 Welcome to JSA TV, the newsroom for tech and telecom professionals. I'm Jamie Skado-Cutaya, here at JSA and welcoming my good friend, Zen, Zennephin Giannis, of course, the vice president of sales at Nexus Guard. Zen, welcome back to JSA TV. Hi, Jamie, how are you? Good, good and big news. We just heard you announced a new partner program called TAP, is that right? What we've done is basically focused, we've changed our strategy of last year and we're now focusing more on ISPs and CSPs and helping enable them to utilize our technology. So we've taken our software platform that we would use for ourselves to provide service to enterprise and then turned it and focused it on the service provider market. Anybody that sells or provides any kind of IP services and has sub-customers, this is something that we can enable them to not only protect their existing revenue, but also add services to their customers that they're asking for. A lot of the customers now it's a need, check the box, a need DDoS. So it helps the service providers very quickly meet that need. And let's break that down even to people, processes and technology. How does the TAP program really elevate these three elements? Sure, well on the people side, we've got 12 years in the business fighting DDoS attacks, large ones, small ones, across all verticals and sectors. We have a SOC that's been just on 24-7 for the last 12 years and sees all the attacks, zero-day to the oldest ones, standard attacks that we should be able to mitigate no problem. And part of the service that you get when you become a NexusGuard partner is you have access. So even though you might have your own SOCs and ISP, our people are right behind them. We're supporting your SOC as second level support. So when they need to escalate the ticket, come straight to us, we'll even jump in and do the mitigation for you and show you exactly what we've learned, like, oh, this is the new attack, this is how it is, this is how you mitigate it. So you get that benefit of our people and our intelligence and experience. Process, sorry. Process would be basically the workflow of the product itself. So we have, you know, with the platform, there's a basic workflow that goes with it, you know, onboarding, ticketing, implementation, provisioning, and then fully, you know, in service for the customers. And instead of having to create it yourselves, we kind of plug right into your existing billing system and sales order system, things like that, and give you the process that goes along with it. Obviously, we can customize it for you, but the process that we've created has worked for us for 12 years, so it's much easier for us to basically lend it to our customers as well so that they can hit the ground running. And the technology is the platform, right? So the platform has been evolving over the last 12 years. We listen to our customers, we see what works, what doesn't work, we add features where it makes sense, as new attacks come in, as new needs come in in the marketplace, you know, we adapt the platform consistently. So once again, it's not like you're buying one, you know, one piece of technology frozen in time that you're going to have to upgrade later. You're buying a service that evolves with the market as well. So, you know, you don't really have to worry about it, oh, am I out of date, or how do I deal with this now? So that's the technology piece. And I'll say along with it that if you looked at it holistically, an example of this would be like so on our most recent threat report for Q3, we part of the findings were that the bits and pieces attacks are very detrimental to ISPs and service providers. For the reason is, normally, traditionally, DDoS attacks are just a big flood at one IP. And those are easier to find, filter out, and you know, you're done with it. What's happening is they're injecting smaller groups of traffic into a wide array of IP numbers. So they're going across your entire IP space and injecting, let's say 100 megs here, 100 megs there, and it passes through your detection filters. So normal network traffic, it looks normal. It's not. When it kind of converges onto your routers, it's really maybe 10 gigs of traffic that kind of slipped through. So that's an issue right now. It's kind of the new, trending, dangerous attack. And if you're a technology partner with Nexus Guard, you get the benefit of our SOC. We've already seen the attack. We know how to mitigate it. We know how to kind of identify it. And then if you become a customer that's actually, we see the attack often, then we can create filters around it so that it will become detected more easily. And you don't even have to worry about it. So that's kind of like a real world example of how the people process technology works to benefit the ISPs and CSPs. And certainly a reason to contact you guys sooner than later, knowing that these attacks are happening in so broadly across our marketplace. So how long does it take to implement a Nexus Guard DDoS mitigation program? It varies. But on the basic level, it could be a couple of days if we're just doing a cloud network-based, you know, BGP situation with tunnels, or you're doing a reseller scenario, all the way to it could be six months, three to six months, depending. We're shooting for three, most likely six, to build a ground zero DDoS pop that is X customer's own pop that has been the Nexus Guard network behind it, and the Nexus Guard SOC and technology. But just to get the gear and set it all up and fine tune it, make sure the network's working, it could be about six months. So anywhere in between it depends what you buy. Some people start with the cloud and then transition to the larger pop. If they see it's working and they see that the customer really want it, a lot of times it's chicken and eggs. How much money can we make if we implement this as a product? So then they get the budget and then they can upgrade. And that range definitely makes sense, particularly as you guys are so customer-focused. So these solutions are really built for each client, which we love. So you guys will be at PTC20, obviously a huge event in our industry for the telecom space. Coming up January 20th, it kicks off in Honolulu, no better place. How can our viewers who are attending PTC20 reach out to you guys and set up a meeting? The traditional ways. I mean, obviously, I think we're going to have a link with you on your newsletter and feed on the website or subscribe below or through the meeting maker or through sales at nexuscard.com or just stop by our booth. We don't have a booth per se or a room. We just have the cabana down by the top of the car, which is hard to miss us. So to bare minimum, if you're walking by, just drop a card and say, hey, we'd like to talk, and then we'll have somebody follow up and set your meeting. And it's great that you guys got those cabanas. They are in huge demand. There's only a few of them and the top as far is definitely the place where all the action happens. So you guys got a key location there for sure. Talking from a PTC alumni perspective. But then always a pleasure. Thank you so much for sharing all your insight and those reports that you guys do really benefit us as an industry. So thank you for all your fine work there and for keeping us safe while those attacks keep on getting more and more clever. They always seem to try to outsmart and you guys defending us makes me sleep better at night for sure. So thank you for all you do. Thank you viewers for tuning in to JSA TV. Happy networking.