 Hey everyone, welcome to theCUBE's presentation of the AWS Startup Showcase, Cyber Security. This is season three, episode three of the ongoing series that covers exciting startups from the AWS ecosystem. I'm your host, Lisa Martin, and today, excited to be joined by CUBE alum Ed Kazmer, founder and CTO Cloud Storage Security. Ed's here to talk about when data becomes dangerous. Managing the security posture of data in AWS Storage. Ed, great to see you again. Thanks for joining me today. Thank you, Lisa, I appreciate it. So as we talked about before, data continues to migrate to the cloud. You shared some really compelling stats from enterprise strategy groups. Share this with the audience. I think it would be really compelling for them to understand what's going on. Yeah, certainly. So data itself, we understand that cloud storage has grown massively over the last few years, but when you look at the actual context of the overall storage capacity, only 7% of organizations today show that they've moved more than 50% of data to the cloud. And if you think about that then, how do we interpret that? That just means a lot of organizations, the vast majority, 93% have not moved that much data and there's that much more to go. The estimations are that we'll probably see that number quadruple over the next couple of years, somewhere near the 30% range, we'll finally get more than 50% of the data to the cloud, but that's still a minor piece. And if you see how much storage is there, it's a massive number to continue to grow. It is, those numbers are staggering. And we see customers in every industry are using data to provide customer services and make better decisions, improve business operations, but data is increasingly becoming a liability. When does data become dangerous? Walk us through what that even looks like. First, I would just start by considering all data dangerous, but there are three particular cases to that. One is when the data is unknown. Another is when it's riddled with issues, payloads, malware, and another is when it falls into the wrong hands. And we can dive a little deeper on those. Like, what does it mean that data is unknown? In my mind, it means a couple of different things. It means that we don't know where the data or the source of data. But it also is this notion that organizations really don't have a clue about what data they have in their environment. And that's the unknown aspects. There are certain data paths, but outside of those data paths, they really don't know what data they have. If we talk about the second piece there being riddled with payloads, the notion there is the stats prove to us and show to us that one in two organizations are being attacked by ransomware on a daily, weekly, or monthly basis. That is really, really frequent. And the third piece there going into just a little bit more, data falling into the wrong hands is typically a configuration issue. It's not always just a brute entry into the environment. It's not like someone's compromised a system per se. And it proves to us by saying, what data is being compromised? What data is being lost to customers? And it was really interesting findings that we worked with ESG on. And it's about a third of the customers are losing it from file stores. So whether these are network file shares or these are block storage attached to computers, 34% of organizations are losing information from data lakes. And then the number of that maybe isn't as surprising but still was a little, is that 42% of organizations are losing information from their SaaS applications. And whether that's the SaaS application being compromised or how they've configured it themselves, they're losing data. So it's a wide array of where people are losing their data. It is and it's also, it sounds like it's a technology of process and also a people challenge. Talk about data being unknown. You mentioned ransomware and I read a stat recently that a ransomware attack happens once every 11 seconds. It's no longer, are we gonna get hit? It's when, it's what's the- Exactly. What you're talking about than of course data falling into the wrong hands. So what data security management challenges or organizations facing today with those three kind of classifications of data becoming dangerous? Talk us through some of the business challenge and of course the security challenges as well. Yeah, definitely. So there's two different fronts here. It was related to the notion of how people have adjusted to cloud in general. We've moved to the cloud. We focused on compute in the early days but now we have to focus on storage as well. So when we look at the business challenges we're looking at areas where data proliferates massively whether that's backups now that are being pushed to the cloud. It's the notion of having infinite resources versus finite resources on-prem where you couldn't just make tons of copies of data and put it in places because you didn't have the places to put it. Now you can. So when we look at the business challenges it's really about how do I control and become aware around my data? And that's this proliferation issue. The security team is now focused on data as much as they were on compute where we had shadow IT before. Now we have shadow data and it's easy to make a copy of a production database and put it someplace to start running reports against and doing more activity against but it's very hard for the security team to understand who's done what with that data and how you're securing it. Shadow data, that seems kind of like a scary outcome for organizations not being able to manage that but also having it proliferated and copied as you said. I'm curious, how do you help business teams and security teams come together to really start fighting and dialing down the dangerous nature of data? I imagine it's gotta be a collaboration between those two teams. Oh, absolutely. So it really comes down to there's a new kind of tool set coming out that's focused in and around the data and we're participating in that. We're one of those tools that can help you with that and what are you really trying to do to empower both the business side and the security side? You need to give them visibility and you need to give them control and the business side wants visibility the security side wants control. So how is cloud storage security helping with that? Well, we provide a tool that locates the unknown data so you get that notion of there is no more unknown data because you can find everything across all of your infrastructure. We also help you scan that data so we touch the data itself we make sure it's safe to use but we also are classifying it we're looking at the contents of that data and making sure it's not too sensitive. One of the big stats that we keep seeing out there is that there are customers that don't know what they've lost. So 39% of organizations indicate they have lost some sensitive data from the cloud and 20% on top of that say, I don't know maybe I've lost sensitive data because I don't even know what sensitive data is out there. So we go through that and we give you that aspect. And there are multiple ways to lose data as we mentioned one of them is the configuration aspect. So we're giving you a best practices review of all of your data stores to say are you doing the right things with that data? So with a little bit of visibility, a bunch of control and a bunch of scanning or touching of that data to really tell you what you have we can help those organizations solve both the business requirements as well as the security requirements. Yeah, it sounds like really being able to give them that visibility and the control that they really haven't had. I was doing some research on you guys and saw that over the past three plus years we've located and scanned over five billion files and cloud storage for customers. This is customer globally. Can you share a customer case study that you think really shows that when data has become dangerous and what you guys to help do to mitigate that risk? Yeah, absolutely this. It really puts