You have the software developer that wants infrastructures code. I just want to write my code, I don't want to stop. I want to build in shift-left for security, shift-right for data. All that's in there. >> Right. >> I'm coding away, I love coding. Then you've got the under-the-hood person. >> Yes. >> I've been to the engines. >> Certainly. >> So that's more of an SRE, data engineer, I'm wiring services together. >> Yeah. >> A lot of people are like, they don't know who they are yet. They're in college or they're transforming from an IT job. They're trying to figure out who they are. So question is, how do you tell a person that's watching, like, who am I? Like, should I be just coding? But I love the tech. Would you guys have any advice there? >> You know, I don't know if I have any guidance in terms of telling people who they are. (all laughing) I mean, I think about it in terms of a spectrum and this is what we hear from customers, is some customers want to shift as much responsibility onto the software teams to manage their infrastructure as well. And then some want to shift it all the way over to the very centralized model. And, you know, we see everything in between as well with our EKS customer base. But, yeah, I'm not sure if I have any direct guidance for people. >> Let's see, any wisdom? >> Aside from experiment. >> If you're coding more, you're a coder. If you like to play with the hardware, >> Yeah. >> or the gears. >> Look, I think it's really important for managers to understand that developers, yes, they have a job, you have to write code, right. But they also want to learn new things. It's only fair, right. >> Oh, yeah. >> So what we see is, developers want to learn. And we enable for them to understand Kubernetes in small pieces, like small steps, right. And that is really, really important because if we completely abstract things away, like Kubernetes, from them, it's not good for them, right. It's good for their careers also, right. It's good for them to learn these things. This is going to be with us for the next 15, 20 years. Everybody should learn it. But I want to learn it because I want to learn, not because this is part of my job, and that's the distinction, right. I don't want this to become my job because I want, I want to write my code. >> Do what you love. If you're more attracted to understanding how automation works, and robotics, or making things scale, you might be under-the-hood. >> Yeah. >> Yeah, look under the hood all day long. But then, in terms of, like, who keeps the lights on for the cluster, for example. >> All right, see- >> That's the job. >> He makes a lot of value. Now you know who you are. Ask these guys. (Lisa laughing) Congratulations on your success on EKS 2. >> Yeah, thank you. >> Quick, give a plug for the company. I know you guys are growing. I want to give you a minute to share to the audience a plug that's going to be, what are you guys doing? You're hiring? How many employees? Funding? Customer new wins? Take a minute to give a plug. >> Absolutely. And look, I come see, John, I think, every show you guys are doing a summit or a KubeCon, I'm here. (John laughing) And every time we come, we talk about new customers. Look, platform teams at enterprises seem to love Rafay because it helps them build that, well, Kubernetes platform that we've talked about on the show today. I think, many large enterprises on the financial service side, healthcare side, digital native side seem to have recognized that running Kubernetes at scale, or even starting with Kubernetes in the early days, getting it right with the right standards, that takes time, that takes effort. And that's where Rafay is a great partner. We provide a great SaaS offering, which you can have up and running very, very quickly. Of course, we love EKS. We work with our friends at AWS. But also works with Azure, we have enough customers in Azure. It also runs in Google. We have enough customers at Google. And it runs on-premises with OpenShift or with EKS A, right, whichever option you want to take. But in terms of that standardization and governance and automation for your developers to move fast, there's no better product in the market right now when it comes to Kubernetes platforms than Rafay. >> Kevin, while we're here, why don't you plug EKS too, come on. >> Yeah, absolutely, why not? (group laughing) So yes, of course. EKS is AWS's managed Kubernetes offering. It's the largest managed Kubernetes service in the world. We help customers who want to adopt Kubernetes and adopt it wherever they want to run Kubernetes, whether it's in region or whether it's on the edge with EKS A or running Kubernetes on Outposts and the evolving portfolio of EKS services as well. We see customers running extremely high-scale Kubernetes clusters, excuse me, and we're here to support them as well. So yeah, that's the managed Kubernetes offering. >> And I'll give the plug for theCUBE, we'll be at KubeCon in Detroit this year. (Lisa laughing) Lisa, look, we're giving a plug to everybody. Come on. >> We're plugging everybody. Well, as we get to plugs, I think, Haseeb, you have a book to write, I think, on Kubernetes. And I think you're wearing the title. >> Well, I do have a book to write, but I'm one of those people who does everything at the very end, so I will never get it right. (group laughing) So if you want to work on it with me, I have some great ideas. >> Ghostwriter. >> Sure! >> But I'm lazy. (Kevin chuckles) >> Ooh. >> So we got to figure something out. >> Somehow I doubt you're lazy. (group laughs) >> No entrepreneur's lazy, I know that. >> Right? >> You're being humble. >> He is. So Haseeb, Kevin, thank you so much for joining John and me today, >> Thank you. >> talking about what you guys are doing at Rafay with EKS, the power, why you shouldn't hate k8s. We appreciate your insights and your time. >> Thank you as well. >> Yeah, thank you very much for having us. >> Our pleasure. >> Thank you. >> We appreciate it. With John Furrier, I'm Lisa Martin. You're watching theCUBE live from New York City at the AWS NYC Summit. John and I will be right back with our next guest, so stick around. (upbeat music) (gentle music)
SUMMARY :
We're going to be talking Thank you very much for having us. This is packed. Talk to us about some of the trends, I mean, the developers, you know, in the cloud and region. that you have and why And so customers, you know, we used to cover a show called OpenStack. And at the time, And it reminds me of the same trend we saw They're not that many out there yet. You want to go? And, I mean, you mentioned OpenStack. Well, Amazon had a lot to do And so it sounds like it's And that the reason why Well, after the Broadcom view, (John laughs) Yeah, let's not go there today. and some of the other Amazon tools. I mean, so, one of the you know, the thing about these who have, you know, standardized on EKS. of the New York City (John laughs) So I'm going to ask you guys, And that's the opportunity we're seeing. I think they're going to be very, I mean, this is happening whether, big driver in all of this. I mean, you talked about Because it's taking the is taking all the component pieces code is a big piece of it, is code too, the security. here's a snippet of code that you write that if you get them right, at the end. I just want to write my I'm coding away, I love coding. So that's more of But I love the tech. And then some want to If you like to play with the hardware, for managers to understand This is going to be with us Do what you love. the cluster, for example. Now you know who you are. I want to give you a minute Kubernetes in the early days, why don't you plug EKS too, come on. and the evolving portfolio And I'll give the plug And I think you're wearing the title. So if you want to work on it with me, But I'm lazy. So we got to (group laughs) So Haseeb, Kevin, thank you so much the power, why you shouldn't hate k8s. Yeah, thank you very much at the AWS NYC Summit.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Lisa Martin | PERSON | 0.99+ |
Kevin Coleman | PERSON | 0.99+ |
Kevin | PERSON | 0.99+ |
John | PERSON | 0.99+ |
Rafay | PERSON | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Haseeb | PERSON | 0.99+ |
John Furrier | PERSON | 0.99+ |
two | QUANTITY | 0.99+ |
EKS | ORGANIZATION | 0.99+ |
10 | QUANTITY | 0.99+ |
John Furrier | PERSON | 0.99+ |
New York City | LOCATION | 0.99+ |
Haseeb Budhani | PERSON | 0.99+ |
2010 | DATE | 0.99+ |
Rafay Systems | ORGANIZATION | 0.99+ |
20 things | QUANTITY | 0.99+ |
12 | QUANTITY | 0.99+ |
Lisa | PERSON | 0.99+ |
two people | QUANTITY | 0.99+ |
ORGANIZATION | 0.99+ | |
one platform | QUANTITY | 0.99+ |
two types | QUANTITY | 0.99+ |
MoneyGram | ORGANIZATION | 0.99+ |
15 products | QUANTITY | 0.99+ |
one | QUANTITY | 0.99+ |
OpenShift | TITLE | 0.99+ |
Rafay | ORGANIZATION | 0.99+ |
12 things | QUANTITY | 0.98+ |
today | DATE | 0.98+ |
Second one | QUANTITY | 0.98+ |
8 | QUANTITY | 0.98+ |
10, 12,000 people | QUANTITY | 0.98+ |
vCenter | TITLE | 0.98+ |
Detroit | LOCATION | 0.98+ |
12 years | QUANTITY | 0.98+ |
New York City Summit | EVENT | 0.97+ |
EKS A | TITLE | 0.97+ |
Kubernetes | TITLE | 0.97+ |
Sheila Rohra & Omer Asad, HPE Storage | HPE Discover 2022
>> Announcer: "theCUBE" presents HPE Discover 2022. Brought to you by HPE. >> Welcome back to HPE Discover 2022. You're watching "theCUBE's" coverage. This is Day 2, Dave Vellante with John Furrier. Sheila Rohra is here. She's the Senior Vice President and GM of the Data Infrastructure Business at Hewlett Packard Enterprise, and of course, the storage division. And Omer Asad. Welcome back to "theCUBE", Omer. Senior Vice President and General Manager for Cloud Data Services, Hewlett Packard Enterprise storage. Guys, thanks for coming on. Good to see you. >> Thank you. Always a pleasure, man. >> Thank you. >> So Sheila, I'll start with you. Explain the difference. The Data Infrastructure Business and then Omer's Cloud Data Services. You first. >> Okay. So Data Infrastructure Business. So I'm responsible for the primary secondary storage. Basically, what you physically store, the data in a box, I actually own that. So I'm going to have Omer explain his business because he can explain it better than me. (laughing) Go ahead. >> So 100% right. So first, data infrastructure platforms, primary secondary storage. And then what I do from a cloud perspective is wrap up those things into offerings, block storage offerings, data protection offerings, and then put them on top of the GreenLake platform, which is the platform that Antonio and Fidelma talked about on main Keynote stage yesterday. That includes multi-tenancy, customer subscription management, sign on management, and then on top of that we build services. Services are cloud-like services, storage services or block service, data protection service, disaster recovery services. Those services are then launched on top of the platform. Some services like data protection services are software only. Some services are software plus hardware. And the hardware on the platform comes along from the primary storage business and we run the control plane for that block service on the GreenLake platform and that's the cloud service. >> So, I just want to clarify. So what we maybe used to know as 3PAR and Nimble and StoreOnce. Those are the products that you're responsible for? >> That is the primary storage part, right? And just to kind of show that, he and I, we do indeed work together. Right. So if you think about the 3PAR, the primary... Sorry, the Primera, the Alletras, the Nimble, right? All that, right? That's the technology that, you know, my team builds. And what Omer does with his magic is that he turns it into HPE GreenLake for storage, right? And to deliver as a service, right? And basically to create a self-service agility for the customer and also to get a very Cloud operational experience for them. >> So if I'm a customer, just so I get this right, if I'm a customer and I want Hybrid, that's what you're delivering as a Cloud service? >> Yes. >> And I don't care where the data is on-premises, in storage, or on Cloud. >> 100%. >> Is that right? >> So the way that would work is, as a customer, you would come along with the partner, because we're 100% partner-led. You'll come to the GreenLake Console. On the GreenLake Console, you will pick one of our services. Could be a data protection service, could be the block storage service. All services are hybrid in nature. Public Cloud is 100% participant in the ecosystem. You'll choose a service. Once you choose a service, you like the rate card for that service. That rate card is just like a hyperscaler rate card. IOPS, Commitment, MINCOMMIT's, whatever. Once you procure that at the price that you like with a partner, you buy the subscription. Then you go to console.greenLake.com, activate your subscription. Once the subscription is activated, if it's a service like block storage, which we talked about yesterday, service will be activated, and our supply chain will send you our platform gear, and that will get activated in your site. Two things, network cable, power cable, dial into the cloud, service gets activated, and you have a cloud control plane. The key difference to remember is that it is cloud-consumption model and cloud-operation model built in together. It is not your traditional as a service, which is just like hardware leasing. >> Yeah, yeah, yeah. >> That's a thing of the past. >> But this answers a question that I had, is how do you transfer or transform from a company that is, you know, selling boxes, of course, most of you are engineers are software engineers, I get that, to one that is selling services. And it sounds like the answer is you've organized, I know it's inside baseball here, but you organize so that you still have, you can build best of breed products and then you can package them into services. >> Omer: 100%. 100%. >> It's separate but complementary organization. >> So the simplest way to look at it would be, we have a platform side at the house that builds the persistence layers, the innovation, the file systems, the speeds and feeds, and then building on top of that, really, really resilient storage services. Then how the customer consumes those storage services, we've got tremendous feedback from our customers, is that the cloud-operational model has won. It's just a very, very simple way to operate it, right? So from a customer's perspective, we have completely abstracted away out hardware, which is in the back. It could be at their own data center, it could be at an MSP, or they could be using a public cloud region. But from an operational perspective, the customer gets a single pane of glass through our service console, whether they're operating stuff on-prem, or they're operating stuff in the public cloud. >> So they get storage no matter what? They want it in the cloud, they got it that way, and if they want it as a service, it just gets shipped. >> 100%. >> They plug it in and it auto configures. >> Omer: It's ready to go. >> That's right. And the key thing is simplicity. We want to take the headache away from our customers, we want our customers to focus on their business outcomes, and their projects, and we're simplifying it through analytics and through this unified cloud platform, right? On like how their data is managed, how they're stored, how they're secured, that's all taken care of in this operational model. >> Okay, so I have a question. So just now the edge, like take me through this. Say I'm a customer, okay I got the data saved on-premise action, cloud, love that. Great, sir. That's a value proposition. Come to HPE because we provide this easily. Yeah. But now at the edge, I want to deploy it out to some edge node. Could be a tower with Telecom, 5G or whatever, I want to box this out there, I want storage. What happens there? Just ship it out there and connects up? Does it work the same way? >> 100%. So from our infrastructure team, you'll consume one or two platforms. You'll consume either the Hyperconverged form factor, SimpliVity, or you might convert, the Converged form factor, which is proliant servers powered by Alletras. Alletra 6Ks. Either of those... But it's very different the way you would procure it. What you would procure from us is an edge service. That edge service will come configured with certain amount of compute, certain amount of storage, and a certain amount of data protection. Once you buy that on a dollars per gig per month basis, whichever rate card you prefer, storage rate card or a VMware rate card, that's all you buy. From that point on, the platform team automatically configures the back-end hardware from that attribute-based ordering and that is shipped out to your edge. Dial in the network cable, dial in the power cable, GreenLake cloud discovers it, and then you start running the- >> Self-service, configure it, it just shows up, plug it in, done. >> Omer: Self-service but partner-led. >> Yeah. >> Because we have preferred pricing for our partners. Our partners would come in, they will configure the subscriptions, and then we activate those customers, and then send out the hardware. So it's like a hyperscaler on-prem at-scale kind of a model. >> Yeah, I like it a lot. >> So you guys are in the data business. You run the data portion of Hewlett Packard Enterprise. I used to call it storage, even if we still call it storage but really, it's evolving into data. So what's your vision for the data business and your customer's data vision, if you will? How are you supporting that? >> Well, I want to kick it off, and then I'm going to have my friend, Omer, chime in. But the key thing is that what the first step is is that we have to create a unified platform, and in this case we're creating a unified cloud platform, right? Where there's a single pane of glass to manage all that data, right? And also leveraging lots of analytics and telemetry data that actually comes from our infosite, right? We use all that, we make it easy for the customer, and all they have to say, and they're basically given the answers to the test. "Hey, you know, you may want to increase your capacity. You may want to tweak your performance here." And all the customers are like, "Yes. No. Yes, no." Basically it, right? Accept and not accept, right? That's actually the easiest way. And again, as I said earlier, this frees up the bandwidth for the IT teams so then they actually focus more on the business side of the house, rather than figuring out how to actually manage every single step of the way of the data. >> Got it. >> So it's exactly what Sheila described, right? The way this strategy manifests itself across an operational roadmap for us is the ability to change from a storage vendor to a data services vendor, right? >> Sheila: Right. >> And then once we start monetizing these data services to our customers through the GreenLake platform, which gives us cloud consumption model and a cloud operational model, and then certain data services come with the platform layer, certain data services are software only. But all the services, all the data services that we provide are hybrid in nature, where we say, when you provision storage, you could provision it on-prem, or you can provision it in a hyperscaler environment. The challenge that most of our customers have come back and told us, is like, data center control planes are getting fragmented. On-premises, I mean there's no secrecy about it, right? VMware is the predominant hypervisor, and as a result of that, vCenter is the predominant configuration layer. Then there is the public cloud side, which is through either Ajour, or GCP, or AWS, being one of the largest ones out there. But when the customer is dealing with data assets, the persistence layer could be anywhere, it could be in AWS region, it could be your own data center, or it could be your MSP. But what this does is it creates an immense amount of fragmentation in the context in which the customers understand the data. Essentially, John, the customers are just trying to answer three questions: What is it that I store? How much of it do I store? Should I even be storing it in the first place? And surprisingly, those three questions just haven't been answered. And we've gotten more and more fragmented. So what we are trying to produce for our customers, is a context to ware data view, which allows the customer to understand structured and unstructured data, and the lineage of how it is stored in the organization. And essentially, the vision is around simplification and context to ware data management. One of the key things that makes that possible, is again, the age old infosite capability that we have continued to hone and develop over time, which is now up to the stage of like 12 trillion data points that are coming into the system that are not corroborated to give that back. >> And of course cost-optimizing it as well. We're up against the clock, but take us through the announcements, what's new from when we sort of last talked? I guess it was in September. >> Omer: Right. >> Right. What's new that's being announced here and, or, you know, GA? >> Right. So three major announcements that came out, because to keep on establishing the context when we were with you last time. So last time we announced GreenLake backup and recovery service. >> John: Right. >> That was VMware backup and recovery as a complete cloud, sort of SaaS control plane. No backup target management, no BDS server management, no catalog management, it's completely a SaaS service. Provide your vCenter address, boom, off you go. We do the backups, agentless, 100% dedup enabled. We have extended that into the public cloud domain. So now, we can back up AWS, EC2, and EBS instances within the same constructs. So a single catalog, single backup policy, single protection framework that protects you both in the cloud and on-prem, no fragmentation, no multiple solutions to deploy. And the second one is we've extended our Hyperconverged service to now be what we call the Hybrid Cloud On-Demand. So basically, you go to GreenLake Console control plane, and from there, you basically just start configuring virtual machines. It supports VMware and AWS at the same time. So you can provision a virtual machine on-prem, or you can provision a virtual machine in the public cloud. >> Got it. >> And, it's the same framework, the same catalog, the same inventory management system across the board. And then, lastly, we extended our block storage service to also become hybrid in nature. >> Got it. >> So you can manage on-prem and AWS, EBS assets as well. >> And Sheila, do you still make product announcements, or does Antonio not allow that? (Omer laughing) >> Well, we make product announcements, and you're going to see our product announcements actually done through the HPE GreenLake for block storage. >> Dave: Oh, okay. >> So our announcements will be coming through that, because we do want to make it as a service. Again, we want to take all of that headache of "What configuration should I buy? How do I actually deploy it? How do I...?" We really want to take that headache away. So you're going to see more feature announcements that's going to come through this. >> So feature acceleration through GreenLake will be exposed? >> Absolutely. >> This is some cool stuff going on behind the scenes. >> Oh, there's a lot good stuff. >> Hardware still matters, you know. >> Hardware still matters. >> Does it still matter? Does hardware matter? >> Hardware still matters, but what matters more is the experience, and that's actually what we want to bring to the customer. (laughing) >> John: That's good. >> Good answer. >> Omer: 100%. (laughing) >> Guys, thanks so much- >> John: Hardware matters. >> For coming on "theCUBE". Good to see you again. >> John: We got it. >> Thanks. >> And hope the experience was good for you Sheila. >> I know, I know. Thank you. >> Omer: Pleasure as always. >> All right, keep it right there. Dave Vellante and John Furrier will be back from HPE Discover 2022. You're watching "theCUBE". (soft music)
SUMMARY :
Brought to you by HPE. and of course, the storage division. Always a pleasure, man. Explain the difference. So I'm responsible for the and that's the cloud service. Those are the products that That's the technology that, you know, the data is on-premises, On the GreenLake Console, you And it sounds like the Omer: 100%. It's separate but is that the cloud-operational and if they want it as a and it auto configures. And the key thing is simplicity. So just now the edge, and that is shipped out to your edge. it just shows up, plug it in, done. and then we activate those customers, for the data business the answers to the test. and the lineage of how it is And of course and, or, you know, GA? establishing the context And the second one is we've extended And, it's the same framework, So you can manage on-prem the HPE GreenLake for block storage. that's going to come through this. going on behind the scenes. and that's actually what we Omer: 100%. Good to see you again. And hope the experience I know, I know. Dave Vellante and John
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Sheila | PERSON | 0.99+ |
John | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
Sheila Rohra | PERSON | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
September | DATE | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
three questions | QUANTITY | 0.99+ |
Hewlett Packard Enterprise | ORGANIZATION | 0.99+ |
100% | QUANTITY | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
John Furrier | PERSON | 0.99+ |
one | QUANTITY | 0.99+ |
Omer | PERSON | 0.99+ |
John Furrier | PERSON | 0.99+ |
two platforms | QUANTITY | 0.99+ |
Omer Asad | PERSON | 0.99+ |
first | QUANTITY | 0.99+ |
HPE | ORGANIZATION | 0.99+ |
Nimble | ORGANIZATION | 0.99+ |
first step | QUANTITY | 0.99+ |
console.greenLake.com | OTHER | 0.99+ |
yesterday | DATE | 0.99+ |
second one | QUANTITY | 0.99+ |
One | QUANTITY | 0.99+ |
Antonio | PERSON | 0.98+ |
12 trillion data points | QUANTITY | 0.98+ |
Two things | QUANTITY | 0.98+ |
Alletras | ORGANIZATION | 0.97+ |
HPE Storage | ORGANIZATION | 0.97+ |
5G | ORGANIZATION | 0.97+ |
theCUBE | TITLE | 0.97+ |
both | QUANTITY | 0.95+ |
GA | LOCATION | 0.95+ |
StoreOnce | ORGANIZATION | 0.95+ |
EBS | ORGANIZATION | 0.94+ |
three major announcements | QUANTITY | 0.94+ |
Cloud Data Services | ORGANIZATION | 0.93+ |
Primera | ORGANIZATION | 0.92+ |
Ajour | ORGANIZATION | 0.9+ |
GreenLake | ORGANIZATION | 0.9+ |
single pane | QUANTITY | 0.88+ |
single backup policy | QUANTITY | 0.86+ |
single catalog | QUANTITY | 0.86+ |
Day 2 | QUANTITY | 0.85+ |
single protection framework | QUANTITY | 0.84+ |
VMware | TITLE | 0.82+ |
theCUBE | ORGANIZATION | 0.82+ |
EC2 | TITLE | 0.79+ |
Alletra 6Ks | TITLE | 0.77+ |
VMware | ORGANIZATION | 0.73+ |
Keynote | EVENT | 0.72+ |
single step | QUANTITY | 0.72+ |
HPE Discover | ORGANIZATION | 0.7+ |
dollars per gig | QUANTITY | 0.7+ |
Haseeb Budhani, Rafay & Adnan Khan, MoneyGram | Kubecon + Cloudnativecon Europe 2022
>> Announcer: theCUBE presents "Kubecon and Cloudnativecon Europe 2022" brought to you by Red Hat, the Cloud Native Computing Foundation and its ecosystem partners. >> Welcome to theCUBE coverage of Kubecon 2022, E.U. I'm here with my cohost, Paul Gillin. >> Pleased to work with you, Keith. >> Nice to work with you, Paul. And we have our first two guests. "theCUBE" is hot. I'm telling you we are having interviews before the start of even the show floor. I have with me, we got to start with the customers first. Enterprise Architect Adnan Khan, welcome to the show. >> Thank you so much. >> Keith: CUBE time first, now you're at CUBE-alumni. >> Yup. >> And Haseeb Budhani, CEO Arathi, welcome back. >> Nice to talk to you again today. >> So, we're talking all things Kubernetes and we're super excited to talk to MoneyGram about their journey to Kubernetes. First question I have for Adnan. Talk to us about what your pre-Kubernetes landscape looked like? >> Yeah. Certainly, Keith. So, we had a traditional mix of legacy applications and modern applications. A few years ago we made the decision to move to a microservices architecture, and this was all happening while we were still on-prem. So, your traditional VMs. And we started 20, 30 microservices but with the microservices packing. You quickly expand to hundreds of microservices. And we started getting to that stage where managing them without sort of an orchestration platform, and just as traditional VMs, was getting to be really challenging, especially from a day two operational. You can manage 10, 15 microservices, but when you start having 50, and so forth, all those concerns around high availability, operational performance. So, we started looking at some open-source projects. Spring cloud, we are predominantly a Java shop. So, we looked at the spring cloud projects. They give you a number of initiatives for doing some of those management. And what we realized again, to manage those components without sort of a platform, was really challenging. So, that kind of led us to sort of Kubernetes where along with our journey new cloud, it was the platform that could help us with a lot of those management operational concerns. >> So, as you talk about some of those challenges, pre-Kubernetes, what were some of the operational issues that you folks experienced? >> Yeah, certain things like auto scaling is number one. I mean, that's a fundamental concept of cloud native, right? Is how do you auto scale VMs, right? You can put in some old methods and stuff, but it was really hard to do that automatically. So, Kubernetes with like HPA gives you those out of the box. Provided you set the right policies, you can have auto scaling where it can scale up and scale back, so we were doing that manually. So, before, you know, MoneyGram, obviously, holiday season, people are sending more money, Mother's Day. Our Ops team would go and basically manually scale VMs. So, we'd go from four instances to maybe eight instances, but that entailed outages. And just to plan around doing that manually, and then sort of scale them back was a lot of overhead, a lot of administration overhead. So, we wanted something that could help us do that automatically in an efficient and intrusive way. That was one of the things, monitoring and and management operations, just kind of visibility into how those applications were during what were the status of your workloads, was also a challenge to do that. >> So, Haseeb, I got to ask the question. If someone would've came to me with that problem, I'd just say, "You know what? Go to the plug to cloud." How does your group help solve some of these challenges? What do you guys do? >> Yeah. What do we do? Here's my perspective on the market as it's playing out. So, I see a bifurcation happening in the Kubernetes space. But there's the Kubernetes run time, so Amazon has EKS, Azure as AKS. There's enough of these available, they're not managed services, they're actually really good, frankly. In fact, retail customers, if you're an Amazon why would you spin up your own? Just use EKS, it's awesome. But then, there's an operational layer that is needed to run Kubernetes. My perspective is that, 50,000 enterprises are adopting Kubernetes over the next 5 to 10 years. And they're all going to go through the same exact journey, and they're all going to end up potentially making the same mistake, which is, they're going to assume that Kubernetes is easy. They're going to say, "Well, this is not hard. I got this up and running on my laptop. This is so easy, no worries. I can do EKS." But then, okay, can you consistently spin up these things? Can you scale them consistently? Do you have the right blueprints in place? Do you have the right access management in place? Do you have the right policies in place? Can you deploy applications consistently? Do you have monitoring and visibility into those things? Do your developers have access when they need it? Do you have the right networking layer in place? Do you have the right chargebacks in place? Remember you have multiple teams. And by the way, nobody has a single cluster, so you got to do this across multiple clusters. And some of them have multiple clouds. Not because they want to be multiple clouds, because, but sometimes you buy a company, and they happen to be in Azure. How many dashboards do you have now across all the open-source technologies that you have identified to solve these problems? This is where pain lies. So, I think that Kubernetes is fundamentally a solve problem. Like our friends at AWS and Azure, they've solved this problem. It's like a AKS, EKS, et cetera, EGK for that matter. They're great, and you should use them, and don't even think about spinning up QB best clusters. Don't do it, use the platforms that exist. And commensurately on-premises, OpenShift is pretty awesome. If you like it, use it. But then when it comes to the operations layer, that's where today, we end up investing in a DevOps team, and then an SRE organization that need to become experts in Kubernetes, and that is not tenable. Can you, let's say unlimited capital, unlimited budgets. Can you hire 20 people to do Kubernetes today? >> If you could find them. >> If you can find 'em, right? So, even if you could, the point is that, see five years ago when your competitors were not doing Kubernetes, it was a competitive advantage to go build a team to do Kubernetes so you could move faster. Today, you know, there's a high chance that your competitors are already buying from a Rafay or somebody like Rafay. So, now, it's better to take these really, really sharp engineers and have them work on things that make the company money. Writing operations for Kubernetes, this is a commodity now. >> How confident are you that the cloud providers won't get in and do what you do and put you out of business? >> Yeah, I mean, absolutely. In fact, I had a conversation with somebody from HBS this morning and I was telling them, I don't think you have a choice, you have to do this. Competition is not a bad thing. If we are the only company in a space, this is not a space, right? The bet we are making is that every enterprise, they have an on-prem strategy, they have at least a handful of, everybody's got at least two clouds that they're thinking about. Everybody starts with one cloud, and then they have some other cloud that they're also thinking about. For them to only rely on one cloud's tools to solve for on-prem, plus that second cloud, they potentially they may have, that's a tough thing to do. And at the