 From San Jose, California, in the heart of Silicon Valley, it's theCUBE, covering Hadoop Summit 2016, brought to you by Hortonworks. Here's your host, John Furrier. Okay, welcome back everyone. We are here live in Silicon Valley in San Jose for Hadoop Summit 2016. I'm John Furrier, this is theCUBE, our flagship program. We go out to the events, and extract the signal to the noise. Our next guest is Kerry James, the big data solutions director at EMC, and Steven Schartz. Schartz, or VP of Worldwide Sales, Blue Talent, sorry about that. Had no worries. I think I got it wrong last time too, but it's day two long, long days of interviews. Welcome to theCUBE. Thank you. Thank you. We just talked earlier about your ecosystem and other two partners, Tifio and Tivio, and Zoloni. Zoloni, how do these guys fit in? So, Blue Talent for us is, so we talked about a Tifio and Zoloni, right? Finding data, managing data, getting data into the system. For us, Blue Talent comes in and says, okay, now that we got this data in the system, we got to be able to allow people to access this data, but in a governing and secure manner, right? So, people can't see payroll data, they can't see payroll data. If I'm not a user that can see all nine digits of social security number, I want to be able to mass that information where it comes into. And again, right, so we know there are things inside the Hadoop ecosystem that allow you to do parts of that. Again, for us, the ecosystem play is bigger than just Hadoop. We've got to be able to apply those same rules and same governances across security and access to data, whether I'm using MongoDB, whether I'm using Cassandra, whether I'm using Hadoop, whether I'm using Spark or MapReduce or Hive, whether I'm utilizing GreenFoam databases, or even Oracle databases in the old days, right? So, yeah. So, security is key. We heard from Tifio talk about the APIs, having data being open. Open data is the only way to have a great observation space. By opening it up, Steven, you potentially have a security surface area is monstrous. Yes, exactly. And that's one of the things that Blue Talent brings to the table. So we're data-centric security that has access control, as Casey said, across multiple different platforms. So we can get really precise down to row, column, cell, and partial cell without any data duplication and without by being agnostic to the application and to the database. So it gives them a lot of flexibility. Now, this is a surveillance, cyber surveillance, but threat detection, all these things going on. Most people find out that they're in the data before even anyone even knows it. Does this help that problem? I mean, how does it help us squint through that? Absolutely. So you've heard a lot about old breaches that have happened lately. A lot of the breaches have been stolen identities and one identity where they get 76 million credit cards and therefore you're over provisioning the rights to see sensitive information. Blue Talent could get really, really precise and eliminate and mitigate that risk to over-provisioning and eliminate the threat for someone accessing that information. And what does this mean for EMC? Talk about the impact of customers. Sure, so the impact for customers to us again, right? As we go back into it, we've seen it where we have customers that have spent years building governance teams and policies. They have probably pretty good governance around their EDWs, around their transactional systems as they move through the analytic space that started kind of to break down a little bit, right? And then again, right? So if I move stuff into Hadoop and HDFS into that ecosystem, there are tools that have been evolving around helping secure that environment. But again, I've got multiple tools in the ecosystem and do I have to make sure that I create the right security policies in every single place? And if I forget to update one of those policies, then that's where I start to open up the security breaches and data access breaches. And again, that's where blue talent comes into us and in multiple reasons. One is that we can, they're an enforcement policy function, right? There's a security policy engine that allows us to create the policy once and enforce it at multiple access points. So again, as Stephen said, agnostic to the tool trying to access the data, it goes to the policy enforcement and we apply the same policy whether you're reading it from a Spark job, a MongoDB job, or if you're actually reading the data directly off of the Atibio index. So that's the one piece of security for us too. The other piece we do with this is we've actually integrated blue talent into the shared storage that we utilize behind our ecosystem to kind of help prevent exactly what you're talking about. That dirt road access to data where they're bypassing our access security, we've now blocked that dirt road, right? We put up patrol points on that block road or on that dirt road to help again control access to the information to stop exfiltration and breaches of information. What's the level of relationships, Stephen, with EMC on this? How does this all come together? We've been working with them for a long time and really understanding the platform and the solutions that they're trying to bring to the table. And as Casey was mentioning about how we protect the storage system, this is a really, really key important thing because HEFS out on Isilon is key and any performance degradation is important because Isilon is all about high performance and blue talent has proven