 theCUBE presents Ignite 22, brought to you by Palo Alto Networks. Greetings from the MGM Grand Hotel in beautiful Las Vegas. It's theCUBE, live day two of our coverage of Palo Alto Networks Ignite 22, Lisa Martin, Dave Vellante. Dave, what can I say? This has been a great couple of days. The amount of content we have created and shared with our viewers on theCUBE is second to none. Well, the cloud has completely changed the way that people think about security. You know, at first it was like, oh, the cloud, how can that be secure? And then realized, wow, actually, cloud is pretty secure if we do it right. So shared responsibility model. And partnerships are critical. Partnerships are critical, especially as more and more organizations are multi-cloud by default, right, these days. We're going to bring Google into the conversation. Josh Haslett joins us, strategic partnership manager at Google. Welcome, great to have you, Josh. Hi, Lisa, thanks for having me here. So you are a secret squirrel from Palo Alto Networks. Talk to me a little bit about your background and about your role at Google in terms of partnership management. Sure, I feel like we need to add that to my title. You should, secret squirrel. Great, yeah, so as a matter of fact, I've been at Google for two and a half years. Prior to that, I was at Palo Alto Networks. I was managing the business development relationship with Google, and I was kind of at the inception of when the cash came in and decided that we needed to think about how to do security in a new way from a platform standpoint, right? And so it was exciting, because when I started with the partnership, we were focusing on still securing workloads in the cloud with next generation firewall. And then as we went through acquisitions that Palo Alto added, it expanded the capabilities of what we could do from cloud security. And so it was very exciting to make sure that we could onboard with Google Cloud, take a look at how not only Palo Alto was enhancing their solutions as they built those and delivered those from Google Cloud, but then how did we help customers adopt cloud in a more easy fashion by making things more tightly integrated. And so that's really been a lot of what I've been involved in, which has been exciting to see the growth of both organizations as we see customers shifting to cloud transformation. And then how do they deploy these new methodologies and tools from a security perspective to embrace this new way of working and this new way of creating applications and doing digital transformation. It's important since work is no longer a place, it's an activity. Organizations have to be able to cater to the distributed workforce. Of course, the workforce has to be able to access everything that they need to, but it has to be done in a secure way, regardless of what kind of company you are. Yeah, you're right, Lisa, it's interesting. I mean, the pandemic has really changed and accelerated that transformation. I think really remote working has started previous to that and I think Nikesh called that out in the keynote too. He really said that this has been ongoing for a while but I think organizations had to figure out how to scale and that was something that they weren't as prepared for. And a lot of the technology that was deployed for VPN connectivity or supporting remote work, that was fixed hardware. And so cloud deployment and cloud architectures, specifically with Prisma Access, really enabled this transformation to happen in a much faster manner. And where we've come together is how do we make sure that customers, no matter what device, what user, what application you're accessing, as we take a look at ZTNA, Zero Trust Network Access 2.0, how can we come together to partner to make sure the customers have that wide range of coverage and capability? How would you describe Josh, Google's partner strategy, generally and specifically in the world of cyber and what makes it unique and different? Yeah, so that's a great question. I think from Google Cloud perspective, we heard TK mention this in the keynote with Nikash. We focus on building a secure platform, first and foremost. We want to be a trusted cloud for customers to deploy on. And so we find that as customers do one of two things, they're looking at reducing cost as they move to cloud and consolidate workloads, or as they embrace innovation and look at leveraging things like BigQuery for analytics and machine learning for the way that they want to innovate and stay ahead of the competition. They have to think about, how do they secure in a new way? And so not only do we work on how do we secure on platform, we work with trusted partners to make sure that customers have, you mentioned it earlier, Dave, this shared security model, right? How do they take a look at their applications and their workloads and this new way of working as they go to CI CD pipelines, they start thinking about DevSecOps, how do they integrate tooling that is frictionless and seamless for their teams to deploy, but allows them to quickly embrace that cloud transformation journey. And so, yes, partners are critical to that. The other thing is, we find that you mentioned earlier, Lisa, that customers are multi-cloud, right? That's kind of the new normal as we look at enterprises today. And so Google Cloud is going to do a great job at securing our platform, but we need partners that can help customers deploy policy that embraces not only the things that they put in Google Cloud, but as they're in their transformation journey, how that embraces the estates that are in data centers, the things that are still on-prem. And really, this is about making sure that the applications, no matter where they are, the databases, no matter where they are, and the users, no matter where they are, are all secure in that new framework of deploying and