same time, we as a vendor, I mean, the only real reason why startups survive, is because you have technology that is truly differentiator. Otherwise, I mean, you got to build something that is materially interesting, right? We seem to have- >> Keith: Now. Sorry, go ahead. >> No, I was going to, you actually have me thinking about something. Adnan? >> Yes. >> MoneyGram, big, well known company. a startup, adding, working in a space with Google, VMware, all the biggest names. What brought you to Rafay to solve this operational challenge? >> Yeah. A good question. So, when we started out sort of in our Kubernetes, we had heard about EKS and we are an AWS shop, so that was the most natural path. And we looked at EKS and used that to create our clusters. But then we realized very quickly, that, yes, to Haseeb's point, AWS manages the control plane for you, it gives you the high availability. So, you're not managing those components which is some really heavy lifting. But then what about all the other things like centralized dashboard? What about, we need to provision Kubernetes clusters on multicloud, right? We have other clouds that we use, or also on-prem, right? How do you do some of that stuff? We also, at that time were looking at other tools also. And I had, I remember come up with an MVP list that we needed to have in place for day one or day two operations before we even launch any single applications into production. And my Ops team looked at that list and literally, there was only one or two items that they could check off with EKS. They've got the control plane, they've got the cluster provision, but what about all those other components? And some of that kind of led us down the path of, you know, looking at, "Hey, what's out there in this space?" And we realized pretty quickly that there weren't too many. There were some large providers and capabilities like Antos, but we felt that it was a little too much for what we were trying to do at that point in time. We wanted to scale slowly. We wanted to minimize our footprint, and Rafay seemed to sort of, was a nice mix from all those different angles. >> How was the situation affecting your developer experience? >> So, that's a really good question also. So, operations was one aspect to it. The other part is the application development. We've got MoneyGram is when a lot of organizations have a plethora of technologies from Java, to .net, to node.js, what have you, right? Now, as you start saying, okay, now we're going cloud native and we're going to start deploying to Kubernetes. There's a fair amount of overhead because a tech stack, all of a sudden goes from, just being Java or just being .net, to things like Docker. All these container orchestration and deployment concerns, Kubernetes deployment artifacts, (chuckles) I got to write all this YAML as my developer say, "YAML hell." (panel laughing) I got to learn Docker files. I need to figure out a package manager like HELM on top of learning all the Kubernetes artifacts. So, initially, we went with sort of, okay, you know, we can just train our developers. And that was wrong. I mean, you can't assume that everyone is going to sort of learn all these deployment concerns and we'll adopt them. There's a lot of stuff that's outside of their sort of core dev domain, that you're putting all this burden on them. So, we could not rely on them in to be sort of CUBE cuddle experts, right? That's a fair amount overhead learning curve there. So, Rafay again, from their dashboard perspective, saw the managed CUBE cuddle, gives you that easy access for devs, where they can go and monitor the status of their workloads. They don't have to figure out, configuring all these tools locally, just to get it to work. We did some things from a DevOps perspective to basically streamline and automate that process. But then, also Rafay came in and helped us out on kind of that providing that dashboard. They don't have to break, they can basically get on through single sign on and have visibility into the status of their deployment. They can do troubleshooting diagnostics all through a single pane of glass, which was a key key item. Initially, before Rafay, we were doing that command line. And again, just getting some of the tools configured was huge, it took us days just to get that. And then the learning curve for development teams "Oh, now you got the tools, now you got to figure out how to use it." >> So, Haseeb talk to me about the cloud native infrastructure. When I look at that entire landscape number, I'm just overwhelmed by it. As a customer, I look at it, I'm like, "I don't know where to start." I'm sure, Adnan, you folks looked at it and said, "Wow, there's so many solutions." How do you engage with the ecosystem? You have to be at some level opinionated but flexible enough to meet every customer's needs. How do you approach that? >> So, it's a really tough problem to solve because... So, the thing about abstraction layers, we all know how that plays out, right? So, abstraction layers are fundamentally never the right answer because they will never catch up, because you're trying to write a layer on top. So, then we had to solve the problem, which was, well, we can't be an abstraction layer, but then at the same time, we need to provide some, sort of like centralization standardization. So, we sort of have this the following dissonance in our platform, which is actually really important to solve the problem. So, we think of a stack as floor things. There's the Kubernetes layer, infrastructure layer, and EKS is different from AKS, and it's okay. If we try to now bring them all together and make them behave as one, our customers are going to suffer. Because there are features in EKS that I really want, but then if you write an abstraction then I'm not going to get 'em so not okay. So, treat them as individual things that we logic that we now curate. So, every time EKS, for example, goes from 1.22 to 1.23, we write a new product, just so my customer can press a button and upgrade these clusters. Similarly, we do this for AKS, we do this for GK. It's a really, really hard job, but that's the job, we got to do it. On top of that, you have these things called add-ons, like my network policy, my access management policy, my et cetera. These things are all actually the same. So, whether I'm EKS or AKS, I want the same access for Keith versus Adnan, right? So, then those components are sort of the same across, doesn't matter how many clusters, doesn't matter how many clouds. On top of that, you have applications. And when it comes to the developer, in fact I do the following demo a lot of times. Because people ask the question. People say things like, "I want to run the same Kubernetes distribution everywhere because this is like Linux." Actually, it's not. So, I do a demo where I spin up access to an OpenShift cluster, and an EKS cluster, and then AKS cluster. And I say, "Log in, show me which one is which?" They're all the same. >> So, Adnan, make that real for me. I'm sure after this amount of time, developers groups have come to you with things that are snowflakes. And as a enterprise architect, you have to make it work within your framework. How has working with Rafay made that possible? >> Yeah, so I think one of the very common concerns is the whole deployment to Haseeb's point, is you are from a deployment perspective, it's still using HELM, it's still using some of the same tooling. How do you? Rafay gives us some tools. You know, they have a command line Add Cuddle API that essentially we use. We wanted parity across all our different environments, different clusters, it doesn't matter where you're running. So, that gives us basically a consistent API for deployment. We've also had challenges with just some of the tooling in general that we worked with Rafay actually, to actually extend their, Add Cuddle API for us so that we have a better deployment experience for our developers. >> Haseeb, how long does this opportunity exist for you? At some point, do the cloud providers figure this out, or does the open-source community figure out how to do what you've done and this opportunity is gone? >> So, I think back to a platform that I think very highly of, which has been around a long time and continues to live, vCenter. I think vCenter is awesome. And it's beautiful, VMware did an incredible job. What is the job? It's job is to manage VMs, right? But then it's for access, it's also storage. It's also networking in a sec, right? All these things got done because to solve a real problem, you have to think about all the things that come together to help you solve that problem from an operations perspective. My view is that this market needs essentially a vCenter, but for Kubernetes, right? And that is a very broad problem. And it's going to spend, it's not about a cloud. I mean, every cloud should build this. I mean, why would they not? It makes sense. Anto exist, right? Everybody should have one. But then, the clarity in thinking that the Rafay team seems to have exhibited, till date, seems to merit an independent company, in my opinion, I think like, I mean, from a technical perspective, this product's awesome, right? I mean, we seem to have no real competition when it comes to this broad breadth of capabilities. Will it last? We'll see, right? I mean, I keep doing "CUBE" shows, right? So, every year you can ask me that question again, and we'll see. >> You make a good point though. I mean, you're up against VMware, You're up against Google. They're both trying to do sort of the same thing you're doing. Why are you succeeding? >> Maybe it's focused. Maybe it's because of the right experience. I think startups, only in hindsight, can one tell why a startup was successful. In all honesty, I've been in a one or two startups in the past, and there's a lot of luck to this, there's a lot of timing to this. I think this timing for a product like this is perfect. Like three, four years ago, nobody would've cared. Like honesty, nobody would've cared. This is the right time to have a product like this in the market because so many enterprises are now thinking of modernization. And because everybody's doing this, this is like the boots strong problem in HCI. Everybody's doing it, but there's only so many people in the industry who actually understand this problem, so they can't even hire the people. And the CTO said, "I got to go. I don't have the people, I can't fill the seats." And then they look for solutions, and via that solution, that we're going to get embedded. And when you have infrastructure software like this embedded in your solution, we're going to be around with the... Assuming, obviously, we don't score up, right? We're going to be around with these companies for some time. We're going to have strong partners for the long term. >> Well, vCenter for Kubernetes I love to end on that note. Intriguing conversation, we could go on forever on this topic, 'cause there's a lot of work to do. I don't think this will over be a solved problem for the Kubernetes as cloud native solutions, so I think there's a lot of opportunities in that space. Haseeb Budhani, thank you for rejoining "theCUBE." Adnan Khan, welcome becoming a CUBE-alum. >> (laughs) Awesome. Thank you so much. >> Check your own profile on the sound's website, it's really cool. From Valencia, Spain, I'm Keith Townsend, along with my Host Paul Gillin . And you're watching "theCUBE," the leader in high tech coverage. (bright upbeat music)
SUMMARY :
brought to you by Red Hat, Welcome to theCUBE Nice to work with you, Paul. now you're at CUBE-alumni. And Haseeb Budhani, Talk to us about what your pre-Kubernetes So, that kind of led us And just to plan around So, Haseeb, I got to ask the question. that you have identified So, even if you could, the point I don't think you have a Keith: Now. No, I was going to, you to solve this operational challenge? that to create our clusters. I got to write all this YAML So, Haseeb talk to me but that's the job, we got to do it. developers groups have come to you so that we have a better to help you solve that problem Why are you succeeding? And the CTO said, "I got to go. I love to end on that note. Thank you so much. on the sound's website,
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Keith Townsend | PERSON | 0.99+ |
Keith | PERSON | 0.99+ |
Haseeb Budhani | PERSON | 0.99+ |
Paul Gillin | PERSON | 0.99+ |
10 | QUANTITY | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
ORGANIZATION | 0.99+ | |
20 | QUANTITY | 0.99+ |
Adnan | PERSON | 0.99+ |
one | QUANTITY | 0.99+ |
Red Hat | ORGANIZATION | 0.99+ |
Adnan Khan | PERSON | 0.99+ |
Cloud Native Computing Foundation | ORGANIZATION | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Paul | PERSON | 0.99+ |
20 people | QUANTITY | 0.99+ |
Java | TITLE | 0.99+ |
50 | QUANTITY | 0.99+ |
Today | DATE | 0.99+ |
Adnan Khan | PERSON | 0.99+ |
HBS | ORGANIZATION | 0.99+ |
Rafay | PERSON | 0.99+ |
50,000 enterprises | QUANTITY | 0.99+ |
node.js | TITLE | 0.99+ |
Valencia, Spain | LOCATION | 0.99+ |
two items | QUANTITY | 0.98+ |
second cloud | QUANTITY | 0.98+ |
vCenter | TITLE | 0.98+ |
HPA | ORGANIZATION | 0.98+ |
first two guests | QUANTITY | 0.98+ |
eight instances | QUANTITY | 0.98+ |
one cloud | QUANTITY | 0.98+ |
Haseeb | PERSON | 0.98+ |
today | DATE | 0.98+ |
five years ago | DATE | 0.98+ |
hundreds of microservices | QUANTITY | 0.98+ |
Kubernetes | TITLE | 0.98+ |
Linux | TITLE | 0.98+ |
EKS | ORGANIZATION | 0.98+ |
Mother's Day | EVENT | 0.98+ |
Arathi | PERSON | 0.97+ |
Haseeb | ORGANIZATION | 0.97+ |
Docker | TITLE | 0.97+ |
First question | QUANTITY | 0.97+ |
VMware | ORGANIZATION | 0.97+ |
four years ago | DATE | 0.97+ |
MoneyGram | ORGANIZATION | 0.97+ |
both | QUANTITY | 0.97+ |
15 microservices | QUANTITY | 0.97+ |
single cluster | QUANTITY | 0.96+ |
CUBE | ORGANIZATION | 0.96+ |
30 microservices | QUANTITY | 0.95+ |
single | QUANTITY | 0.95+ |
one aspect | QUANTITY | 0.95+ |
first | QUANTITY | 0.95+ |
theCUBE | ORGANIZATION | 0.95+ |
Rafay | ORGANIZATION | 0.94+ |
EKS | TITLE | 0.94+ |
Cloudnativecon | ORGANIZATION | 0.94+ |
Azure | ORGANIZATION | 0.94+ |
two startups | QUANTITY | 0.94+ |
theCUBE | TITLE | 0.94+ |
AKS | ORGANIZATION | 0.94+ |
Haseeb Budhani, Rafay & Adnan Khan, MoneyGram | Kubecon + Cloudnativecon Europe 2022
>>The cube presents, Coon and cloud native con Europe 22, brought to you by the cloud native computing foundation. >>Welcome to the cube coverage of CubeCon 2022 EU. I'm here with my cohost Paul Gill. Please work with you, Keith. Nice to work with you, Paul. And we have our first two guests. The cube is hot. I'm telling you we are having interviews before the start of even the show floor I have with me. We gotta start with the customers first enterprise architect, a non-con Aon con. Welcome to the show. >>Thank you so >>Much. Cube time cube time. First now you're at cube alumni. Yep. <laugh> and, and, uh, has Havani CEO. Arai welcome back. Nice to, >>Uh, >>Talk to you again today. So we're talking all things Kubernetes and we're super excited to talk to MoneyGram about their journey to Kubernetes. First question I have for Anon. Talk to us about what your pre Kubernetes landscape looked like. >>Yeah, certainly. Uh, Keith, so, um, we had a, uh, you know, a traditional mix of legacy applications and modern applications. Uh, you know, a few years ago we made the decision to move to a microservices architecture. Um, and this was all happening while we were still on prem. Right? So your traditional VMs, um, and you know, we started 20, 30 microservices, but with the microservices packing, you know, you quickly expand to hundreds of microservices. Um, and we started getting to that stage where managing them without sort of an orchestration platform, uh, and just as traditional VMs was getting to be really challenging, right. Uh, especially from a day two operational, uh, you know, you can manage 10, 15 microservices, but when you start having 50 and so forth, um, all those concerns around, uh, you know, high availability, operational performance. Um, so we started looking at some open source projects, you know, spring cloud. Uh, we are predominantly a Java, um, shop. So we looked at the spring cloud projects. Uh, they give you a number, uh, you know, of initiatives, um, for doing some of those, um, management and what we realized again, to manage those components, um, without sort of a platform was really challenging. So that, that kind of led us to sort of Kubernetes where, um, along with our journey cloud, uh, it was the platform that could help us with a lot of those management operational concerns. >>So as you talk about some of those challenges, pre Kubernetes, what were some of the operational issues that you folks experienced? >>Yeah. You know, uh, certain things like auto scaling is, is number one, right? I mean, that's a fundamental concept of cloud native, right. Is, um, how do you auto scale VMs? Right. Uh, you can put in some old methods and stuff, but, uh, it was really hard to do that automatically. Right. So, uh, Kubernetes with like HPA gives you those out of the box, right? Provided you set the right policies. Uh, you can have auto scaling, uh, where it can scale up and scale back. So we were doing that manually. Right. So before, uh, you know, MoneyGram, obviously, you know, holiday season, people are sending more money mother's day. Um, our ops team would go in basically manually scale, uh, VMs. Right. So we'd go from four instances to maybe eight instances. Right. Uh, but, but that entailed outages. Right. Um, and just to plan around doing that manually and then sort of scale them back was a lot of overhead, a lot of administration overhead. Right. So, uh, we wanted something that could help us do that automatically right. In a, in an efficient, uh, unintrusive way. So, so, you know, that was one of the things, uh, monitoring, um, and, and management, uh, operations, you know, just kind of visibility into how those applications were during, what were the status of your, um, workloads was also a challenge, right. Uh, to do that. >>So, cause see, I gotta ask the question. If someone would've came to me with that problem, I'd just say, you know, what, go to the plug, the cloud, what, how does, uh, your group help solve some of these challenges? What do you guys do? >>Yeah. What, what do we do? So here's my perspective on the market as it's playing out. So I see a bifurcation happening in the Kubernetes space, but there's the Kubernetes run time. So Amazon is EKS Azure as EKS, you know, there's enough of these available. They're not managed services. They're actually really good, frankly. Right? In fact, retail customers, if you're an Amazon, why would you spin up your own? Just use EK. It's awesome. But then there's an operational layer that is needed to run Kubernetes. Uh, my perspective is that, you know, 50,000 enterprises are adopting Kubernetes over the next five to 10 years. And they're all gonna go through the same exact journey and they're all gonna end up, you know, potentially making the same mistake, which is, they're gonna assume that Kubernetes is easy. <laugh> they're gonna say, well, this is not hard. I got this up and running on my laptop. >>This is so easy. No worries. Right. I can do key gas, but then, okay. Can you consistently spin up these things? Can you scale them consistently? Do you have the right blueprints in place? Do you have the right access management in place? Do you have the right policies in place? Can you deploy applications consistently? Do you have monitoring and visibility into those things? Do your developers have access to when they need it? Do you have the right networking layer in place? Do you have the right chargebacks in place? Remember you have multiple teams and by the way, nobody has a single cluster. So you gotta do this across multiple clusters. And some of them have multiple clouds, not because they wanna be multiple clouds because, but sometimes you buy a company and they happen to be in Azure. How many dashboards do you have now across all the open source technologies that you have identified to solve these problems? >>This is where pain lies. So I think that Kubernetes is fundamentally a solve problem. Like our friends at AWS and Azure they've solved this problem. It's like a KSKS et cetera, GK for that matter. They're they're great. And you should use them and don't even think about spinning up Q B and a best clusters. Don't do it. Use the platforms that exist and commensurately on premises. OpenShift is pretty awesome, right? If you like it, use it. But then when it comes to the operations layer, right, that's where today we end up investing in a DevOps team and then an SRE organization that need to become experts in Kubernetes. And that is not tenable, right? Can you let's say unlimited capital unlimited budgets. Can you hire 20 people to do Kubernetes today? >>If you could find them, if >>You can find 'em right. So even if you could, the point is that see, five years ago, when your competitors were not doing Kubernetes, it was a competitive advantage to go build a team to do Kubernetes. So you could move faster today. You know, there's a high chance that your competitors are already buying from a Rafa or somebody like Rafa. So now it's better to take these really, really sharp engineers and have them work on things that make the company money, writing operations for Kubernetes. This is a commodity. Now >>How confident are you that the cloud providers won't get in and do what you do and put you out of business? >>Yeah, I mean, absolutely. I think, I mean, in fact, I, I had a conversation with somebody from HBS this morning and I was telling them, I don't think you have a choice. You have to do this right. Competition is not a bad thing. Right? This, the, >>If we are the only company in a space, this is not a space, right. The bet we are making is that every enterprise has, you know, they have an on-prem strategy. They have at least a handful of, everybody's got at least two clouds that they're thinking about. Everybody starts with one cloud and then they have some other cloud that they're also thinking about, um, for them to only rely on one cloud's tools to solve for on-prem plus that second cloud, they potentially, they may have, that's a tough thing to do. Um, and at the same time we as a vendor, I mean the only real reason why startups survive is because you have technology that is truly differentiated, right. Otherwise, right. I mean, you gotta build something that is materially. Interesting. Right. We seem to have, sorry, go ahead. >>No, I was gonna ask you, you actually had me thinking about something, a non yes. MoneyGram big, well known company, a startup, adding, working in a space with Google, VMware, all the biggest names. What brought you to Rafi to solve this operational challenge? >>Yeah. Good question. So when we started out sort of in our Kubernetes, um, you know, we had heard about EKS, uh, and, and we are an AWS shop. So, uh, that was the most natural path. And, and we looked at, um, EKS and, and used that to, you know, create our clusters. Um, but then we realized very quickly that yes, toe's point AWS manages the control plane for you. It gives you the high availability. So you're not managing those components, which is some really heavy lifting. Right. Uh, but then what about all the other things like, you know, centralized dashboard, what about, we need to provision, uh, Kubernetes clusters on multi-cloud right. We have other clouds that we use, uh, or also on prem. Right. Um, how do you do some of that stuff? Right. Um, we, we also, at that time were looking at, uh, other, uh, tools also. >>And I had, I remember come up with an MVP list that we needed to have in place for day one or day two, uh, operations, right. To before we even launch any single applications into production. Um, and my ops team looked at that list. Um, and literally there was only one or two items that they could check, check off with S you know, they they've got the control plane, they've got the cluster provision, but what about all those other components? Uh, and some of that kind of led us down the path of, uh, you know, looking at, Hey, what's out there in this space. And, and we realized pretty quickly that there weren't too many, there were some large providers and capabilities like Antos, but we felt that it was, uh, a little too much for what we were trying to do. You know, at that point in time, we wanted to scale slowly. We wanted to minimize our footprint. Um, and, and Rafa seemed to sort of, uh, was, was a nice mix, uh, you know, uh, from all those different angles, how >>Was, how was the situation affecting your developer experience? >>So, um, so that's a really good question also. So operations was one aspect of, to it, right? The other part is the application development, right? We've got, uh, you know, Moneygrams when a lot of organizations have a plethora of technologies, right? From, from Java to.net to no GS, what have you, right. Um, now as you start saying, okay, now we're going cloud native, and we're gonna start deploying to Kubernetes. Um, there's a fair amount of overhead because a tech stack, all of a sudden goes from, you know, just being Java or just being.net to things like Docker, right? All these container orchestration and deployment concerns, Kubernetes, uh, deployment artifacts, right. I gotta write all this YAML, uh, as my developer say, YAML, hell right. <laugh>, uh, I gotta learn Docker files. I need to figure out, um, a package manager like helm, uh, on top of learning all the Kubernetes artifacts. >>Right. So, um, initially we went with sort of, okay, you know, we can just train our developers. Right. Um, and that was wrong. Right. I mean, you can't assume that everyone is gonna sort of learn all these deployment concerns, uh, and we'll adopt them. Right. Um, uh, there's a lot of stuff that's outside of their sort of core dev domain, uh, that you're putting all this burden on them. Right. So, um, we could not rely on them and to be sort of cube cuddle experts, right. That that's a fair amount, overhead learning curve there. Um, so Rafa again, from their dashboard perspective, right? So the managed cube cuddle gives you that easy access for devs, right. Where they can go and monitor the status of their workloads. Um, they can, they don't have to figure out, you know, configuring all these tools locally just to get it to work. >>Uh, we did some things from a DevOps perspective to basically streamline and automate that process. But then also office order came in and helped us out, uh, on kind of that providing that dashboard. They don't have to worry. They can basically get on through single sign on and have visibility into the status of their deployment. Uh, they can do troubleshooting diagnostics all through a single pane of glass. Right. Which was a key key item. Uh, initially before Rafa, we were doing that command line. Right. And again, just getting some of the tools configured was, was huge. Right. Took us days just to get that. And then the learning curve for development teams, right? Oh, now you gotta, you got the tools now you gotta figure out how to use it. Right. Um, so >>See, talk to me about the, the cloud native infrastructure. When I look at that entire landscaping number, I'm just overwhelmed by it. As a customer, I look at it, I'm like, I, I don't know where to start I'm sure. Or not, you, you folks looked at it and said, wow, there's so many solutions. How do you engage with the ecosystem? You have to be at some level opinionated, but flexible enough to, uh, meet every customer's needs. How, how do you approach that? >>Yeah. So it's a, it's a really tough problem to solve because, so, so the thing about abstraction layers, you know, we all know how that plays out, right? So abstraction layers are fundamentally never the right answer because they will never catch up. Right. Because you're trying to write and layer on top. So then we had to solve the problem, which was, well, we can't be an abstraction layer, but then at the same time, we need to provide some sort of, sort of like centralization standardization. Right. So, so we sort of have this, the following dissonance in our platform, which is actually really important to solve the problem. So we think of a, of a stack as sort of four things. There's the, there's the Kubernetes layer infrastructure layer, um, and EKS is different from ES and it's okay. Mm-hmm <affirmative>, if we try to now bring them all together and make them behave as one, our customers are gonna suffer because there are features in ESS that I really want. >>But then if you write an AB obsession layer, I'm not gonna get 'em so not. Okay. So treat them as individual things. And we logic that we now curate. So every time S for example, goes from 1 22 to 1 23, rewrite a new product, just so my customer can press a button and upgrade these clusters. Similarly, we do this fors, we do this for GK. We it's a really, really hard job, but that's the job. We gotta do it on top of that, you have these things called. Add-ons like my network policy, my access management policy, my et cetera. Right. These things are all actually the same. So whether I'm Anek or a Ks, I want the same access for Keith versus a none. Right. So then those components are sort of the same across doesn't matter how many clusters does money clouds on top of that? You have applications. And when it comes to the developer, in fact, I do the following demo a lot of times because people ask the question, right? Mean, I, I, I, people say things like, I wanna run the same Kubernetes distribution everywhere, because this is like Linux, actually, it's not. So I, I do a demo where I spin up a access to an OpenShift cluster and an EKS cluster and an AKs cluster. And I say, log in, show me which one is, which they're all the same. >>So Anan get, put, make that real for me, I'm sure after this amount of time, developers groups have come to you with things that are snowflakes and you, and as a enterprise architect, you have to make it work within your framework. How has working with RAI made that possible? >>Yeah. So, um, you know, I think one of the very common concerns is right. The whole deployment, right. Uh, toe's point, right. Is you are from an, from a deployment perspective. Uh, it's still using helm. It's still using some of the same tooling, um, right. But, um, how do you Rafa gives us, uh, some tools, you know, they have a, a command line, art cuddle API that essentially we use. Um, we wanted parody, um, across all our different environments, different clusters, you know, it doesn't matter where you're running. Um, so that gives us basically a consistent API for deployment. Um, we've also had, um, challenges, uh, with just some of the tooling in general, that we worked with RA actually to actually extend their, our cuddle API for us, so that we have a better deployment experience for our developers. So, >>Uh Huie how long does this opportunity exist for you? At some point, do the cloud providers figure this out or does the open source community figure out how to do what you've done and, and this opportunity is gone. >>So, so I think back to a platform that I, I think very highly of, which is a highly off, which has been around a long time and continues to live vCenter, I think vCenter is awesome. And it's, it's beautiful. VMware did an incredible job. Uh, what is the job? Its job is to manage VMs, right? But then it's for access. It's also storage. It's also networking and a sex, right? All these things got done because to solve a real problem, you have to think about all the things that come together to solve, help you solve that problem from an operations perspective. Right? My view is that this market needs essentially a vCenter, but for Kubernetes, right. Um, and that is a very broad problem, right. And it's gonna spend, it's not about a cloud, right? I mean, every cloud should build this. I mean, why would they not? It makes sense, Anto success, right. Everybody should have one. But then, you know, the clarity in thinking that the Rafa team seems to have exhibited till date seems to merit an independent company. In my opinion, I think like, I mean, from a technical perspective, this products awesome. Right? I mean, you know, we seem to have, you know, no real competition when it comes to this broad breadth of capabilities, will it last, we'll see, right. I mean, I keep doing Q shows, right? So every year you can ask me that question again. Well, you're >>You make a good point though. I mean, you're up against VMware, you're up against Google. They're both trying to do sort of the same thing you're doing. What's why are you succeeding? >>Maybe it's focus. Maybe it's because of the right experience. I think startups only in hindsight, can one tell why a startup was successful? In all honesty. I, I, I've been in a one or two service in the past. Um, and there's a lot of luck to this. There's a lot of timing to this. I think this timing for a com product like this is perfect. Like three, four years ago, nobody would've cared. Like honestly, nobody would've cared. This is the right time to have a product like this in the market because so many enterprises are now thinking of modernization. And because everybody's doing this, this is like the boots storm problem in HCI. Everybody's doing it. But there's only so many people in the industry who actually understand this problem. So they can't even hire the people. And the CTO said, I gotta go. I don't have the people. I can't fill the, the seats. And then they look for solutions and we are that solution that we're gonna get embedded. And when you have infrastructure software like this embedded in your solution, we're gonna be around with the assuming, obviously we don't score up, right. We're gonna be around with these companies for some time. We're gonna have strong partners for the long term. >>Well, vCenter for Kubernetes, I love to end on that note, intriguing conversation. We could go on forever on this topic, cuz there's a lot of work to do. I think, uh, I don't think this will over be a solve problem for the Kubernetes of cloud native solution. So I think there's a lot of opportunity in that space. Hi, thank you for rejoining the cube. I non con welcome becoming a cube alum. <laugh> I awesome. Thank you. Get your much your profile on the, on the Ken's. Website's really cool from Valencia Spain. I'm Keith Townsend, along with my whole Paul Gillon and you're watching the cube, the leader in high tech coverage.