it into context when you look at this particular case study we've been working with them again recently. It's been a year long project but just over the weekend they migrated another few hundred million files just in the weekend alone and really some really interesting stats come out of that with a number of infected files found it's it was hundreds of millions of files but there were 88 pieces of malware found inside of that. So you don't need it to be more than one one bad file leads to bad things but we have a financial services company that we've been working with and their scenario it's an intra country migration and it has these requirements that they can't take physical data across from country to country there. So they're doing it through the cloud they're migrating that data from one spot to another and so they're using multiple means to do that. So there are lots of ways to get your data around there's replication, there's data syncing one of the things that they're using is transfer family AWS transfer family for managed file transfers. So they're using multiple mechanisms and they need support across all of those to one make sure their data safety use and two to make sure it's classified. If we look at their requirements for this migration was that every single file every single piece of data that comes from the other country company to their country company needed to be touched. They couldn't let a single piece into their production and so what they did is they created a staging area all data is migrated into the staging area it's scanned and validated and classified there and then moved on to production consumption where their internal employees and other consumers can take that data and move it forward. They were driven by compliance and mandates regulations in the financial industry required that they be able to identify and document all pieces of data coming in for sensitivity and otherwise. And they required us to also help them how do you keep track of what you are finding those 88 files that we found just over this past weekend alone and on top of the other millions and hundreds of millions of files they've scanned earlier in the year has to be dealt with in some way and so they have third party tools that they want the notification sent to they're using internal AWS pieces like security hub that where they aggregate their findings and they required a tool that could integrate with all of those and we happen to do that as well. That's critical you mentioned finding all that malware and we talked about the ransomware stats and I was wondering how does cloud storage security partner with other technologies and you just done a great job explaining that because once you find the payloads that may need to be eradicated as quickly as possible before it's right throughout the organization. Talk to us about some of the other key use cases that you guys are solving for customers as every company regardless of industry is a data company these days. Yeah, you know the data is the life blood of the company it helps you make good customer decisions it helps make business decisions. If data is shrinking you've got other problems to go solve for in your business cause data grows when a company is growing the data grows and as a result you have to touch and manage all of that data as well. When we look at some of the other customers that we have and the others facing this what we're seeing now is a lot of these companies that are our customers have their own customer sets as well whether they're a SaaS service or a global management consulting a company that we're partnering with right now to go through this process of touching hundreds of their customers and their data to provide that visibility and control on behalf of their customers. So it's a very common use case data is massively growing. If we just look at the probably the biggest data store that there is out there right now with Amazon S3 if you look at what's happened just over the last 10 years it's over 20,000% growth. They're into the hundreds of trillions of objects category now. And when we see people migrate when we see people re-architect for the cloud it often goes down this road of I'm going to change my storage structure as well. So the tools and the technologies in place have to account for that. They have to be able to meet the cloud native requirements to do security properly and at scale. Got to ask you a quick question on the security front. You know, we talk a lot about the skills gap in security and it's been prevalent for a long time. A lot of organizations are doing a lot. Is there an element here where cloud storage security can help organizations dial down or kind of make that gap on the security side smaller with the technologies that you're delivering? Absolutely. You know, there's a couple of different ways to solve cloud. None of them are manual. You know, you start manual when you're on your journey early you've got to automate and you've got to be simple. If security is complex, you won't implement it and you won't keep it up to date. So cloud storage security is a sub 10 minute install. Our goal and part of our driving mantra is to make security simple and to give you really simple tools that you can put in place and expand across your entire organization. And it doesn't take a PhD in cybersecurity or someone who's worked at a major firm for 20 years to be able to implement it. Make security simple. I love that. I'm sure that's music to the ears of security teams everywhere. Give us a little peek at into the roadmap. You're the founder in CTO. What are some of the things that we can be on the lookout for where cloud storage security is concerned? Yeah, absolutely. I mean, we're again, trying to drive forward the simplicity model. We're trying to expand data sets. The more data you can touch, the better. We're very focused on unstructured data so far because that's been one of the primary gaps that we see out there. But there's going to be movements to more than unstructured data we'll move into structured data. We'll move into better business intelligence. There's this whole AI conversation going on right now that people are trying to find good uses for. Security is a perfect use case for AI. Doing evaluations across all of your data sets. When you find one bad thing here, we can start to model and look for other things that look like that. Well, because maybe we'll find bad things there. And so it gives us intelligence around, well, what data should we protect? And so it's not just a wide scale. Let's look at it all, which is the default answer right now. You should look at it all until you have a better answer. But I think there are things that we can bring AI into. We can bring that in and figure out better answers for our customers. And again, drive simplicity, make it really smart and really intelligent for the consumer. Awesome, good stuff. We're going to be keeping our eyes peeled. Last question, Bree, where can the audience go to learn more? I know they're going to want to. Yes, yes, we certainly hit us up on our website, cloudstoragesecurity.com. You can find us at cloud-storage-security on LinkedIn. And then of course, we're in the AWS Marketplace. We transact through the Marketplace quite frequently and we offer a free trial there. So kick the tires for 30 days, you get 500 gigs of data to test this out on whether that be malware scanning or data classification. And you can find us there. And we're always happy to help. So email us at support at cloudstoragesecurity.com and we're happy to help you guys out in any way. Awesome, and thank you so much for coming on the program as part of the AWS startup showcase cybersecurity. Defining dangerous data, the challenges it presents to organizations, but also the mitigations and what you're doing to keep security simple. We really appreciate your time and your insights. Thank you, Lisa. I appreciate it. My pleasure. We want to thank you for watching and reminding you to keep it right here on theCUBE for more action. Your leader in tech coverage.