 Live from Las Vegas, it's theCUBE. Covering Dell Technologies World 2018. Brought to you by Dell EMC and its ecosystem partners. Well, welcome back to Las Vegas. theCUBE continue our coverage here of Dell Technologies World 2018 with some 14,000 strong in attendance. This is day two, by the way, of three days of coverage that you'll be seeing here live on theCUBE. Along with Keith Townsend, I'm John Walson. We're now joined by Alex Ameda, who is a consultant product marketing at Dell EMC. And Bob Bender, who's the CTO Founders Federal Credit Union. Bob, good to see you as well, sir. Thank you, thank you for having me. You bet, thanks for being here to both of you. First off, let's just set the table for what you do at Founders and what Founders is all about and then why Dell and how Dell figures into your picture. Sure, so Founders Federal Credit Union has started established in 1950 where regional financial institution providing basic services for that area in South and North Carolina. We now service over 32 areas and we have about 210,000 plus members. So I'm Chief Technology Officer and we're looking to Dell EMC to really give us a lift in the cyber resilience of our data of what we're trying to protect today. Yeah, Keith, now we're talking to you. So we always like hearing on the customer side of this, especially on the financial side, right? Because your concerns are grave concerns, right? We all care about our money, right? And obviously that's first and foremost for you having trust, credibility, viability. So tell us a little bit about that thought process in general, what drives your business and how that then transfers over to the IT. Sure, and as a member, you look at us big or small, you expect the same cyber resilience, protection for your personal information. You don't think there's going to be a difference there. So if you look at the Carolinas, you're going to see a significant, or the Southeast, we've been picked on with malware, with that data extortion of what the name ransomware. So we had to find a solution quickly and we looked at Dell EMC for data protection and cyber recovery to really help us in that area and really protect our data. So let's talk about some of the threats faced up. Outside of malware, typically the line of thought is, you know what, don't assume that you can prevent getting hacked, assume that you are hacked. What personas do you guys wear at the bank? Or at the credit union? Well, we looked at that and what we did is we get really involved and we go out and we see that event and that the breach, the malware, the ransomware. And so we really thought we lacked the ability of bringing assets under governance. So how do we really bring that, roll that up so that everybody knows at any point in time we can recover, that we have kind of an isolated recovery, an air gap or a data bunker, and then a clean room to bring that up, a sandbox. And we really saw that our tape media backup recovery was not going to recover for the events that were happening. We're not, the old days you're looking at one or two critical systems that are being recovered. Today they're locking 500, 1500 servers in a matter of minutes. So when you rehydrate that data, you know, the deduplication, we're seeing 72 to one. And that's done very fast through the product lines of Dell EMC, it's significant. But when you want to rehydrate that, tape is gone. It's just not there. Well, if you take away that air gap situation, what are you left with? And if they're smart enough to figure out where your backups are, you're left with no protection. So we really needed to isolate and put off-network all that critical data. And because of that 72 to one dedupe rate, and I realize we may be unique, there's others that may have to choose what those critical systems are, we're not going to have to. We're going to protect everything, every day. And so that we have a recovery point that we point to and show management and our board and our members, such as you guys, that we can recover. That you're going to have trust in us handling your financial responsibilities. So what specific technologies are you guys using from Dell to create this environment in which you can recover within these isolated bubbles? You know, I'll let Alex talk more specific, but we really looked at the data protection solution and the cyber solution. We said phase one, we want to stand this up very quickly because it's any minute this could happen to us. It's happening to very smart establishments. So we really picked what was going to optimize our first iteration of this, and we did it quickly. So we were talking to roll out in 45 days. We used Data Domain, Avamar, DD Boost. We've got Data Protection Advisor, which gives me where I'm here or I'm off at another conference or I'm showing up at the office. I get instant results of what we did the day before for that recovery. I know that we were in the petabyte storage business. I don't know when we crossed that line, but now we store a huge amount of data very quickly. I mean, we took their product line and went from hours down to seconds and I can move that window any which way I want it. And so it's just empowering to be able to use that product line to protect our data the way we are today. Yeah, I think that the Dell EMC Cyber Recovery solution really is kind of looking at solving the problem. Most people look at it from solving it as a preventative thing. How do I prevent malware from happening? How do I