0:04 So first of all, you know, back in the day when I was a young engineer, life used to be very simple. 0:13 You know, our infrastructure had a well defined perimeter and there was only one way to get in and out of our enterprise infrastructure. 0:21 So it was easy to protect. 0:23 In that picture, it might have been a bridge across that water perimeter, so it was easy to protect. 0:28 Why? 0:28 Because it was very safe, was safe from the outside attacks, safe from outside world and threats. 0:32 And our employees could be inside the castle working, getting their job done, and it was very productive. 0:39 But it was too good to last. 0:43 What happened along came Internet mobility, cloud, all translated into this concept of digital transformation. 0:54 It's changed the world, it's dramatically changed the world, but all of us together have been adapting our infrastructure, network security to meet the needs of this digital transformation. 1:08 Now, why digitally transform? 1:11 If you talk to AD, CEO or CFO or CIO, it's really about flexibility and agility. 1:17 That's the whole promise of driving productivity, right? 1:20 And that that was kind of the promise and it's actually been delivering and you've been actually a critical part of enabling that digital transformation. 1:28 What's happened with digital transformation? 1:30 First, our data and applications have all moved to the cloud. 1:35 Today, 90% of the traffic in the enterprises is really destined to the Internet. 1:40 Yet the amount of collaboration inside the enterprises with video and all the collaboration tools is at an all time high. 1:49 Video concurrency has gone up from less than 5% to over 50%. 1:54 The amount of hybrid work or remote work has gone from less than 5% to just being a norm for most organizations. 2:02 So it's really changed how and what the way we work and where we do it. 2:09 So what's next? 2:11 Well, how do we deal with this? 2:13 Well, first thing is we actually work together to transform our offices with all the destinations being in the cloud, many of us have transformed our branch and offices to get to that path faster. 2:26 Why? 2:26 Because the web became the Internet, the, the, the network we've been using Internet as you heard from any of us and all of you kind of doing it is a way to connect across these sites and getting to cloud. 2:37 Now, not everyone kind of relied on a distributed Internet breakout. 2:41 Some of you have, some haven't. 2:42 Some are on that journey, but you need to have your own path to it. 2:45 Nobody's got the right answer at the right time. 2:47 You've all got to have your journey to it, but we did transform branch connectivity and many of you transformed it with Versa. 2:55 And we appreciate that with using SD Wan and the solutions that we're putting in today, today. 3:01 And now we're actually still extending that journey because it's no longer about the branch, it's about the destination, it's about the data center, it's about the cloud, the multi cloud. 3:07 All those pieces are kind of coming together. 3:09 So network is getting transformed, but that was about office and data center and remote connectivity. 3:15 Second, we had to scale dramatically our ability to connect a remote workforce, and that happened through the pandemic. 3:25 It's continued. 3:26 Rather than have a small percentage of population connecting up for a small period of time, it was 100% of the population connecting 100% of the time. 3:33 And that took a lot. 3:34 That wasn't easy. 3:35 And credit and kudos to all that have actually done that and done that with ease. 3:43 Now, where's the edge today? 3:46 The edge is not just a place anymore, it's actually everywhere. 3:52 And it's no longer the network edge. 3:53 We are the edge, our devices are the edge, the users are the edge. 3:57 Our behavior is the edge. 3:59 The edge is everywhere. 4:01 It's no longer outside the organization. 4:03 It's actually even inside the organization. 4:06 So how do you kind of deal with that is going to be the next part of the conversation. 4:10 But before we get there, you know, let's, let's take a minute to take a deep breath because we've achieved a lot, right? 4:19 You all have achieved a lot and you deserve a medal, right? 4:22 Because this has not been easy. 4:24 It's not simple and it continues to happen every day. 4:27 Now, what have you achieved? 4:28 Well, it used to be a cost center. 4:31 No one talks about it being a cost center. 4:33 Every company, every industry talks about that, them being a technology company 1st. 4:38 So you've moved it from being a cost center to a business enabler. 