Dean Sysman, co-founder and CEO of a cybersecurity company, emphasizes the importance of cybersecurity in today's tech-savvy world. His platform, Axonius, provides visibility and truth across data sources for effective action. With the rise of generative AI, trustworthiness is crucial. Organizations need a unified platform to consolidate data and collaborate between teams. By leveraging AI for insights, informed decisions can enhance cybersecurity. Axonius introduces Cyber-Asset Attack Surface Management to gain visibility and address security risks. Success stories include a healthcare manufacturer transitioning to remote work and a media conglomerate managing a cybersecurity incident. The platform empowers organizations to proactively manage cybersecurity posture. Dean's focus on creating a system of truth showcases the importance of alignment in cybersecurity. By leveraging AI and automation, organizations can navigate IT complexities and stay ahead of threats. The incident response team and security operations teams were critical in handling situations, showcasing the value of collaboration. The company recently announced a $200 million funding round with plans for growth and becoming a global cybersecurity vendor. They focus on customer outcomes, evident in their high Net Promoter Score. The subscription model is based on tiers of assets, with deployment options in different models. The company aims to increase revenue and become a future public company. Based in New York, they are hiring for various positions globally. Interested individuals can look up Axonius jobs for more information. Their dedication to growth and adding value for customers has been key to their success.
Forgot Password
Almost there!
We just sent you a verification email. Please verify your account to gain access to
theCUBE + NYSE Wired: Worldwide. If you don’t think you received an email check your
spam folder.
In order to sign in, enter the email address you used to registered for the event. Once completed, you will receive an email with a verification link. Open this link to automatically sign into the site.
Register For theCUBE + NYSE Wired: Worldwide
Please fill out the information below. You will recieve an email with a verification link confirming your registration. Click the link to automatically sign into the site.
You’re almost there!
We just sent you a verification email. Please click the verification button in the email. Once your email address is verified, you will have full access to all event content for theCUBE + NYSE Wired: Worldwide.
I want my badge and interests to be visible to all attendees.
Checking this box will display your presense on the attendees list, view your profile and allow other attendees to contact you via 1-1 chat. Read the Privacy Policy. At any time, you can choose to disable this preference.
Select your Interests!
add
Upload your photo
Uploading..
OR
Connect via Twitter
Connect via Linkedin
EDIT PASSWORD
Share
Forgot Password
Almost there!
We just sent you a verification email. Please verify your account to gain access to
theCUBE + NYSE Wired: Worldwide. If you don’t think you received an email check your
spam folder.
In order to sign in, enter the email address you used to registered for the event. Once completed, you will receive an email with a verification link. Open this link to automatically sign into the site.
Sign in to gain access to theCUBE + NYSE Wired: Worldwide
Please sign in with LinkedIn to continue to theCUBE + NYSE Wired: Worldwide. Signing in with LinkedIn ensures a professional environment.
Are you sure you want to remove access rights for this user?
Details
Manage Access
email address
Community Invitation
Dean Sysman, Axonius
Dean Sysman, co-founder and CEO of a cybersecurity company, emphasizes the importance of cybersecurity in today's tech-savvy world. His platform, Axonius, provides visibility and truth across data sources for effective action. With the rise of generative AI, trustworthiness is crucial. Organizations need a unified platform to consolidate data and collaborate between teams. By leveraging AI for insights, informed decisions can enhance cybersecurity. Axonius introduces Cyber-Asset Attack Surface Management to gain visibility and address security risks. Success stories include a healthcare manufacturer transitioning to remote work and a media conglomerate managing a cybersecurity incident. The platform empowers organizations to proactively manage cybersecurity posture. Dean's focus on creating a system of truth showcases the importance of alignment in cybersecurity. By leveraging AI and automation, organizations can navigate IT complexities and stay ahead of threats. The incident response team and security operations teams were critical in handling situations, showcasing the value of collaboration. The company recently announced a $200 million funding round with plans for growth and becoming a global cybersecurity vendor. They focus on customer outcomes, evident in their high Net Promoter Score. The subscription model is based on tiers of assets, with deployment options in different models. The company aims to increase revenue and become a future public company. Based in New York, they are hiring for various positions globally. Interested individuals can look up Axonius jobs for more information. Their dedication to growth and adding value for customers has been key to their success.
