Episode: 048

Title: Secure Data Exchange Platforms

Aired: August 26, 2017

Featured Segments: Secure Data Exchange Platforms


Bret Piatt, CTR Host and Greg Hoffer with Globalscape talk about the secure movement and integration of data.

Follow Us & Stay Informed:

Bret Piatt (left), Greg Hoffer (right)

Tweet us: @cybertalkradio, @globalscape, @bpiatt / Stream on iHeartRadio: Android or iOS


00:00:04 from the dark web to your radio dial you
00:00:08 were listening to cyber talk radio on
00:00:10 news 1200 WOAI
00:00:24 [Music]
00:00:25 welcome to cyber talk radio
00:00:28 I'm your host Bret Pyatt a 20-year
00:00:30 internet security veteran this week
00:00:33 we're gonna be talking about secure data
00:00:35 exchange platforms you may wonder what
00:00:38 that is but if you'll stick with us here
00:00:39 on the program you will learn all about
00:00:41 it and more if you're listening to us on
00:00:44 I Heart Radio online thank you for
00:00:48 joining in or if you're listening to us
00:00:50 here in San Antonio on 1200 W a I thank
00:00:52 you as well
00:00:53 we're a weekly cybersecurity focused
00:00:57 radio program you can listen to past
00:00:59 episodes on our web site at WWF or a do
00:01:04 calm as well as on iTunes podcast pocket
00:01:07 casts and our YouTube channel the format
00:01:09 of the program is I'm joined by an
00:01:12 expert and being in San Antonio with
00:01:15 many cyber security companies and tons
00:01:18 of cybersecurity professionals we've had
00:01:20 the opportunity to have great guests on
00:01:22 I'm very thrilled to be joined this week
00:01:24 by Greg Hoffer from a company called
00:01:27 Global scape that really goes all the
00:01:30 way back here in San Antonio and helped
00:01:32 get some of the cyber security scenes
00:01:34 started huh thank you for joining us
00:01:35 Greg thank you very much yeah so can you
00:01:38 a share for our audience who's global
00:01:42 scapin and how did you get to join the
00:01:44 team there sure global scape is a sleepy
00:01:47 little tech company here in San Antonio
00:01:48 that started out in 1996 with a single
00:01:52 product called cute FTP back in the day
00:01:56 this was the really the only commercial
00:01:58 FTP client available on the wind 3.1
00:02:01 platform if you can believe it all the
00:02:02 way back then yes and then we took it
00:02:04 commercial
00:02:05 started to build out lots of features
00:02:07 around security SSL connections but
00:02:10 primarily focused on delivering those
00:02:12 HTML files up to web servers when
00:02:15 everyone was doing things that way that
00:02:18 was 1996 we have evolved since then and
00:02:20 to delivering secure file transfer
00:02:22 solutions on the server side as well
00:02:24 with EFT which is our brand name for
00:02:27 enhanced file transfer server that not
00:02:30 only secures the exchange of data but
00:02:32 also allows for some pretty complex
00:02:34 workflow automation so steps to take up
00:02:38 delivering files or receiving files to
00:02:40 help business processes become automated
00:02:42 compliant and secure and this is I think
00:02:46 one of the real big pieces of security
00:02:51 so everyone hopes are thinking often
00:02:54 about securing data at rest in a
00:02:56 database and behind a perimeter but
00:02:59 informations not useful if it's locked
00:03:01 in a vault you have to be able to access
00:03:03 that information you have to be able to
00:03:04 share that information with business
00:03:06 partners with vendors with customers and
00:03:10 the flow of that information and being
00:03:12 able to share it in a safe and secure
00:03:14 way and audit it and guarantee that it
00:03:16 is safe and secure really is the kind of
00:03:20 magic of Technology it's because if you
00:03:22 go into the physical world having to get
00:03:25 a secured courier service and armored
00:03:26 cars and all of this to move stuff back
00:03:28 and forth really expensive really
00:03:30 complicated they make great action
00:03:32 movies about it with that that briefcase
00:03:33 piece that businesses don't want to have