SUMMARY :
brought to you by the cloud native computing foundation. I'm telling you we are having interviews before the start of even the <laugh> and, and, uh, has Havani CEO. Talk to you again today. Uh, Keith, so, um, we had a, uh, you know, So before, uh, you know, MoneyGram, obviously, you know, that problem, I'd just say, you know, what, go to the plug, the cloud, what, how does, So Amazon is EKS Azure as EKS, you know, How many dashboards do you have now across all the open source technologies that you have identified to And you should use them and don't even think about spinning up Q B and a best clusters. So even if you could, the point is that see, five years ago, I don't think you have a choice. we as a vendor, I mean the only real reason why startups survive is because you have technology that is truly What brought you to Rafi to solve Uh, but then what about all the other things like, you know, centralized dashboard, that they could check, check off with S you know, they they've got the control plane, they've got the cluster provision, you know, just being Java or just being.net to things like Docker, right? So, um, initially we went with sort of, okay, you know, we can just Oh, now you gotta, you got the tools now you gotta figure out how to use it. How do you engage with the ecosystem? so the thing about abstraction layers, you know, we all know how that plays out, We gotta do it on top of that, you have these things called. developers groups have come to you with things that are snowflakes and you, some tools, you know, they have a, a command line, art cuddle API that essentially we use. does the open source community figure out how to do what you've done and, and this opportunity is gone. you know, the clarity in thinking that the Rafa team seems to have exhibited till date seems What's why are you succeeding? And when you have infrastructure software like this embedded in your solution, we're thank you for rejoining the cube.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Paul Gill | PERSON | 0.99+ |
Keith Townsend | PERSON | 0.99+ |
Paul Gillon | PERSON | 0.99+ |
Paul | PERSON | 0.99+ |
one | QUANTITY | 0.99+ |
Keith | PERSON | 0.99+ |
ORGANIZATION | 0.99+ | |
20 | QUANTITY | 0.99+ |
HBS | ORGANIZATION | 0.99+ |
Rafay | PERSON | 0.99+ |
10 | QUANTITY | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Adnan Khan | PERSON | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Java | TITLE | 0.99+ |
20 people | QUANTITY | 0.99+ |
Haseeb Budhani | PERSON | 0.99+ |
Rafa | PERSON | 0.99+ |
eight instances | QUANTITY | 0.99+ |
Valencia Spain | LOCATION | 0.99+ |
Arai | PERSON | 0.99+ |
50 | QUANTITY | 0.99+ |
First | QUANTITY | 0.99+ |
50,000 enterprises | QUANTITY | 0.99+ |
second cloud | QUANTITY | 0.99+ |
15 microservices | QUANTITY | 0.99+ |
Linux | TITLE | 0.98+ |
one cloud | QUANTITY | 0.98+ |
vCenter | TITLE | 0.98+ |
today | DATE | 0.98+ |
mother's day | EVENT | 0.98+ |
first | QUANTITY | 0.98+ |
First question | QUANTITY | 0.98+ |
both | QUANTITY | 0.98+ |
five years ago | DATE | 0.98+ |
four instances | QUANTITY | 0.98+ |
ES | TITLE | 0.98+ |
Anan | PERSON | 0.97+ |
Rafi | PERSON | 0.97+ |
MoneyGram | ORGANIZATION | 0.97+ |
first two guests | QUANTITY | 0.97+ |
HPA | ORGANIZATION | 0.97+ |
four years ago | DATE | 0.96+ |
Kubernetes | TITLE | 0.96+ |
single cluster | QUANTITY | 0.95+ |
1 23 | OTHER | 0.95+ |
hundreds of microservices | QUANTITY | 0.95+ |
30 microservices | QUANTITY | 0.95+ |
single | QUANTITY | 0.95+ |
OpenShift | TITLE | 0.95+ |
one aspect | QUANTITY | 0.95+ |
single pane | QUANTITY | 0.94+ |
VMware | ORGANIZATION | 0.94+ |
two items | QUANTITY | 0.94+ |
day two | QUANTITY | 0.93+ |
Coon | ORGANIZATION | 0.93+ |
ESS | TITLE | 0.9+ |
10 years | QUANTITY | 0.89+ |
Azure | ORGANIZATION | 0.89+ |
day one | QUANTITY | 0.89+ |
Rafa | ORGANIZATION | 0.88+ |
Kubernetes | ORGANIZATION | 0.88+ |
this morning | DATE | 0.88+ |
Docker | TITLE | 0.87+ |
Cloudnativecon | ORGANIZATION | 0.86+ |
Ken | PERSON | 0.86+ |
Samuel Niemi, Dell Technologies | CUBE Conversation
(upbeat music) >> Okay, welcome to the special CUBE conversation. I'm John Furrier, host of theCUBE. We're here talking about the evolving capabilities of VCF on VxRail. VCF being VMware Cloud Foundation. as VxRail from Dell Technologies. Samuel Niemi is their Product Manager of VCF on VxRail. He's got the keys to the kingdom. He is going to give us the update on what's going on, obviously with all the major IT operational conversations going on with cloud native, how to get the best excellence out of the organization as we come through the pandemic, big stuff happening. Welcome to theCUBE. >> Thank you, happy to be here. >> In June, you guys announced some major updates that's coming on to VMware Cloud Foundation on VxRail that would allow customers to extend their capabilities and their ability to innovate in the landscape and with external storage. Can you take us through what's new what's the situation and tell us what's happening? >> Yeah, absolutely. So, first off if you're, for those who might be watching who are not familiar with VCF on VxRail, VxRail is our hyperconverged infrastructure system that allows for massive data centers scaling at, from node to node to node. VCF on VxRail specifically is the VMware SDDC software suite that allows us to create a private cloud with VxRail deployments. So instead of saying, I want to manage this cluster and this cluster, and this cluster VCF allows us to manage VxRail clusters and deployments at a big scale. So VCF on VxRail, we've gone from in the last two and a half years or so that we have been available as a product we've gone from nothing to tens of thousands of nodes deployed across the world. And it has been a rollercoaster of a ride. And we're just thrilled with the success that we've had so far. >> And what's been new since the release in June but what's new? >> Absolutely. So, one thing that we've realized from a VxRail perspective is that, as we grow and as our data center and enterprise scale customers continue to grow their VCF on the VxRail environments VCF on VxRail has to evolve as well. And in June we announced an ability for VCF on VxRail to consume external storage. Now, hyper-converged means no storage, networking, network virtualization I should say and your server all in one box. External storage gives us the ability to utilize your existing Dell EMC storage arrays and use that data centric kind of storage deployment with your existing or net new VCF on VxRail deployments. It's really exciting stuff. And we're really looking forward to be able to even better provide solutions for our customers at that big enterprise scale. >> So a lot of change happening scale is a big word here, right? We're seeing scale, modern applications looking for environment. You talk about hybrid private cloud. I mean, essentially cloud operations is private cloud if you will. I got to ask you on this big product that you have VCF on VxRail, what are the drivers behind making this option viable for customers, what are they looking for? Why are they consuming it this way? What are the key aspects of drive in this force? >> Absolutely. So, what we found is that with vSAN which has been wildly successful on the VxRail, it's fantastic for general purpose workloads. And we don't see that changing. What we see is an ability for our customers to leverage the extreme speed of our PowerStore T, our PowerMax and our Unity XT storage arrays so that you can get that sub millisecond latency that you're used to out of those storage arrays and have the same benefits in say another workload domain of your existing vSAN deployment. Now, my favorite example of a use case for that is when you have sub millisecond latency, that's something like a PowerMax can provide. Let's say you're standing at the gas pump. It's cold, I'm here in Minnesota it was three degrees here yesterday. When I'm standing at the gas pump, swipe my card. I don't want to wait and wait and wait for that database kit. Put my card to go through I want it now. PowerMax and our PowerStore T, unity XT with those crazy low latencies, they allow our VCF on VxRail customers to not have to wait at the pump. So when our enterprise customers have those things deployed with that crazy low latency for database hits, you're not standing at the pump. You're not waiting awkwardly at the grocery store for your card to go through. You really get that extreme speed that those big storage arrays can provide. >> Yeah, so the weather in Minnesota, and so my brother lives in that area too. He was complaining about it on the family text, but this is an edge case, whether you're swiping your credit card on the pump, this latency discussion, the edge is really a key conversation because that's what you're, you're going to get cold waiting, but still you could be, key data store for say some equipment in a manufacturing operation, or on a farm or somewhere. So again, this brings up the whole edge. >> True. >> That an area is that the driver, one of the drivers, or is it also just in general the performance? >> You know I would say it depends on what you need out of your storage array. If you need that performance at the edge, VCF can deploy remote clusters in a metro distance within 50 milliseconds. So you can have your center and you can have your edges, you can put storage arrays behind those edges. You can have that kind of, speed from place to place, to place to place, or you can use traditional vSAN storage. So it really comes down to what your storage use case is. Maybe you have a need of the data replication that PowerMax can provide from one site to the other, and that's your backup for your edges. Those kinds of things can all be utilized with VCF on VxRail and remote clusters at the edge. >> What a similar customer use case? Can you just walk me through some examples of customers that you have and what they're interested in, what kind of advantages they're seeing with the capability? >> Certainly. So we have a number of customers who have high level of data resiliency requirements that we have that 99 point lots of nines resiliency that the PowerMax, and it's forebears, VMX have provided for 20 something years now, those customers say at our financial institutions where they have to have massive levels of resiliency. We have customers who frankly have separate buying cycles, where they buy their compute one year, and then maybe two years later, that's when their storage comes up for renewal. So those customers are able to leverage both VCF on VxRail and their external storage. I'm not going to drop customer names. I've got a couple that come to mind, but I'll say in the financial institution and in healthcare especially is where we see. >> What problem are they solving? You don't have to name names because I know it's probably the company, everything, but you know what all the reference stuff, but what's the anecdotal, what's the main problem, let's say kind of the use cases that jump out and people, if people are watching might think that they should be using this. What signals and signs should they be looking for? >> Absolutely. I would say first off data resiliency, and I'm just in love with PowerMax. So that's the first thing that jumps to mind. I'm extreme performance, whether it's databases or having a need to get data out to their customers as quickly as possible. Replication comes to mind. Those are the big three. And then of course, where you maybe need a little bit of compute and a lot of storage are dynamic nodes and VCF on VxRail means that we can sell our nodes without any storage. And that really gives us an ability to just say, I need a lot of compute, I need a little compute, whatever it might be, I'm going to scale my nodes and my storage independently of one another. >> Where can people get more information to find out? >> Sure, absolutely. So for more information, you can always go to dell.com. You can reach out to your sales team and talk to your VMware sales team as well, who are well-versed in VCF on VxRail deployments, but we're always here dell.com and we're always just an email away. >> So while I've got your here, say, I want to ask you about this notion of simplifying the IT operational experience. >> Sure. >> In your view, as you look out on the horizon from your perspective, being the product leader on this area, what's on the mind of the customer. What's the psychology out there? What's some of the environmental conditions that they're facing (indistinct) their landscape. Is it do more with less, the classic cliche? Is it actually a replatformin, is it refactoring? Is it application developers? what's some of the big drivers there in terms of the customers that you're seeing? >> So as a customer today, I have so many options for where to put my data and where to put my VMs and my development. I want to look at what is the best route for my business? Is it a hybrid cloud offering? And if yes, what's the easiest way to manage that because at the end of the day, if I'm spending money on maintenance spending money on staff who are not accelerating the business, but just keeping the thing going, what's the best way to do that? And VCF on VxRail today really allows our customers to deploy a private or a hybrid cloud rather, and maintain the entire thing through one interface. That interface being SDDC Manager. When we look at the benefits of it, VCF for on VxRail today provides Tanzu. So for customers who need to have a development platform in their hybrid cloud Tanzu is that the easy option or the easy answer for that. So, it is a big answer. What's driving this, lots of things, but really it's data center modernization. It's moving from a traditional servers with virtual machines on them into the hybrid cloud. >> Yeah, you were missing resilience here on the data. I think that's awesome because I mean, at the end of the day it's data driven. Everyone wants more data. Database has been around for a while. So making that go faster is really critical. Awesome, awesome conversation. And now on the VCF on VxRail, what's the bottom line, if you had to summarize the evolution capabilities that are coming on, they're evolving, you're the Product Manager, you got the keys to the kingdom, what's next, what's happening? >> If I'm looking at VCF and what's next and what's on the way, really lifecycle management. So, when our customers talk about what it looks like to lifecycle their systems without VCF on VxRail and the complexity of doing that without VCF it's lifecycle management is the reason for being. We look at the, from everything we lifecycle from the hardware of the VxRail nodes, including disc firmware, HPAs, NIC drivers, etc to the VCF SDDC software suite, all of those components they're in vSphere, VCenter ESXi. I'm going through the checklist in my head here. The V realized components, getting all of that lifecycle to a good continuous revalidated state is really, really tough. And then your add storage, that's one more thing. So I want to be able to just have a single click that will go through LCM my entire hybrid cloud environment from hardware to software stack, so that I can manage that external storage that I just added to my system without adding more pain. So really with VCF on VxRail, it's the only jointly engineered solution from an HCI vendor like VxRail and VMware to deliver that single click soup to nuts hardware to software suite LCM. LCM is the name of the game. And we're going to continue to make that innovate on that and new ways that I can't even say yet. >> I can't wait to hear the innovation is a great model. Putting that out there, getting the environmental all scaled up. Sam Niemi, Product Manager, VCF VMware Cloud Foundation on VxRail with Dell Technologies. Thanks for coming on this CUBE conversation. >> Absolutely thanks, John. >> Okay, it's theCUBE here in Palo Alto. I'm John for your host, thanks for watching. (upbeat music)
SUMMARY :
He's got the keys to the kingdom. and their ability to innovate of nodes deployed across the world. VCF on VxRail has to evolve as well. I got to ask you on this big product and have the same benefits in it on the family text, So it really comes down to that the PowerMax, and it's forebears, VMX You don't have to name So that's the first and talk to your VMware the IT operational experience. in terms of the customers is that the easy option And now on the VCF on VxRail, getting all of that lifecycle to getting the environmental all scaled up. I'm John for your host,
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Samuel Niemi | PERSON | 0.99+ |
Minnesota | LOCATION | 0.99+ |
John Furrier | PERSON | 0.99+ |
Sam Niemi | PERSON | 0.99+ |
John | PERSON | 0.99+ |
June | DATE | 0.99+ |
Palo Alto | LOCATION | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
three degrees | QUANTITY | 0.99+ |
VMware Cloud Foundation | ORGANIZATION | 0.99+ |
VMware Cloud Foundation | ORGANIZATION | 0.99+ |
yesterday | DATE | 0.99+ |
one box | QUANTITY | 0.99+ |
dell.com | ORGANIZATION | 0.99+ |
PowerStore T | COMMERCIAL_ITEM | 0.99+ |
two years later | DATE | 0.98+ |
VCF | ORGANIZATION | 0.98+ |
first thing | QUANTITY | 0.98+ |
VxRail | TITLE | 0.97+ |
both | QUANTITY | 0.97+ |
Tanzu | ORGANIZATION | 0.97+ |
today | DATE | 0.97+ |
HCI | ORGANIZATION | 0.97+ |
one | QUANTITY | 0.97+ |
one thing | QUANTITY | 0.97+ |
PowerMax | COMMERCIAL_ITEM | 0.96+ |
99 point | QUANTITY | 0.96+ |
one interface | QUANTITY | 0.95+ |
VCF VMware Cloud Foundation | ORGANIZATION | 0.95+ |
one site | QUANTITY | 0.95+ |
VCF | TITLE | 0.94+ |
first | QUANTITY | 0.94+ |
VMware | TITLE | 0.92+ |
tens of thousands of nodes | QUANTITY | 0.92+ |
CUBE | ORGANIZATION | 0.91+ |
single click | QUANTITY | 0.9+ |
one more thing | QUANTITY | 0.9+ |
pandemic | EVENT | 0.89+ |
LCM | TITLE | 0.89+ |
50 milliseconds | QUANTITY | 0.88+ |
nesota | LOCATION | 0.86+ |
vSphere | TITLE | 0.84+ |
20 something years | QUANTITY | 0.84+ |
LCM | ORGANIZATION | 0.83+ |
theCUBE | ORGANIZATION | 0.82+ |
VMware | ORGANIZATION | 0.81+ |
vSAN | TITLE | 0.79+ |
single click | QUANTITY | 0.79+ |
couple | QUANTITY | 0.79+ |
VMX | ORGANIZATION | 0.77+ |
Unity XT | COMMERCIAL_ITEM | 0.76+ |
VxRail | COMMERCIAL_ITEM | 0.75+ |
VxRail | ORGANIZATION | 0.73+ |
and a half years | QUANTITY | 0.7+ |
VCF for | ORGANIZATION | 0.68+ |
last two | DATE | 0.65+ |
Simon McCormack, Aruba | Aruba & Pensando Announce New Innovations
(fastpaced upbeat music) >> Welcome back to theCubes coverage of the power of N and the collaborations between HPE Aruba and Pensando. Where the two companies are setting out to create a new category in network switching. Joining me now is Simon McCormack, who looks after product management at HPE Aruba. Welcome Simon. Good to see you. >> Good morning. Thanks for having me today. >> You're very welcome. So Simon, we've been talking all day about the Aruba switching fabric that you're bringing to market, embedding the Pensando technology. Can you tell us what's the primary value prop that AFC brings to its customers? >> Sure. Aruba Fabric Composer. This is orchestration and management for the Aruba wide switching platform. Primarily for data centers. It does a lot of things. I'll give you three key ones just to get a feel for it. So in data center networking, there's a lot of complex technologies. I'm afraid to say, lease spines, overlays, underlays, EDP and OSPF BGP. I can throw out loads of acronyms for you. Fabric Composer can really simplify through a bunch of intent based workflows, the deployment and management of these fabrics. We can do it either interactively through a UI or fully API driven, if you want to. So it really takes away a lot of the plexity there makes it dead easy to deploy these and that scale. Number two, in a data center, a lot of compute storage hypervisor technologies that you have to interact with the THEO network products. So in Fabric Composer, we built an integration layer into it that interacts with other orchestrators, vCenter, VMware vcenter is a good example of that. So an operator may make changes to vCenter that affect the network. You don't want to call the network team for it. Fabric Composer can automate that network side configuration on the Aruba switch, making your day to operations, insertion of new services, much more simpler. And then finally, number three, because we've got all these capabilities I've just told you about. We actually have a great typology model that we build from it. And we can use that to visualize this virtual to physical network layer that is really powerful for troubleshooting the environment. >> Great? So three things, actually four right. To simplify or integrate and automate. And it's kind of two and two way, I'm going to to call it. and then the visualization piece for troubleshooting. Awesome. What about security policy? How are you thinking about that in this release? >> Yeah, so that's where in this release, we're extending it with the Pensando PSM technologies embedded into the 10K. Now we can use Aruba Fabric Composer to actually orchestrate the policy in addition to the network. So you think about today, Fabric Composer does network primarily. You bring policy into it. You've got one single pane of glass now that does network and policy. It actually provides a really powerful capabilities for operators of different skill sets to be able to manage and orchestrate this environment. >> What about the sort of operational model as it pertains to the network and security, I'm interested in how flexible that is. For instance, if a customer wants to use their own tooling or operational frameworks. What if they want to leverage multi-vendor fabrics like a third-party spine? How do you deal with all of that? >> Yeah, and I think that's, we built that into essentially the DNA of this technology is that we're, we're expecting to often go into brownfield environments. Where they've already got best practices for security and networking. They've already got networking vendors there. The 10K is a very powerful lease switch on its own. We want those lease switches to go in all of these different environments, not just Greenfield. It's really great for Greenfield. And I'm going to explain this a little bit in a few ways. First of all, the technology we have with Aruba fabric Composer and Pensando PSM, you can do a pure operational split between them SecOps, NetOps. A lot of customers that's how they deal with it. They've got the security operations team, network operations team. If they're split, you can use the two tools and make a fantastic product using that. However, if they're not split, and you've got a single policy for it. You can use Aruba Fabric Composer to do both of them. So you've got the options there and we fully embrace that in the architecture of what we built. This extends to multiple layers for the technology build as well. Again, as I said, the 10K's is a lease switch, it can connect to third-party spines. So you could use Fabric Composer to manage this lease Spitch and the policy you could use Fabric Composer just to manage the least switch and connect and interoperate the lease to the spine, or you can do a full Aruba solution, the full Aruba spine and use that operating model. There's one final thing in this area is fabric Composers are a UI based orchestrator, API driven. Some customers love it. Some customers love their CLIs. We fully embrace the operational model where customers still use their own APIs and their own CLIs. So the customer may be using Ansible to automate through API. They can still use that directly to the switch and they can use it to AFC and mix the two. If you talk directly to a switch and change it, Fabric Composer detects it and basically sinks its configuration together. So we can insert all or any part of this solution into existing or new Netflix. >> Yeah, that's nice. Right? Because I mean, so there's the network hard guys, right they, they want that CLI access. So you you're accommodating that. And then as well, being able to bring those SecOps view and the netOps view together is important because let's say, let's face it. A lot of organizations, especially some of the smaller ones, they don't actually have a full blown SecOps team. That's really the netOps responsibility. And so that's nice flexibility, you can handle both worlds. How about segmentation? What a customer is telling you that they want regarding segmentation and how are you guys approaching that? >> Yeah, I mean, it's, it's actually a key feature of what we're doing in this area. Now the iland segmentation generates it's kind of a wide area with many layers to it and we could talk about it for hours. So let me talk briefly about some of the areas we're going into when it comes to the segmentation. But particularly of a compute and virtual type environment. So when you, when you're typically creating policies in today's world, current policies based on addresses, IP addresses, or Mac addresses. You have lots of rules and big lists of addresses. It's really annoying. Customers generally don't talk in addresses. They talk in machines and names of machines. So if you think about what I've already told you with the Fabric Composer, we've already got these hooks in the compute hypervisor layer. So we didn't know about the virtual machines? So it said obviously, a natural extension now for you to be able to create these policies based on the machines. So there's, there's a scale problem in policy distribution at two levels, at the top and the bottom. The top level is your chronic create the policy. You've got this massive distribution addresses. So Fabric Composer can really help you by allowing you to then create these groups, sensible groups, using the names then you can distribute. The 10K solution with the distributed architecture of the bottom layer, now allows us to distribute these policies and rules across your racks within your data center. So it scales really well, but that's one level I've described. You know, you're creating groups of machines with names, so it's easier to define it, but there's auto and automation angle to this as well. You might not want to even create it interactively. Now a lot of customers with VMware vCenter, For example, are tagging the virtual machines. So the tag tells you a group information. Again, Fabric Composer can already get the tag within its database model. So we can use the tag now either to fully automate or use as a hint to creating these groups. So now I've got a really simple way to basically just categorize my machines into the groups so that now I can push rules down onto them. And there's one, one final thing that I just want to tell you before, before we move on. There's, there's often a zero trust model you want to do in the data center for segmentation. Meaning I've got two virtual machines on the same network on the same host. Normally they can talk to each other, nothing's stopping them, but sometimes you want to isolate even those two. You can do it in products like vCenter with PV land technologies. A bit cumbersome to configure on the vSphere side, you got to match it with what you see on the switch side. It's one of those that's a real headache, unless you've got an orchestrator to do it. So Fabric Composer could basically orchestrate this isolated solution. You're now grouping your machines and you're saying they're isolated. We can do the smarts and both of the vCenter side and the switch side, get them in sync, get it all configured. And now the masses can start to do this kind of segmentation at scale. >> Got it. Thank you Simon. Can the Fabric Composer kind of be used as the primary prism for troubleshooting? How do you handle troubleshooting and this art combined architecture? Who, who do I call when there's a problem? How do you approach that? >> Well, definitely start by calling me or actually call my product first, so fabric Composer. If you're using it, use that as the front tool for what you're going to try and figure out what's going on. There is a global health dashboard. It encompasses networking security policy across the solution, across the fabric. So that's your, tells you what's going on immediately. Down to port stats on what's happening within the physical topology of the network. Down to the end-to-end view, we have in terms of policy connectivity between machines. So Fabric Composer is your first port of call, but we built a solution here that we don't want to hide the pieces underneath it. Any networking guy knows when they're deep troubleshooting networking stuff, they're going to end up with the switch. So you started the orchestrator, but sometimes in the deep troubleshooting, not day-to-day, hopefully. You'll go to the switch and you'll troubleshoot that way. We've got the same technology here with the policy, with the firewall rules, with Pensando PSM. We still fully embrace for deep troubleshooting, go to Pensando PSM. They have really advanced tools in their bag of tricks in the product to give you advanced troubleshooting down to the policy layer. They have a really powerful firewall log capability, where you can search and sort, and see exactly what role is allowing or stopping any traffic going through the environment. And the two orchestrated model, we really like it 'cause it scales really well. It allows Fabric Composer to remain lightweight, PSM focused on the policy orchestration bit. But again, if your that customer that wants to do single pane of glass use Fabric Composer for the standard day-to-day stuff. But you've got the tools there to do the advanced troubleshooting between the different elements that we have within the Pensando and the Aruba tools. >> Yeah, really well thought out. You got the simplification angle nailed, the integration automation we talked about that, the visualization and the topology map, zero trust. And then remediation with deep^ened inspection. Simon, thanks so much for taking us through the announcements. Really appreciate your insights and time today. >> Thank you very much. >> You're welcome. Okay. Keep it right there, this is Dave Vellante for theCube. More content from the HPE Aruba Pensando announcements coming right up. (soothing music)
SUMMARY :
coverage of the power of N for having me today. about the Aruba switching fabric lot of the plexity there I'm going to to call it. embedded into the 10K. What about the sort and the policy you could and the netOps view together is important So the tag tells you a group information. as the primary prism for troubleshooting? that as the front tool You got the simplification angle nailed, More content from the HPE
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Dave Vellante | PERSON | 0.99+ |
