 Okay, up next in the Lightning Talk session is Brian Gallaghan, manager, security and operator at Brookfield Properties. Brian, great to see you. Thanks for coming on. Thanks for having me, John. So Unified Visibility Across Extended Asset Surface Area is key these days. You can't secure what you can't see. So tell me more about how you were able to centralize your view of network assets with Armus and what impact that had on your business. Yeah, that's been a really key component of ours where we've actually owned multiple companies within and are always acquiring companies from time to time. So it's always a question, what is actually out there and what do we need to be worried about? So from an inventory and perspective, it's definitely something that we've been looking into. Armus was a great partner in being able to get us the visibility into a lot of the IoT that we have out in the environment. And then also trying to find what we have and what's actually installed on those devices, what's running, who's talking to who. So that's definitely been a key component with our partnership with Armus. You know, we interviewed a lot of practitioners and companies and one of the things we found is vulnerability management programs is a lot of gaps. You know, vulnerability management comes across most sometimes just IT devices, but not all assets. How has Armus vulnerability management made things better for your business? What can you see now that you couldn't see before? Yeah, again, because we own multiple companies and they actually use different tools for vulnerability management, it's been a challenge to be able to compare apples to apples on when we have vulnerability, when we have risk out there, how do you put a single number to it? How do you prioritize different initiatives across those sectors? And being able to use Armus and have that one score, have that one visibility and also that one platform that you can query across all of those different companies has been huge because we just haven't had the ability to say, are we vulnerable to X, Y and Z across the board in these different companies? You know, it's interesting when you have a lot of different assets and companies, as you mentioned, it kind of increases the complexity. And yeah, we love the enterprise. You solve complexity by more complexity, but that's not the playbook anymore. We want simplicity. We want to have a better solution. So when you take into account the criticality of these businesses you're integrating in in real time and the assets within those business operations, you got to keep focused on the right solutions. What has Armus done for you that's been correct and right for you guys? Yeah, so being able to see the different, like be able to actually drill down into the nitty gritty on what devices are connecting to what, being able to enforce policies that way, I think has been a huge win that we've been able to see from Armus. It's one of those things where we were able to see North-South traffic, no problem with our typical SIM tools, firewall tools, different logging sources, but we haven't been able to see anything East-West. And that's where we're going to be most vulnerable. That's where we've been actually found, we found some gaps in our coverage from a pentest perspective where we've found that we don't have that visibility. Armus has allowed us to get into that communication to better fine tune the rules that we have across devices, across sectors, across the data center to properties, properties of the data center, and then also to the cloud. Yeah, visibility into the assets is huge, but as you're in the operations, you got to operationalize these tools. I mean, some people sound like they've got a great sales pitch and all of a sudden it's like, wait a minute, I got to reconfigure my entire operations. At the end of the day, you want to have an easy to use but effective capability so you don't text either personnel or operations. How easy has it been with Armus to implement from an ease of use, simplicity, plug and play? In other words, how quickly did you get to the time to value? Can you share your thoughts? This honestly is the biggest value that we've seen in Armus. I think a big kudos goes to the professional services group for getting us stood up, being able to explain the tool, be able to dig into it and then get us to that time to value. Honestly, we've only scratched the service on what Armus can give us, which is great because they've given us so much already. So definitely taking that model of, let's crawl, walk, run with what we're able to do, but the professional services team has given us so much assistance in getting from one collector to now many collectors and we're in that deployment phase where we're able to gather more data and find those anomalies that are out there. Again, big props to the professional services team. Yeah, one of the way to add an old expression when in the whole democratization happened on the web, here comes all the people, social media and whatnot. Now with IoT, here comes all the devices. Here comes all the things. More things are being attached to the network. So Armus has this global asset knowledge base that crowdsources the asset intelligence. How has that been a game changer for you? And were you shocked when you discovered how many assets they were able to discover and what impacted that have for you? We have a large Wi-Fi footprint for guests, vendors, contractors that are working on site, along with our corporate side, which has a lot of devices on it as well, and being able to see what devices are using, what services on there, and then be able to fingerprint them easily has been huge. I would say one of the best stories that I can tell is actually with a pentest that we ran recently, we were able to determine what the pentest device was and how it was acting anomalous. And then fingerprint that device within five minutes opposed to getting on the phone with probably four or five different groups to figure out what is this device? It's not one of our normal devices. It's not one of our normal builds or anything. We were able to find that device within probably three to five minutes with Armus and the fingerprinting capability. Yeah, nothing's going to get by you with these port scans or any kind of activities, so to speak, jumping on the Wi-Fi, great stuff. Anything else you'd like to share about Armus while I got you here? Yeah, I would say that something recently we actually have an open position on our team currently and one of the most exciting things is being able to share our journey that we've had with Armus over the last year, year and a half and their eyes light up when they hear the capabilities of what Armus can do, what Armus can offer. You see a little bit of jealousy of, hey, I really wish my current organization had that and it's one of those selling tools that you're able to give to security engineers, security analysts saying, here's what you're going to have on the team to be able to do your job right so that you don't have to worry about necessarily the normal mundane things. You get to actually go do the cool hunting stuff which Armus allows you to do. Well, Brian, thanks for the time here on this lightning talk. Appreciate your insight.