stop ransomware from attacking me? The thing is that it's all about really how are you going to recover from that and having a plan to be able to recover. And with the way we approached it, we started talking to customers like Bob and they were really coming to us and saying, this is increasing, this is an increasing problem that we're seeing and it's inevitable. We feel we're going to be attacked at some point. And you see on the news today, we're only a little bit through the year and there's been a lot of news on cyber attacks and things like that. The key thing is how do you recover? So we took a look at that in conversations with our customers and went specifically back and designed a solution that leverages the best in industry technology that we have with our data protection portfolio. So when you look at data deduplication, you look at data domain, that technology in the industry provides the fastest recovery possible. And from there, that makes it realistic for companies to really say, yeah, I can recover from a ransomware attack. And the more important thing is we look at this as the isolation piece of the solution is really where the value comes in. That not only is it to get a clean copy of the data, but you can use that for analysis of that data in that clean room to be able to detect early on problems that may be happening in your production environment. And it's really important that that recovery aspect be stressed and really the data domain solution is kind of the enabler there. It's still a really tough spot to be in, right? Because on one hand, you're protecting. You're trying to prevent. So you're building the fortress as best you can. And at the same time, you're developing a recovery solution so that if there is a violation in intrusion, you're going to be okay. But the fact is the data's gone. You know, it went out the door. And so I'm just curious psychologically, you know, how do you deal with that, with your board, with your ownership, with your customers? How do you deal with it, Alex? To your customer to saying, we're going to do all we can to keep this safe? Absolutely. But, so that but is a big caveat, right? How did both of you deal with that? First off? Well, I'll say this, working with the Dell EMC engineers and their business partners, I'm sleeping better at night. I'm not just saying that being here. What I mean is that they've shrunk my backup window. They've guaranteed me reporting in an infrastructure IQ of that environment that I have more insight, integrated. So across, holistically, my enterprise. So no longer am I adding on different components to complete backups, this backup, this company, this, and it doesn't, I just never get that insight. And I never really have the evidence that we're restoring. I can do the store and the restore at the same time and see that in next day and reporting that we're achieving that. So I hear that but, but that but is a little quieter because it's just a little less impactful because I'm confident now that I've got a very efficient window. I'm not affecting, again, with those add-on ad hoc products, not condemning them, but they're impactful to critical applications. I see response time during peak times. The product doesn't have that effect. And it's really exciting because now I can, I've got a rip and replace. I got a lift and shift. You decide what the acronyms you want to add to it. But we, the big thing I want to add, I'm sorry to ramble here a little. Yeah, you're fine. Yeah, yeah, our runbooks have become smaller. And this is, this is the less complex. So I now are taking, keep the lights on people that are very frustrated with our acronyms and our terminology and the way we're going. And I'm starting to bring them into the cyber resilience, cyber security environment. And they're feeling empowered. And I'm getting more creative ideas. And that means, more creative ideas means we're back to the business solving problems, not worrying if our backups are done at two in the morning. And from a Dell EMC perspective, I think we're really uniquely positioned in the industry in that, not just from Dell EMC, but look at all of Dell technologies, right? When we incorporate the fact that we have best in class data protection solutions to do operational recovery, disaster recovery, the next logical step is to really augment that and really start looking at cyber recovery, right? And then when you look at that, and you look at the power of Dell technologies, it's really a layered approach. How do I layer my data protection solutions to do operational recovery, to do disaster recovery? And then at the same time, throw in a little RSA and secure works in there into the picture. And we're really uniquely positioned as a vendor in the industry. No other vendor can really handle that breath in the industry from a cyber recovery standpoint when you throw in the likes of RSA and secure works. So, Alex, let's drill down in the overall capability versus the rest of the industry. There's been a ton of investment in data protection, 90 million, 100 million. We're seeing unicorns pop up over just this use case of data protection. And they're making no qualms at it. They're going right at the data domain business. What is the message that you're going out telling end users like Bob that the, you know what? State of course, data domain, the portfolio of data protection at Dell is the best way to recover your environment in case of a breach. Yeah, absolutely. So in