Chris McCurdy, IBM | Juniper NXTWORK 2016
01. Chris McCurdy, IBM, Visits #theCUBE!. (00:20) 02. Is Security In The Top Of The Line Conversations. (00:39) 03. Is This A Big Data Problem Meets Networking. (01:54) 04. Do You Feed All Events Into Watson To Get A Predictive Perscriptive Solution. (03:26) 05. How Does Software In Cloud Defined Fit Into The Services You Offer. (04:29) 06. Talk About SAS And Security. (06:010) 07. How Do You Advise Customers On Security For ISV's. (07:57) 08. What Are The Conversations You're Having With Your Customers About Security. (09:12) 09. What Does IBM Say About Malware Getting Smart. (10:32) 10. What Is Your Take On Software Defined. (12:13) 11. What Do You Say To Customers That Have Software Defined Fatigue. (14:17) 12. Is Automation Trustworthy. (15:33) 13. Is Their Social Networking Among Security Companies. (17:59) Track List created with http://www.vinjavideo.com. --- --- Expanding new views on security with network transparency | #NXTWORK by Nelson Williams | Oct 4, 2016 If data is king, then cybersecurity is the royal guard. In this world of viruses and ransomware, data must be protected or a company can lose its most vital assets in a single attack. This has created an arms race between security researchers and the dark minions of evil across the Internet. New views on design, networking and system management are shifting the game toward built-in security. To gain some understanding of these new security technologies, John Furrier (@furrier) and Stu Miniman (@stu), cohosts of theCUBE, from the SiliconANGLE Media team, visited the Juniper NXTWORK conference in Santa Clara, CA. There, they sat down with Chris McCurdy, VP of Global Security Services at IBM. Customer conversations on security The discussion opened with a look at what customers have been asking for in regards to security. McCurdy related that IBM likes to talk with its clients about security by design. Customers expect their systems to be secure from the start. IBM can’t provide solutions that don’t include security because customers expect it to be there. McCurdy explained that as a security service provider, IBM is doing network design, deployment and management services. Between those, IBM is also looking at the Cloud, hybrid cloud and private data centers. It’s important to provide a risk framework that’s measured the same way across all these infrastructures, he explained. Visibility across the Cloud “The conversation is very much that companies should adopt the Cloud,” McCurdy said. He mentioned that IBM is able to provide Infrastructure as a Service through the Cloud, which gives companies a great opportunity to transform their security structures. Cloud providers, as well, are looking for new ways to include security in their solutions. McCurdy stressed that a company must look at security from end to end. They must have visibility on events that are happening across the network and in the Cloud. The key is being able to look at different protection strategies and layer those strategies into the system. Identity access management is also a concern. If an attacker with credentials can be cut off at the user level, that’s a great capability for customers, he said.