4:43 And that's not an easy transition to make IT security. 4:47 Everyone's in the boardroom talking about what's next, the digital, what's digital mean? 4:52 There's a chief digital officer in most organizations. 4:55 There's the CIO is at the at the board, board level presenting to the board meetings. 4:58 It's great. 4:59 And it's great to see that. 5:00 So first of all, congratulations to all of you for getting that done and getting IT to where it is. 5:05 So you deserve a big round of applause. 5:07 So thank you. 5:13 But where are we now? 5:17 Are we done? 5:20 I don't think so. 5:22 You know, you're not done. 5:24 So yeah, not so fast today. 5:32 And don't laugh, OK? 5:33 Or you can laugh. 5:34 We're living in the post digital transformation world with a hangover. 5:40 OK, That's how some of us feel this morning. 5:42 I'm OK, but I'm not sure about some of the folks that stayed in the bar last night. 5:46 But it's it's an interesting time because while we've accomplished a lot, we feel like there's like more to do and we're not sure if we're ready for it. 5:57 We're ready, but we got to get get get the day going. 6:00 So what does this mean? 6:02 Well, the first thing is look at what we have to do and the paradigm of move fast and break things is not something that you could apply to running your business. 6:14 Your business is not going to put up a downtime. 6:17 Your business cannot afford loss of connectivity. 6:19 Your business cannot afford breaches that are going to slow you down. 6:23 So wasn't moving fast and breaking things. 6:27 You move fast without breaking things. 6:30 And that's kind of what we have to do going forward is we have to move fast. 6:33 Well, we can't break the business. 6:36 Business has to go on. 6:37 The lights have to stay on. 6:40 So that's kind of the big thing and that's the big part of what we're going to do now is how we're going to go forward without breaking things. 6:46 But how would how do we do it? 6:48 Well, the first thing we did collectively, we said, you know what, let's take our infrastructure, let's break into islands. 6:55 And some of you talked about those islands. 6:57 One of the big islands is network. 6:59 While I do network and security is part of somebody else that's a Big Island today, I think those islands are going to have to come together. 7:06 2nd, we said, well, branch offices, remote offices, let's kind of make them an island. 7:11 Let's go worry about how we're going to connect branch connectivity. 7:14 We're going to use SD Wan, we're going to use this. 7:16 We're going to do security that way. 7:17 That's covered campus. 7:19 Well, we're going to go down this way and do that here and we're going to have some Network Solutions and we're going to have some security solutions there. 7:26 Remote access, same thing. 7:27 We're going to do a VPN, transform that to Z TNA and get that done. 7:32 Oh, well, cloud, cloud networking, OK, we've got some stuff going on here. 7:35 Data centers, another piece. 7:36 So we've created islands. 7:38 The result of those islands is what we're going to talk about, OK? 7:43 And how do we get there? 7:44 So where have we gotten to? 7:47 Well, infrastructure is actually slowing us down because what we did to get to agility with digital transformation, we're finding we don't have agility anymore because most enterprises talk about over 70 different tools, products, panes of glass, security network, different types of operating systems, different products to really operate and manage. 8:12 And now that creates complexity and of course causes lack of agility. 8:19 2nd, we have so much security, but we have zero trust. 8:26 Michael yesterday talked about how many appliances that they use at this up 30 plus and yet there's zero trust. 8:36 The network is not supposed to be trusted. 8:39 You have to assume that there's a breach already done and typically it's a network that's caused a breach. 8:45 OK, So there's no trust, There's zero trust. 8:49 Lastly, we have lots of capacity. 8:53 We've have so much capacity everywhere in the network. 8:56 You're using 500 Meg a gig. 8:58 Everyone's talking about how we're, yet we struggle with the user experience, we struggle with performance, and we have to kind of go figure out what's causing those performance issues and where. 9:10 And the challenge is different. 9:14 So this is another interesting one. 9:19 We have a lot of data, OK? 9:21 We have data everywhere. 