embracing innovation on public cloud. One of the things that almost everybody from Palo Alto Networks talks about is their partnering strategy, their acquisition strategy integrations. And I was doing some research. There's over 50 joint integrations that Google Cloud and Palo Alto Networks have. You talked about Zero Trust Network Access 2.0 that was announced yesterday. Give us a flavor of what that is, and what does it deliver that 1.0 did not? Well, great, and what I'd like to do is touch a little bit on those 50 integrations because it's been a building rolling thunder, shall we say, as far as how have we taken a look at customers embracing the cloud? The first thing was we took a look at how do we make sure that Palo Alto Solutions are easier for customers to deploy and to orchestrate in Google Cloud, making their journey to embracing cloud seamless and easy. The second thing was how could we make that deployment and the infrastructure even more easy to adopt by doing first party integrations? So earlier this year, we announced Cloud IDS, Intrusion Detection System, where we actually have first party directly in our console of customers being able to simply select they want to turn on inspection of the traffic that's running on Google Cloud, and it leverages the threat detection capability from Palo Alto Networks. So we've gone from third party integration alone to first party integration, and that really takes us to the direction of what we're seeing customers need to embrace now, which is this zero trust strategy. And Zero Trust 2.0 helps customers do a number of things. The first is we don't want to just verify a user and their access into the environment once. It needs to be continuous inspection, because their state could change. I think the teams we're talking about some really good ways of addressing, for instance, TSA checkpoints, and how does that experience look? We need to make sure that we're constantly evaluating that user's access into the environment, and then we need to make sure that the content that's being accessed, or loaded into the environment, is inspected. So we need continuous content inspection, and that's where our partnership really comes together very well, is not only can we take care of any app, any device, any user, and especially as we take a look at embracing contractor, like use cases, for instance, where we have managed devices and unmanaged devices, we bring together BeyondCorp and Prisma Access to take a look at how can we make sure any device, any user, any application is secured throughout, and then we've got content inspection of how that ZTNA 2.0 experience looks like. Josh, that threat data that you just talked about, who has access to that? Is it available to any partner? Any customer? How? It seems like there's gold in them in our hills, so there is. But this could be gold going both ways. So how do you adjudicate and how do you make sure that, first of all, that that data is accessible for good, and not in how do you protect it against wrong use? Well, this is one of the great things about partnering with Palo Alto, because technically the threat intelligence is coming from their ingestion of malware, known threats and unknown threats, right? Into their technology, Wildfire, for instance, is a tremendous example of this, where Unit 42 does analysis on unknown threats, based upon what Nikesh said on stage, I think he said 27 days to identification and remediation down to less than a minute, right? So they've been able to take the intelligence of what they ingest from all of their existing customers, the unknown vulnerabilities that are identified, quickly assessing what those look like, and then pushing out information to the rest of their customers, so that they can remediate and protect against those threats. So we get this shared intelligence from the way that Palo Alto leverages that capability, and we've brought that natively into Google Cloud with Cloud Intrusion Detection. So okay, so I don't know why I have high-frequency trading in my mind, because it used to be, like the norm was, oh, it could take a year to identify an intrusion, and now it's down to, it was down to 27 days, now it's down to a minute, now that's best practice, and again, I'm thinking high-frequency trading, how do I beat the speed of light? And that's kind of where we're headed, right? And so that's why he said one minute's not enough, we have to keep going. You guys got your best people working on that? Well, as a matter of fact, so Palo Alto Networks, when we take a look at what Nakesh said from stage, he talked about using machine learning and AI to get ahead of what they look at as far as predictability, not only about behaviors in the environment, so things that are not necessarily known threats, but things that aren't behaving properly in the environment, and you can start to detect based on that. The second piece of it then is a lot of that technology is built on Google Cloud, so we're leveraging, they're leveraging the capabilities that come together with aggregation of logs, the file stitching across the entire environment from the endpoint through to cloud operations, the things that they detect for network, content inspection, putting all those files together to understand where has the threat vector entered, how has it gone lateral inside the environment, and then how do you make sure that you remediate all of those points of intrusion? And so yeah, it's been exciting to see how our product teams have worked together to continue to advance the capabilities for speed for customers. And speed, secure speed is critical. We had the opportunity this morning to speak with Lake Claridge, the Chief Product Officer, and one of the things that I had heard about Lee is that despite all of the challenges in cybersecurity and the amorphous expansion of the threat network