Kris Lahiri: We’ve had a company that specializes in just drone pictures. They take live pictures of a site by drones and keeps that integrated. It uses this as an update to see how that project is progressing and roll that up into whatever reporting they want.
It doesn’t have to separately figure out what to do with the data from the company that works on drone. That is integrated through Egnyte. Similarly, there are these ecosystems that are built out for many industries. Life sciences is a good example.
>>>Kris Lahiri: There is another angle which is what you were referring to. I’ll bring up Egnyte in the life sciences space. Nowadays, there’s a lot of very serious work being done by life sciences companies that are using either genomics or other types of DNA sequencing, which needs a huge amount of elastic compute.
It’s a perfect environment for what happens in the public cloud like Google Cloud and AWS. The results of those experiments is what they need to collaborate on.
>>>Kris Lahiri: In those four to five years, IT either did not have the tools that they would like or people’s thinking had to change. IT was just constantly looked at as a naysayer. If I go and ask my IT how to build this environment, they’re just going to say no.
So I’ll get a department-level AWS account and go build this out in AWS and demonstrate certain results. I’ll integrate some kind of a Hadoop backend and process all this data. They’re able to really work and produce results very rapidly.
>>>Kris Lahiri: We integrate with all the top identity management providers. Now that I know who can get in, what types of access do they have? It’s not necessary that everybody in your finance department should automatically have access to payroll info. It’s also not true that everybody needs access to the finance folder.
This type of real-life situations that we’ve seen in the past as well as with our customers is what is built into the platform. We refer to this as our permissions model.
>>>Sramana Mitra: I would like you to isolate the different security issues of a content platform and comment on each of them. What are the challenges? How do you differentiate? What are the issues we are dealing with in the current landscape?
Kris Lahiri: I’m going to come at it from a little bit of a deeper technical perspective. Very baseline infrastructure type of issues come up. We look at any content that a customer shares or stores within Egnyte as crown jewels of that company.
>>>Excellent conversation about the security aspects of content and data and the evolution of shadow IT.
Sramana Mitra: Let’s start by introducing our audience to Egnyte and yourself. Bear in mind that we have been covering Egnyte for a while. The audience have some idea. We are going to talk about Egnyte today in the context of cyber security.
>>>Mark Geene: We don’t do a point-to-point mapping structure. We give companies the ability to define a data structure, create a virtual representation of that, and make them all look the same.
The benefit of that is, instead of doing all these point-to-point mapping, you’re now always dealing with one common model. We help them make everything they integrate to look like that common model. That’s one of the big differentiators.
>>>Sramana Mitra: Let’s do a couple of more use cases just to understand the types of activities that are happening on your technology.
Mark Geene: Another use case is in the unified communications space. We’ve got customers like Dialpad and Infuse. Dialpad is a tremendous product. It streamlines communication with customers by bringing cellphone communication as well onto the internet with an easy-to-use platform.
>>>