9:23 All those islands, all those components, we have so much data and telemetry coming up. 9:28 Massive data, but limited insights because somebody's got to synthesize that data, somebody's got to put it together and that's hard. 9:41 And costs, I know what I say, which is our business is going to grow, but we have to maintain our costs to reduce them. 9:47 And I'm sure you're all struggling with the same thing. 9:50 No business is going to say, here's an unlimited amount of budget, right to go do what you need to, you know, whether it's network or security, you have to figure out how to maintain the business growth and trajectory without increasing costs. 10:04 So what do we need? 10:06 How do we get there? 10:06 Because this is not a simple challenge, right? 10:08 How do we need, what do we need to do together to kind of get there? 10:11 Well, we have a view on it and I'm happy to take your input on the views, but this is kind of the way we're thinking and the way what we're doing, tying into what we're addressing here. 10:22 The 1st is we need total automation. 10:24 Our traditional approaches of troubleshooting the network and troubleshooting network issues will no longer scale. 10:32 You can't throw more people at the problem. 10:34 The time it takes for us to react to understand what's going on, where the issues are can no longer be done manually. 10:41 Breaches. 10:43 We're living in an age of Gen. 10:44 AI where Gen. 10:45 AI based attacks are going to be hitting us not in one edge, every edge. 10:51 And the number of attacks and the sophistication of attacks is already up and you'll see more data about that every day. 10:58 So reacting to those breaches you cannot do manually. 11:02 By the time you figure out what's happened, it's already too late. 11:06 So how do you react to that? 11:08 Now? 11:10 We think that the way to fight AI is with AI. 11:17 You have to use it for security and you have to use it for networking, but you can't bolt it on. 11:25 You know how many products you have or platforms you have inside your organization? 11:29 Getting data out of that those platforms is a challenge. 11:34 Now, AI is all about telemetry and data. 11:37 If you have islands of data, the first thing you've got to do is organize that data. 11:41 That library picture that I showed, it's nicely categorized. 11:44 Well, data, if it's nicely categorized, if it's slightly structured and put together, then AI is easy. 11:50 If it's not, you have to spend a lot of time, a lot of data lakes, a lot of islands, spend a lot more money to get that done, which is also a challenge. 12:01 So AI has to be built in, not bolted on. 12:06 Just like security, AI has to be built in, not bolted on. 12:10 If you don't have AI embedded in your platform, in your infrastructure, you're going to have a tough time meeting the goals of AI. 12:18 There was a lot of folks talking about how do I get on the AI journey today? 12:22 Well, you can leverage it where it's there. 12:25 Leverage it. 12:25 Start on your journey. 12:26 Start on a journey with operations, AI operations with VANI, prediction, network optimization. 12:32 Start using it for other other things, Security, wherever it is, detecting anomalies, remediation. 12:38 Get that started now. 12:42 Automation is absolutely fundamental to the future. 12:49 Now, automation can be really hard in the current environment, but if we make it easy, the only way to make it easy is of radical simplification. 13:02 You've got to simplify the infrastructure, you've got to simplify the platforms. 13:07 You've got to simplify and do all the things. 13:09 Now the talk of platformization in the industry is happening today. 13:13 Everyone's talking about the journey to platformization. 13:15 I'm going to take all these pieces and stitch them together. 13:19 It's a nice vision, but it takes a long time to put things together that weren't meant to be together before, so stitching those together is going to take some time. 13:28 So what you're going to have today, you're going to have to get on a journey with something and continue to evolve it to be into the platform. 13:34 And why is this important? 13:37 Simplifying your network and security infrastructure is a key thing. 13:41 Even large incumbents are talking about taking their bespoke products, bespoke architectures, and converging them together into a single architecture in a single plane. 13:50 Why? 13:51 Because it makes it simple, right? 13:52 The journey for them to get there, it's going to be years. 13:57 I was telling someone this earlier where I started a journey in my last employer many years ago of platformization. 14:07 We used to have a bunch of boxes in My Portfolio. 