and the sophistication of the adversaries, he's really optimistic about what it's going to enable organizations to do. I see you smiling. Do you share that optimism? I do, I think when you bring leaders together to tackle big problems, I think we've got the right teams working on the right things and we understand the problems that the customers are facing, and so from a Google Cloud perspective, we understand that partnering with Palo Alto Networks helps to make sure that that optimism continues. We work on continuous innovation when it comes to Google Cloud security framework, but then partnering with Palo Alto brings additional capabilities to the table. Vision for the partnership. Where do you want to see it go? We're two to five years down the road. What's it look like? Maybe two to three years, let's go. Well, it was interesting. I think NIR was the one that mentioned on stage about how AI is going to start replacing us in our main jobs, right? I think there's a lot of truth to that. I think as we look forward, we see that our teams are going to continue to help with automation, remediation, and we're going to have the humans working on things that are more interesting and important, and so that's an exciting place to go because today the reality is that we are understaffed in cybersecurity across the industry, and we just can't hire enough people to make sure that we can detect, remediate, and secure every user endpoint and environment out there, so it's exciting to see that we've got a capability to move in a direction to where we can make sure that we get ahead of the threat actors. Yeah, so he said, within five years, your SOC will be AI-based, and basically he elaborated, saying there's a lot of stuff that you're doing today that you're not going to be doing tomorrow, and that's going to continue to be a moving target. I would think Google is probably ahead in that game, and ahead of most, right? I mean, you guys were there early. I mean, I remember when Hadoop was all the rage, like just at the beginning, it was like, yeah, Google was like, you know, we're not doing Hadoop anymore, that's like old news, so you tended to be, I don't know, at least five, maybe seven years ahead of the industry, so imagine you're using a lot of those AI techniques in your own business today. Absolutely, I mean, I think you see it in our consumer products, and you certainly see it in the capabilities we make available to enterprise as far as how they can innovate on our cloud, and we want to make sure that we continue to provide those capabilities, you know, not only for the tools that we build, but the tools that customers use. What's the, as we kind of get towards the end of our conversation here, we talk about Zero Trust as a journey, as an approach, it's not a product, it's not a tool. What is the, who's involved in the Zero Trust journey from the customer's perspective? Is this solely with the CISO, CSO, CIOs, or is this at the CEO level going, we have to be a data company, but we have to be a secure data company 24-7? It's interesting, as you've seen malware, phishing, ransomware attacks, this is not only just a CISO, CIO conversation, it's a board level conversation, and so the way to address this new way of working where we have very distributed environments where you can't create a perimeter anymore, you need to strategize with Zero Trust, and so continuously when we're talking to customers, we're hearing that as a main initiative, you know, from the CIO's office and from the board level. Got it, last question, the upgrade path for existing customers from one dot ZTNA, one dot O to two dot O, how simple is that? It's easy, you know, when we take a look. Is there an easy button? So here's the great thing. If you're feeling lucky. Yeah. Well Palo Alto, right, building Prisma access has really taken what was traditional security that was an on-prem or a data center deployed strategy to cloud-based, and so we've worked with customers like Princeton University who had to quickly transition from in-person learning to distance learning, find a way to ramp their staff, their faculty, and their students, and we were able, you know, Palo Alto deployed on Google Cloud's network, that solution in very quick order and had those, you know, everybody back up and running. So deployment and upgrade path is simple when you look at cloud-deployed architectures to address zero-trust network. That's awesome. Some of those use cases that came out of the pandemic were mind-blowing, but also just really set the table for other organizations to go, yes, this can be done and it doesn't have to take forever because frankly, where security is concerned, we don't have time. That's right. And it's so much faster than traditional architectures where you had to procure hardware, deploy it, configure it, and then, you know, push agents out to all the endpoints and get your users provisioned. In this case, we're talking about cloud-delivered rates. So I've seen, you know, with Palo Alto deploying for customers that run on Google Cloud, they've deployed tens of thousands of users in a very short order. You know, we're talking, it's not months anymore, it's not weeks anymore, it's days. It has to be days. Josh, it's been such a pleasure having you on the program. Thank you for stopping by and talking with Dave and me about Google Cloud, Palo Alto Networks. In addition to Secret Squirrel, I feel like when you were describing your background that you're like the love child of Palo Alto Networks and Google Cloud. You might put that on your card too. That is a huge compliment. I really appreciate that, Lisa. Thank you so much. Thanks so much, Josh. It's been a pleasure being here with you. Oh, likewise. For Josh Haslett and Dave Vellante, I'm Lisa Martin. You're watching theCUBE, the leader in live coverage for emerging and enterprise tech.