 Welcome back everybody. Jeff Frick here with theCUBE. We're at the RSA convention in downtown San Francisco. 40,000 people talking security, trying to keep you safe, keep your car safe, your nest safe, microwave safe, refrigerator safe. Everything safe. Oh my gosh. Jason Porter, VP Security Solutions from AT&T. Welcome. Very good. Thanks for having me, Jeff. So, what are your impressions of the show? This is a crazy event. Oh, it is crazy. I mean, look at all the people. It's the crowds. It's a lot of fun. You know, the best part is just walking the hallways, getting to connect with friends and network and really create new solutions to help our customers. It seems to be a recurring theme. Everybody sees everybody who's involved in this space is here today. Oh, absolutely. Yeah. For the next couple of days, it's just all in all the time. So AT&T, obviously big network. You guys are carrying all this crazy IP traffic that's got good stuff and bad stuff, a lot of fast moving parts, a ton more data flying through the system. It's kind of your kind of step back view of what's going on and how are you guys addressing new challenges with 5G and IoT and an ever increasing amount of data flow through the network. Absolutely. So you're right. At AT&T, we see a ton of traffic. We see 130 petabytes of traffic every day across our network. So our threat platform, we pull in five billion threat events every 10 minutes. So five billion events every 10 minutes. Every 10 minutes. That's what our big data platform is analyzing with our data scientists and our math. So lots of volume and activity going on. We have 200 million end points all feeding that threat platform as well. So what are we seeing? We're seeing threats continuing to grow. Obviously, everybody here at this show knows it, but give you some concrete examples. We've seen a 4,000% increase in IoT vulnerability scanning. So IoT is something, as a community, as a group here, we definitely need to go solve. And that's why we launched our IoT security alliance last week. We formed an alliance with some big names out there like Palo Alto Networks and IBM and Trostonic and others that really we all have a passion in going out and solving IoT security. That's the number one barrier to concern for adopting IoT. Okay, so you touched on all kinds of stuff there. So let's go to the big data. So what's interesting about big data, and I always tell my kids, right, every coin has two sides. Absolutely. The bad part is you've got that much more data to sort through. But the good news is you can use a lot of those same tools. Obviously, it's not a guy sitting with a page or waiting for a red light to go off. That's right. Analyzing that. So how has the big data tools helped you guys to be able to see the threats faster to react to them faster and really get more proactive? That's a great point. So cybersecurity is a zero percent unemployment field, right? People you can't get enough people to come work in cybersecurity who have the right talent. So we had to really evolve a few years ago. We had to make a big shift that we were not going to just put platforms and people watching screens looking for blinking red lights, right? So we made this shift to a big data threat platform that's basically doing the work of identifying the threats without the people. So we're able to analyze at machine speed instead of people speed, which allows us to, as I said, get through many more events much more quickly and allows us to eliminate false positives and keep our people working really at that looking at those new threats, those things that we want the people analyzing. Right. Okay. So then the next thing you talked about is IoT. Yep. And my favorite part of IoT is autonomous vehicles just because I live in Palo Alto, we see the Google cars all along, and they're coming soon, right? Absolutely. But now you're talking about moving in a 3,000-pound vehicle, potentially somebody takes control. So security is so important for IoT. The good news for you guys, 5G is going to be a big part of it, not necessarily just for security, but enablements. So you guys are right in the heart of IoT. Yeah, we are. You know, we have one of the largest IoT deployments in the world. We have the most connected devices. And so what we see is really a need for a layered approach to security. You mentioned 5G. 5G is certainly a part of getting capacity to that. But when you move to IoT with connected cars and things, you move beyond data harm to physical harm for people. And so we've got to be able to, you know, up our game. And so a layered approach, securing that device, putting malware detection, but even threat and monitoring what's going on between the hardware and the operating system and the user, and then segmenting, say, in a car, telematics from infotainment, right? You want to really segment the telematics so that the controls of driving and stopping that car are separate from the infotainment, the internet traffic, the video watching, Spotify, whatever, right, right, right. And so we do that through SMS, private SMS user groups, private APNs, VPNs, those kinds of things. And then of course, you want to build that castle around your data, your control unit that's managing that car. Make sure you do full UTM, you know, threat capabilities, throw everything you can at that. We've even got some specialized solutions that we built with some three-letter agencies to really monitor that control point. Right. Well, then the last thing you touched on is really partnership and co-opetition and sharing, which has to be done at a scale that it wasn't before to keep up with the bad guys, because apparently they're sharing all their stuff amongst each other all the time. Absolutely. And here we are, 40,000 people. It's an ecosystem. So how is that evolving in terms of kind of the way that you shared data that maybe you wouldn't have wanted to share before for the benefit of the whole? Yeah, so our threat platform, we built it with that in mind, was sharing. So it's surrounded by an API layer so that we can actually extract data for our customers. Our customers can give us their data. You know, it's interesting. I thought they would want to pull data. But our biggest customer said, no, you know what? We want your data scientists and your math looking at our environment too. So they wanted to push data. But speaking about alliances overall, it's got to be a community, as you said. And our IoT security alliance is a great example of that. We've got some big suppliers in there like Palo Alto. But we also have IBM, IBM and AT&T are two of the largest managed security companies in the planet. So you would think competition. But we came together in this situation because we feel like IoT is one of those things we've got to get right as a community. All right, Jason, I'll give you the last words. 2017, we're just getting started. What are kind of your priorities for this year? What will we be talking about a year from now at RSA 2018? Well, you're going to continue to hear more about attack types, different attack types, the expanding threat surface of IoT. But I think you're going to continue to hear more about our critical infrastructure being targeted. You saw with the Dine Attack, you're starting to take out major pieces that are impacting people's lives. And so think about power grids and moving into some more critical infrastructure. I think that's going to be more and more the flavor of the day as you continue to progress through the year. All right, well, hopefully you get a good night's sleep. But we want you working hard. We're all rooting for you. We're all working hard. All right. He's Jason Porter from AT&T. I'm Jeff Rick with theCUBE. You're watching theCUBE from RSA Conference in San Francisco. Thanks for watching.