Dean Sysman, co-founder and CEO of a cybersecurity company, emphasizes the importance of cybersecurity in today's tech-savvy world. His platform, Axonius, provides visibility and truth across data sources for effective action. With the rise of generative AI, trustworthiness is crucial. Organizations need a unified platform to consolidate data and collaborate between teams. By leveraging AI for insights, informed decisions can enhance cybersecurity. Axonius introduces Cyber-Asset Attack Surface Management to gain visibility and address security risks. Success ...Read more
exploreKeep Exploring
What problem did Axonius aim to address when starting their company seven and a half years ago?add
What are some important considerations for cybersecurity to effectively cater to various stages and workflows within organizations?add
What is the process for customers to use the CAASM (cyber-asset attack surface management) category that the company has innovated?add
What were some examples of how Axonius helped companies overcome challenges related to working from home and IT outages during the COVID-19 pandemic?add
What can enable the IT and operational sides to take action against devices with vulnerabilities or breaches identified by the security team effectively?add
>> Hello, welcome to theCUBE. We are here in New York City's New York Stock Exchange. I'm John Furrier, your host of theCUBE. I'm here with Dave Vellante. It's Media Week for theCUBE and NYSE Wired. This is a cyber and AI innovators. This is part of theCUBE's initiative with the NYSE and our community to bring the best content. We come here to New York City. We'll be up and running full-time in 2025. Dean Sysman is here. Axonius is here. Dean, great to see you. Thanks for coming on theCUBE.
Dean Sysman
>> Of course.>> Appreciate you coming in.
Dean Sysman
>> Thank you for having me.>> So first of all, you're the co-founder and CEO of cyber security company. You started coding at 12 years old and graduated in high school, computer science at 19, second company you've started?
Dean Sysman
>> Yes.>> You started young.
Dean Sysman
>> Yeah. Well, I had a passion for computers from whenever I can remember myself. What I loved about computers is that you tell it what to do and it'll do the exact same thing an infinite amount of times. And it's not like people where you never know what they're actually going to do. That was really magical to me and I got into it because I love video games. But once I start to learn that in programming, you can create your own world, you can create your own rules. That's what I really fell in love with.>> Yeah, and it's really when you get into the tech, we're in a tech culture now where it's fun to see technology mainstream. Also, you had some robotics, you've experienced winning competitions. Now, tech's mainstream, with video gaming now mainstream, you got the gamer culture. Everyone's wired together. You're seeing as a first class citizen, computer science used to be like, hey, it was a disciplined software engineering, computer science, pretty well-structured. But now, the aperture with gen AI has expanded rapidly. You're starting to see people with no coding experience or degrees coming in learning cyber. They're learning how to code. We are in a phenomenal era of tech. What's your reaction to that? When you look at that now you see the market, what's your take on that?
Dean Sysman
>> I definitely agree. I think today tech is in everybody's life from my mother who's never was able to even use a computer. Now, she uses her mobile smartphone and techs and uses apps and it's crazy to see how much technology has gone into everybody's life. But moreover, I think for us in the cybersecurity industry, we're also going through that transformation and evolution of, it used to be something that nobody knew about or nobody understood. And then we start to see the big hacks. We start to see the big threats that evolved and actually start to impact day-to-day life with breaches and data leaks and even some cyber physical things that happened. And now, we see how much cybersecurity is an essential part of how every organization utilizes technology and not only keeps themselves safe, but also enables them to use technology safely to make themselves faster and better.>> It's funny, I watched the AI wave, especially generative AI, which is like gone mainstream. But before that, machine learning was out there, unsupervised, supervised machine learning. Now, you hear conversations like AI safety, cyber is a data problem. Safety as you just brought that up, let's get into some of the cyber challenges right now because it's a data problem, it's also an infrastructure problem in the sense that the growth of just the perimeter has been decimated. There is no perimeter. You got data that could be in a database. You have so many targets if you're a bad guy from a surface area standpoint. And gen AI just opens up another area where data is exposed. You've got resilience challenges. Being resilient and making things safe is critical problem, but it's an opportunity if you get it right. You guys have been working on this helping companies and cyber is always one of those things where it's just it's always a day, you're always fighting the bad guys, but now the tool is getting better and now you got more data aperture, you got tools, platforms are emerging, more platforms than I've ever seen before. What's your take on the current landscape of cyber right now? Because there's a lot more data that could be leveraged. You got speed, but it's the same game that you've been fighting. What's the current situation in your mind?
