According to Allied Market Research, the Global ERP Software Market is expected to grow 7% annually over the period 2014 through 2020 to be worth $41.69 billion. SaaS-based enterprise services provider Workday (NYSE: WDAY) has been doing well in this market. In fact, in the recent quarter, the company managed to sneak in a profit. It is hard to predict if they will manage to retain this profitability, but for now, things appear to be looking up.
Sramana Mitra: Can you help put some of the other players and the ecosystem map in view a bit? I’m still looking for the ecosystem map.
Mike Potts: Let me shed a little bit of light on what we’re doing. We really are the lights of the network using the electricity, which is the metadata coming off of switches, routers, and firewalls. What we’re able to do is provide instant visibility and also be able to detect when behavior patterns and network traffic begins to change. We’re providing a different level of security than what other providers have been able to provide up to this point. It plays into this management adage that unless you can measure, you can’t manage it. In security, if you can’t see it, you can’t secure it. We’re providing the eyes and ears to the network. >>>
Atlanta, Georgia has become a mini hub for Cyber Security companies. Lancope is part of that ecosystem. This conversation is an exploration of the network security side of things.
Sramana Mitra: Let’s start by introducing our audience to yourself as well as to Lancope.
Mike Potts: I’m the President and CEO of Lancope. I’m a 20-year-industry veteran who has been in the software security since the evolution of mainframe security technology, which was where I started my career with a company called MSA. Then, I ran a company called Jacada, which we took public. We helped interface to the web legacy applications. I, most recently, ran a software security company called AirDefense, which was acquired by Motorola. That’s a quick recap of my experience in the industry, which leads us to Lancope. We are a network security company that provides network visibility and security intelligence to some 750 global customers at present. >>>
Sramana Mitra: I got it. Let’s actually take this forward. Now, I’m going to ask you to go up to that 30,000-foot level and talk to me about the application of artificial intelligence into the field of cyber security. In more general terms, what are some of the things that you’re seeing? Who’s doing what? What else can be done? What are other open problems that can be solved in this mode?
I was at a talk last night on artificial intelligence and startup opportunities in AI was advertised. Everything was discussed except for startup opportunities in artificial intelligence. It was not well moderated. Part of it is because it’s complex. I think the person moderating couldn’t really get to the heart of things. I do believe that security is an area where artificial intelligence is having a direct impact right now.
Mark Jaffe: It is. I think what’s interesting is that the state of the industry is such that, today, the best practices in machine learning and the advance thinkers in machine learning are building these supervised models. They’re cranking out more and more use cases. I think what we’ll >>>
Sramana Mitra: If I understand correctly, you have this behavioral detection data anlaysis going on. The machine learning is correcting things. As new use cases pop up, the system administrators can set up new heuristics on what the machine learning algorithm should be doing in an unsupervised mode to correct those.
Mark Jaffe: It’s not to correct them as much as they can use our single platform to deploy new use cases within a minute. They can initially use the product to identify DNS tunneling accurately in their environment.
Sramana Mitra: They can identify a set of use cases that are causing these alerts. Then they come up with remedies for those. They can program those remedy elements in an unsupervised learning mode into your machine learning algorithm. Is that what you’re saying?
>>>
Sramana Mitra: I think the data-driven approach is growing for sure. The follow-up question to that is, do you have direct competitors that are following exactly your approach?
Mark Jaffe: There are a lot of competitors who are applying machine learning to solve the data problem. I couldn’t even name them. Since this interview started, investors have probably put money into another one because it’s a hot space. The question is how do we compete in that market? The best way to explain that is to share what we see and what customers come to us for. We’re uniquely positioned to help larger organizations that are centrally collecting data. They want to build a center of excellence around a single behavioral analytics platform that they can use for user-based security, network security, server security, database security. They want to use it for operations. They may have tentacles into IoT. They may have business data. >>>
Mark Jaffe: The challenge in building Prelert and this sounds like a simple approach, is learning normal behaviors from billions and trillions of terabytes of data per day and being able to do that accurately. It turns out to be really hard. That’s what Prelert is all about – having cracked the code to be able to give our customers a handful of alerts that represent real indicators of compromise.
Sramana Mitra: Interesting. What kind of adoption are you seeing in the industry for what you are offering?
Mark Jaffe: There’s been transition. The adoption has been really good. In the first quarter, we grew almost 300%. We’re growing nicely now. I think there are still candidates for adoption because a lot of security teams are still struggling to get the existing approaches up and running. >>>
Mark Jaffe: So I met Steve Dodson who’s the CTO of Prelert. Steve and I founded the business with the goal of automatically gleaning insights from those logs that are today missing and therefore lead to long undetected breaches and operational issues.
Sramana Mitra: Can you walk us through, in some detail, exactly how the detection is happening? I assume you’re selling to enterprise customers?
Mark Jaffe: Enterprises and to other vendors but mostly to enterprises. Let me explain that. I think it’s a really good question because I think there’s a lot of different approaches to solving, what we generally categorize as, advanced persistent threats. The best way to describe that in our approach is to recognize that most approaches try to solve the problem by identifying behaviors of some sort that are indicators of compromise. >>>