00:03:36 to do that to send information back and
00:03:38 forth these days yeah absolutely right
00:03:40 the way I like to characterize it within
00:03:42 the walls of global scape is that data
00:03:44 or files do not exist in and of
00:03:46 themselves I mean they are transacted
00:03:48 they are moved across borders whether
00:03:50 it's within your own organization
00:03:51 between systems but more importantly
00:03:53 across borders into your partner
00:03:55 suppliers vendors etc so it's the
00:03:58 transaction of information that is
00:04:00 really the important part of securing
00:04:01 that transaction or securing the data
00:04:03 exchange and further one must think of
00:04:07 security as not just protecting or
00:04:09 encrypting the data but it's also the
00:04:12 regulatory compliance associated with it
00:04:14 you must follow the rules so you must
00:04:16 protect your corporate interests to make
00:04:18 sure you're in compliance and largely
00:04:21 it's about risk management as well so if
00:04:24 I'm transacting very large financial
00:04:26 numbers with my my banking institution
00:04:31 that has much greater import then say
00:04:34 the hoursworked of my employees for the
00:04:37 week that I tend to run reports on so
00:04:39 you must assess the risk associated with
00:04:41 the data figure out where it's being
00:04:43 transacted and then secure it at rest in
00:04:45 transit in a compliant manner
00:04:48 yeah so with your background at global
00:04:52 scape and seeing both as a company and
00:04:55 then as a San Antonio as a city the tech
00:04:59 evolution here over the the course of
00:05:01 the last 20 years and we started tec
00:05:02 block now just a handful of years ago
00:05:04 global scape was one of the founding
00:05:07 members and helped get that up and going
00:05:09 as we're now organizing into a community
00:05:12 but what have you you've seen in San
00:05:14 Antonio over this evolutionary period
00:05:17 well do you look back over 20 years and
00:05:19 I think it's really amazing what has
00:05:21 happened I've being a San Antonio native
00:05:24 and watching it for the past 20 years I
00:05:26 especially as an employer I've been
00:05:29 really excited to see the evolution of
00:05:30 things such as geekdom or UTSA si center
00:05:35 for information assurance for the Joint
00:05:38 Base San Antonio and all the stuff that
00:05:39 is going on the tech block scene is
00:05:42 pretty amazing recently but thinking
00:05:45 back it used to be just a few key
00:05:47 cornerstone tenants of the tech
00:05:49 community here in San Antonio the us's
00:05:52 of the world and really cool stuff they
00:05:53 were doing
00:05:55 Rackspace came in and that was a coup
00:05:57 for San Antonio to help the burgeoning
00:05:58 tech scene and it's been a rather slow
00:06:01 evolution but especially over the past
00:06:04 five or ten years I can't express how
00:06:06 excited I am looking at tech blocks
00:06:09 founding the cast school for example to
00:06:12 help the young brilliant minds get
00:06:14 educated in this tech arena I can't
00:06:17 express how important that is because if
00:06:19 you look at the traditional education
00:06:21 system especially at a young age it's
00:06:23 usually manned or staffed by a little
00:06:26 bit older teacher right you don't have
00:06:28 the tech savvy people teaching the young
00:06:30 minds so we had kind of a disconnect
00:06:32 there between how do I get that tech
00:06:33 infusion into the young minds that they
00:06:36 really need and I think the
00:06:38 collaboration of different efforts here
00:06:39 in San Antonio is really helping us to
00:06:41 build up from the young age up to the
00:06:43 older age getting more talent more
00:06:45 interest and hopefully a bit more
00:06:49 entrepreneurship as well to bring
00:06:50 anymore yeah I think that's one of the
00:06:52 things I'm excited about is we've
00:06:54 on-and-off had
00:06:56 large tech employment centers here
00:06:59 AT&T still has a large amount of tech
00:07:02 jobs
00:07:03 USAA a ton of tech jobs and then we've