Dean Sysman
>> So what you said about the perimeter disappearing and the fact that it's a data problem are things that I couldn't agree more. And if we go to what we do, what Axonius does, we started our company seven and a half years ago. And when I started, the problem that I saw was that even in the best funded cybersecurity programs in the world, you could find threats, you could find advanced hacks, and that's exactly what happened to me. We found a very advanced state level threat. And yet, when I showed that to the team I was working with, they had no idea what was that asset. They had no idea why the device was there. They had no idea who owned it. They had no idea what was managing it. And the more I talked to more organizations, I realized that with the proliferation and the fragmentation of the computing environment, what ended up happening was just like a puzzle. There were all these different pieces that nobody knew how to put together and nobody really understood what they had. So to me, the starting point for everything you do is to know what you have and make sure they have the right visibility. So we created this new technology that today has over 1,100 now adapters that we know how to pull all the data from an existing organization's infrastructure from their existing controls, their existing products. And we do that seamlessly. And what you end up with is the true visibility and that true puzzle being put together in the right way that people understand what they have. And then the beautiful thing about it is that one of the things we talk a lot about in cyber security today, the biggest problem in our present day with AI, with the speed that everything is happening is how to take action. How do we make security and IT teams have the ability to go and take action? And to us, what we've seen is that it relies on having the truth. And we constantly say truth leads to action. Being able to have action ability is based on how much truth do you understand about your organization. And that's what we think is the biggest challenge to adhere not only to AI as it is today, but also how AI and all the new technical challenges are going to happen over the next few years.>> When you say, I got to understand my inventory or assets. In the old world, everything was pretty static. Now, you have stuff being added to the network, devices, you got gen AI turning on, services you may not know exists. So it's even more dynamic than ever before. I mean, from a problem set standpoint.
Dean Sysman
>> Exactly. Exactly. It used to be the case where an organization could say, okay, I have the high walls. We talked about the perimeter. I have an office network and if I just measure everything on the network, I'll be fine. But today, first of all, there is no real network anymore. People can be accessing a SaaS application from their personal device, but using their corporate identity and using corporate data, they could be sharing data with gen AI, they could be having different unmanaged devices in their network environment and you could be sprouting up physical office locations around the world without even ever visiting them. So every organization today needs to understand everything in their landscape and not just from a inventory perspective, but from a do I really see the truth about everything in my environment?>> I love listening to Jensen Huang speak at NVIDIA. Obviously, NVIDIA is a darling replacing Intel's as the bellwether in tech, obviously gen AI. But he's an old school technologist, which he's awesome and he's been doing the work before he was kind of popular and they were doing some great software work, but he said a line when we met with me and Dave at GTC last year, and I'll never forget this. He said a lot of great things. But one thing that jumps out at me I think is relevant to you guys and everyone else is, the generative AI is a category, a new category because it's generating. It's not programmed. It's not like something was there and you program it. Yeah, you have stuff and software out there, but it's generating something new, which poses a challenge to cyber because you have to understand what's in the asset list that's going to generate stuff and then the generation has to be trusted. What's your take on that and how does that impact, say, cyber, good, bad and ugly?