Simon | PERSON | 0.99+ |
two tools | QUANTITY | 0.99+ |
Simon McCormack | PERSON | 0.99+ |
two companies | QUANTITY | 0.99+ |
Pensando | ORGANIZATION | 0.99+ |
both | QUANTITY | 0.99+ |
Aruba | ORGANIZATION | 0.99+ |
AFC | ORGANIZATION | 0.99+ |
HPE Aruba | ORGANIZATION | 0.99+ |
Netflix | ORGANIZATION | 0.99+ |
two levels | QUANTITY | 0.99+ |
two | QUANTITY | 0.99+ |
one | QUANTITY | 0.99+ |
first port | QUANTITY | 0.98+ |
three things | QUANTITY | 0.98+ |
today | DATE | 0.98+ |
both worlds | QUANTITY | 0.98+ |
vCenter | TITLE | 0.97+ |
vSphere | TITLE | 0.96+ |
10K | QUANTITY | 0.96+ |
one level | QUANTITY | 0.95+ |
Pensando PSM | ORGANIZATION | 0.95+ |
Mac | COMMERCIAL_ITEM | 0.95+ |
one final thing | QUANTITY | 0.95+ |
single policy | QUANTITY | 0.95+ |
First | QUANTITY | 0.95+ |
zero trust | QUANTITY | 0.95+ |
Composer | ORGANIZATION | 0.93+ |
Aruba | LOCATION | 0.89+ |
first | QUANTITY | 0.88+ |
Fabric Composer | TITLE | 0.88+ |
two virtual machines | QUANTITY | 0.85+ |
three key ones | QUANTITY | 0.85+ |
one single pane | QUANTITY | 0.84+ |
HPE | ORGANIZATION | 0.84+ |
Greenfield | ORGANIZATION | 0.84+ |
single pane | QUANTITY | 0.83+ |
10K | COMMERCIAL_ITEM | 0.83+ |
SecOps | OTHER | 0.8+ |
four | QUANTITY | 0.79+ |
Fabric Composer | ORGANIZATION | 0.79+ |
theCubes | ORGANIZATION | 0.79+ |
Number two | QUANTITY | 0.77+ |
VMware vCenter | TITLE | 0.76+ |
VMware vcenter | TITLE | 0.71+ |
AFC | TITLE | 0.7+ |
Fabric | TITLE | 0.7+ |
them | QUANTITY | 0.68+ |
theCube | ORGANIZATION | 0.68+ |
netOps | OTHER | 0.68+ |
Ansible | TITLE | 0.68+ |
zero | QUANTITY | 0.66+ |
three | QUANTITY | 0.62+ |
model | QUANTITY | 0.56+ |
iland | LOCATION | 0.55+ |
William Choe & Shane Corban | Aruba & Pensando Announce New Innovations
(intro music playing) >> Hello everyone, and welcome to the power of n where HPE Aruba and Pensando are changing the game, the way customers scale with the cloud, and what's next in the evolution in switching. Hey everyone, I'm John furrier with the cube, and I'm here with Shane Corbin, director of technical product management at Pensando, and William show vice president of product management, Aruba HPE. Gentlemen, thank you for coming on and doing a deep dive and, and going into the, the big news. So the first question I want to ask you guys is um, what do you guys see from a market customer perspective that kicked this project off? um, amazing um, results um, over the past year or so? Where did it all come from? >> No, it's a great question, John. So when we were doing our homework, there were actually three very clear customer challenges. First, security threats were largely spawn with on, within the perimeter. In fact, Forrester highlighted 80% of threats originate within the internal network. Secondly, workloads are largely distributed creating a ton of east-west traffic. And then lastly, network services such as firewalls, load balancers, VPN aggregators are expensive, they're centralized, and they ultimately result in service chaining complexity. >> John: So, so, >> John: Go ahead, Shane. >> Yeah. Additionally, when we spoke to our customers after launching initially the distributed services platform, these compliance challenges clearly became apparent to us and while they saw the architecture value of adopting what the largest public cloud providers have done by putting a smart NIC in each compute node to provide these stateful services. Enterprise customers were still, were struggling with the need to upgrade fleets and brown field servers and the associated per node cost of adding a smart NIC to every compute node. Typically the traffic volumes for on a per node basis within an enterprise data center are significantly lower than cloud. Thus, we saw an opportunity here to, in conjunction with Aruba, develop a new category of switching product um, to share the processing capabilities of our unique intellectual property around our DPU across a rack of servers that net net delivers the same set of services through a new category of platform, enabling a distributed services architecture, and ultimately addressing the compliance and TCO generating huge TCO and ROI for customers. >> You know, one of the things that we've been reporting on with you guys, as well as the cloud scale, this is the volume of data and just the performance and scale. I think the timing of the, of this partnership and the product development is right on point. And you've got the edge right around the corner, more, more distributed nature of cloud operations, huge, huge change in the marketplace. So great timing on the origination story there. Great stuff. Tell me more about the platform itself, the details, what's under the hood, the hardware OS, what are the specs? >> Yeah, so we started with a very familiar premise. Rubik customers are already leveraging CX with an edge to cloud common operating model, in deploying leaf and spine networks. Plus we're excited to introduce the industry's first distributed services switch, where the first configuration has 48-25 gig ports with a hundred gig couplings running Aruba CX cloud native operating system, Pensando Asic's software inside, enabling layer four through six, seven stateful services. Shane, do you want to elaborate on. >> Yeah, let me elaborate on that a little bit further, um, you know, as we spoke existing platforms and how customers were seeking to address these challenges were, are inherently limited by the ASIC dye size, and that does limit their scale and performance and ability in traditional switching platforms to deliver truly stateful functions in, in, in a switching platform, this was, you know, architecturally from the ground up, when we developed our DPU, first and second generation, we delivered it, or we, we built it with stateful services in mind from the get-go, we leveraged the clean state design with our P four program with DPU. We evolved to our seven nanometers based pro DPU right now, which is essentially enabling software and Silicon. And this has generated a new level of performance scale, flexibility and capability in terms of services. This serves as the foundation for our 200 gig card, were we taking the largest cloud providers into production for. And the DPU itself is, is designed inherently to process stage, track stateful connections, and stateful flow is at very, very large scale without impacting performance. And in fact, the two of these DPU components server disk, services foundation of the CX 10 K, and this is how we enable stateful functions in a switching platform functions like stateful network fire-walling, stateful segmentation, enhanced programmable telemetry, which we believe will bring a whole lot of value to our customers. And this is a platform that's inherently programmable from the ground up. We can, we can build and leverage this platform to build new use cases around encryption, enabling stateful load balancing, stateful NAT to name a few, but, but the key message here is, this is, this is a platform with the next generation of architecture's in mind, is programmed, but at all, there's the stack, and that's what makes it fundamentally different than anything else. >> I want to just double click on that if you don't mind, before we get to the competitive question, because I think you brought up the state thing. I think this is worth calling out, if you guys don't mind commenting more on this states issue, because this is big. Cloud native developers right now, want speed, they're shifting left at the CICD pipeline with programmability. So going down and having the programmability, and having state is a really big deal. Can you guys just expand on that a little bit more and why it's important and, and how hard it really is to pull off? >> I, I can start, I guess, um, it's very hard to pull off because of the sheer amount of connections you need to track when you're developing something like a stateful firewall or a stateful load balancer, a key component of that is managing the connections at very, very large scale and understanding what's happening with those connections at scale, without impacting application performance. And this is fundamentally different at traditional switching platform, regardless of how it's deployed today in Asics, don't typically process and manage state like this. Um, memory resources within the chip aren't sufficient, um, the policy scale that you can um, implement on a platform aren't sufficient to address and fundamentally enable deployable firewalling, or load balancing, or other stateful services. >> That's exactly right. And so the other kind of key point here is that, if you think about the sophistication of different security threats, it does really require you to be able to look at the entire packet, and, and more so be able to look at the entire flow and be able to log that history, so that you can get much better heuristics around different anomalies, security threats that are emerging today. >> That's a great, great point. Thanks for, for, um, bringing that extra, extra point out. I would just add to this, we're reporting this all the time on Silicon angle in the cube is that, you know, the, you know, the, the automation wave that's coming with around data, you know, it's a center of data, not data centers we heard earlier on with the, in, in, in the presentation. Data drives automation, having that enabled with the state is a real big deal. So, I think that's really worth calling out. Now, I've got to ask the competition question, how is this different? I mean, this is an evolution. I would say, it's a revolution. You guys are being being humble, um, but how is this different from what customers can deploy today? >> Architecturally, if you take a look at it. We've, we've spoken about the technology and fundamentally in the platform what's unique, in the architecture, but, foundationally when customers deploy stateful services they're typically deployed leveraging traditional big box appliances for east-west our workload based agents, which seek to implement stateful security for each east-west. Architecturally what we're enabling is stateful services like firewalling, segmentation, can scale with the fabric and are delivered at the optimal point for east west which is through leaf for access layer of the network. And we do this for any type of workload. Be it deployed on a virtualized compute node, be a deployed on a containerized worker node, be deployed on bare metal, agnostic up typology, it can be in the access layer of a three tier design and a data center. It can be in the leaf layer of a VX VPN based fabric, but the goal is an all centrally managed to a single point of orchestration and control of which William will talk about shortly. The goal of this is to drive down the TCO of your data center as a whole, by allowing you to retire legacy appliances that are deployed in an east-west roll, and not utilize host based agents, and thus save a whole lot of money and we've modeled on the order of 60 to 70% in terms of savings in terms of the traditional data center pod design of a thousand compute nodes which we'll be publishing. And as, as we go forward additional services, as we mentioned, like encryption, this platform has the capability to terminate up to 800 gigs of our line rates encryption, IP sec, VPN per platform, stateful Nat load balancing, and this is all functionality we'll be adding to this existing platform because it's programmable as we've mentioned from the ground up. >> What are some of the use cases lead? And what's the top use cases, what's the low hanging fruit and where does this go? You've got service providers, enterprises. What are the types of customers you guys see implementing? >> Yeah, that's, what's really exciting about the CX 10,000. We actually see customer interest from all types of different markets, whether it be higher education, service providers to financial services, basically all enterprises verticals with private cloud or edge data centers. For example, it could be a hospital, a big box retailer, or a colon such as Iniquinate So it's really the CX 10,000 that creates a new switching category, enabling stateful services in that leaf node right at the workload, unifying network and security automation policy management. Second, the CX 10,000 greatly improves security posture and eliminates the need for hair-pinning east-west traffic all the way back to the centralized deployments. Lastly, As Shane highlighted, there's a 70% TCO savings by eliminating that appliance sprawl and ultimately collapsing the network security operations. >> I love the category creation um, vibe here. Love it. And also the technical and the cloud alignment's great. But how do the customers manage all this? Okay, I got a new category. I just put the box in, throw away some other ones? I mean, how does this all get done? And how does the customers manage all this? >> Yeah, so we're, we're looking to build on top of the river fabric composer. It's another familiar site for our customers, and what's already provides for compute storage and network automation, with a broad ecosystem integrations, such as VMware vSphere Vcenter as with Nutanix prism and so aligned with the CX 10,000 FGA, now you have a fabric composer, unified security and policy orchestration, and management with the ability to find firewall policies efficiently and provide that telemetry to collect your such a Splunk. >> John: So the customer environments right now involve a lot of multi-vendor and new frameworks, obviously, cloud native. How does this fit into the customer's existing environment with the ecosystem? How do they get, get going here? >> Yeah, great question. Um, Our customers can get going as we, we've built a flexible platform that can be deployed in either Greenfield or brownfield. Obviously it's a best of breed architecture for distributed services we're building in conjunction with Aruba. But if customers want to gradually integrate this into their existing environments and they're using other vendors, spines or cores, this can be inserted seamlessly as, as a lead for an access, access tier switch to deliver the exact same set of services within that architecture. So it plugs seamlessly in because it supports all the standard control plan protocols, a VX 90 VPN, and a traditional attitude, three tier designs easily. Now, for any enterprise solution deployment, it's critical that you build a holistic ecosystem around it. It's clear that, this will get customer deployments and the ecosystem being diverse and rich is very, very important. And as part of our integrations with the controller, we're building a broad suite of integrations across threat detection, application dependency mapping, Siemens sooam, dev ops infrastructure as code tools. (inaudible) And it's clear if you look at these categories of integrations, you know, XDR or threat detection requires full telemetric from within the data center, it's been hard to accomplish to date because you typically need agents on, on your compute nodes to give you the visibility into what's going on or firewalls for east west fuels. Now, our platform can natively provide full visibility into all flows east- west in the data center. And this can become the source of telemetry truth that these MLX CR engines require to work. The other aspects of ecosystem around application dependency mapping, this single core challenge with deploying segmentation east west is understanding the rules to put in & Right, first is how do you insert the service, um, service device in such a way that it won't add more complexity? We don't add any complexity because we're in line natively. How you would understand it, would allow you to build the rules that are necessary to do segmentation. We integrate with tools like Guardi core, we provide our flogs as source of data, and they can provide room recommendations and policy recommendations for customers. Around, we're building integrations around Siemen soam with, with tools like Splunk and elastic, elastic search that will allow NetOps and SecOps teams to visualize trend and manage the services delivered by the CX 10 K. And the other aspect of ecosystem, from a security standpoint is clearly how do I get policy for these traditional appliances and enforce them on this next generation architecture that you've built, that can enable stateful services. So we're building integrations with tools like turf and an algo sec third-party sources of policy that we can ingest and enforce on the infrastructure, allowing you to gradually, um, migrate to this new architecture over time. >> John: It's really a cloud native switch. I mean, you solve people's problems, pin- points, but yet positioned for growth. I mean, it sounds that's my takeaway, but I got to ask you guys both, what's the takeaway for the customers because it's not that simple for them, I mean it's, we a have complicated environment. (all giggling) >> Yeah, I think it's, I think it's really simple, um, you know, every 10 years or so, we see major evolutions in the data center and the switching environment, but we do believe we've created a new category with the distributed services, distributed services switch, delivering cloud scale distributed services, where the local, where the workloads reside greatly, simplifying network, security provisioning, and operations with the urban fabric composer while improving security posture and the TCO. But that's not all the folks, it's a journey, right Shane? >> Yeah, it's absolutely a journey. And this is the first step in a long journey with a great partner like Aruba. There's other platforms, hundred or 400 gig hardware platforms where we're looking at and then this additional services that we can enable over time, allowing customers to drive even more TCO value out of the platform of the architecture services like encryption for securing the cloud on-ramp, services like stateful load balancing to deploy east-west in the data center and, you know, holistically that's, that's the goal, deliver value for customers. And we believe we have an architecture and a platform, and this is a first step in a long journey. >> It's a great way of, I just ask one final, final question for both of you as product leaders, you got to be excited having a category creation product here in this market, this big wave, but what's your thoughts? >> Yeah, exactly right, it doesn't happen that often, and so we're, we're all in it's, it's exciting to be able to work with a great team like Pensando and Shane here. Um, so we're really, really excited about this launch. >> Yeah, it's awesome. The team is great. It's a great partnership between Pensando and Aruba. You know, we, we look forward to delivering value for our joint customers. >> John: Thank you both for sharing under the hood and more details on the product. Thanks for coming on. >> [William And Shane] Thank you. >> Okay. The next evolution in switching, I'm John Furrier here with the power of nHPE Aruba and Pensando changing the game, the way customers scale up in the cloud and networking. Thanks for watching. (music playing)
SUMMARY :
the way customers scale with the cloud, and they ultimately result in service and the associated per node cost and just the performance and scale. introduce the industry's and this is how we and how hard it really is to pull off? because of the sheer amount of connections And so the other kind of on Silicon angle in the cube and fundamentally in the What are some of the use cases lead? and eliminates the need for And how does the and so aligned with the CX 10,000 FGA, John: So the customer and the ecosystem being diverse and rich but I got to ask you guys both, and the switching environment, and this is a first and so we're, we're all in it's, we look forward to delivering value on the product. the way customers scale up in the cloud
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Shane Corbin | PERSON | 0.99+ |
John | PERSON | 0.99+ |
William | PERSON | 0.99+ |
Shane | PERSON | 0.99+ |
60 | QUANTITY | 0.99+ |
hundred | QUANTITY | 0.99+ |
80% | QUANTITY | 0.99+ |
six | QUANTITY | 0.99+ |
70% | QUANTITY | 0.99+ |
John Furrier | PERSON | 0.99+ |
First | QUANTITY | 0.99+ |
Pensando | ORGANIZATION | 0.99+ |
Shane Corban | PERSON | 0.99+ |
Aruba | ORGANIZATION | 0.99+ |
Second | QUANTITY | 0.99+ |
200 gig | QUANTITY | 0.99+ |
first | QUANTITY | 0.99+ |
first question | QUANTITY | 0.99+ |
CX 10,000 | COMMERCIAL_ITEM | 0.99+ |
first configuration | QUANTITY | 0.99+ |
three | QUANTITY | 0.99+ |
two | QUANTITY | 0.99+ |
Siemens | ORGANIZATION | 0.98+ |
William Choe | PERSON | 0.98+ |
both | QUANTITY | 0.98+ |
400 gig | QUANTITY | 0.98+ |
first step | QUANTITY | 0.98+ |
Forrester | ORGANIZATION | 0.98+ |
Pensando Asic | ORGANIZATION | 0.98+ |
second generation | QUANTITY | 0.98+ |
seven nanometers | QUANTITY | 0.98+ |
48-25 gig | QUANTITY | 0.98+ |
Secondly | QUANTITY | 0.97+ |
today | DATE | 0.97+ |
CX | TITLE | 0.97+ |
Asics | ORGANIZATION | 0.97+ |
single | QUANTITY | 0.97+ |
HPE Aruba | ORGANIZATION | 0.96+ |
one | QUANTITY | 0.96+ |
three tier | QUANTITY | 0.95+ |
one final | QUANTITY | 0.94+ |
first distributed services | QUANTITY | 0.92+ |
illiam | ORGANIZATION | 0.92+ |
Iniquinate | ORGANIZATION | 0.91+ |
nHPE | ORGANIZATION | 0.91+ |
ASIC | ORGANIZATION | 0.9+ |
hundred gig | QUANTITY | 0.89+ |
10 years | QUANTITY | 0.88+ |
Rubik | ORGANIZATION | 0.87+ |
CX 10,000 FGA | COMMERCIAL_ITEM | 0.85+ |
Splunk | TITLE | 0.84+ |
up to 800 gigs | QUANTITY | 0.83+ |
each compute | QUANTITY | 0.83+ |
NetOps | TITLE | 0.82+ |
Aruba HPE | ORGANIZATION | 0.81+ |
Guardi | TITLE | 0.8+ |
seven stateful services | QUANTITY | 0.79+ |
SecOps | TITLE | 0.77+ |
VMware vSphere Vcenter | TITLE | 0.76+ |
east- | LOCATION | 0.75+ |
CX 10 K | TITLE | 0.75+ |
layer four | OTHER | 0.74+ |
single point | QUANTITY | 0.72+ |
each east | QUANTITY | 0.7+ |
Greenfield | LOCATION | 0.7+ |
east west | LOCATION | 0.64+ |
question | QUANTITY | 0.63+ |
Simon McCormack, Aruba
(upbeat music) >> Welcome back to the cubes coverage of the power of N and the collaborations between HPE Aruba and Pensando. Where the two companies are setting out to create a new category in network switching. Joining me now is Simon McCormack, who looks after product management at HPE Aruba. Welcome Simon. Good to see you. >> Good morning. Thanks for having me today. >> You're very welcome. So Simon, we've been talking all day about the Aruba switching fabric that you're bringing to market embedding the Pensando technology. Can you tell us what's the primary value prop that AFC brings to its customers? >> Sure. Aruba fabric composer. This is orchestration and management for the Aruba wide switching platform, primarily for data centers. It does a lot of things. I'll give you three key ones just to get a feel for it. So in data center, networking, there's a lot of complex technologies. I'm afraid to say, lease spines, overlays, underlays, EDPs, OSPs PGP. I can throw out loads of acronyms for you. Fabric composer can really simplify through a bunch of intent based workflows, the deployment and management of these fabrics. We can do it either interactively through a UI or fully API driven if you want to. So it really takes away a lot of the complexity there makes it dead easy to deploy these and that scale. Number two, in a data center, a lot of compute storage hypervisor technologies that you have to interact with with your network products. So in fabric composer, we built an integration layer into it, that interacts with other orchestrators. V-Center, VMware Vcenter is a good example of that. So an operator may make changes to V-Center that affect the network. You don't want to call the network team for it. Fabric composer can automate that network side configuration on the Aruba switch, making your day to operations, insertion of new services, much more simpler. And then finally, number three, because we've got all these capabilities I've just told you about. We actually have a great typology model that we build from it. And we can use that to visualize this virtual to physical network layer that is really powerful for troubleshooting the environment. >> Great, so three things actually for right simplify, you integrate and automate, and it's kind of two and two way I'm going to call it and then the visualization piece for troubleshooting. Awesome. What about security policy? How are you thinking about that in this release? >> Yeah, so that's where in this release, we're extending it with the Persando PSM technologies embedded into the 10 K. Now we can use Aruba fabric composer to actually orchestrate the policy in addition to the network. So you think about today, fabric poser does network primarily you bring policy into it, you've got one single pane of glass now that doesn't network in policy, it actually provides a really powerful capabilities for operators of different skill sets to be able to manage and orchestrate this environment. >> What about the sort of operational model as it pertains to the network and security, I'm interested in how flexible that is. Like for instance, if a customer wants to use their own tooling or operational frameworks or frameworks so what if they want to leverage multi-vendor fabrics like a third-party spine? How do you deal with all of that? >> Yeah, and I think that's, we built that into essentially the DNA of this technology is that where we're expecting to often go into brownfield environments where they've already got best practices for security and networking. They've already got networking vendors there. The 10 K the very powerful lease switch on its own. We want those lease switches to go in all of these different environments, not just Greenfield. It's really great for Greenfield. And I'm going to explain this a little bit in a few ways. First of all, the technology we have with Aruba fabric composer and Pensando PSM, you can do a pure operational split between them. SecOps, NetOps a lot of customers that's how they deal with it. They've got the security operations team network operations team. If they're split, you can use the two tools and make a fantastic product using that. However, they're not split and you've got a single policy for it. You can use Aruba fabric composer to do both of them. So you've got the options there and we fully embrace that in the architecture of what we built. This extends to multiple layers for the technology build as well. Again, as I said, the 10 K's at Leafs, which it can connect to third-party spines. So you could use fabric composer to manage this lead switch and the policy you could use fabric composer just to manage the lease switch and connect and inter-operate the Leaf's to a spine, or you can do a full Aruba solution, the full Rube Leaf spine and use that operating model. There's one final thing in this area is fabri Composers are a UI based orchestrator, API driven. Some customers love it. Some customers that love their CLIs, we fully embrace the operational model where customers still use their own API APIs and their own CLIs. So the customer may be using Ansible to automate through API. They can still use that directly to the switch and they can use it to AFC and mix the two. If you talk directly to a switch and change it, fabric composer detects it and basically sinks its configuration together. So we can insert all or any part of this solution into existing or new Networks. >> Yeah, that's nice. Right? Because I mean, so there's the network hard guys, they want that CLI access, so you you're accommodating that. And then as well, being able to bring those SecOps view and the NetOps view together is important because let's face it. A lot of organizations, especially some of the smaller ones, they don't actually have a full blown SecOps team, that's really the NetOps responsibility. And so that's nice flexibility. You can handle both worlds. How about segmentation? When a customer is telling you that they want regarding segmentation and how are you guys approaching that? >> Yeah, I mean, it's actually a key feature of what we're doing in this area. Now the land segmentation generates it's kind of a wide area with many layers to it and we could talk about it for hours. So let me talk briefly about some of the areas we're going into when it comes to the segmentation, particularly the compute-virtual type environment. So when you, you're typically creating policies in today's world, current policies based on addresses, IP addresses, or Mac addresses. You have lots of rules and big lists of addresses. It's really annoying. Customers generally don't talk in addresses. They talk in machines and names of machines. So if you think about what I've already told you with a fabric composer. We've already got these hooks in the compute hypervisor layer. So what do we know about the virtual machines? So it's undoubtedly a natural extension now for you to be able to create these policies based on the machines. So there's a scale problem in policy distribution, at two levels, at the top and the bottom. The top level is your chronic create the policy. You've got this massive distribution addresses. So fabric composer can really help you by allowing you to then create these groups, sensible groups, using the names. Then you can distribute the 10 K solution with the distributed architecture of the bottom layer, now allows us to distribute these policies and rules across your racks within your data center. So it scales really well, but that's one level I've described. You know, you're creating groups of machines with names, so it's easier to define it, but there's also an automation angle to this as well. You might not want to even create it interactively. A lot of customers with VMware Vcenter for example, are tagging the virtual machines. So the tag tells you a group information. Again, fabric composer can already get the tag within its database model. So we can use the tag now either to fully automate or use as a hint to creating these groups. So now I've got a really simple way to basically just categorize my machines into the groups so that now I can push rules down onto the, and there's one, final thing that I just want to tell you before we move on, There's often a zero trust model you want to do in the data center for segmentation, meaning I've got two virtual machines on the same network on the same host. Normally they can talk to each other, nothing's stopping them, but sometimes you want to isolate even those two. You can do it in products like V-Center with PV land technologies. A bit cumbersome to configure on the VSphere side, you've got to match it with what you see on the switch side. It's one of those, that's a real headache, unless you've got an orchestrator to do it. So fabric composer could basically orchestrate this isolated solution. You're now grouping the machines and you're saying they're isolated. We can do the smarts and both of the center side and the switch side, get them in sync, get it all configured. And now the masses can start to do this kind of segmentation at scale. >> Got it. Thank you Simon. Can the fabric composer kind of be used as the primary prism for troubleshooting? How do you handle troubleshooting and this art combined architecture? Who, who do I call when there's a problem? How do you approach that? >> Well, definitely start by calling me or actually call my product first, so fabric composer. If you're using it, use that as the front tool for what you're going to try and figure out what's going on. There is a global health dashboard. It encompasses networking security policy across the solution, across the fabric. So that's your tells you what's going on immediately, down to port stats on what's happening within the physical topology of the network down to the end to end view, we have in terms of policy connectivity between machines. So fabric composer is your first port of call, but we built a solution here that we don't want to hide the pieces underneath it. Any networking guy knows when they're deep troubleshooting networking stuff, they're going to end up at the switch. So you started the orchestrator, but sometimes in the deep troubleshooting, not day-to-day hopefully, you'll go to the switch and you'll troubleshoot that way. We've got the same technology here with the policy, with the firewall rules, with Pensando PSM, we still fully embrace. For deep troubleshooting, go to Pensando PSM. They have really advanced tools in their bag of tricks in the product to give you advanced troubleshooting down to the policy layer that they have a really powerful firewall log capability, where you can search and sort and see exactly what role is allowing or stopping any traffic going through the environment. And the two orchestrated model, we really like it because it scales really well. It allows fabric composer to remain lightweight, PSM focused on the policy orchestration bit. But again, if you're the customer that wants to do single pane of glass, use fabric composer for the standard day-to-day stuff. But you've got the tools there to do the advanced troubleshooting between the different elements that we have within the Pensando and the Aruber tools. >> Yeah, really well thought out, you get the simplification angle nailed, the integration automation we talked about that, the visualization and a topology map, zero trust, and then remediation with deepened spend inspection. Simon, thanks so much for taking us through the announcements, really appreciate your insights and time today. >> Thank you very much. >> You're welcome. Okay. Keep it right there. This is Dave Vellante for theCUBE. More content from the HPE Aruba Pensando announcements, coming right up. (soft music)