14:09 Every box had a different architecture, different ASIC team, different architecture of the processing and line cards, different software, different ASICS, and it was all resulting in about lots of people in that organization. 14:26 The journey we set forward is we said let's continue down the path of platformization. 14:31 And I left that company 8 years ago and they're still on that journey of platformization. 14:36 It takes a while, OK? 14:38 It takes a while. 14:40 So and SASE was a really good start. 14:43 We felt SASE was a good thing. 14:44 We think it was great to talk about convergence of network and security because that drives simplification, that drives your ability to be able to detect and protect and also drive all the things that you need to from a network standpoint as well. 14:56 However, however, the initial iteration of SASE was really about taking discrete products. 15:02 You can put these products anywhere and stitch them together and get to the functions that you want. 15:06 In fact, SASE before was SD Wan with SSE. 15:09 SD Wan is not just about SD Wan. 15:11 SD Wan has a lot of networking capabilities in it. 15:14 You know, you've tried all the other SD Wans somewhere or the other, and you know that not all SD Wans are alike. 15:20 SSE. 15:20 SSE was a combination of all these other things, Proxies, firewalls, SWIG, I mean 0 truck, all these pieces kind of stitched together and most of them were existing discrete products. 15:31 Even in some of the SSE vendors today that call themselves SASE vendors, their products and portfolios and services are not converged. 15:39 They're not a platform. 15:43 So SASE was a good start. 15:45 Not only that, it did only address a handful of things. 15:49 It talked about remote work, it talked about sites or branches, and it only talked about the Wan. 15:57 Now, where's your edge? 15:59 It's everywhere. 16:00 Where are your users? 16:02 Everywhere. 16:02 Where's your attack surfaces? 16:05 Not just outside your organization, but even inside your organization. 16:09 So we think that SASE was a step in the right direction, but it needs to go further. 16:17 So as you've heard me say, yes, Sir, and I'll keep saying it until we, we remember this, which is we're in our mission is really to simplify how you protect every user, device and site everywhere and connected to data and applications anywhere, anytime. 16:33 So up until now, you've seen our portfolio, are you seeing what we're doing? 16:37 Apurva Kumar, the all the breakouts yesterday talked about all the different components that we have coming together, all with the vision to protect, connect and simplify. 16:47 Why? 16:47 Because we believe it's you that has to decide what inspection takes place, whether it's applications, user or devices and where it happens. 16:57 Does it have to be only in the cloud? 16:59 No, it should be anywhere. 17:01 You heard in Rahul's session yesterday that you can have CASB and DLP enabled in your SD Wan branch. 17:07 Why? 17:07 Because you need to be able to do that anywhere you want to. 17:10 Second, you need to decide what identity providers you want to use and the strength of authentication that you want to do. 17:18 The posture, how often you want to look at the posture, what adjustments you want to make, all those things you have to decide. 17:24 You have to decide whether or not you use appliances or agents and what size and what type you should decide that. 17:34 Also, security is very important, so you've got to figure out your private keys, where they held, and if any next, very important to get to AI, your logs, where are they today? 17:51 Where are you collecting them and what logs you're collecting. 17:54 I heard a data point from someone that in this one implementation, they're collecting 1.1 billion logs a day, 1.1 billion logs a day. 18:08 Now you've got to process those logs, you've got to look at it and they're not even scratching the surface of their overall implementation. 18:14 So you've got to decide what logs you collect and where. 18:17 And lastly, you need to decide what infrastructure you want to use, whether it's things running in your environment, you're buying a SAS service, you're building your own, but having somebody operate it. 18:31 So I call that three different iterations. 18:33 The infrastructure, whether it's sovereign, meaning completely air gapped, whether it's private built for you but could be operated by someone, or whether it's shared, those are all choices that you should make to get to this destination. 