 From Miami Beach, Florida, it's theCUBE, covering Acronis Global Cyber Summit 2019. Brought to you by Acronis. Hello and welcome back with theCUBE's coverage here for two days at Acronis Global Cyber Summit 2019. I'm John Forrier, host of theCUBE. We're at Miami Beach at the Fontainebleau Hotel and I am here with the CEO and Chairman of Acronis, SB, is there a guy known as SB? Yes, yes, yes, that's fine, that's fine. So you're an inaugural event of the Global Cyber Summit. What's your feeling so far? Do you like it? It's very good. We have exited the expectations in terms of attendees. We have high quality audience. Everything is organized quite well. It's our first event of a kind. It's a first event which marks the transformation of the company from being a data protection company to being a cyber protection company, from being an application company to being a platform company. Talk about the vision and how you got here because again, the market's changing, cloud computing, internet of things, more threats than ever before, data seems to be at the center of all this. What's the vision? We don't think about the IT in terms of data. We look at IT in terms of workloads. And so workload could be data, could be application, could be system. We also look at IT not from the standpoint of large customer, small customer, but from the standpoint of end point, like your computer right here on the table, or a mobile device. From the standpoint of core IT, which is a large data center of a large enterprise, or it is a cloud, like Amazon, like Google, like Microsoft, and from the standpoint of something in the middle, which we call Edge, and it's growing very rapidly. That's a small data center. That's a remote office. That's a small office. That's also specialized locations like factory, like hospital, like railway station, like restaurant, like any retail location, where you actually have specialized computers, effectively servers running the infrastructure. For example, every Starbucks location is actually 12 computers. And those computers, the Edge and end point, need protection, need complete protection. And our vision is to provide a complete protection from the standpoint of safety, accessibility, privacy, authenticity, and security. That's something which we call a chronic surface. You know, I think your division's right on. In fact, when you think about data protection, my observation is it was because of disruption and operation somehow. An event happened, hurricane, flood. The operation was disrupted so they got to roll back and get the snapshots and bring it back. But security is now causing a disruption. I think you guys are honing in on that the disruption is coming from a security vector. And so the official mechanisms have to change a little bit. That seems to be your success here with the... I think we look at this holistically. We don't see really a difference. So safety, accessibility, privacy, authenticity, and security, all of these vectors are a problem. You know, perhaps authenticity is not yet visible as much and privacy is new. So privacy is not the bad guys. You know, it's a good guys. It's maybe your other employee or maybe your partner or maybe it's your customer who you don't want to see the information about somebody else. And so all of this is a threat. And you really don't want your infrastructure to bring damage to your business or to yourself. Unintentional damage. If you want to break something, you better break it based on your decision and you better be able to roll back. And so, you know, it comes from data protection, but it goes to security and privacy and authenticity. All of this together is important for the fact that your IT infrastructure is functional and at all times controlled by you. In your opinion, has ransomware provided a wake-up call to IT around this area? Because that seems to be a theme a lot with ransomware where people realize that they're stuck. And it highlights a problem. I think ransomware is an interesting trend. I wouldn't really be happy about ransomware. Ransomware is a bad thing. So we help people to be protected against ransomware, but that doesn't mean we like ransomware. Yeah, I know I like ransomware. Extortion is not really well-liked. But you're the one being extorted. It's not really a nice thing, but it's one of the wake-up calls. In reality, again, it comes from older direction. I think ransomware is just very, very easy to understand. Yeah, and people can see it and understand it. Explain, you mentioned SAPAS, SAPAS. What is that? Explain that acronym. What does it mean? What's the vision behind it? SAPAS is a safety, accessibility, privacy, authenticity, and security combined in a single product. That's what it means. It means that you don't lose anything. Everything is accessible at all times. The right people have access and you can control the access. Nothing is modified in such ways that you don't know it was modified and no bad guys can break into your IT or into your data or into your application. You mentioned the platform. Platforms are a well-known concept in computer science and certainly the Internet. You've seen great successes with platforms that enable something. How would you describe the enablement that comes from the Cronus platform, the cyber platform? I think it comes back to what you started with. There is a lot of new trends. Part of these new trends is the world for a while. Maybe 20 years ago it looked like the world which is consolidated. You have one vendor which provides solutions to vast majority of problems, which was Microsoft. If you remember 1999, it looked like pretty much everybody is going to use Windows. Mac is not going to be there. There are some inroads in mobile with Windows CE and so on and so forth. Well, now the world is deconsolidating. You have tons of different types of workloads. You have different systems. You have different applications. You have different cloud applications. You need to protect them in a very different way. That's another thing. You need to integrate with a lot of applications. We cannot do it all. So we opened our applications and our platform for third parties for the event like this to actually build on top of the platform to provide the functionality which we look at. You said the word system a few times and I think this is an interesting platform validation. Systems thinking is like an operating system. It's a lot of consequences in systems. It seems that systems thinking is back in the front lines of IT and technology because you've got a cloud, you've got on-premises, you've got IoT, you've got networks. It's a system. And so, holistically, thinking about it is interesting. Do you think people are getting there? Or do you think that's the right thing to do? Think like a system. We are simple people in Acronis. We look at the world and we don't see anything but data bits and bytes, zeros and ones. We don't look at everywhere and we don't see anything but workloads. And these workloads, they could be in the cloud, they could be on-premise, they could be in a location, they could be on your mobile device, it could be the whole device or part of it. And we also see the world in terms of partners. And from our point of view, you know, it's whether people realize it or not, people have IT, it needs to work and there are partners to help them. So if IT doesn't work, they cannot do anything. They cannot call their friends, they cannot communicate with their relatives. So it's impossible, it has to work. It's a protection to make sure that it works at all time, no matter what is a possible challenge. SP, thank you for taking the time to answer some questions. I want to get one final question to you. The news today, opening APIs up, creating a developer network and a portal for new things. What's your message to the folks that want to developing on your platform? What's the guiding principles? What's the simple value proposition of being a developer I wouldn't want to work on that promises global platform? So we might look relatively small, we are only 1.5 thousand people and we are only several hundred million dollars a year. We are growing very rapidly. We have 6000 partners who can sell your products and this number is growing very rapidly. We have 30 thousand in several years. And so you have also a lot of data under management. And this amount of data is growing very rapidly. So if you build applications for protection of this data, this number of workloads, this number of partners to sell it, you can sell your product successfully. Ultimately, for developers, it's about doing something which makes money and doing something which makes sense. And with our partner network, with our workload and data reach, they get to make sense and they get to make money. We have a new category emerging out of the old data protection. If you had to describe to someone the old way versus the new way, data protection, the old way, cyber protection, the new way, what's the difference between the two? Well, the difference is that it includes security, privacy management and authenticity management into one package. The difference is that it's designed to work in the world which is inherently insecure. It's designed to work in the world and not to network. You don't trust this network. And so if you have a cyber protection application or cyber protection hardware, it has to be protected itself. That's me. Thank you for coming on theCUBE and taking the time out of your busy schedule to talk to us. Thank you very much. You're welcome. Thank you very much. Appreciate it. It's theCUBE coverage here in Miami Beach we're across Global Cyber Summit 2019. I'm John Furrier. Thanks for watching. Two days of coverage here. We'll be right back.