SUMMARY :
coverage of the power of N and for having me today. about the Aruba switching fabric So it really takes away a lot of the How are you thinking about embedded into the 10 K. What about the sort of and the policy you could use that's really the NetOps responsibility. So the tag tells you a group information. Can the fabric composer kind the product to give you advanced the visualization and a More content from the HPE
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Simon | PERSON | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
Simon McCormack | PERSON | 0.99+ |
Pensando | ORGANIZATION | 0.99+ |
two companies | QUANTITY | 0.99+ |
two tools | QUANTITY | 0.99+ |
Aruba | ORGANIZATION | 0.99+ |
HPE Aruba | ORGANIZATION | 0.99+ |
both | QUANTITY | 0.99+ |
AFC | ORGANIZATION | 0.99+ |
three things | QUANTITY | 0.99+ |
first port | QUANTITY | 0.99+ |
two | QUANTITY | 0.98+ |
today | DATE | 0.98+ |
Mac | COMMERCIAL_ITEM | 0.97+ |
one level | QUANTITY | 0.96+ |
two levels | QUANTITY | 0.96+ |
both worlds | QUANTITY | 0.96+ |
Aruber | ORGANIZATION | 0.95+ |
single policy | QUANTITY | 0.95+ |
Aruba | LOCATION | 0.95+ |
two way | QUANTITY | 0.94+ |
10 K | QUANTITY | 0.94+ |
First | QUANTITY | 0.94+ |
one final thing | QUANTITY | 0.94+ |
single pane | QUANTITY | 0.94+ |
VSphere | TITLE | 0.94+ |
one | QUANTITY | 0.93+ |
zero trust | QUANTITY | 0.93+ |
Pensando PSM | ORGANIZATION | 0.92+ |
NetOps | ORGANIZATION | 0.91+ |
two virtual machines | QUANTITY | 0.9+ |
three key ones | QUANTITY | 0.9+ |
VMware Vcenter | TITLE | 0.88+ |
first | QUANTITY | 0.83+ |
one single pane of | QUANTITY | 0.82+ |
Greenfield | LOCATION | 0.8+ |
V-Center | TITLE | 0.8+ |
V-Center | ORGANIZATION | 0.78+ |
hours | QUANTITY | 0.78+ |
Number two | QUANTITY | 0.77+ |
two orchestrated model | QUANTITY | 0.75+ |
SecOps | OTHER | 0.74+ |
HPE Aruba | ORGANIZATION | 0.73+ |
three | QUANTITY | 0.64+ |
Pensando | LOCATION | 0.58+ |
SecOps | ORGANIZATION | 0.55+ |
10 K. | QUANTITY | 0.55+ |
Rube Leaf | ORGANIZATION | 0.54+ |
Ansible | ORGANIZATION | 0.48+ |
Persando | ORGANIZATION | 0.47+ |
Leaf | ORGANIZATION | 0.42+ |
NetOps | TITLE | 0.33+ |
Phil Bullinger, Infinidat & Lee Caswell, VMware | CUBE Conversation, March 2021
>>10 years ago, a group of industry storage veterans formed a company called Infinidat. The DNA of the company was steeped in the heritage of its founder, Moshe Yanai, who had a reputation for relentlessly innovating on three main areas, the highest performance, rock solid availability, and the lowest possible cost. Now these elements have historically represented the superpower triumvirate of a successful storage platform. Now, as Infinidat evolved, landed on a fourth vector, that has been a key differentiator and its value proposition, and that is petabyte scale. Hello everyone. And welcome to this Qube conversation. My name is Dave Vellante and I'm pleased to welcome in two longtime friends of theCube. Phil Bullinger is newly minted CEO of Infinidat and of course, Lee Caswell, VMware's VP of Marketing for the cloud platform business unit. Gents, welcome. >>Great to be here. Always good to see you guys. Phil, so you're joining at the 10 year anniversary mark. Congratulations on the appointment. What attracted you to the company? >>You know I spent a long time in my career at enterprise storage and, and enjoying many of the opportunities, you know, through a number of companies. Last fall when I became aware of the Infinidat opportunity and it immediately captured my attention because of frankly my respect for the product through several opportunities I've had with enterprise customers in selling cycles of different products, if they happened to be customers of Infinidat, , they were not bashful about talking about their satisfaction with the product, their level of delight with it. And so I think from, from the sidelines, I've always had a lot of respect for the Infinidat platform, the implementation of the product quality and reliability that it's kind of legendary for. And so when the opportunity came along, it really captured my interest in of course behind a great product is almost always a great team. >>And as I got to know the company and the board, and, you know, some of the leaders, and learned about the momentum and the business, it was just a very, very compelling opportunity for me. And I'll have to say just, you know, 60 days into the job. Everything I hoped for is here, not only a warm welcome to the company, but an exciting opportunity with respect to where Infinidat is at today with the growth of the business. The company has achieved a level of consistent growth through 2020, cashflow positive, EBITDA positive. And now it's a matter of scaling, scaling the business and it's something that I have had success with several times in my career and really, really enjoying the opportunity here at Infinidat to do that. >>That's great. Thanks for that. Now, of course, Lee, VMware was founded nearly a quarter century ago and carved out a major piece of the enterprise pie and predominantly that's been on prem, but the data center's evolving the cloud is evolving, and this universe is expanding. How do you see the future of that on-prem data center? >>No, I think Satya recently said, right, that, that we've reached max consolidation almost right. You pointed that out earlier. I thought that was really interesting, right. You know, we believe in the distributed hybrid cloud and you know, the reasons for that actually turn out to be storage led in there and in, in the real thinking about it, because we're going to have distributed environments and, you know, one of the things that we're doing with Infinidat here today, right, is we're showing how customers can invest intelligently and responsibly on prem and have bridges in across the hybrid cloud. We do that through something called the VMware Cloud Foundation. That's a full stack offering that, uh, an interesting here, right? It started off with a HCI element, but it's expanded into storage and storage at scale, you know, because storage is going to exist... We have very powerful storage value propositions, and you're seeing customers go and deploy both. We're really excited about seeing Infinidat lean into the VMware Cloud Foundation and vVols actually as a way to match the pace of change in today's application world. >>These trends, I mean, building bridges is what we called it. And so that takes a lot of hard work, especially when you're doing from on-prem into hybrid, across clouds, eventually the edge, you know, that's a, that's a non-trivial task. How do you see this playing out in market trends? >>Yeah. You know, we're, we're in the middle of this every day as, as you know, Dave, uh, and certainly Lee, uh, data center architectures ebb and flow from centralized to decentralized, but clearly data locality, I think, is driving a lot of the growth of the distributed data center architecture, the edge data centers, but core is still very significant for, for most enterprise. Uh, and it's, it's, it has, it has a lot to do with the fact that most enterprises want to own their own cloud. You know, when a Fortune 15 or a Fortune 50 or Fortune 100 customer, when they talk about their cloud, they don't want to talk about, you know, the AWS cloud or the GCP cloud or the Azure cloud. They want to talk about their cloud. And almost always, these are hybrid architectures with a large on-prem or colo footprint. >>Uh, the reason for that number of reasons, right? Data sovereignty is a big deal, uh, among the highest priorities for enterprise today. The control of the security, the, the ability to recover quickly from ransomware attacks, et cetera. These, these are the things that are just fundamentally important, uh, to the business continuity and enterprise risk management plan for these companies. But I think one thing that has changed the on prem data center is the fact that it's the core operating characteristics have to take on kind of that public cloud characteristic. It has to be a transparent, seamless scalability. I think the days of, of CIO's  you know, even tolerating people showing up in their data centers with, with disk trays under their arms to add capacity is, is over. Um, they want to seamlessly add capacity. They want nonstop operation, a hundred percent uptime is the bar. >>Now it has to be a consolidation. Massive consolidation is clearly the play for TCO and efficiency. They don't want to have any compromises between scale and availability and performance. You know, the, the very characteristics that you talked about upfront, Dave, that make Infinidat unique, I think are fundamentally the characteristics that enterprises are looking for when they build their cloud on prem. Uh, I, I think our architecture also really does provide a, a set it and forget it, uh, kind of experience. Um, when we install a new Infinidat frame in an enterprise data center, our intentions are we're, we're not going to come back. We don't intend to come back, uh, to, to help fiddle with the bits or, uh, you know, tweak the configuration as applications and, and multitenant users are added. And then of course, flexible economic models. I mean, everybody takes this for granted, but you really, really do have to be completely flexible between the two rails, the CapEx rail and the OpEx rail and every, uh, every step in between. And importantly, when a customer, when an enterprise customer needs to add capacity, they don't have a sales conversation. They just want to have it right. They're already running in their data center. And that's the experience that we provide. >>Yeah. You guys are aligned in that vision, that layer, that abstracts the complexity from the underlying wherever cloud on prem, et cetera. Right. Let's talk about the VMware and Infinidat relationship. I mean, every, every year at VMworld, up until last year, thank you COVID, Infinidat would host this awesome dinner. You'd have the top customers there. Very nice Vegas steak restaurant. I, of course, I always made a point to stop by not just for the food. I mean, I was able to meet some customers and I've talked to many dozens over the years, Phil, and I can echo that sentiment, but, you know, why is the VMware ecosystem so important to Infinidat? And I guess the question there is, is, is petabyte scale that really that prominent in the VMware customer base? >>It's a, it's a very, very important point. VMware is the longest standing Alliance partner of Infinidat. It goes back to really, almost the foundation of the company, certainly starting with the release one, the very first commercial release of Infinidat VMware and a very tight integration with the VMware was a core part of that. Uh, we, we have a capability. We call the Host PowerTools, which drives a consistent best practices implementation around our, our VMware, uh, integration and, and how it's actually used in the data center. And we built on that through the years through just a deep level of integration. And, um, our customers typically are, are at scale petabyte scale or average deployment as a petabyte and up, um, and over 90% of our customers use VMware. So you would say, I, I think I can safely say we're we serve the VMware environment for some of VMware's largest enterprise footprints, uh, in the market. >>I know it's like children, you got, you love all your partners, but is there anything about Infinidat that, that stands out to you a particular area where, where they shine that from your perspective? >>Yeah, I think so. You know, the, the best partnerships, one are ones that are customer driven. It turns out right. And the idea that we have joint customers at large scale and listen storage is a tough business to get, right, right. It takes time to go and mature to harden a code base. Right. And particularly when you're talking about petabyte scale, right now, you've basically got customers buying in for the largest systems. And what we're seeing overall is customers are trying to do more things with fewer component elements, makes sense, right? And so the scale here is important because it's not just scale in terms of like capacity, right. It's scale in terms of performance as well. And so, as you see customers trying to expand the number of different types of applications, this is one of the things we're seeing, right. Is new applications, which could be container-based Kubernetes orchestrated our Tanzu portfolio helps with that. >>Right. If you see what we're doing with Nvidia, for example, we announced some AI work, right. Uh, this week with vSphere. And so what you're starting to see is like the changing nature of applications and the fast pace of applications is really helping customers save us. And I want to go and find solutions that can meet the majority of my needs. And that's one of the things that we're seeing. And particularly with the vVols integration at scale, that we just haven't seen before, uh, and Infinidat has set the bar and is really setting a new, a new record for that. >>Yeah. Let me, let me comment on that a little bit, Dave, we've been a core part of the VMware Cloud Solutions Lab, which is a very, very exciting engaging, investment that VMware has made. A lot of people have contributed to in the industry, but in the, in the VMware Cloud Solutions Lab, we recently demonstrated on a single Infinidat frame over 200,000 vVols on a single system. And I think that not only edges up the bar, I think it completely redefines what, what scale means when you're talking about a vVols implementation. >>So not to geek out here, but vVols, they're kind of a game changer because instead of admins, having to manually allocate storage to performance tiers. An array, that is VASA certified, VASA is VMware, or actually vStorage API for, for storage awareness, VASA, anyway, with vVols, you can dynamically provision storage that matches the way I say it as a match as device attributes to the data and the application requirements of the VM. So Phil, it seems like so much in VMware land hearkens back to the way mainframes used to solve problems in a modern way. Right. And vVols is a real breakthrough in that regard in terms of storage. So, so how do you guys see it? I, I presume you're, you're sort of vVols certified based on what you just said in the lab. >>Yeah. We recently announced our vVols release and we're not the first to market with the vVols, but from, from the start of the engineering project, we wanted to do it. We wanted to do it the way we think. We think at scale in everything we do, and our customers were very prescriptive about the kind of scale and performance and availability that they wanted to experience in vVols. And we're now seeing quite a bit of customer interest with traction in it. Uh, as I said, we, we redefined the bar for vVols scalability. We support on a single array now, um, a thousand storage containers. Uh, and I think most of our competition is like at one or maybe 10 or 13 or something like that. So, uh, our customers are, again at scale, they said, if you're going to do vVols, we want it... We want it at scale. We want it to embody the characteristics of your, of your platform. We really liked vVols because it, it helps, it helps separate kind of the roles and responsibilities between the VI administrator and the storage system administrator. If you're going to put a majority of your most critical bits on Infinidat in your data center, you're going to want to, you're going to want to have control over how that resource is used, but yet the vVols mplementation and the tools that we provide with that deep level of integration, give the VI, the VI administrator, all of the flexibility they need to manage applications. And vVols of course gives the VI administrator the native use of our snapshot technology. And so it makes it incredibly easy for them to administrate the platform without having to worry about the physical infrastructure, but yet the people worried about the physical infrastructure still have control over that resource. So it's, it's a game changer as far as we're concerned. >>Yeah. Storage has come a long way. Hasn't it, Lee? I'm wondering if you could add some color here, it seems in talking to ... Uh, so that's interesting. You've had, you had a hand in the growth of vSAN and it was very successful product, but he chose Infinidat for that higher end application. It seems like vVols are a key innovation in that regard. How's the vVols uptake going from your perspective. >>Yeah, I think we you know, we're in the second phase of vVols adoption, right? First phase was, Hey, technically interesting, intriguing. Um, but adoption was relatively low, I think because, you know, up until five years ago, um, applications, weren't actually changing that fast. I mean, think about it, right? The applications, ERP systems, CRM systems, you weren't changing those at the pace of what we're doing today. Now what's happening is every business is a software business. Every business, when you work, when you interact with your healthcare provider right now, it's about the apps. Like, can you go and get your schedules online? Can you email your doctors? Right? Can you go and get your labs? Right? The pace of new application development, we have some data showing that there will be more apps developed in the next five years, and then the past 40 years of computing combined. >>And so when you think about that, what's changed now is trying to manage that all from the kind of storage hardware side was just actually getting in the way you want to organize around the fastest beat rate in your infrastructure today. That's the application. So what vVols has helped you do is it allows the vSphere administrator, who's managing VMs and looking at the apps and the changing pace, and be able to basically select storage attributes, including QoS, capacity, IOPS, and do that from the vCenter console, and then be able to rectify things and manage them right from the console right next to the apps. And that provides a really integrated way. So when you have a close interaction, like what we're talking about today, or, you know, integration, um, that the Infinidat has provided now, you've got this ability to have a faster moving activity. And, you know, consolidation is one of the themes you've heard from time to time from VMware, we're consolidating the management so that the vSphere administrator can now go and manage more things. What traditional VMs yes. VMs across HCI. Sure. Plus now, plus storage and into the hybrid cloud and into like containers. It's that consolidated management, which is getting us speed and basically a consumer like experience for infrastructure deployments. >>Yeah. Now Phil mentioned the solutions lab. We've got a huge ecosystem. Several years ago, you launched this, this via the VMware. I think it's called the VMware Cloud Solutions Lab is the official name. What, explain what it does for collaboration and joint solutions development. And then Phil, I want you to go into more detail about what your participation is, but Lee, why don't you explain it? >>Yeah. You know, we don't take just any products that, because listen, there's a mixing. What we take is things that really expand that innovation frontier. And that's what we saw with Infinidat was expanding the frontier on like large capacity for many, many different mixed workloads and a commitment, right. To go and bring in, not just vVols support, of course, all the things we do for just a normal interaction with vSphere. But, uh, bringing vVols in was certainly important in showing how we operate at scale. And then importantly, as we expanded the VCF, VMware Cloud Foundation, to include storagee systems for a customer, for example, right, who has storage and HCI, right? And it looks for how to go and use them. And that's an individual choice at a customer level. We think this is strategically important. Now, as we expand a multicloud experience, that's different from the hyperscalers. Hyperscalers are coming in with two kind of issues, maybe, right? So one is it's single cloud. And the other one is there's a potential competitive aspect or from some right around the ongoing, underlying business and a hyperscaler business model. And so what VMware uniquely is doing is extending a common control plane across storage systems and HCI, and doing that in a way that basically gives customers choice. And we love that the cloud lab is really designed to go and make that a reality for customers strip out perceived and real risk. >>Yeah. To Lee's point of, it's not like there's not dozens and dozens and dozens of logos on the slide for the lab. I think there's like, you know, 10 or 12 from what I saw and Infinidat is one of them. Maybe you could talk a little bit more about your participation in the program and what it does for customers. >>Yeah, absolutely. And I would agree it's I, we liked the lab because it's not just supposed to be one of everything eye candy it's a purpose-built lab to do real things. And we like it because we can really explore, you know, some of the most contemporary, workloads in that environment, as well as solutions to what I considered some of the most contemporary industry problems. We're participating in a couple of ways. I believe we're the only petabyte scale storage solution in the Cloud Solutions Lab at VMware. One of the projects we're working on with VMware is their machine learning platform. That's one of the first cloud solutions lab projects that we worked on at Infinidat. And we're also a core part of, of what VMware is driving from a data for good initiative. This was inspired by the idea that that tech can be used as a force for good in the world. And right now it's focused on the technology needs of nonprofits. And so we're closely working in, in the cloud solutions lab with, the VMware cloud foundation layers, as well as, their Tanzu and Kubernetes environments and learning a lot and proving a lot. And it's also a great way to demonstrate the capabilities of our platform. >>Yeah. So, yeah, it was just the other day I was on the VMware analyst meeting virtually of course in Zane and Sanjay and a number of other execs were giving the update. And, and just to sort of emphasize what we've been talking about here, this expansion of on-prem the cloud experience, the data from, especially from our survey data, we have a partner UTR that did great surveys on a regular quarterly basis, the VMware cloud on AWS, doing great for sure, but the VMware Cloud Foundation, the on-prem cloud, the hybrid cloud is really exploding and resonating with customers. And that's a good example of this sort of equilibrium that we're seeing between the public and private coming together >>Well on the VMware Cloud Foundation right now with, uh, you know, over a thousand customers, but importantly over 400 of the global 2000, it's the largest customers. And that's actually where the Venn diagram between the work that VMware Cloud Foundation is doing and Infinidat right, you know, this large scale, actually the, you know, interesting crossover, right. And, you know, listen for customers to go and take on a new store system. We always know that it's a high bar, right. So they have to see some really unique value, like how is this going to help? Right. And today that value is I want to spend less time looking down at the storage and more time looking up at the apps, that's how we're working together. Right. And how vVols fits into that, you know, with the VMware Cloud Foundation, it's the hype that hybrid cloud offering really gives customers that future-proofing right. And the degrees of freedom they're most likely to exercise. >>Right. Well, let's close with a, kind of a glimpse of the future. What do you see as the future of the data center specifically, and also your, your collaborations Lee? Why don't you start? >>I think what we hope to be true is turning out to be true. So, you know, if you've looked at the, you know, what's happening in the cloud, not everything is migrating in the cloud, but the public cloud, for example, and I'm talking about public cloud there. The public cloud offers some really interesting, unique value and VMware is doing really interesting things about like DR as a service and other things, right? So we're helping customers tap into that at the same time. Right. We're seeing that the on-prem investment is not stalling at all because of data sovereignty because of bandwidth limitations. Right. And because of really the economics of what it means to rent versus buy. And so, you know, partnering with  leaders on, in storage, right, is a core part of our strategy going forward. And we're looking forward to doing more right with Infinidat, as we see VCF evolve, as we see new applications, including container based applications running on our platform, lots of futures, right. As the pace of application change, you know, doesn't slow down. >>So what do you see for the next 10 years for Infinidat? >>Yeah, well, um, we, I appreciated your introduction because of this speak to sort of the core characteristics of Infinidat. And I think a company like us and at our, at our juncture of evolution, it's important to know exactly who you are. And we clearly are focused in that on-prem hybrid data center environment. We want to be the storage tier that companies use to build their clouds. And, uh, the partnership with VMware, uh, we talked about the Venn diagram. I think it just could not be more complimentary. And so we're certainly going to continue to focus on VMware as our largest and most consequential Alliance partner for our business going forward. Um, I'm excited about, about the data center landscape going forward. I think it's going to continue to ebb and flow. We'll see growth in distributed architectures. We'll see growth at the edge in the core data center. >>I think the, the old, the old days where customers would buy a storage system for a application environment, um, those days are over, it's all about consolidating multiple apps and thousands of users on a single platform. And to do that, you have to be really good at, uh, at a lot of things that we are very good at. Our, our strategy going forward is to evolve as media evolves, but never stray far from what has made Infinidat unique and special and highly differentiated in the marketplace. I think the work that VMware is doing and in Kubernetes >>Is very exciting. We're starting to see that really pick up in our business as well. So as we think about, um, uh, you know, not only staying relevant, but keeping very contemporary with application workloads, you know, we have some very small amount of customers that still do some bare metal, but predominantly as I said, 90% or above is VMware infrastructure. Uh, but we also see, uh, Kubernetes, our CSI driver works well with the VMware suite above it. Uh, so that, that complimentary relationship we see extending forward as, as the application environment evolves. Great, thank you. You know, many years ago when I attended my first, uh, VMworld, the practitioners that were there, you talked to them, half the conversations, they were complaining about storage and how it was so complicated and you needed guys in lab coats to solve problems. And, you know, VMware really has done a great job, publishing the APIs and encouraging the ecosystem. And so if you're a practitioner you're interested in how vVols and Infinidat and VMware were kind of raising the bar and on petabyte scale, there's some good blogs out there. Check out the Virtual Blocks blog for more information, guys. Thanks so much great to have you in the program. Really appreciate it. Thanks so much. Thank you for watching this Cube conversation, Dave Vellante. We'll see you next time.