Dean Sysman
>> Yeah. So, like you mentioned, I got my bachelor's degree in computer science by the time I was 19. And my favorite topic was machine learning AI. I actually did a research seminar around SVMs, which is technology people don't use anymore, or at least doesn't have the limelight that gen AI and LLMs are having right now. And to me, AI is again that extension of how much can you enable technology while still controlling and managing the risk behind it. It's like a sports car. Imagine taking a Ferrari or a very fast sports car around the track, the thing that's giving you the ability to go fast is the engine, but also the combination of the braking system and the wheels. If they told you, you'd get a braking system that comes from a Toyota Camry and yet you have a Ferrari engine, you'd be very, very worried about going fast because you can't control the speed to the same level that you have with the control. So what we do, and I think it's very important to think about how cybersecurity becomes a real platform that can cater to a lot of the workflows, a lot of the stages of how organizations enable technology. So for example, you talked about inventory and asset management, and we started out with, first of all, just giving people the visibility, just showing them which assets they have. But then we very quickly realized assets mean a lot of different things. It's not just devices, it's also identities and applications and people accessing AI and licenses and most of all vulnerabilities. How do we track and understand all the vulnerabilities we have? But then like we talked about, how do we give people the tools to determine what's the right action? Because the thing that's blocking them is the lack of knowledge of what's really happening. Who's the owner of this thing? What is going to be the business impact of either blocking or changing or managing this thing? What's going to be the business strategy that enabling this technology or not enabling it is going to drive for us. So I think security and cyber has become this very, very deep foundational platform that allows you to take these big challenges, allows you to go as fast as possible.>> Yeah, you'll appreciate this. I've been riffing on theCUBE with Dave all the time on our CUBE podcast every Friday, plug in there for our CUBE pod. If you're listening, you got to listen to that about how the old ways used to be like networking policies, policy routing, all that good stuff, databases, access control. You mentioned identity. When you get to these system challenges, and you mentioned the brakes' analogy because that's a great example of if you've got to build a Ferrari, that system has to work as design. And so we're moving into an era of what I call the operating system runtime environment, which is anything's possible. And you got to understand how it all connects together. And I think that's what you're getting at here. This has been a fundamental challenge for traditional IT. What does the system architecture look like? What are we building? And then what will happen at runtime? That's everything. Policy on data, policy on access control, governance, all these things increase the complexity. If you're in cyber, you want every data point possible. So you got the one, is the data available? Well, if the brakes fail in the car, if that system doesn't work, you're at risk. Talk about the impact to enterprises now, especially the ones that are large scale, because I talked to the CIO at JPMorgan Chase, all the top people, and they're telling me, "Look, we have machine learning for many, many years. We get generative AI coming, but we want to be resilient. We cannot be down and we got to protect," because they have a lot of money, they move trillions of dollars a day. This is a huge problem. What do you say to that? What's your commentary or just anecdotal advice around the holistic view of designing an operating system with that in mind?
Dean Sysman
>> Yeah, so excellent questions. First of all, I think that when you think about how do you utilize and enable technology in a way that both serves the business but also is safe and controllable and manageable, you always think about the sort of the collaboration, but also the conflict of interest between the security team, the IT team, and the engineering team or developers. How do we make all of them be able to work together? And what we've discovered, and like you talked about, we have customers of every shape and size, including very large federal agencies and the DOD and civilian agencies, very large financial services like you said, some of the world's top biggest banks and even tech companies and startups. And what we've seen is that the reason it's very hard for them to work together many times and where the conflict of interest really brush up against each other is when they don't see the same thing, right? When they have different data, when they've been told different things. And being able to have a platform that consolidates and correlates the data from all the different perspectives is what allows them to take action together. It's that truth that leads to the action that, for example, let's talk about vulnerability management. That's how many of the large breaches happen. That's a huge challenge because if you'll go to one of those top banks, they'll have millions of vulnerabilities and that's impossible to fix. So they have to think about, okay, which ones do I prioritize? How do I manage the workflow of how do I get my developers to fix those things? And the real answer is if you share the best data across the board with both the security team that understands the risks of the vulnerability, then the IT team that understands maybe the business impact of what that asset is, and then the developers who might need to actually do the fix or upgrade or patch something, if you have them all within the same scope of data and the same context, then they all understand what's happening with that problem. But if they're looking at different systems, the developers are looking at their code system, the IT are looking at their ITSM or whatever, or CMDB or whatever it is, and then the security team are looking at their SOC, and they're not understanding the context the same way, then they're never going to be able to work well together.>> Dean, you bring up the whole scale view there. I remember back, I forget what year it was, it was the second year of Open Compute Project, OCP. I interviewed one of the meta-engineers at that time. They were dealing with such large-scale data. He goes, "John, you can't believe the amount of data we're getting. There's no human can even deal with this." So we look at how machine learning and automation can come in and help to go through those data. Like you said, those workflows, there's too many workflows, too many vulnerabilities to manage. You got to apply some intelligence there. So I got to ask you, as you look at that tsunami, okay, you got to zoom out and say, "okay, one, how do I do it?"