terms of that, what I say to customers that I talk to every day around this that are maybe doubting, you know, going forward in what they're going to do is that we are continuing to innovate. The data domain platform continues to innovate. You see that in our cloud scenarios and the cloud use cases that we're talking about and really kind of working together with our customers as a partner on how we apply things like cyber recovery for their workloads that go into the cloud, right? And that's really through that working relationship with customers and that very strong investment that we're making on the engineering side with our roadmaps is really what customers at the end of the day become convinced that data domain is here set. So Bob, I'd love to follow up on that. Can I add on to that? Please. You know, I think there are a couple of things you pointed on that I probably missed is, one, you've given me options. I can be on-prem or off-prem or back to on-prem. And that is with the product line. And again, that integration across that, I have to have that insight. But at the end of the day, Dell EMC's product line delivers. And that's what we experience in our relationship. We're not talking about 72-to-1 de-dupe rate. I know that's, I triple-check the facts. It's like, really, we're achieving that? But that's impactful to my project lines, right? I'm no longer a bottleneck because I'm back at the projects and we're getting stuff moving and we're just not, we're not confused by the technology or the way we have to, you know, kind of band-aid them together. It's just one place to go and it delivers. And we see that delivery, especially with the growth of the data domain in the addition of the sandbox. It's very exciting. We're seeing some great performance on our new systems. Yeah, and we hear that a lot about the flexibility of the portfolio and the data protection. The fact that Bob mentioned it many times, making the backup window disappear is really where the heart of it is. And now Bob's team and all the customers that I talked to and their teams can go off and actually move the business forward with more innovation and bringing more value back to the business. So part of security is disaster recovery. Do you guys integrate your disaster recovery practice as part of your data domain implementation? Well, I think that's a great question. We challenged our DR group external also. We saw incident response component, just a big empty hole. It's missing. And I think that's a change in mindset people have to implement as you pointed out. Incident response is going to be before the disaster. And if you don't stand up, look, our data's gone mobile. That means it's everywhere. And we have to follow it everywhere with the same protection because in the end of the day, no matter where we own it, we're responsible for it. So we have to go after it in the same protection. So I think it is part of that. We're integrating it. I think we confused a couple of companies with that, but you've got to stand up those foundation services. The cybersecurity, the data lifecycle has made the cybersecurity become much more complex. And the use, the business use of that data is becoming more demanding. So we have to make it available. And so we have to be transparent with these products and kudos to Dell EMC and all the engineers making this happen. I don't know what I would be doing if it wasn't there for me. Well, thank you, Bob. Yeah, and I'll tell you what strikes me a little bit about this as we have just a final moment here is that we think about cyber invasions and violations and what have you. We think about it on a global or a national scale. I mean, you are a very successful regional business, right? Yes. And you are just as prime of a target for malfeasance as any and you need to take these prophylactic measures just as aggressively as any enterprise. Right, right. If you look at the names, I mean, you just go down the list, Boeing, Mecklenburg County as city of Atlanta. You know, not to name them and pick on them, but they're still recovering. Sure. And our business resilience, our reputation is all we have. We're there, you know, our critical asset is your data. That is what we say, you know, the story we tell is how we protect that. And that's our services. And at the end of the day, you don't trust our services. What are we? That's right. Not enough just to protect and prevent. You have to be able to recover. No, so if they have a business partner that really understands, and I know I'm a little, maybe a little smaller than some of your others, but you still treat me like I'm, and you still listen to me. I bring you ideas, you say, this fits. Let's see what we can do. Your engineers go back and they say, you know, we can't say yes, but we can say we're going to take a different way approach and they come back with a solution. So it's very, very exciting to have a partner that does that with you. No, it's a great lesson. It is, it's great. Although, as I say goodbye here, I am a little disappointed when I heard you from South Carolina, I was expecting this wonderful Southern accent to come out. Bob, what happened? You know, I'm an Iowa boy. You got a little Yankee in you. There you go. Maybe they'll say a little more than we do. Gentlemen, thanks for being with us. Thank you very much for having us. Thanks for sharing the Founders Federal story. Back with more from Las Vegas. You're watching theCUBE where Dell Technologies World 2018.