SUMMARY :
and of course, Lee Caswell, VMware's VP of Marketing for the cloud platform business unit. Always good to see you guys. and enjoying many of the opportunities, you know, through a number of companies. And as I got to know the company and the board, and, you know, some of the leaders, but the data center's evolving the cloud is evolving, and this universe is expanding. You know, we believe in the distributed hybrid cloud and you know, the reasons for that actually turn out to eventually the edge, you know, that's a, that's a non-trivial task. they don't want to talk about, you know, the AWS cloud or the GCP cloud or the Azure cloud. The control of the security, the, the ability to recover And that's the experience that we provide. And I guess the question there is, is, is petabyte scale that really that prominent We call the Host PowerTools, which drives a consistent best practices implementation around our, And the idea that we have joint customers at large scale and listen storage is a tough business to get, And that's one of the things that we're seeing. And I think that not only edges up the bar, and the application requirements of the VM. mplementation and the tools that we provide with that deep level of integration, in the growth of vSAN and it was very successful product, but he chose Infinidat for that higher end Yeah, I think we you know, we're in the second phase of vVols adoption, right? the kind of storage hardware side was just actually getting in the way you want to organize And then Phil, I want you to go into more detail about what your participation is, but Lee, And the other one is there's a potential competitive aspect or from some right around the I think there's like, you know, 10 or 12 from what I saw and And we like it because we can really explore, you know, some of the most contemporary, the VMware cloud on AWS, doing great for sure, but the VMware Cloud Foundation, Well on the VMware Cloud Foundation right now with, uh, you know, over a thousand customers, And the degrees of freedom they're most likely to exercise. as the future of the data center specifically, and also your, your collaborations Lee? So, you know, As the pace of application change, you know, at our juncture of evolution, it's important to know exactly who you are. And to do that, you have to be really good at, Thanks so much great to have you in the program.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Dave Vellante | PERSON | 0.99+ |
Lee Caswell | PERSON | 0.99+ |
Phil Bullinger | PERSON | 0.99+ |
Phil | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
Infinidat | ORGANIZATION | 0.99+ |
Lee | PERSON | 0.99+ |
VMware Cloud Foundation | ORGANIZATION | 0.99+ |
Nvidia | ORGANIZATION | 0.99+ |
VMware Cloud Foundation | ORGANIZATION | 0.99+ |
VMware Cloud Solutions Lab | ORGANIZATION | 0.99+ |
March 2021 | DATE | 0.99+ |
Moshe Yanai | PERSON | 0.99+ |
VMware | ORGANIZATION | 0.99+ |
VMware Cloud Solutions Lab | ORGANIZATION | 0.99+ |
90% | QUANTITY | 0.99+ |
60 days | QUANTITY | 0.99+ |
First phase | QUANTITY | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
2020 | DATE | 0.99+ |
two rails | QUANTITY | 0.99+ |
first | QUANTITY | 0.99+ |
One | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
vSphere | TITLE | 0.99+ |
10 | QUANTITY | 0.99+ |
second phase | QUANTITY | 0.99+ |
UTR | ORGANIZATION | 0.99+ |
fourth vector | QUANTITY | 0.98+ |
VCF | ORGANIZATION | 0.98+ |
today | DATE | 0.98+ |
three main areas | QUANTITY | 0.98+ |
two kind | QUANTITY | 0.98+ |
single | QUANTITY | 0.98+ |
one | QUANTITY | 0.98+ |
this week | DATE | 0.98+ |
VMware | TITLE | 0.98+ |
Vegas | LOCATION | 0.98+ |
over 90% | QUANTITY | 0.98+ |
Last fall | DATE | 0.98+ |
both | QUANTITY | 0.97+ |
13 | QUANTITY | 0.97+ |
over a thousand customers | QUANTITY | 0.97+ |
Eric Herzog, IBM & Sam Werner, IBM | CUBE Conversation, October 2020
(upbeat music) >> Announcer: From theCUBE Studios in Palo Alto and Boston, connecting with thought leaders all around the world. This is a CUBE conversation. >> Hey, welcome back everybody. Jeff Frick here with the CUBE, coming to you from our Palo Alto studios today for a CUBE conversation. we've got a couple of a CUBE alumni veterans who've been on a lot of times. They've got some exciting announcements to tell us today, so we're excited to jump into it, So let's go. First we're joined by Eric Herzog. He's the CMO and VP worldwide storage channels for IBM Storage, made his time on theCUBE Eric, great to see you. >> Great, thanks very much for having us today. >> Jeff: Absolutely. And joining him, I think all the way from North Carolina, Sam Werner, the VP of, and offering manager business line executive storage for IBM. Sam, great to see you as well. >> Great to be here, thank you. >> Absolutely. So let's jump into it. So Sam you're in North Carolina, I think that's where the Red Hat people are. You guys have Red Hat, a lot of conversations about containers, containers are going nuts. We know containers are going nuts and it was Docker and then Kubernetes. And really a lot of traction. Wonder if you can reflect on, on what you see from your point of view and how that impacts what you guys are working on. >> Yeah, you know, it's interesting. We talk, everybody hears about containers constantly. Obviously it's a hot part of digital transformation. What's interesting about it though is most of those initiatives are being driven out of business lines. I spend a lot of time with the people who do infrastructure management, particularly the storage teams, the teams that have to support all of that data in the data center. And they're struggling to be honest with you. These initiatives are coming at them, from application developers and they're being asked to figure out how to deliver the same level of SLAs the same level of performance, governance, security recovery times, availability. And it's a scramble for them to be quite honest they're trying to figure out how to automate their storage. They're trying to figure out how to leverage the investments they've made as they go through a digital transformation and keep in mind, a lot of these initiatives are accelerating right now because of this global pandemic we're living through. I don't know that the strategy's necessarily changed, but there's been an acceleration. So all of a sudden these storage people kind of trying to get up to speed or being thrown right into the mix. So we're working directly with them. You'll see, in some of our announcements, we're helping them, you know, get on that journey and provide the infrastructure their teams need. >> And a lot of this is driven by multicloud and hybrid cloud, which we're seeing, you know, a really aggressive move to before it was kind of this rush to public cloud. And that everybody figured out, "Well maybe public cloud isn't necessarily right for everything." And it's kind of this horses for courses, if you will, with multicloud and hybrid cloud, another kind of complexity thrown into the storage mix that you guys have to deal with. >> Yeah, and that's another big challenge. Now in the early days of cloud, people were lifting and shifting applications trying to get lower capex. And they were also starting to deploy DevOps, in the public cloud in order to improve agility. And what they found is there were a lot of challenges with that, where they thought lifting and shifting an application will lower their capital costs the TCO actually went up significantly. Where they started building new applications in the cloud. They found they were becoming trapped there and they couldn't get the connectivity they needed back into their core applications. So now we're at this point where they're trying to really, transform the rest of it and they're using containers, to modernize the rest of the infrastructure and complete the digital transformation. They want to get into a hybrid cloud environment. What we found is, enterprises get two and a half X more value out of the IT when they use a hybrid multicloud infrastructure model versus an all public cloud model. So what they're trying to figure out is how to piece those different components together. So you need a software-driven storage infrastructure that gives you the flexibility, to deploy in a common way and automate in a common way, both in a public cloud but on premises and give you that flexibility. And that's what we're working on at IBM and with our colleagues at Red Hat. >> So Eric, you've been in the business a long time and you know, it's amazing as it just continues to evolve, continues to evolve this kind of unsexy thing under the covers called storage, which is so foundational. And now as data has become, you know, maybe a liability 'cause I have to buy a bunch of storage. Now it is the core asset of the company. And in fact a lot of valuations on a lot of companies is based on its value, that's data and what they can do. So clearly you've got a couple of aces in the hole you always do. So tell us what you guys are up to at IBM to take advantage of the opportunity. >> Well, what we're doing is we are launching, a number of solutions for various workloads and applications built with a strong container element. For example, a number of solutions about modern data protection cyber resiliency. In fact, we announced last year almost a year ago actually it's only a year ago last week, Sam and I were on stage, and one of our developers did a demo of us protecting data in a container environment. So now we're extending that beyond what we showed a year ago. We have other solutions that involve what we do with AI big data and analytic applications, that are in a container environment. What if I told you, instead of having to replicate and duplicate and have another set of storage right with the OpenShift Container configuration, that you could connect to an existing external exabyte class data lake. So that not only could your container apps get to it, but the existing apps, whether they'll be bare-metal or virtualized, all of them could get to the same data lake. Wow, that's a concept saving time, saving money. One pool of storage that'll work for all those environments. And now that containers are being deployed in production, that's something we're announcing as well. So we've got a lot of announcements today across the board. Most of which are container and some of which are not, for example, LTO-9, the latest high performance and high capacity tape. We're announcing some solutions around there. But the bulk of what we're announcing today, is really on what IBM is doing to continue to be the leader in container storage support. >> And it's great, 'cause you talked about a couple of very specific applications that we hear about all the time. One obviously on the big data and analytics side, you know, as that continues to do, to kind of chase history of honor of ultimately getting the right information to the right people at the right time so they can make the right decision. And the other piece you talked about was business continuity and data replication, and to bring people back. And one of the hot topics we've talked to a lot of people about now is kind of this shift in a security threat around ransomware. And the fact that these guys are a little bit more sophisticated and will actually go after your backup before they let you know that they're into your primary storage. So these are two, really important market areas that we could see continue activity, as all the people that we talk to every day. You must be seeing the same thing. >> Absolutely we are indeed. You know, containers are the wave. I'm a native California and I'm coming to you from Silicon Valley and you don't fight the wave, you ride it. So at IBM we're doing that. We've been the leader in container storage. We, as you know, way back when we invented the hard drive, which is the foundation of almost this entire storage industry and we were responsible for that. So we're making sure that as container is the coming wave that we are riding that in and doing the right things for our customers, for our channel partners that support those customers, whether they be existing customers, and obviously, with this move to containers, is going to be some people searching for probably a new vendor. And that's something that's going to go right into our wheelhouse because of the things we're doing. And some of our capabilities, for example, with our FlashSystems, with our Spectrum Virtualize, we're actually going to be able to support CSI snapshots not only for IBM Storage, but our Spectrum Virtualize products supports over 500 different arrays, most of which aren't ours. So if you got that old EMC VNX2 or that HPE, 3PAR or aNimble or all kinds of other storage, if you need CSI snapshot support, you can get it from IBM, with our Spectrum Virtualize software that runs on our FlashSystems, which of course cuts capex and opex, in a heterogeneous environment, but gives them that advanced container support that they don't get, because they're on older product from, you know, another vendor. We're making sure that we can pull our storage and even our competitor storage into the world of containers and do it in the right way for the end user. >> That's great. Sam, I want to go back to you and talk about the relationship with the Red Hat. I think it was about a year ago, I don't have my notes in front of me, when IBM purchased Red Hat. Clearly you guys have been working very closely together. What does that mean for you? You've been in the business for a long time. You've been at IBM for a long time, to have a partner you know, kind of embed with you, with Red Hat and bringing some of their capabilities into your portfolio. >> It's been an incredible experience, and I always say my friends at Red Hat because we spend so much time together. We're looking at now, leveraging a community that's really on the front edge of this movement to containers. They bring that, along with their experience around storage and containers, along with the years and years of enterprise class storage delivery that we have in the IBM Storage portfolio. And we're bringing those pieces together. And this is a case of truly one plus one equals three. And you know, an example you'll see in this announcement is the integration of our data protection portfolio with their container native storage. We allow you to in any environment, take a snapshot of that data. You know, this move towards modern data protection is all about a movement to doing data protection in a different way which is about leveraging snapshots, taking instant copies of data that are application aware, allowing you to reuse and mount that data for different purposes, be able to protect yourself from ransomware. Our data protection portfolio has industry leading ransomware protection and detection in it. So we'll actually detect it before it becomes a problem. We're taking that, industry leading data protection software and we are integrating it into Red Hat, Container Native Storage, giving you the ability to solve one of the biggest challenges in this digital transformation which is backing up your data. Now that you're moving towards, stateful containers and persistent storage. So that's one area we're collaborating. We're working on ensuring that our storage arrays, that Eric was talking about, that they integrate tightly with OpenShift and that they also work again with, OpenShift Container Storage, the Cloud Native Storage portfolio from, Red Hat. So we're bringing these pieces together. And on top of that, we're doing some really, interesting things with licensing. We allow you to consume the Red Hat Storage portfolio along with the IBM software-defined Storage portfolio under a single license. And you can deploy the different pieces you need, under one single license. So you get this ultimate investment protection and ability to deploy anywhere. So we're, I think we're adding a lot of value for our customers and helping them on this journey. >> Yeah Eric, I wonder if you could share your perspective on multicloud management. I know that's a big piece of what you guys are behind and it's a big piece of kind of the real world as we've kind of gotten through the hype and now we're into production, and it is a multicloud world and it is, you got to manage this stuff it's all over the place. I wonder if you could speak to kind of how that challenge you know, factors into your design decisions and how you guys are about, you know, kind of the future. >> Well we've done this in a couple of ways in things that are coming out in this launch. First of all, IBM has produced with a container-centric model, what they call the Multicloud Manager. It's the IBM Cloud Pak for multicloud management. That product is designed to manage multiple clouds not just the IBM Cloud, but Amazon, Azure, et cetera. What we've done is taken our Spectrum Protect Plus and we've integrated it into the multicloud manager. So what that means, to save time, to save money and make it easier to use, when the customer is in the multicloud manager, they can actually select Spectrum Protect Plus, launch it and then start to protect data. So that's one thing we've done in this launch. The other thing we've done is integrate the capability of IBM Spectrum Virtualize, running in a FlashSystem to also take the capability of supporting OCP, the OpenShift Container Platform in a Clustered environment. So what we can do there, is on-premise, if there really was an earthquake in Silicon Valley right now, that OpenShift is sitting on a server. The servers just got crushed by the roof when it caved in. So you want to make sure you've got disaster recovery. So what we can do is take that OpenShift Container Platform Cluster, we can support it with our Spectrum Virtualize software running on our FlashSystem, just like we can do heterogeneous storage that's not ours, in this case, we're doing it with Red Hat. And then what we can do is to provide disaster recovery and business continuity to different cloud vendors not just to IBM Cloud, but to several cloud vendors. We can give them the capability of replicating and protecting that Cluster to a cloud configuration. So if there really was an earthquake, they could then go to the cloud, they could recover that Red Hat Cluster, to a different data center and run it on-prem. So we're not only doing the integration with a multicloud manager, which is multicloud-centric allowing ease of use with our Spectrum Protect Plus, but incase of a really tough situation of fire in a data center, earthquake, hurricane, whatever, the Red Hat OpenShift Cluster can be replicated out to a cloud, with our Spectrum Virtualize Software. So in most, in both cases, multicloud examples because in the first one of course the multicloud manager is designed and does support multiple clouds. In the second example, we support multiple clouds where our Spectrum Virtualize for public clouds software so you can take that OpenShift Cluster replicate it and not just deal with one cloud vendor but with several. So showing that multicloud management is important and then leverage that in this launch with a very strong element of container centricity. >> Right >> Yeah, I just want to add, you know, and I'm glad you brought that up Eric, this whole multicloud capability with, the Spectrum Virtualize. And I could see the same for our Spectrum Scale Family, which is our storage infrastructure for AI and big data. We actually, in this announcement have containerized the client making it very simple to deploy in Kubernetes Cluster. But one of the really special things about Spectrum Scale is it's active file management. This allows you to build out a file system not only on-premises for your, Kubernetes Cluster but you can actually extend that to a public cloud and it automatically will extend the file system. If you were to go into a public cloud marketplace which it's available in more than one, you can go in there click deploy, for example, in AWS Marketplace, click deploy it will deploy your Spectrum Scale Cluster. You've now extended your file system from on-prem into the cloud. If you need to access any of that data, you can access it and it will automatically cash you on locally and we'll manage all the file access for you. >> Yeah, it's an interesting kind of paradox between, you know, kind of the complexity of what's going on in the back end, but really trying to deliver simplicity on the front end. Again, this ultimate goal of getting the right data to the right person at the right time. You just had a blog post Eric recently, that you talked about every piece of data isn't equal. And I think it's really highlighted in this conversation we just had about recovery and how you prioritize and how you, you know, think about, your data because you know, the relative value of any particular piece might be highly variable, which should drive the way that you treated in your system. So I wonder if you can speak a little bit, you know, to helping people think about data in the right way. As you know, they both have all their operational data which they've always had, but now they've got all this unstructured data that's coming in like crazy and all data isn't created equal, as you said. And if there is an earthquake or there is a ransomware attack, you need to be smart about what you have available to bring back quickly. And maybe what's not quite so important. >> Well, I think the key thing, let me go to, you know a modern data protection term. These are two very technical terms was, one is the recovery time. How long does it take you to get that data back? And the second one is the recovery point, at what point in time, are you recovering the data from? And the reason those are critical, is when you look at your datasets, whether you replicate, you snap, you do a backup. The key thing you've got to figure out is what is my recovery time? How long is it going to take me? What's my recovery point. Obviously in certain industries you want to recover as rapidly as possible. And you also want to have the absolute most recent data. So then once you know what it takes you to do that, okay from an RPO and an RTO perspective, recovery point objective, recovery time objective. Once you know that, then you need to look at your datasets and look at what does it take to run the company if there really was a fire and your data center was destroyed. So you take a look at those datasets, you see what are the ones that I need to recover first, to keep the company up and rolling. So let's take an example, the sales database or the support database. I would say those are pretty critical to almost any company, whether you'd be a high-tech company, whether you'd be a furniture company, whether you'd be a delivery company. However, there also is probably a database of assets. For example, IBM is a big company. We have buildings all over, well, guess what? We don't lease a chair or a table or a whiteboard. We buy them. Those are physical assets that the company has to pay, you know, do write downs on and all this other stuff, they need to track it. If we close a building, we need to move the desk to another building. Like even if we leasing a building now, the furniture is ours, right? So does an asset database need to be recovered instantaneously? Probably not. So we should focus on another thing. So let's say on a bank. Banks are both online and brick and mortar. I happened to be a Wells Fargo person. So guess what? There's Wells Fargo banks, two of them in the city I'm in, okay? So, the assets of the money, in this case now, I don't think the brick and mortar of the building of Wells Fargo or their desks in there but now you're talking financial assets or their high velocity trading apps. Those things need to be recovered almost instantaneously. And that's what you need to do when you're looking at datasets, is figure out what's critical to the business to keep it up and rolling, what's the next most critical. And you do it in basically the way you would tear anything. What's the most important thing, what's the next most important thing. It doesn't matter how you approach your job, how you used to approach school, what are the classes I have to get an A and what classes can I not get an A and depending on what your major was, all that sort of stuff, you're setting priorities, right? And the dataset, since data is the most critical asset of any company, whether it's a Global Fortune 500 or whether it's Herzog Cigar Store, all of those assets, that data is the most valuable. So you've got to make sure, recover what you need as rapidly as you need it. But you can't recover all of it. You just, there's just no way to do that. So that's why you really ranked the importance of the data to use sameware, with malware and ransomware. If you have a malware or ransomware attack, certain data you need to recover as soon as you can. So if there, for example, as a, in fact there was one Jeff, here in Silicon Valley as well. You've probably read about the University of California San Francisco, ended up having to pay over a million dollars of ransom because some of the data related to COVID research University of California, San Francisco, it was the health care center for the University of California in Northern California. They are working on COVID and guess what? The stuff was held for ransom. They had no choice, but to pay them. And they really did pay, this is around end of June, of this year. So, okay, you don't really want to do that. >> Jeff: Right >> So you need to look at everything from malware and ransomware, the importance of the data. And that's how you figure this stuff out, whether be in a container environment, a traditional environment or virtualized environment. And that's why data protection is so important. And with this launch, not only are we doing the data protection we've been doing for years, but now taking it to the heart of the new wave, which is the wave of containers. >> Yeah, let me add just quickly on that Eric. So think about those different cases you talked about. You're probably going to want for your mission critically. You're going to want snapshots of that data that can be recovered near instantaneously. And then, for some of your data, you might decide you want to store it out in cloud. And with Spectrum Protect, we just announced our ability to now store data out in Google cloud. In addition to, we already supported AWS Azure IBM Cloud, in various on-prem object stores. So we already provided that capability. And then we're in this announcement talking about LTL-9. And you got to also be smart about which data do you need to keep, according to regulation for long periods of time, or is it just important to archive? You're not going to beat the economics nor the safety of storing data out on tape. But like Eric said, if all of your data is out on tape and you have an event, you're not going to be able to restore it quickly enough at least the mission critical things. And so those are the things that need to be in snapshot. And that's one of the main things we're announcing here for Kubernetes environments is the ability to quickly snapshot application aware backups, of your mission critical data in your Kubernetes environments. It can very quickly to be recovered. >> That's good. So I'll give you the last word then we're going to sign off, we are out of time, but I do want to get this in it's 2020, if I didn't ask the COVID question, I would be in big trouble. So, you know, you've all seen the memes and the jokes about really COVID being an accelerant to digital transformation, not necessarily change, but certainly a huge accelerant. I mean, you guys have a, I'm sure a product roadmap that's baked pretty far and advanced, but I wonder if you can speak to, you know, from your perspective, as COVID has accelerated digital transformation you guys are so foundational to executing that, you know, kind of what is it done in terms of what you're seeing with your customers, you know, kind of the demand and how you're seeing this kind of validation as to an accelerant to move to these better types of architectures? Let's start with you Sam. >> Yeah, you know I, and I think i said this, but I mean the strategy really hasn't changed for the enterprises, but of course it is accelerating it. And I see storage teams more quickly getting into trouble, trying to solve some of these challenges. So we're working closely with them. They're looking for more automation. They have less people in the data center on-premises. They're looking to do more automation simplify the management of the environment. We're doing a lot around Ansible to help them with that. We're accelerating our roadmaps around that sort of integration and automation. They're looking for better visibility into their environments. So we've made a lot of investments around our storage insights SaaS platform, that allows them to get complete visibility into their data center and not just in their data center. We also give them visibility to the stores they're deploying in the cloud. So we're making it easier for them to monitor and manage and automate their storage infrastructure. And then of course, if you look at everything we're doing in this announcement, it's about enabling our software and our storage infrastructure to integrate directly into these new Kubernetes, initiatives. That way as this digital transformation accelerates and application developers are demanding more and more Kubernetes capabilities. They're able to deliver the same SLAs and the same level of security and the same level of governance, that their customers expect from them, but in this new world. So that's what we're doing. If you look at our announcement, you'll see that across, across the sets of capabilities that we're delivering here. >> Eric, we'll give you the last word, and then we're going to go to Eric Cigar Shop, as soon as this is over. (laughs) >> So it's clearly all about storage made simple, in a Kubernetes environment, in a container environment, whether it's block storage, file storage, whether it be object storage and IBM's goal is to offer ever increasing sophisticated services for the enterprise at the same time, make it easier and easier to use and to consume. If you go back to the old days, the storage admins manage X amount of gigabytes, maybe terabytes. Now the same admin is managing 10 petabytes of data. So the data explosion is real across all environments, container environments, even old bare-metal. And of course the not quite so new anymore virtualized environments. The admins need to manage that more and more easily and automated point and click. Use AI based automated tiering. For example, we have with our Easy Tier technology, that automatically moves data when it's hot to the fastest tier. And when it's not as hot, it's cool, it pushes down to a slower tier, but it's all automated. You point and you click. Let's take our migration capabilities. We built it into our software. I buy a new array, I need to migrate the data. You point, you click, and we automatic transparent migration in the background on the fly without taking the servers or the storage down. And we always favor the application workload. So if the application workload is heavy at certain times a day, we slow the migration. At night for sake of argument, If it's a company that is not truly 24 by seven, you know, heavily 24 by seven, and at night, it slows down, we accelerate the migration. All about automation. We've done it with Ansible, here in this launch, we've done it with additional integration with other platforms. So our Spectrum Scale for example, can use the OpenShift management framework to configure and to grow our Spectrum Scale or elastic storage system clusters. We've done it, in this case with our Spectrum Protect Plus, as you saw integration into the multicloud manager. So for us, it's storage made simple, incredibly new features all the time, but at the same time we do that, make sure that it's easier and easier to use. And in some cases like with Ansible, not even the real storage people, but God forbid, that DevOps guy messes with a storage and loses that data, wow. So by, if you're using something like Ansible and that Ansible framework, we make sure that essentially the DevOps guy, the test guy, the analytics guy, basically doesn't lose the data and screw up the storage. And that's a big, big issue. So all about storage made simple, in the right way with incredible enterprise features that essentially we make easy and easy to use. We're trying to make everything essentially like your iPhone, that easy to use. That's the goal. And with a lot less storage admins in the world then there has been an incredible storage growth every single year. You'd better make it easy for the same person to manage all that storage. 'Cause it's not shrinking. It is, someone who's sitting at 50 petabytes today, is 150 petabytes the next year and five years from now, they'll be sitting on an exabyte of production data, and they're not going to hire tons of admins. It's going to be the same two or four people that were doing the work. Now they got to manage an exabyte, which is why this storage made simplest is such a strong effort for us with integration, with the Open, with the Kubernetes frameworks or done with OpenShift, heck, even what we used to do in the old days with vCenter Ops from VMware, VASA, VAAI, all those old VMware tools, we made sure tight integration, easy to use, easy to manage, but sophisticated features to go with that. Simplicity is really about how you manage storage. It's not about making your storage dumb. People want smarter and smarter storage. Do you make it smarter, but you make it just easy to use at the same time. >> Right. >> Well, great summary. And I don't think I could do a better job. So I think we'll just leave it right there. So congratulations to both of you and the teams for these announcement after a whole lot of hard work and sweat went in, over the last little while and continued success. And thanks for the, check in, always great to see you. >> Thank you. We love being on theCUBE as always. >> All right, thanks again. All right, he's Eric, he was Sam, I'm I'm Jeff, you're watching theCUBE. We'll see you next time, thanks for watching. (upbeat music)
SUMMARY :
leaders all around the world. coming to you from our Great, thanks very Sam, great to see you as well. on what you see from your point of view the teams that have to that you guys have to deal with. and complete the digital transformation. So tell us what you guys are up to at IBM that you could connect to an existing And the other piece you talked and I'm coming to you to have a partner you know, and ability to deploy anywhere. of what you guys are behind and make it easier to use, And I could see the same for and how you prioritize that the company has to pay, So you need to look at and you have an event, to executing that, you know, of security and the same Eric, we'll give you the last word, And of course the not quite so new anymore So congratulations to both of you We love being on theCUBE as always. We'll see you next time,
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Jeff | PERSON | 0.99+ |
Eric Herzog | PERSON | 0.99+ |
IBM | ORGANIZATION | 0.99+ |
Sam Werner | PERSON | 0.99+ |
Sam | PERSON | 0.99+ |
two | QUANTITY | 0.99+ |
Eric | PERSON | 0.99+ |
Silicon Valley | LOCATION | 0.99+ |
Jeff Frick | PERSON | 0.99+ |
Wells Fargo | ORGANIZATION | 0.99+ |
October 2020 | DATE | 0.99+ |
Wells Fargo | ORGANIZATION | 0.99+ |
Red Hat | ORGANIZATION | 0.99+ |
Boston | LOCATION | 0.99+ |
50 petabytes | QUANTITY | 0.99+ |
10 petabytes | QUANTITY | 0.99+ |
North Carolina | LOCATION | 0.99+ |
Palo Alto | LOCATION | 0.99+ |
last year | DATE | 0.99+ |
150 petabytes | QUANTITY | 0.99+ |
California | LOCATION | 0.99+ |
one | QUANTITY | 0.99+ |
University of California | ORGANIZATION | 0.99+ |
2020 | DATE | 0.99+ |
a year ago | DATE | 0.99+ |
both cases | QUANTITY | 0.99+ |
24 | QUANTITY | 0.99+ |
iPhone | COMMERCIAL_ITEM | 0.99+ |
CUBE | ORGANIZATION | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
next year | DATE | 0.99+ |
three | QUANTITY | 0.99+ |
both | QUANTITY | 0.99+ |
second example | QUANTITY | 0.99+ |
Eric Cigar Shop | ORGANIZATION | 0.99+ |
Herzog Cigar Store | ORGANIZATION | 0.99+ |
OpenShift | TITLE | 0.99+ |
today | DATE | 0.99+ |
DevOps | TITLE | 0.98+ |
over 500 different arrays | QUANTITY | 0.98+ |
end of June | DATE | 0.98+ |
four people | QUANTITY | 0.98+ |
vCenter Ops | TITLE | 0.98+ |
Eric Herzog, IBM | VMworld 2020
>> Announcer: From around the globe, it's theCUBE. With digital coverage of VMworld 2020, brought to you by VMware and its ecosystem partners. >> Welcome back, I'm Stu Miniman. This is theCUBE's coverage of VMworld 2020 of course, happening virtually. And there are certain people that we talk to every year at theCUBE, and this guest, I believe, has been on theCUBE at VMworld more than any others. It's actually not Pat Gelsinger, Eric Herzog. He is the chief marketing officer and vice president of global storage channels at IBM. Eric, Mr. Zoginstor, welcome back to theCUBE, nice to see you. >> Thank you very much, Stu. IBM always enjoys hanging with you, John, and Dave. And again, glad to be here, although not in person this time at VMworld 2020 virtual. Thanks again for having IBM. >> Alright, so, you know, some things are the same, others, very different. Of course, Eric, IBM, a long, long partner of VMware's. Why don't you set up for us a little bit, you know, 2020, the major engagements, what's new with IBM and VMware? >> So, a couple of things, first of all, we have made our Spectrum Virtualize software, software defined block storage work in virtual machines, both in AWS and IBM Cloud. So we started with IBM Cloud and then earlier this year with AWS. So now we have two different cloud platforms where our Spectrum Virtualize software sits in a VM at the cloud provider. The other thing we've done, of course, is V7 support. In fact, I've done several VMUGs. And in fact, my session at VMworld is going to talk about both our support for V7 but also what we're doing with containers, CSI, Kubernetes overall, and how we can support that in a virtual VMware environment, and also we're doing with traditional ESX and VMware configurations as well. And of course, out to the cloud, as I just talked about. >> Yeah, that discussion of hybrid cloud, Eric, is one that we've been hearing from IBM for a long time. And VMware has had that message, but their cloud solutions have really matured. They've got a whole group going deep on cloud native. The Amazon solutions have been something that they've been partnering, making sure that, you know, data protection, it can span between, you know, the traditional data center environment where VMware is so dominant, and the public clouds. You're giving a session on some of those hybrid cloud solutions, so share with us a little bit, you know, where do the visions completely agree? What's some of the differences between what IBM is doing and maybe what people are hearing from VMware? >> Well, first of all, our solutions don't always require VMware to be installed. So for example, if you're doing it in a container environment, for example, with Red Hat OpenShift, that works slightly different. Not that you can't run Red Hat products inside of a virtual machine, which you can, but in this case, I'm talking Red Hat native. We also of course do VMware native and support what VMware has announced with their Kubernetes based solutions that they've been talking about since VMworld last year, obviously when Pat made some big announcements onstage about what they were doing in the container space. So we've been following that along as well. So from that perspective, we have agreement on a virtual machine perspective and of course, what VMware is doing with the container space. But then also a slightly different one when we're doing Red Hat OpenShift as a native configuration, without having a virtual machine involved in that configuration. So those are both the commonalities and the differences that we're doing with VMware in a hybrid cloud configuration. >> Yeah. Eric, you and I both have some of those scars from making sure that storage works in a virtual environment. It took us about a decade to get things to really work at the VM level. Containers, it's been about five years, it feels like we've made faster progress to make sure that we can have stateful environments, we can tie up with storage, but give us a little bit of a look back as to what we've learned and how we've made sure that containerized, Kubernetes environments, you know, work well with storage for customers today. >> Well, I think there's a couple of things. First of all, I think all the storage vendors learn from VMware. And then the expansion of virtual environments beyond VMware to other virtual environments as well. So I think all the storage vendors, including IBM learned through that process, okay, when the next thing comes, which of course in this case happens to be containers, both in a VMware environment, but in an open environment with the Kubernetes management framework, that you need to be able to support it. So for example, we have done several different things. We support persistent volumes in file block and object store. And we started with that almost three years ago on the block side, then we added the file side and now the object storage side. We also can back up data that's in those containers, which is an important feature, right? I am sitting there and I've got data now and persistent volume, but I got to back it up as well. So we've announced support for container based backup either with Red Hat OpenShift or in a generic Kubernetes environment, because we're realistic at IBM. We know that you have to exist in the software infrastructure milieu, and that includes VMware and competitors of VMware. It includes Red Hat OpenShift, but also competitors to Red Hat. And we've made sure that we support whatever the end user needs. So if they're going with Red Hat, great. If they're going with a generic container environment, great. If they're going to use VMware's container solutions, great. And on the virtualization engines, the same thing. We started with VMware, but also have added other virtualization engines. So you think the storage community as a whole and IBM in particular has learned, we need to be ready day one. And like I said, three years ago, we already had persistent volume support for block store. It's still the dominant storage and we had that three years ago. So for us, that would be really, I guess, two years from what you've talked about when containers started to take off. And within two years we had something going that was working at the end user level. Our sales team could sell our business partners. As you know, many of the business partners are really rallying around containers, whether it be Red Hat or in what I'll call a more generic environment as well. They're seeing the forest through the trees. I do think when you look at it from an end user perspective, though, you're going to see all three. So, particularly in the Global Fortune 1000, you're going to see Red Hat environments, generic Kubernetes environments, VMware environments, just like you often see in some instances, heterogeneous virtualization environments, and you're still going to see bare metal. So I think it's going to vary by application workload and use case. And I think all, I'd say midsize enterprise up, let's say, $5 billion company and up, probably will have at least two, if not all three of those environments, container, virtual machine, and bare metal. So we need to make sure that at IBM we support all those environments to keep those customers happy. >> Yeah, well, Eric, I think anybody, everybody in the industry knows, IBM can span those environments, you know, support through generations. And very much knows that everything in IT tends to be additive. You mentioned customers, Eric, you talk to a lot of customers. So bring us inside, give us a couple examples if you would, how are they dealing with this transition? For years we've been talking about, you know, enabling developers, having them be tied more tightly with what the enterprise is doing. So what are you seeing from some of your customers today? >> Well, I think the key thing is they'd like to use data reuse. So, in this case, think of a backup, a snap or replica dataset, which is real world data, and being able to use that and reuse that. And now the storage guys want to make sure they know who's, if you will, checked it out. We do that with our Spectrum Copy Data Management. You also have, of course, integration with the Ansible framework, which IBM supports, in fact, we'll be announcing some additional support for more features in Ansible coming at the end of October. We'll be doing a large launch, very heavily on containers. Containers and primary storage, containers in hybrid cloud environments, containers in big data and AI environments, and containers in the modern data protection and cyber resiliency space as well. So we'll be talking about some additional support in this case about Ansible as well. So you want to make sure, one of the key things, I think, if you're a storage guy, if I'm the VP of infrastructure, or I'm the CIO, even if I'm not a storage person, in fact, if you think about it, I'm almost 70 now. I have never, ever, ever, ever met a CIO who used to be a storage guy, ever. Whether I, I've been with big companies, I was at EMC, I was at Seagate Maxtor, I've been at IBM actually twice. I've also done seven startups, as you guys know at theCUBE. I have never, ever met a CIO who used to be a storage person. Ever, in all those years. So, what appeals to them is, how do I let the dev guys and the test guys use that storage? At the same time, they're smart enough to know that the software guys and the test guys could actually screw up the storage, lose the data, or if they don't lose the data, cost them hundreds of thousands to millions of dollars because they did something wrong and they have to reconfigure all the storage solutions. So you want to make sure that the CIO is comfortable, that the dev and the test teams can use that storage properly. It's a part of what Ansible's about. You want to make sure that you've got tight integration. So for example, we announced a container native version of our Spectrum Discover software, which gives you comprehensive metadata, cataloging and indexing. Not only for IBM's scale-out file, Spectrum Scale, not only for IBM object storage, IBM cloud object storage, but also for Amazon S3 and also for NetApp filers and also for EMC Isilon. And it's a container native. So you want to make sure in that case, we have an API. So the AI software guys, or the big data software guys could interface with that API to Spectrum Discover, let them do all the work. And we're talking about a piece of software that can traverse billions of objects in two seconds, billions of them. And is ideal to use in solutions that are hundreds of petabytes, up into multiple exabytes. So it's a great way that by having that API where the CIO is confident that the software guys can use the API, not mess up the storage because you know, the storage guys and the data scientists can configure Spectrum Discover and then save it as templates and run an AI workload every Monday, and then run a big data workload every Tuesday, and then Wednesday run a different AI workload and Thursday run a different big data. And so once they've set that up, everything is automated. And CIOs love automation, and they really are sensitive. Although they're all software guys, they are sensitive to software guys messing up the storage 'cause it could cost them money, right? So that's their concern. We make it easy. >> Absolutely, Eric, you know, it'd be lovely to say that storage is just invisible, I don't need to think about it, but when something goes wrong, you need those experts to be able to dig in. You spent some time talking about automation, so critically important. How about the management layer? You know, you think back, for years it was, vCenter would be the place that everything can plug in. You could have more generalists using it. The HCI waves were people kind of getting away from being storage specialists. Today VMware has, of course vCenter's their main estate, but they have Tanzu. On the IBM and Red Hat side, you know, this year you announced the Advanced Cluster Management. What's that management landscape look like? How does the storage get away from managing some of the bits and bytes and, you know, just embrace more of that automation that you talked about? >> So in the case of IBM, we make sure we can support both. We need to appeal to the storage nerd, the storage geek if you will. The same time to a more generalist environment, whether it be an infrastructure manager, whether it be some of the software guys. So for example, we support, obviously vCenter. We're going to be supporting all of the elements that are going to happen in a container environment that VMware is doing. We have hot integration and big time integration with Red Hat's management framework, both with Ansible, but also in the container space as well. We're announcing some things that are coming again at the end of October in the container space about how we interface with the Red Hat management schema. And so you don't always have to have the storage expert manage the storage. You can have the Red Hat administrator, or in some cases, the DevOps guys do it. So we're making sure that we can cover both sides of the fence. Some companies, this just my personal belief, that as containers become commonplace while the software guys are going to want to still control it, there eventually will be a Red Hat/container admin, just like all the big companies today have VMware admins. They all do. Or virtualization admins that cover VMware and VMware's competitors such as Hyper-V. They have specialized admins to run that. And you would argue, VMware is very easy to use, why aren't the software guys playing with it? 