And if I do, I got to be resilient and secure. Managing large-scale data is a huge problem, and in cyber, you got to nail it. What is the best practice from your standpoint? You got to do the grinding out at the foundational level, start getting the apps together. And then ultimately developers, I mean, like you said, system of record has been a buzzword around for years. I mean, I like the word you use truth, system of truth because what you're getting at is, what am I looking at? Is that a hallucination? I mean basically it's a hallucination if it's wrong, I mean, it may not be a hallucination. Just wrong data that's technically an error.
Dean Sysman
>> So we talk a lot about the system of truth. And by the way, the truth sometimes can be subjective. One thing can be something to one and another to another, but the really important factor is, first of all, the consistency and the explicit agreement around how do you look at data and what is the truth for that organization or for that situation. And I think that's what we always want to end up have our users say that they end up achieving is that system of truth. And that truth is dependent on looking at many, many different data points. So how does a detective solve a crime? They don't go and talk to one witness and says, "Okay, what the witness said, that's what happened." No, the goal is to get as many data points and as many viewpoints on what you see. You got to talk to as many witnesses, you try and find as much evidence and then where everything overlaps, you know for a fact that that's the truth, right? Because otherwise, it couldn't have happened that way. So actually, we use AI in our platform to create suggestions or to create workflows or to do all those things. But when we correlate the data, when we do that detective work of overlapping all the different viewpoints, those 1,100 plus adapters that we have, we do that in a deterministic algorithm that tells you exactly this is why this is the truth from all these different perspectives. Here's the stuff that we don't know if that's the truth because it's not coming from enough perspective.>> Dave and I talk about on theCUBE pod again all the time. Next best action is categorically what's happening? What's the next prompt? What do I do next? How do I get all those data points? One, insight action really is the killer outcome of some of these things we're getting. So you don't collect all the data points, you're done, right? You're not getting the best action.
Dean Sysman
>> That's right. Exactly.>> Or insight. So this is the problem. Talk about your business. I want to get into some of the platform pieces and then some of the business model things. Okay, so I'm a customer, you sold me on it, "Dean, you're awesome. Multiple companies, you got all the top customers. I want what you got because everyone wants the best security." So what do I do? Do I install the platform? What am I doing? Take me through the use case day in the life of customer.
Dean Sysman
>> Sure. So our customers, what they do is a very simple thing. This is what we innovated and how we created what is now called the CAASM category, like the cyber-asset attack surface management. But we think about it in a much grander view than that. What you do is you tell us which products you have, your identity platform, your agent systems, your cloud systems, all of that, you give us access to those systems. You can deploy either on-prem or in our cloud or in your cloud. We're very agnostic to how you want to do it. And then using those adapters, you just connect them and within the first few minutes of using the platform, you're going to start to see everything that you have from those data sources. And we have not gone to one single organization in the world, including our own by the way, that from the time->> I was going to say next....
Dean Sysman
>> you turn it on, you start to see a lot of things that you're like, "Wow, I had no idea this was happening." But then the beauty of it is not only do you see those things, you start to understand what's the action that I should be taking about them. And also, that's what we want the platform to look like, our biggest users and our most happiest ones, they'll tell you amazing stories about how their business was having some level of strategy, some level of event, and it could be a cyber event, it could be an acquisition, it could be moving to the cloud and how we were the supporting function behind allowing them to all be on the same page of the truth and then taking the right action in order to do those big things.>> Yeah, I mean, back in the old days, they used to call this discovery, right? You're actually doing intelligent discovery. Give an example of some of the... You don't have to name the names, but the weirdest or the coolest or not coolest, but the most mind-blowing, oh shit factor, like I had that open or give an example of when you... Because I hear that all the time. Like, oh my god, I had that, who installed that? So all these things, whether they're legitimate or I just forgot about or someone else installed, what is the most fascinating or mind-blowing thing that you could talk to and say, "Hey, I had a customer and they saw this, explain something ?"