18:49 So what are we calling this? 18:50 Well, you've heard of talk about Unified SASE, but we think the time is right to take this concept one level further because while the competition is trying to catch up with us on platformization and Unified SASE where they have a single stack that covers everything, we're going to stretch the boundary further. 19:08 We think it's time for Universal SASE Platform. 19:11 So why Universal Universal? 19:13 Because it's not just about covering all users, employees and third parties and sites and devices and everything else, by the way, sites and devices, devices as well. 19:22 You need to cover devices, you need to cover all edge locations. 19:26 It's not just about the branches, it's not just about the offices. 19:29 It's got to be even about your, your cloud infrastructure and your data centers closest to the applications. 19:36 And it has to cover all networks. 19:39 It can't just be about the Wan. 19:41 You remember, you need to decide where, what, where, what, what you need to do and could be inside the LAN. 19:47 It could be at the Wan edge. 19:48 So policy enforcement should be anywhere and everywhere. 19:51 And security has to be built in. 19:53 It cannot be bolted on because the days of bolted on security are coming to an end. 20:00 Firewalls are going to go away as a box or a, but not away as a function. 20:04 Firewall. 20:05 Just like routers got integrated with other functions, firewalls are going to Firewall Inc. 20:09 Functionality is going to get embedded into many things. 20:13 So why do you want security baked in? 20:15 Why? 20:15 Because zero trust has to be at every edge. 20:18 It can't be at some edges. 20:20 It can't be just in my cloud pops. 20:21 It has to be at the Wan edge. 20:23 It has to be at the land edge. 20:23 It has to be at every edge. 20:25 If you don't have it at every edge, what you're going to be doing is like letting bad actors traverse through your infrastructure and create havoc until you can get to that security edge, which might be in the cloud only. 20:37 Second, security has to be flexible. 20:39 It has to be distributed, and enforcement policy enforcement has to be distributed. 20:45 Third, you can't just rely on posture that you've checked once or authentication only. 20:50 You have to have continuous risk assessment. 20:52 You have to have continuous threat detection and protection, and you have to do that as close to the user, device or application as possible. 21:00 So you have to have it at the edge, and where's that edge? 21:03 It's everywhere. 21:06 And by the way, that policy enforcement, somebody asked yesterday, has to be consistent in that session. 21:10 It has to be consistent, right? 21:12 You have to have the same policy no matter where the user or the device or the application is, you have to have the same policy. 21:18 And the only way to get that simplicity is to be powered with AI. 21:20 And that's what the Universal SASE platform is. 21:22 It's powered with AI. 21:23 So we believe that it's time to talk and get to that Universal SASE Platform. 21:31 You heard a lot yesterday. 21:32 You're going to hear real world use cases today. 21:34 Brent's going to be talking about what they're doing in the mobile infrastructure for offering SIM secure service agentless to every mobile subscriber that they have in their infrastructure and they're protected by SASE. 21:47 Very interesting concept. 21:48 OK, Then you'll see that how that SASE is coming into that, that access, mobile access. 21:54 The same thing is going to happen whether a user or a device is connecting through a service provider wireline or wireless access. 22:02 It does, it shouldn't matter. 22:04 It's going to be the same in the in the enterprise, whether it's a LAN or a remote user, it's all going to be connected in the same same construct. 22:11 So that's where we think the world is headed. 22:13 Why? 22:13 Because we think that this is going to help you build and create your own self protecting network where you and your business can trust your network. 22:24 Again, because we think that the network is got to be trusted. 22:28 The network is where you see all the attacks. 22:30 That's where the that's the door inside your enterprises infrastructure to your castle. 22:35 And there's many doors now than there were before. 22:37 And we've got to protect everyone. 22:41 So that's kind of where we're headed with our vision and our strategy for the next little while. 22:49 Now you'll start to see us talk more about this, and we wanted to share this with you. 22:53 So what you hear about it, you say, hey, I was just at versatility and I didn't hear anything about that. 22:58 You can talk about this to your peers, your kids, your spouses, your friends, but also your bosses.