'Cause guess what? Those VMs are sitting on servers containing both apps and data. And if the software guy comes in to do something, messes it up, so what have of the big entities done? They've created basically a virtualization admin layer. I think that over time, either the virtualization admins become virtualization/container admins, or if it's a big enough for both estates, there'll be container admins at the Global Fortune 500, and they'll also be virtualization admins. And then the software guys, the devOps guys will interface with that. There will always be a level of management framework. Which is why we integrate, for example, with vCenter, what we're doing with Red Hat, what we do with generic Kubernetes, to make sure that we can integrate there. So we'll make sure that we cover all areas because a number of our customers are very large, but some of our customers are very small. In fact, we have a company that's in the software development space for autonomous driving. They have over a hundred petabytes of IBM Spectrum Scale in a container environment. So that's a small company that's gone all containers, at the same time, we have a bunch of course, Global Fortune 1000s where IBM plays exceedingly well that have our products. And they've got some stuff sitting in VMware, some such sitting in generic Kubernetes, some stuff sitting in Red Hat OpenShift and some stuff still in bare metal. And in some cases they don't want their software people to touch it, in other cases, these big accounts, they want their software people empowered. So we're going to make sure we could support both and both management frameworks. Traditional storage management framework with each one of our products and also management frameworks for virtualization, which we've already been doing. And now management frame first with container. We'll make sure we can cover all three of those bases 'cause that's what the big entities will want. And then in the smaller names, you'll have to see who wins out. I mean, they may still use three in a small company, you really don't know, so you want to make sure you've got everything covered. And it's very easy for us to do this integration because of things we've already historically done, particularly with the virtualization environment. So yes, the interstices of the integration are different, but we know here's kind of the process to do the interconnectivity between a storage management framework and a generic management framework, in, originally of course, vCenter, and now doing it for the container world as well. So at least we've learned best practices and now we're just tweaking those best practices in the difference between a container world and a virtualization world. >> Eric, VMworld is one of the biggest times of the year, where we all get together. I know how busy you are going to the show, meeting with customers, meeting with partners, you know, walking the hallways. You're one of the people that traveled more than I did pre-COVID. You know, you're always at the partner shows and meeting with people. Give us a little insight as to how you're making sure that, partners and customers, those conversations are still happening. We understand everything over video can be a little bit challenging, but, what are you seeing here in 2020? How's everybody doing? >> Well, so, a couple of things. First of all, I already did two partner meetings today. (laughs) And I have an end user meeting, two end user meetings tomorrow. So what we've done at IBM is make sure we do a couple things. One, short and to the point, okay? We have automated tools to actually show, drawing, just like the infamous walk up to the whiteboard in a face to face meeting, we've got that. We've also now tried to make sure everybody is being overly inundated with WebEx. And by the way, there's already a lot of WebEx anyway. I can think of meeting I had with a telco, one of the Fortune 300, and this was actually right before Thanksgiving. I was in their office in San Jose, but they had guys in Texas and guys in the East Coast all on. So we're still over WebEx, but it also was a two and a half hour meeting, actually almost a three hour meeting. And both myself and our Flash CTO went up to the whiteboard, which you could then see over WebEx 'cause they had a camera showing up onto the whiteboard. So now you have to take that and use integrated tools. One, but since people are now, I would argue, over WebEx. There is a different feel to doing the WebEx than when you're doing it face to face. We have to fly somewhere, or they have to fly somewhere. We have to even drive somewhere, so in between meetings, if you're going to do four customer calls, Stu, as you know, I travel all over the world. So I was in Sweden actually right before COVID. And in one day, the day after we had a launch, we launched our new Flash System products in February on the 11th, on February 12th, I was still in Stockholm and I had two partner meetings and two end user meetings. But the sales guy was driving me around. So in between the meetings, you'd be in the car for 20 minutes or half an hour. So it connects different when you can do WebEx after WebEx after WebEx with basically no break. So you have to be sensitive to that when you're talking to your partners, sensitive of that when you're talking to the customers sensitive when you're talking to the analysts, such as you guys, sensitive when you're talking to the press and all your various constituents. So we've been doing that at IBM, really, since the COVID thing got started, is coming up with some best practices so we don't overtax the end users and overtax our channel partners. >> Yeah, Eric, the joke I had on that is we're all following the Bill Belichick model now, no days off, just meeting, meeting, meeting every day, you can stack them up, right? You used to enjoy those downtimes in between where you could catch up on a call, do some things. I had to carve out some time to make sure that stack of books that normally I would read in the airports or on flights, everything, you know. I do enjoy reading a book every now and again, so. Final thing, I guess, Eric. Here at VMworld 2020, you know, give us final takeaways that you want your customers to have when it comes to IBM and VMware. >> So a couple of things, A, we were tightly integrated and have been tightly integrated for what they've been doing in their traditional virtualization environment. As they move to containers we'll be tightly integrated with them as well, as well as other container platforms, not just from IBM with Red Hat, but again, generic Kubernetes environments with open source container configurations that don't use IBM Red Hat and don't use VMware. So we want to make sure that we span that. In traditional VMware environments, like with Version 7 that came out, we make sure we support it. In fact, VMware just announced support for NVMe over Fibre Channel. Well, we've been shipping NVMe over Fibre Channel for just under two years now. It'll be almost two years, well, it will be two years in October. So we're sitting here in September, it's almost been two years since we've been shipping that. But they haven't supported it, so now of course we actually, as part of our launch, I pre say something, as part of our launch, the last week of October at IBM's TechU it'll be on October 27th, you can join for free. You don't need to attend TechU, we'll have a free registration page. So just follow Zoginstor or look at my LinkedIns 'cause I'll be posting shortly when we have the link, but we'll be talking about things that we're doing around V7, with support for VMware's announcement of NVMe over Fibre Channel, even though we've had it for two years coming next month. But they're announcing support, so we're doing that as well. So all of those sort of checkbox items, we'll continue to do as they push forward into the container world. IBM will be there right with them as well because we know it's a very large world and we need to support everybody. We support VMware. We supported their competitors in the virtualization space 'cause some customers have, in fact, some customers have both. They've got VMware and maybe one other of the virtualization elements. Usually VMware is the dominant of course, but if they've got even a little bit of it, we need to make sure our storage works with it. We're going to do the same thing in the container world. So we will continue to push forward with VMware. It's a tight relationship, not just with IBM Storage, but with the server group, clearly with the cloud team. So we need to make sure that IBM as a company stays very close to VMware, as well as, obviously, what we're doing with Red Hat. And IBM Storage makes sure we will do both. I like to say that IBM Storage is a Switzerland of the storage industry. We work with everyone. We work with all these infrastructure players from the software world. And even with our competitors, our Spectrum Virtualized software that comes on our Flash Systems Array supports over 550 different storage arrays that are not IBM's. Delivering enterprise-class data services, such as snapshot, replication data, at rest encryption, migration, all those features, but you can buy the software and use it with our competitors' storage array. So at IBM we've made a practice of making sure that we're very inclusive with our software business across the whole company and in storage in particular with things like Spectrum Virtualize, with what we've done with our backup products, of course we backup everybody's stuff, not just ours. We're making sure we do the same thing in the virtualization environment. Particularly with VMware and where they're going into the container world and what we're doing with our own, obviously sister division, Red Hat, but even in a generic Kubernetes environment. Everyone's not going to buy Red Hat or VMware. There are people going to do Kubernetes industry standard, they're going to use that, if you will, open source container environment with Kubernetes on top and not use VMware and not use Red Hat. We're going to make sure if they do it, what I'll call generically, if they use Red Hat, if they use VMware or some combo, we will support all of it and that's very important for us at VMworld to make sure everyone is aware that while we may own Red Hat, we have a very strong, powerful connection to VMware and going to continue to do that in the future as well. >> Eric Herzog, thanks so much for joining us. Always a pleasure catching up with you. >> Thank you very much. We love being with theCUBE, you guys do great work at every show and one of these days I'll see you again and we'll have a beer. In person. >> Absolutely. So, definitely, Dave Vellante and John Furrier send their best, I'm Stu Miniman, and thank you as always for watching theCUBE. (relaxed electronic music)
SUMMARY :
brought to you by VMware He is the chief marketing officer And again, glad to be here, you know, 2020, the major engagements, So we started with IBM Cloud so share with us a little bit, you know, and the differences that we're doing to make sure that we can and now the object storage side. So what are you seeing from and containers in the On the IBM and Red Hat side, you know, So in the case of IBM, we and meeting with people. and guys in the East Coast all on. in the airports or on and maybe one other of the Always a pleasure catching up with you. We love being with theCUBE, and thank you as always
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Eric | PERSON | 0.99+ |
Pat Gelsinger | PERSON | 0.99+ |
IBM | ORGANIZATION | 0.99+ |
Eric Herzog | PERSON | 0.99+ |
John | PERSON | 0.99+ |
Zoginstor | PERSON | 0.99+ |
Texas | LOCATION | 0.99+ |
Dave | PERSON | 0.99+ |
Stockholm | LOCATION | 0.99+ |
Sweden | LOCATION | 0.99+ |
20 minutes | QUANTITY | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
$5 billion | QUANTITY | 0.99+ |
San Jose | LOCATION | 0.99+ |
Stu Miniman | PERSON | 0.99+ |
February | DATE | 0.99+ |
September | DATE | 0.99+ |
billions | QUANTITY | 0.99+ |
2020 | DATE | 0.99+ |
October 27th | DATE | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
last year | DATE | 0.99+ |
John Furrier | PERSON | 0.99+ |
VMworld | ORGANIZATION | 0.99+ |
two seconds | QUANTITY | 0.99+ |
half an hour | QUANTITY | 0.99+ |
VMware | ORGANIZATION | 0.99+ |
Thursday | DATE | 0.99+ |
Wednesday | DATE | 0.99+ |
Red Hat | TITLE | 0.99+ |
both | QUANTITY | 0.99+ |
February 12th | DATE | 0.99+ |
Red Hat OpenShift | TITLE | 0.99+ |
Red Hat | ORGANIZATION | 0.99+ |
two years | QUANTITY | 0.99+ |
two | QUANTITY | 0.99+ |
end of October | DATE | 0.99+ |
twice | QUANTITY | 0.99+ |
two and a half hour | QUANTITY | 0.99+ |
tomorrow | DATE | 0.99+ |
October | DATE | 0.99+ |
Switzerland | LOCATION | 0.99+ |
hundreds of petabytes | QUANTITY | 0.99+ |
hundreds of thousands | QUANTITY | 0.99+ |
Stu | PERSON | 0.99+ |
Pat | PERSON | 0.99+ |
Seagate Maxtor | ORGANIZATION | 0.99+ |
telco | ORGANIZATION | 0.99+ |
three years ago | DATE | 0.99+ |
Matt Morgan, VMware, and Fred Wurden, AWS | VMware Cloud on AWS Update
>> Voiceover: From theCUBE Studios in Palo Alto in Boston, connecting with thought leaders all around the world, this is a CUBE conversation. >> Hi, I'm Stu Miniman, and welcome to this announcement with VMware cloud on AWS update. Happy to welcome back to the program, Matt Morgan. He is the Vice President of global marketing with VMware cloud services. And welcome into the program Fred Wurden, he's the general manager of EC2 enterprise at Amazon Web Services. Thank you so much both for joining us. >> Good to see you Stu. >> Same, thanks Stu. >> Matt, and Fred, the VMware AWS partnership is one that has gotten a lot of attention. I know any time back in the day when we used to go to physical trade shows, I could know when there was a session talking about this because it was usually full and overflowing. When I've written about this topic or doing videos about it it definitely gets quite a lot of attention. So it's been over three years since the partnership was announced but still, when I talk to people, they don't necessarily really understand the depth of the integration and the work that gets done on both sides even though you get clear messages from both Andy Jassy and Pat Gelsinger about how important this is. Matt, maybe start with you and Fred would love your commentary as to this three year partnership and where we are today here in 2020. >> Absolutely, since the initial announcement of the VMware AWS relationships, we have actually built a very special cloud service. And today, we're actually deepening our partnership. In fact, today, VMware goes to market saying that AWS and only AWS is our preferred public cloud partner for all vSphere based workloads. VMware cloud on AWS is a jointly engineered service. Meaning, our product teams our r&d teams are all working together to deliver VMware enterprise class Software Defined data center solution to the AWS cloud. VMware Cloud foundation is the core technology that's behind our service. And it gives us the capability to deliver that same level of infrastructure familiarity and consistency that our customers use today, across every data center location, the edge and of course inside the public cloud. VMware cloud on AWS attracts an enormous amount of interest from customers. And these customers are in every vertical, whether you're speaking of healthcare, media and entertainment, transportation, financial services, manufacturing, energy, government, education, professional services, and of course technology. And together with AWS, we're bringing together services that are being used across the whole portfolio of cloud optionality. This includes cloud migration from whether you're talking about a single app or complete data center, disaster recovery, whether you're talking about replacing a legacy system or building new disaster recovery in the cloud. Data center extension building that hybrid cloud. And of course, modernizing applications which we classify under the term application modernization. >> Great, and Fred from the Amazon side. >> Yeah, the partnership is been fantastic over three years. And I can't express enough how hard it is to actually deliver a simple solution that customers are asking for from all levels of both organizations. And to do that it takes both AWS and VMware to deliver a solution that allows companies to leverage what they know today and extend that into the cloud. And leverage all of the benefits that we're going to go over and a rapid delivery of new features which they haven't had before ever. So it's fantastic a partnership. I love what we've been doing at all levels. And I say it's going to continue. The scale at which we're growing is fantastic. And with that, I'm happy to go over some of the announcements and why we're doing what we're doing which is all based on listening and what our customers want. >> Excellent. Well, Fred, hey, we're glad first of all, that it did not get called VMC on AWS SS. Because we have enough acronyms already in tech. Matt, VMware and AWS, of course, clear leadership in the marketplace. With three years, bring us inside as to you talked about all the verticals that were used, but where's the proof on the adoption of this technology? Love to hear a little bit about that. >> Yeah, absolutely. So we have customer examples across the verticals we spoke of, but it's the customer stories that are the real value demonstrator. Let's pick up a couple of those. IHS market, they were able to move 1000 plus workloads to the public cloud. And that story is kind of common in the world. But what's unique about this particular story is IHS market moved them in just six weeks. If you look at the cloud migration strategy in general, for someone to move that fast with that many workloads, it's unheard of. VMware empowers that because the operating setup that organizations have standardized in their data center is identical in the public cloud. So organizations can move workloads we see them move hundreds of workloads in a week from their data center up to the public cloud. In addition to that, we have customer examples like the Pennsylvania Lumberman's Mutual Insurance Company. They were able to demonstrate 20% cost savings by moving their disaster recovery systems to VMware cloud on AWS. And that was initial savings right off the rip. Other customers like William Hill, George St. PA, Stage Coast, PHS Mortgage, they're all demonstrating the significant value adds when people move over to the public cloud, but leverage that VMware cloud solution. >> And Fred obviously, AWS also plays across these environments. We would like to hear your side too. >> Yeah, a couple examples like S&P global ratings, they spin up a new application environment in a few hours instead of months. Let alone taking all the burden off of their supply chain and management of that. Like Matt said in terms of seeing cost savings. So agility and speed allows them to really focus on their applications and start to modernize and innovate in areas that really differentiate them. They've had 100% uptime for regulatory applications and a 50% improved disaster recovery time. Other customers have built out a disaster recovery plan and then actually spun to VMware cloud on AWS as their primary because they had better performance. So it's the whole range of options in terms of better performance, better TCL and economics and mostly agility on what they can do going forward with applications that may already be built on AWS as well with native services. >> Matt, you touched on some great customer examples, maybe maybe give us some, broad themes as to what are the key drivers as to why customers are adopting VMware cloud on AWS? >> Yeah, absolutely. As with any infrastructure conversation, total cost of ownership is a big piece of the equation. Organizations want to look at their footprint today. They want to look at their footprint next year, and then of course, many years out. So when you look at the public cloud, cloud economics are a big driver. VMware, of course adopts the whole concept of cloud economics whole full horse. Meaning that we give you the capability to recognize the advantages of an apex object model, the ability to have on demand services, the ability to have a managed IaaS, all of that is part and parcel to our service. But on top of that, there's unique capabilities that VMware cloud on AWS delivers that deliver unique economic value. The first is this concept of zero refactoring. Our customers tell us that this alone allows them to eliminate what they call is rework, sometimes called the rework tax. Which prevents organizations from moving applications to the cloud without reworking them, without working their data layer, re architecting how they run, they can move them because the operating layer is consistent. Another area of value that's unique to VMware cloud on AWS is the leverage of existing skill sets. Today's operators are trained on vCenter. They're trained on all the supporting infrastructure around VMware. All of that applies with VMware cloud on AWS. So the ability to translate those skills into a cloud skill set right off the bat is of enormous value. Of course flexibilities another big one, as organizations embrace what it being seen as composite applications, which are applications that span the data center, the public cloud out to the edge. The ability to move logic as needed to be able to have portability is something we deliver. Again, that's an economic value that we are able to provide. Now this has been quantified by third parties. There's been several major third parties, including Forrester, including IDC, that have published value added statements around the total economic impact of VMware cloud on AWS. In fact, just last year, there was a study that was commissioned by Forrester that demonstrated a 59% reoccurring savings in terms of infrastructure and operating savings, compared to an on premise implementation. When you look at migration that accelerates to 69% 'cause organizations can save almost 70% of moving applications by eliminating rework and refactoring. That's an IDC statistic. >> All right Matt. Maybe it would make sense to talk about just overall adoption of the solution. I believe you've got some stats you can share. >> So yeah, if you look at the adoption, we have delivered enormous growth over the last year of the service. Total number of hosts year over year are up 2.5x. Total number of running VMs year over year is actually larger at 3.5x. Which indicates that customers are not just adopting, but they're accelerating their adoption. We now have 21,000 plus number of hands on labs that have been consumed since July of 2019, a year ago. And there are now 300 plus validated technology partner solutions available. And on top of that, 530 channel partners with VMware cloud service competency are now registered and available to assist. These are tremendous statistics for 12 short months. >> Well, congratulations on to both VMware and AWS on that progress. Maybe talk a little bit about trends. Just briefly, if I look over the last three months we've talked about AWS and VMware customers. Obviously, with the global pandemic, there's been certain things that they've needed to rapidly do things like, VDI, end user computing, remote contact centers are something that they need to rapidly expand on. But, is there anything different or general trends that that you would both like to share? Matt, we'll once again, start with you and then Fred get your take on it. >> Yeah, there's a regional school district in the US that in light of COVID, needed to spin up 10,000 plus people working remotely. And by leveraging VMware cloud on AWS, they were able to conduct virtual classrooms in very short order by leveraging this broad scale infrastructure powered by VMware cloud on AWS. Over time, that provided flexibility and agility, but it also reduced their costs. They've been able to eliminate hardware replacement plans that were going to cost significant amount of money. In fact, they're showing and telling us that they're able to save 75% of those forecasted costs. But everything is really about business continuity today. Today's unfortunate economic environment where we're working through this pandemic, this global pandemic, IT organizations and businesses, they're embracing a tried and true understanding of what it means to move to the cloud. But they're embracing it in a more aggressive way because the supply chain has been disrupted. If you think about a traditional supply chain, where organizations have to receive machines, set up those machines, have them wired in have certain people on site to get those machines configured, move application. That's a lot of steps in the process, many of which have been totally disrupted during the pandemic. The idea of VMware cloud on AWS is that you replace an analog supply chain with a digital supply chain. We can now help organizations get new equipment, new capacity, new resources up and running instantly. They don't have to worry about all the steps that were previously required that have been disrupted in a pandemic. The cloud provides that operating environment that maps one for one to the realities of today's world. And they're also able to understand that looking forward, that that setup enables them to be more future ready. Ready for whatever comes next to deliver what the business needs. >> Yeah, there's a number of reasons that you just touched on Matt, that are examples that we can bring out on that elasticity. For example, Penny Mac, anytime there are changes in the market, for example, on either both for VDI or just on processing of loans. When the pandemic hit, a lot of people actually paused on both looking and or changing their patterns. And this solution has been fantastic for either scaling up or scaling down both ways. And they can do it very quickly. They can do it within a number of a variety of means whether it's a single VM, or it's moving an entire migration into VMware cloud on AWS. So great results there. The case studies speak for themselves. There's a lot of examples that we have up on both of our sites. We'd really be good to take a look at those in detail if you're interested, it's fun to see. Helps a lot of people out. >> If I could follow up with you on something here. I want to talk about I go to the cloud, often that movement is step one, how do I take advantage of modernization, whether that be for my application standpoint, or leveraging new services? I wonder you can give me the AWS side there? And, Matt would love to hear how VMware is helping customers along this journey too. >> Well, the first is we want to meet people they're at with their knowledge set and their skill set. And this is a fantastic part. Customers can move quickly with the domain knowledge that they've go. We can assist in translating and making sure that the environment and the STDC is set up in a way that is tailored to what their needs are. Whether it's an extension, or if it's a complete migration of step one. But step two really is once they're leveraging VMware cloud on AWS is they have a lot of needs in terms of their CICD, their development tools, or samples and applications around automation. And we can take and help them with that. That content is already posted on our developer tool site and our developer center for this solution. It really assists them in learning about how to leverage the elasticity and the security and the networking capabilities that allow them to go in and then use all the rest of the rich AWS services as well. So, if you look at some of the things that are coming out for example, VMware Transit Connect. Which allows, a layer three solution to be built on top of our AWS transit gateway so that we can interconnect multiple VPCs in an environment that may be running either software as a solution on AWS or a native application that was built with managed services, completely in sync and in harmony, with VMware cloud on AWS. So that's what's happening at a rapid pace. It allows people to bite off the chunks that they want to modernize and reuse tools that are either familiar with them, and or automation improvements that we've got between code tools across the board. So it's great to see the work that they're doing >> Great, and Matt on the modernization piece. >> Yeah, so our surveys tell us that customers want to modernize their existing applications. But those same customers don't want to start over. So this is an important value proposition that we deliver in partnership with AWS. Organizations can take a business process application, they can migrate it to the cloud, they can extend and reach that application with AWS services. They can extend and reach that applications with additional machine learning capabilities, they can extend it with containerized extensions. They can support a broader modern agenda without having to start over. And I think that that is a value proposition that resonates with everyone, because people often need must leverage what they already have built with what the baseline is for the business itself. In addition to this, composite applications are now becoming the norm. With data and processing being more CO located, end to end Applications often consist of processing and data for certain tasks to be either pushed out to the edge or remain on premises in the data center in addition to the cloud. That value proposition of VMware delivering a hybrid cloud with consistent infrastructure and operations enables those composite applications to be built and deployed in a highly efficient way, which is a big piece to the modernization story. In addition to this with tons of Kubernetes grid as a customer managed option, organizations can run those containerized components right on top of our service, all of which integrates very cleanly with a whole library of services that AWS offers. End to end, you have all the optionality you need plus the speed of migration and capabilities once you get up to the public cloud. >> All right, let's get into the new pieces of the partnership here. Matt, first of all, when I think about VMware cloud on AWS, the customers that I've mostly spoken to over the last couple of years have tended to be some of the larger enterprises. I've heard you're alluding towards some capabilities to the small and medium business. I know I'm looking forward to talking to PLM insurance, one of the companies that are leveraging this solution as part of this announcement. What's new and the impact that this will have on the addressable market that VMware cloud can hit for AWS? >> Yeah, so with this announcement, VMware cloud on AWS, we're extending it to offer three new capabilities. Three new announcements of capabilities. The first one is all about what you just spoke of. Which is about extending the VMware cloud on AWS value proposition to more customers. So currently, customers can spin up production clusters with three hosts are, of course much more than that. But three hosts was kind of the entry level for a production cluster. What we're announcing is the ability to create production clusters with all the capable abilities that go into what we define as a production cluster with just two hosts. That means customers will be able to deploy production environments with two hosts in a cluster, dramatically reducing their costs. In fact, the traditional costs will come down by 33%. So this is all about providing the full capabilities of VMware cloud on AWS, but to be able to do it at a smaller investment envelope. So in addition to this, we're rolling out enhancements to VMware cloud director offering it as a service. VMware cloud director now will deliver multi tenancy to VMware cloud on AWS specifically designed for MSPs. As you know VMware partner ecosystem is filled with managed service providers. We have a mean enormous collection of these that add value on top of VMware cloud on AWS. Here by using VMware vcloud director service, they can deliver multi tenancy to their customers. And this is designed specifically to serve the needs of small to medium sized enterprises. These capabilities enable MSPs to serve those needs and it will be available initially in North America. And this will give them the opportunity to say, hey, if you want to get started on VMware cloud on AWS, we can give you bite sized pools designed specifically for what you need. And this is a very asset light pay as you grow model, which aligns specifically to that market. >> It's fascinating to watch Matt, I think, not that many years ago, if I had attended VMworld and talked to the MSPs. And they talk how deeply they appreciate the VMware partnership and that cloud company was the enemy. And, today AWS and VMware partnering with them, helping to make sure that in this hybrid world that they play a role to help get to the enterprise. Fred, anytime we go to reinvent, new announcements usually come to a huge fanfare, even something like a new bare metal instance. Last year it was the I3en metal instance. People get pretty excited. Help us understand you know what this really means, what advantages it has? Are there any limitations? What should we know about the capabilities AWS has now available to the VMware cloud? >> Well, first off, thanks Stu, I3en is really exciting that we're launching. It will meet the need of storage intensive workloads. And it'll do it far better than what we've had before. It takes advantage of all the learnings and the investments that we put into instances across the board for AWS such as Nitro. If you have, high random IO access, such as needed for relational database or workloads that have additional security that we have baked in, it's going to meet those needs. Compared to I3 metal, it has more memory, more usable, high performance storage and additional security. The example of a yield compared to I3 is about a 22% performance improvement and value. We're delivering four times the raw storage for about 2.2 times the cost. So in essence, you're getting raw storage at half the cost of an I3. So customers are excited. it's one of many instances that we will launch in the future for VMware cloud on AWS. And that's one of the advantages, is people can instantly take advantage of these innovations that we have. Just like we've done across all of the other instance families to meet workloads that customers are talking to us about that they want to run on this platform. >> Excellent, well, we really look forward. I know we're going to have a deep dive with Colbert to go into a little bit under the hood. And as I mentioned, got one of your joint customers PLM Insurance to understand their use case and how they're doing it. Matt and Fred, if you could just give us final takeaway, VMware cloud on AWS, Matt, and then Fred. >> Well, first off, thank you Stu for this opportunity to speak. I always enjoy spending time with you and certainly with Fred. We're just super excited and thrilled about our partnership. VMware couldn't be happier with our partnership with AWS from engineering to marketing, customer experience. Our teams are working together hand in glove to ensure success for our customers. VMware cloud on AWS is a truly unique service. Customers can continue business operations with minimal disruption in case of any uncertain event, they can migrate their workloads fast in a very cost effective manner with minimal risk. And we're really all about helping large enterprises as well as small and medium businesses accelerate their cloud migration and modernization journey. In fact, if you look across the board, we have seen enormous uptake. And now with these new offerings that we talked about, especially the two hosts production cluster, and VMware cloud Director service, we believe we're going to be more attractive to more organizations of various sizes. We're excited about the road ahead. >> And Fred. >> Customers are excited about this road, I would add. One, thank you guys for having us on. It's great to tell this story. The feedback has been phenomenal . The growth in the adoption and what we're seeing in terms of the use cases across the board is much stronger than we could have imagined. So it's really great to see this work that is hard to do to really merge the best of VMware and the best of AWS in a true deep partnership. And that takes work at all layers, whether it's a commerce system integration, or if it's the instance engineering and roadmap work across the board or networking. And customer support across the board for solutions that run on this platform. Both of us are joined to make sure customers are satisfied regardless of what it takes. That's something that no one else has. And it is unique. And it's a long term commitment that we have with each other to do the right thing for the solution. 'Cause we can't do it individually. This is something that truly only a joint partnership as strong as this is, and has gotten stronger can deliver. So we're super excited about it. I think you're going to continue to see the pace of innovation on what we're delivering increase. And so, with that, it's been great to work with VMware on this. It's really fun. >> Well, thank you, Fred. Thank you, Matt. Yeah, congratulation to your team. And of course, love hearing the customer stories and feedback. >> Thank you Stu. >> All right. Be sure to check out the other interviews as part of this announcement and check out theCUBE.net of course, we're covering VMware and AWS deeply including their shows whether they are in person or virtual. I'm Stu Miniman and thank you for watching theCUBE.