Dean Sysman
>> So first of all, every customer we go into, they discover first of all that there is missing agent systems in their coverage. They have many, many thousands or millions of assets that they never even covered with their security tools. We discovered that a lot of users have very bad password policy. We've even saw cases where the CEO hasn't changed their password in 12 years and there was no enforcement policy.>> It's in a dark web.
Dean Sysman
>> Most likely, right? But those are the things that we see generically. I'll tell you a couple stories that to me are amazing, and unfortunately, I can't say the names, but those are the best stories that I share and they're very meaningful to us. We live for our customer outcomes. The first story has happened during COVID, a very large healthcare manufacturer that is one of the biggest ones in the US. That was one of the most important manufacturers of the testing equipment for COVID in early 2020 when this was just happening. They told us that for the first time in their very long history, they had to move to allow people to work from home and continue the manufacturing, continue the work of what they were doing. And they said because of the regulation that they're under, all the healthcare regulations, they knew that without the visibility and the automation and the actionability in Axonius, they were able to transition to work from home within a day. And they said, without us giving those answers and doing those actions for them, they wouldn't have been able to work from home and they would've probably had a delay in manufacturing. So during the time that COVID was happening...>> At least six months?
Dean Sysman
>> I can't get the estimate, but you can only imagine how much that would've affected the fight against COVID during that time. That was an amazing thing.>> And the alternative would've been a bunch of IT audits, a bunch of meetings, a bunch of Zoom meetings.
Dean Sysman
>> That's what happens when you do things manually.>> Truck roll.
Dean Sysman
>> Yes. Yes.>> Go after the house. Yeah.
Dean Sysman
>> Exactly. And the second story, I'll tell you, this one's also amazing to me. We all know the big IT outage incident that happened to Crowdstrike a few months ago. One of our other very long-standing biggest customers. That's a media conglomerate. It's a name everybody knows, but they've been a customer for us for many years. They are a huge CrowdStrike customer. And obviously when the outage happened, you saw companies like Delta Air Lines go completely shut down and they have a lot of operational things, their media, their physical locations. And they told us that because CrowdStrike was not working for them during those first 48 hours, they not only were impacted, but they couldn't even tell what devices were the ones who were shutting down and restarting and in a boot loop. So using Axonius, they were able to cross reference and correlate all the data sources to say, "Hey, these are devices that we know are in CrowdStrike." We know they're being impacted right now. We also understand who's their owner. We understand their business impact. And then they were able to shift what they did and how they reacted to those things. And they never even missed a beat in their operation as a company. And then they said after first 48 hours, things started to go back live and they did the fix. But other than that, they told us we had no other source to look into that.>> How fast did they get that discovery up and running? Take me through that time, scope the time, they call you up or they already a customer?
Dean Sysman
>> They were already a customer for a long time.>> All right, so they got Axonius in there. So great, what happens next? They had the visibility when you guys went on red alert, what happened next? How long did it take?
Dean Sysman
>> Yeah. So there many different teams that had a perspective over this. You had, first of all, the incident response team and the security operations teams both were very, very critical. But the funny part is we're a cyber security company. We sell to cyber security teams. We're cyber security individuals. But in most of our customers, there's a lot more IT team members who use our platform than even the security team members. Because naturally, there's a lot more IT people than security.>> And they know discovery by the way?
Dean Sysman
>> But also, they own the action that results from the data. The security team can say, "Hey, these devices are impacted, or these devices have a vulnerability. These devices have been breached." Now, it's on the IT side and the operational side to now take the action that results from the platform and take that workflow and deliver it down to .>> And they're running the operations too. So in a way, this is a boon to the cyber teams because they enable IT-
Dean Sysman
>> Exactly.... >> to be more powerful because they don't have to then punch the cyber.