to be extremely high performance with no performance degradation. So you don't impact performance. That is absolutely correct. That's a huge concern. That is a huge concern. So we're doing- Normally the overhead involvement security is high. How do you guys do that? So we do a lot of different things. Number one, we don't duplicate the data. And number two, we actually only bring back the results that's important to the query. So if someone is doing a select star from accounts, instead of getting thousands of accounts, they're only going to get exactly what they need to do their job. So our performance is really, really good. And the one story we heard at EMC World this year, which is fantastic, was ransomware. You guys have an interesting ransomware solution. Do you guys see that at all? You prevent that at all? Well what we can do is our full audit trails. We're tracking everything that people are doing, what time people are coming in, what data they're actually accessing, what policies they're hitting, and then we can provide this data in real time to their SIM systems. And the customers are happy? Oh, customers are extremely happy. Share some color under the customer situation. So we actually have a little casino down in Southern California, we've actually put this into place. And so it's now allowed them to, they were worried that they actually have a lot of player information, a lot of financial information in that player data. So they were not able to actually build out a lot of use cases, to take advantage of that information because they didn't want to run the risk of exposing their customers financial information. So now utilizing the blue talent in the ecosystem, we're able to allow them to again, store the data. In some cases, we obfuscate the data on the way in, so we actually go ahead and tokenize certain things we don't want to be readable. But by proving that we actually have the in-flight security accesses, that users can't pull back more data than they're authorized to see. Plus with the audit trail capabilities, that's where we started to build that whole lineage model. So with Zolonia Tivio, I can show you Zolonia, how we got data into the system, with the blue talent. We can show you what people did with how they access the data on the back end. And again, that's one of the huge integrations for us in the technical integration space. We're talking about the metadata, right? It's that metadata, so we actually have that one complete picture. Now as an ecosystem, we have a complete picture of how we got data, where is the process, what was done to it, and then how is it accessed and who accessed it. So we started to be able to provide information. We just announced, we're not announced yet publicly, a large bank in the UK, that was one paramount to this piece was the security and the audit capability. And this doesn't impact real time at all. This actually helps that real time scenario. Absolutely. Move the data lake, info from the data lake into real time. As a matter of fact, we're actually helping with that. So we are dynamic. So if someone's standing in the UK and there's certain governance and compliance that needs to be enforced, we're doing that, but now all of a sudden. On the fly? On the fly in real time. And if they move to the US, those governance and compliance will change dynamically on the fly. Your customers must be really happy, but this kind of capability, yeah? They are. It's a good solution. It's a good solution. Like I said, we've started to break down the barriers, right? Again, back to that whole piece, companies have been trying to do this on their own for a while, trying to be their own SIS, right? And they find that, yes, when they get through these pieces, there's a lot of, I can get it to work once, but there's a lot of work involved to keep it progressing forward. And so again, with the great ecosystem we've got, with the great partners we've got and all working together at that technical integration layer and all buying into the ecosystem that allows us to provide easy access to our customers. And again, right back to the whole piece, the simplicity of it is we provide the blue talent, the ativio, the Zoloni, and the EMC capabilities all in one set that makes it easy to consume information. And it actually also simplifies that access to the data. But we now give IT, right? The fear that they've had is that if I open this up and I put all this stuff into my own one storage silo, storage position, that I open up for the wild, wild west and I start the ability to not stop data exfiltration, ability to not stop disgruntled people from seeing data they shouldn't see. So with that whole piece now, we've got the ease of use of this. So financial services sector is really taking off for us. Actually an interesting one for us that's coming big too is utilities and the energy sector. Because they need a lot of this information because they're pulling a lot of private data off of these smart meters. So they need to be able to secure or be able to use but without the ability to secure it. It sits in their data lake stagnant without being able to, you know, with no value. Securities, the key. Congratulations, Gary. Steve, it's great to have you on the queue again. Good to see you. He goes, this is booming with EMC. I'm glad to be part of it. Yeah, I have the integrations of the key, security obviously, table stakes as well. This is the queue here live in Silicon Valley for Hadoop Summit 2016. We'll be right back with more live coverage after this short break.