SUMMARY :
leaders all around the world, He is the Vice President of the integration and of the VMware AWS relationships, And leverage all of the benefits in the marketplace. of common in the world. And Fred obviously, AWS also plays and start to modernize So the ability to translate those skills sense to talk about just of hands on labs that have on to both VMware and AWS And they're also able to There's a lot of examples that we have up the cloud, often that movement that is tailored to what their needs are. the modernization piece. In addition to this with of the partnership here. the opportunity to say, that they play a role to across all of the other to go into a little bit under the hood. for this opportunity to speak. that we have with each other Yeah, congratulation to your team. Be sure to check out the
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Fred | PERSON | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Pat Gelsinger | PERSON | 0.99+ |
Matt Morgan | PERSON | 0.99+ |
Matt | PERSON | 0.99+ |
Forrester | ORGANIZATION | 0.99+ |
Andy Jassy | PERSON | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Fred Wurden | PERSON | 0.99+ |
Amazon Web Services | ORGANIZATION | 0.99+ |
69% | QUANTITY | 0.99+ |
two hosts | QUANTITY | 0.99+ |
Stu Miniman | PERSON | 0.99+ |
20% | QUANTITY | 0.99+ |
100% | QUANTITY | 0.99+ |
75% | QUANTITY | 0.99+ |
50% | QUANTITY | 0.99+ |
2020 | DATE | 0.99+ |
59% | QUANTITY | 0.99+ |
IDC | ORGANIZATION | 0.99+ |
Palo Alto | LOCATION | 0.99+ |
three year | QUANTITY | 0.99+ |
Last year | DATE | 0.99+ |
US | LOCATION | 0.99+ |
33% | QUANTITY | 0.99+ |
VMware | ORGANIZATION | 0.99+ |
July of 2019 | DATE | 0.99+ |
next year | DATE | 0.99+ |
Both | QUANTITY | 0.99+ |
12 short months | QUANTITY | 0.99+ |
Today | DATE | 0.99+ |
last year | DATE | 0.99+ |
North America | LOCATION | 0.99+ |
three hosts | QUANTITY | 0.99+ |
Jared Rosoff & Kit Colbert, VMware | CUBEConversation, April 2020
(upbeat music) >> Hey, welcome back everybody, Jeff Frick here with theCUBE. We are having a very special Cube conversation and kind of the the ongoing unveil, if you will, of the new VMware vSphere seven dot O. We're going to get a little bit more of a technical deep-dive here today and we're excited to have a longtime CUBE alumni. Kit Colbert here is the VP and CTO of Cloud platform at VMware. Kit, great to see you. >> Yeah, happy to be here. And new to theCUBE, Jared Rosoff. He's a Senior Director of Product Management of VMware and I'm guessing had a whole lot to do with this build. So Jared, first off, congratulations for birthing this new release and great to have you on board. >> Thanks, feels pretty great, great to be here. >> All right, so let's just jump into it. From kind of a technical aspect, what is so different about vSphere 7? >> Yeah, great. So vSphere 7 bakes Kubernetes right into the virtualization platform. And so this means that as a developer, I can now use Kubernetes to actually provision and control workloads inside of my vSphere environment. And it means as an IT admin, I'm actually able to deliver Kubernetes and containers to my developers really easily right on top of the platform I already run. >> So I think we had kind of a sneaking suspicion that that might be coming with the acquisition of the Heptio team. So really exciting news, and I think Kit, you teased it out quite a bit at VMware last year about really enabling customers to deploy workloads across environments, regardless of whether that's on-prem, public cloud, this public cloud, that public cloud, so this really is the realization of that vision. >> It is, yeah. So we talked at VMworld about Project Pacific, right, this technology preview. And as Jared mentioned of what that was, was how do we take Kubernetes and really build it into vSphere? As you know, we had a hybrid cloud vision for quite a while now. How do we proliferate vSphere to as many different locations as possible? Now part of the broader VMware cloud foundation portfolio. And you know, as we've gotten more and more of these instances in the cloud, on premises, at the edge, with service providers, there's a secondary question of how do we actually evolve that platform so it can support not just the existing workloads, but also modern workloads as well. >> Right. All right, so I think he brought some pictures for us, a little demo. So why don't we, >> Yeah. Why don't we jump over >> Yeah, let's dive into it. to there and let's see what it looks like? You guys can cue up the demo. >> Jared: Yeah, so we're going to start off looking at a developer actually working with the new VMware cloud foundation four and vSphere 7. So what you're seeing here is the developer's actually using Kubernetes to deploy Kubernetes. The self-eating watermelon, right? So the developer uses this Kubernetes declarative syntax where they can describe a whole Kubernetes cluster. And the whole developer experience now is driven by Kubernetes. They can use the coop control tool and all of the ecosystem of Kubernetes API's and tool chains to provision workloads right into vSphere. And so, that's not just provisioning workloads though, this is also key to the developer being able to explore the things they've already deployed. So go look at, hey, what's the IP address that got allocated to that? Or what's the CPU load on this workload I just deployed? On top of Kubernetes, we've integrated a Container Registry into vSphere. So here we see a developer pushing and pulling container images. And you know, one of the amazing things about this is from an infrastructure as code standpoint, now, the developer's infrastructure as well as their software is all unified in source control. I can check in not just my code, but also the description of the Kubernetes environment and storage and networking and all the things that are required to run that app. So now we're looking at a sort of a side-by-side view, where on the right hand side is the developer continuing to deploy some pieces of their application. And on the left hand side, we see vCenter. And what's key here is that as the developer deploys new things through Kubernetes, those are showing up right inside of the vCenter console. And so the developer and IT are seeing exactly the same things with the same names. And so this means when a developer calls, their IT department says, hey, I got a problem with my database. We don't spend the next hour trying to figure out which VM they're talking about. They got the same name, they see the same information. So what we're going to do is that, you know, we're going to push the the developer screen aside and start digging into the vSphere experience. And you know, what you'll see here is that vCenter is the vCenter you've already known and love, but what's different is that now it's much more application focused. So here we see a new screen inside of vCenter, vSphere namespaces. And so, these vSphere namespaces represent whole logical applications, like the whole distributed system now is a single object inside of vCenter. And when I click into one of these apps, this is a managed object inside of vSphere. I can click on permissions, and I can decide which developers have the permission to deploy or read the configuration of one of these namespaces. I can hook this into my Active Directory infrastructure. So I can use the same corporate credentials to access the system. I tap into all my existing storage. So this platform works with all of the existing vSphere storage providers. I can use storage policy based management to provide storage for Kubernetes. And it's hooked in with things like DRS, right? So I can define quotas and limits for CPU and memory, and all of that's going to be enforced by DRS inside the cluster. And again, as an admin, I'm just using vSphere. But to the developer, they're getting a whole Kubernetes experience out of this platform. Now, vSphere also now sucks in all this information from the Kubernetes environment. So besides seeing the VMs and things the developers have deployed, I can see all of the desired state specifications, all the different Kubernetes objects that the developers have created. The compute, network and storage objects, they're all integrated right inside the vCenter console. And so once again from a diagnostics and troubleshooting perspective, this data's invaluable. It often saves hours just in trying to figure out what we're even talking about when we're trying to resolve an issue. So as you can see, this is all baked right into vCenter. The vCenter experience isn't transformed a lot. We get a lot of VI admins who look at this and say, where's the Kubernetes? And they're surprised, they like, they've been managing Kubernetes all this time, it just looks like the vSphere experience they've already got. But all those Kubernetes objects, the pods and containers, Kubernetes clusters, load balancer, storage, they're all represented right there natively in the vCenter UI. And so we're able to take all of that and make it work for your existing VI admins. >> Well that's a, that's pretty wild, you know. It really builds off the vision that again, I think you kind of outlined, Kit, teased out it at VMworld which was the IT still sees vSphere, which is what they want to see, what they're used to seeing, but devs see Kubernetes. And really bringing those together in a unified environment so that, depending on what your job is, and what you're working on, that's what you're going to see and that's kind of unified environment. >> Yep. Yeah, as the demo showed, it is still vSphere at the center, but now there's two different experiences that you can have interacting with vSphere. The Kubernetes based one, which is of course great for developers and DevOps type folks, as well as a traditional vSphere interface, APIs, which is great for VI admins and IT operations. >> Right. And then, and really, it was interesting too. You teased out a lot. That was a good little preview if people knew what they were watching, but you talked about really cloud journey, and kind of this bifurcation of kind of classical school apps that are running in their classic VMs and then kind of the modern, you know, cloud native applications built on Kubernetes. And you outlined a really interesting thing that people often talk about the two ends of the spectrum and getting from one to the other but not really about kind of the messy middle, if you will. And this is really enabling people to pick where along that spectrum they can move their workloads or move their apps. >> Yeah, no. I think we think a lot about it like that. That we look at, we talk to customers and all of them have very clear visions on where they want to go. Their future state architecture. And that involves embracing cloud, it involves modernizing applications. And you know, as you mentioned, it's challenging for them because I think what a lot of customers see is this kind of, these two extremes. Either you're here where you are, with kind of the old current world, and you got the bright nirvana future on the far end there. And they believe that the only way to get there is to kind of make a leap from one side to the other. That you have to kind of change everything out from underneath you. And that's obviously very expensive, very time consuming and very error-prone as well. There's a lot of things that can go wrong there. And so I think what we're doing differently at VMware is really, to your point, is you call it the messy middle, I would say it's more like how do we offer stepping stones along that journey? Rather than making this one giant leap, we had to invest all this time and resources. How can we enable people to make smaller incremental steps each of which have a lot of business value but don't have a huge amount of cost? >> Right. And it's really enabling kind of this next gen application where there's a lot of things that are different about it but one of the fundamental things is where now the application defines the resources that it needs to operate versus the resources defining kind of the capabilities of what the application can do and that's where everybody is moving as quickly as makes sense, as you said, not all applications need to make that move but most of them should and most of them are and most of them are at least making that journey. So you see that? >> Yeah, definitely. I mean, I think that certainly this is one of the big evolutions we're making in vSphere from looking historically at how we managed infrastructure, one of the things we enable in vSphere 7 is how we manage applications, right? So a lot of the things you would do in infrastructure management of setting up security rules or encryption settings or you know, your resource allocation, you would do this in terms of your physical and virtual infrastructure. You talk about it in terms of this VM is going to be encrypted or this VM is going to have this Firewall rule. And what we do in vSphere 7 is elevate all of that to application centric management. So you actually look at an application and say I want this application to be constrained to this much CPU. Or I want this application to have these security rules on it. And so that shifts the focus of management really up to the application level. >> Jeff: Right. >> Yeah, and like, I would kind of even zoom back a little bit there and say, you know, if you look back, one thing we did with something like VSAN, before that, people had to put policies on a LUN, you know, an actual storage LUN and a storage array. And then by virtue of a workload being placed on that array, it inherited certain policies, right? And so VSAN really turned that around and allows you to put the policy on the VM. But what Jared's talking about now is that for a modern workload, a modern workload's not a single VM, it's a collection of different things. We got some containers in there, some VMs, probably distributed, maybe even some on-prem, some in the cloud, and so how do you start managing that more holistically? And this notion of really having an application as a first-class entity that you can now manage inside of vSphere, it's a really powerful and very simplifying one. >> Right. And why this is important is because it's this application centric point of view which enables the digital transformation that people are talking about all the time. That's a nice big word, but the rubber hits the road is how do you execute and deliver applications, and more importantly, how do you continue to evolve them and change them based on either customer demands or competitive demands or just changes in the marketplace? >> Yeah, well you look at something like a modern app that maybe has a hundred VMs that are part of it and you take something like compliance, right? So today, if I want to check if this app is compliant, I got to go look at every individual VM and make sure it's locked down, and hardened, and secured the right way. But now instead, what I can do is I can just look at that one application object inside of vCenter, set the right security settings on that, and I can be assured that all the different objects inside of it are going to inherit that stuff. So it really simplifies that. It also makes it so that that admin can handle much larger applications. You know, if you think about vCenter today you might log in and see a thousand VMs in your inventory. When you log in with vSphere 7, what you see is a few dozen applications. So a single admin can manage a much larger pool of infrastructure, many more applications than they could before because we automate so much of that operation. >> And it's not just the scale part, which is obviously really important, but it's also the rate of change. And this notion of how do we enable developers to get what they want to get done, done, i.e., building applications, while at the same time enabling the IT operations teams to put the right sort of guardrails in place around compliance and security, performance concerns, these sorts of elements. And so by being able to have the IT operations team really manage that logical application at that more abstract level and then have the developer be able to push in new containers or new VMs or whatever they need inside of that abstraction, it actually allows those two teams to work actually together and work together better. They're not stepping over each other but in fact now, they can both get what they need to get done, done, and do so as quickly as possible but while also being safe and in compliance and so forth. >> Right. So there's a lot more to this. This is a very significant release, right? Again, lot of foreshadowing if you go out and read the tea leaves, it's a pretty significant, you know, kind of re-architecture of many parts of vSphere. So beyond the Kubernetes, you know, kind of what are some of the other things that are coming out in this very significant release? >> Yeah, that's a great question because we tend to talk a lot about Kubernetes, what was Project Pacific but is now just part of vSphere, and certainly that is a very large aspect of it but to your point, vSphere 7 is a massive release with all sorts of other features. And so instead of a demo here, let's pull up some slides and we'll take a look at what's there. So outside of Kubernetes, there's kind of three main categories that we think about when we look at vSphere 7. So the first one is simplified lifecycle management. And then really focus on security is the second one, and then applications as well, but both including the cloud native apps that couldn't fit in the Kubernetes bucket as well as others. And so we go on the first one, the first column there, there's a ton of stuff that we're doing around simplifying lifecycle. So let's go to the next slide here where we can dive in a little bit more to the specifics. So we have this new technology, vSphere life cycle management, vLCM, and the idea here is how do we dramatically simplify upgrades, life cycle management of the ESX clusters and ESX hosts? How do we make them more declarative with a single image that you can now specify for an entire cluster. We find that a lot of our vSphere admins, especially at larger scales, have a really tough time doing this. There's a lot of in and outs today, it's somewhat tricky to do. And so we want to make it really really simple and really easy to automate as well. >> Right. So if you're doing Kubernetes on Kubernetes, I suppose you're going to have automation on automation, right? Because upgrading to the seven is probably not an inconsequential task. >> And yeah, and going forward and allowing, you know, as we start moving to deliver a lot of this great vSphere functionality at a more rapid clip, how do we enable our customers to take advantage of all those great things we're putting out there as well? >> Right. Next big thing you talk about is security. >> Yep. >> And we just got back from RSA, thank goodness we got that show in before all the madness started. >> Yep. >> But everyone always talked about security's got to be baked in from the bottom to the top. So talk about kind of the changes in the security. >> So, done a lot of things around security. Things around identity federation, things around simplifying certificate management, you know, dramatic simplifications there across the board. One I want to focus on here on the next slide is actually what we call vSphere trust authority. And so with that one what we're looking at here is how do we reduce the potential attack surfaces and really ensure there's a trusted computing base? When we talk to customers, what we find is that they're nervous about a lot of different threats including even internal ones, right? How do they know all the folks that work for them can be fully trusted? And obviously if you're hiring someone, you somewhat trust them but you know, how do you implement the concept of lease privilege? Right? >> Right. >> Jeff: Or zero trust, right, is a very hot topic >> Yeah, exactly. in security. >> So the idea with trust authority is that we can specify a small number of physical ESX hosts that you can really lock down and ensure are fully secure. Those can be managed by a special vCenter server which is in turn very locked down, only a few people have access to it. And then those hosts and that vCenter can then manage other hosts that are untrusted and can use attestation to actually prove that okay, this untrusted host haven't been modified, we know they're okay so they're okay to actually run workloads on they're okay to put data on and that sort of thing. So it's this kind of like building block approach to ensure that businesses can have a very small trust base off of which they can build to include their entire vSphere environment. >> Right. And then the third kind of leg of the stool is, you know, just better leveraging, you know, kind of a more complex asset ecosystem, if you will, with things like FPGAs and GPUs and you know, >> Yeah. kind of all of the various components that power these different applications which now the application can draw the appropriate resources as needed, so you've done a lot of work there as well. >> Yeah, there's a ton of innovation happening in the hardware space. As you mentioned, all sorts of accelerateds coming out. We all know about GPUs, and obviously what they can do for machine learning and AI type use cases, not to mention 3-D rendering. But you know, FPGAs and all sorts of other things coming down the pike as well there. And so what we found is that as customers try to roll these out, they have a lot of the same problems that we saw on the very early days of virtualization. I.e., silos of specialized hardware that different teams were using. And you know, what you find is all things we found before. You find very low utilization rates, inability to automate that, inability to manage that well, put in security and compliance and so forth. And so this is really the reality that we see at most customers. And it's funny because, and so much you think, well wow, shouldn't we be past this? As an industry, shouldn't we have solved this already? You know, we did this with virtualization. But as it turns out, the virtualization we did was for compute, and then storage and network, but now we really need to virtualize all these accelerators. And so that's where this Bitfusion technology that we're including now with vSphere really comes to the forefront. So if you see in the current slide we're showing here, the challenges that just these separate pools of infrastructure, how do you manage all that? And so if you go to the, if we go to the next slide what we see is that with Bitfusion, you can do the same thing that we saw with compute virtualization. You can now pool all these different silos infrastructure together so they become one big pool of GPUs of infrastructure that anyone in an organization can use. We can, you know, have multiple people sharing a GPU. We can do it very dynamically. And the great part of it is is that it's really easy for these folks to use. They don't even need to think about it. In fact, integrates seamlessly with their existing workflows. >> So it's pretty interesting 'cause of the classifications of the assets now are much larger, much varied, and much more workload specific, right? That's really the opportunity slash challenge that you guys are addressing. >> They are. >> A lot more diverse, yep. And so like, you know, a couple other things just, now, I don't have a slide on it, but just things we're doing to our base capabilities. Things around DRS and VMotion. Really massive evolutions there as well to support a lot of these bigger workloads, right? So you look at some of the massive SAP HANA, or Oracle Databases. And how do we ensure that VMotion can scale to handle those without impacting their performance or anything else there. Making DRS smarter about how it does load balancing and so forth. >> Jeff: Right. >> So a lot of the stuff is not just kind of brand new, cool new accelerator stuff, but it's also how do we ensure the core apps people have already been running for many years, we continue to keep up with the innovation and scale there as well. >> Right. All right, so Jared, I give you the last word. You've been working on this for a while, there's a whole bunch of admins that have to sit and punch keys. What do you tell them, what should they be excited about, what are you excited for them in this new release? >> I think what I'm excited about is how, you know, IT can really be an enabler of the transformation of modern apps, right? I think today you look at a lot of these organizations and what ends up happening is the app team ends up sort of building their own infrastructure on top of IT's infrastructure, right? And so now I think we can shift that story around. I think that there's, you know, there's an interesting conversation that a lot of IT departments and app dev teams are going to be having over the next couple years about how do we really offload some of these infrastructure tasks from the dev team, make you more productive, give you better performance, availability, disaster recovery, and these kinds of capabilities. >> Awesome. Well, Jared, congratulation, again both of you, for you getting the release out. I'm sure it was a heavy lift and it's always good to get it out in the world and let people play with it and thanks for sharing a little bit more of a technical deep-dive. I'm sure there's a ton more resources for people that even want to go down into the weeds. So thanks for stopping by. >> Thank you. >> Thank you. >> All right, he's Jared, he's Kit, I'm Jeff. You're watching theCUBE. We're in the Palo Alto studios. Thanks for watching and we'll see you next time. (upbeat music)
SUMMARY :
and kind of the the ongoing and great to have you on board. great, great to be here. From kind of a technical aspect, and containers to my of the Heptio team. And as Jared mentioned of what that was, All right, so I think he Why don't we jump over to there and let's see what it looks like? and all of the ecosystem the IT still sees vSphere, that you can have and kind of this bifurcation and all of them have very clear visions kind of the capabilities So a lot of the things you would do and so how do you start but the rubber hits the and secured the right way. And it's not just the scale part, So beyond the Kubernetes, you know, and certainly that is a management of the ESX clusters So if you're doing Next big thing you talk about is security. And we just got back from RSA, from the bottom to the top. but you know, how do you Yeah, exactly. So the idea with trust authority of leg of the stool is, kind of all of the various components and so much you think, well 'cause of the classifications And so like, you know, a So a lot of the stuff is that have to sit and punch keys. of the transformation and it's always good to We're in the Palo Alto studios.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Jared | PERSON | 0.99+ |
Jeff Frick | PERSON | 0.99+ |
Jeff | PERSON | 0.99+ |
Jared Rosoff | PERSON | 0.99+ |
April 2020 | DATE | 0.99+ |
two teams | QUANTITY | 0.99+ |
Kit Colbert | PERSON | 0.99+ |
VMware | ORGANIZATION | 0.99+ |
VMworld | ORGANIZATION | 0.99+ |
today | DATE | 0.99+ |
vSphere 7 | TITLE | 0.99+ |
last year | DATE | 0.99+ |
vSphere 7 | TITLE | 0.99+ |
vSphere | TITLE | 0.99+ |
Project Pacific | ORGANIZATION | 0.99+ |
second one | QUANTITY | 0.99+ |
Palo Alto | LOCATION | 0.99+ |
ESX | TITLE | 0.99+ |
vCenter | TITLE | 0.99+ |
Heptio | ORGANIZATION | 0.99+ |
two ends | QUANTITY | 0.99+ |
both | QUANTITY | 0.98+ |
one | QUANTITY | 0.98+ |
first one | QUANTITY | 0.98+ |
CUBE | ORGANIZATION | 0.98+ |
seven | QUANTITY | 0.98+ |
two extremes | QUANTITY | 0.98+ |
SAP HANA | TITLE | 0.98+ |
theCUBE | ORGANIZATION | 0.97+ |
Kubernetes | TITLE | 0.97+ |
third | QUANTITY | 0.97+ |
first column | QUANTITY | 0.97+ |
single | QUANTITY | 0.96+ |
one side | QUANTITY | 0.96+ |
each | QUANTITY | 0.96+ |
first | QUANTITY | 0.95+ |
single object | QUANTITY | 0.95+ |
three main categories | QUANTITY | 0.95+ |