Dean Sysman
>> Exactly.>> They can actually...
Dean Sysman
>> And we talked about the conflicting interests here. If you have right data and you have the same language, everybody's on the same page and working towards the same goal and creates amazing, amazing value from both sides.>> Well, we'll certainly have to get you back on theCUBE. I want to get in just real quick on the business model, give us an update on the business founded in 2017. How many employees do you have? What kind of funding? Where are you? What are you looking for? Give the plug on the business and then we'll get into the business model.
Dean Sysman
>> Yeah. So in the beginning of the year, we announced a funding round a $200 million funding round led by Lightspeed and Accel, some of our existing investors. And we announced that last year we passed a 100 million in ARR, in annual recurring revenue. We did that from one to a 100 in four and a half years. That's one of the fastest ever in the history of cyber security. We continued our amazing growth this year as well. We're getting close to a 1,000 customers globally, and we're about 700 employees. And again, we are so energized and motivated by one metric above all, that to me is NPS, which is net promoter score. How much do our customers recommend us to other organizations? And it hovers around the 80s and that's the highest that I know of any cyber security product. Because when we look at what our platform does compared to let's call it endpoint protection or a network security tool, there's no metric. There's no something that we deliver that we can say that means that you're getting value. The only value that our platform creates is what our users tell us, "Hey, I use this every day, or I use this for these purposes and I couldn't do this any other way." So we're very, very focused on our customer's outcomes.>> When they're safe, they're giving a good promoter score versus how many times they call you when they're in trouble, it means it's not working.
Dean Sysman
>> Exactly. And we want them to call us when it's not working because that's how we get better. That's how we cater to their needs. So we're very happy with feedback.>> Like Delta for example. Delta is a great example. All right, what's the consumption model? SaaS? You mentioned ARR, so it's a subscription. What's the business model?
Dean Sysman
>> Yeah, it's an annual subscription based on tiers of assets. So the bigger amount of assets you have, that's how you go up the subscription cost.>> And they deploy the product how?
Dean Sysman
>> So they can either deploy on-prem or they can deploy in their cloud environment or use it completely SaaS hosted. In our cloud environment, we support any kind of deployment because we have customers from startups to regulated federal agencies, that everything in between as well.>> What's your growth plan right now and talk about your journey as an entrepreneur. You gave some great success right now. You got a great product, great philosophy, love the mojo there. What's the journey been like for you and what's your plans?
Dean Sysman
>> Yeah, so we're about seven and a half years in. This has been so meaningful for me because our mission as a company, we talk about that word all the time, is growth. And what does that mean? Obviously, it means to be a growth business, continue to increase our revenue, continue to increase our business, and we're really thinking about ourselves as a future public company. And we don't know when that will happen, but that's how we're making our decisions every day going forward and thinking about how we can be one of the largest cyber security vendors in the world. And to us, this year is a real transformational period from what we feel is going from what we were as a product company into a platform company. And today, you see many of our customers use multiple different modules, multiple different teams using us and even some of them calling us between some of their most important vendors, some of their more strategical platforms that they use, and even go through some very effortful exercises around how the business impact and the criticality of that. But that's all for the right reasons. And the other side of that word growth is how much do we help our employees grow? Why would somebody join our company compared to any other amazing startup pre-IPO company is because we want to invest in their growth and we want them to say, this was the best job in my career, just like we're talking about in the beginning.>> And you're based out of New York, you're looking for hiring, give a plug in for anyone watching?
Dean Sysman
>> Yeah, so we have dozens of open hires around the world from the East Coast, the West Coast, everywhere in the US. We also have a lot of hires in Israel and Europe and Asia. So feel free to look up Axonius jobs and we'd love to have you join.>> Dean, great to have you on theCUBE.
Dean Sysman
>> Thank you very much.>> We hear your podcasting style in the NYSE. I'm John Furrier watching theCUBE. We're at the NYSE. This is our super studio on the East Coast. We've got the Palo Alto connecting the East Coast and the West Coast together. And the open network with NYSE Wired. Thanks for watching.