00:07:05 had companies headquartered here such as
00:07:07 global scape and Rackspace and a handful
00:07:09 of others over time but there hasn't
00:07:11 been that whole entrepreneurial
00:07:13 ecosystem here really where you have
00:07:15 hundreds of companies starting every
00:07:17 year and maybe ten of those are
00:07:19 successful and the other ninety that
00:07:22 we're not successful those folks move on
00:07:24 and go participate in the next hundred
00:07:26 things that are getting started up the
00:07:27 year after that and you get this
00:07:28 ecosystem of creativity and innovation
00:07:31 going with the acceptance that not every
00:07:35 company and idea and projects going to
00:07:37 succeed and this is something that San
00:07:40 Antonio has been somewhat risk-averse
00:07:42 over time which maybe helps us building
00:07:45 the cybersecurity talent here risk
00:07:46 aversion is a good thing but on the get
00:07:49 the entrepreneurship side it's one where
00:07:52 folks need to be able to have the belief
00:07:55 that if they do try something and it
00:07:56 does not work out that there is going to
00:07:59 be a job available for them still
00:08:01 they're not going to be looked at as a
00:08:03 failure per se which i think has
00:08:06 happened to some here in the past I
00:08:08 absolutely agree and that's something I
00:08:10 tried to coach my team with as well it's
00:08:13 I think it's your perspective right when
00:08:16 you're working at a company you want to
00:08:17 impress your boss you want to do well
00:08:18 you're afraid of failure but the
00:08:20 mentality of that failure is a good it's
00:08:22 a learning experience it's just labeled
00:08:23 failure when in reality it's a
00:08:25 scientific process that allows you to
00:08:27 make a choice that's better than an
00:08:29 earlier choice I think that's the
00:08:32 mentality we need yes certainly cyber
00:08:34 security information assurance is a
00:08:36 little bit more risk-averse I do think
00:08:38 that as institutions like UTSA grow in
00:08:41 their prominence and their education for
00:08:43 the tech sector the tech grow in their
00:08:46 area for educating tech students we will
00:08:50 see more of that I think that's the
00:08:51 advantage that say up in Austin are
00:08:54 really big prominent school lots of
00:08:56 businesses surrounding the University of
00:08:58 Texas in Austin and other institutions
00:09:00 so they have a little bit more of that
00:09:01 infrastructure in place we are coming
00:09:03 long ways in the past five or ten years
00:09:05 I think we'll we'll get there very soon
00:09:07 yeah if you look at all of the other
00:09:10 major tech hubs around the world they
00:09:13 all have at least one world-class
00:09:15 research institution within 50 miles of
00:09:17 them so the the growth of UTSA is
00:09:22 helpful in the quality at Trinity and
00:09:24 some of the other smaller schools around
00:09:26 the area is amazing but you have to have
00:09:28 that large scale research university is
00:09:32 what we've seen from tech hubs all
00:09:34 across the globe whether it's here in
00:09:36 the US or in places like Israel or over
00:09:41 in Asia same everywhere you see that top
00:09:44 quality research university is part of
00:09:46 and a core component of that tech
00:09:49 ecosystem emerging exactly so you guys
00:09:53 started off back with FTP and that was
00:09:57 one way to send files back and forth and
00:09:59 to handle secure data exchange 20 years
00:10:02 ago when we were having to install a
00:10:04 tcp/ip stack on the operating system
00:10:07 like chameleon or some of the other
00:10:08 versions of tcp/ip yes for you folks
00:10:12 listening that were born in the iPhone
00:10:13 generation computers 20 years ago which
00:10:17 is not that long in the grand scheme of
00:10:19 timelines did not come with tcp/ip like
00:10:22 there was the web browser has only been
00:10:24 around for slightly over 20 years as
00:10:27 well so this idea of graphical browsing
00:10:31 of content online is relatively young
00:10:34 and new but businesses have been using
00:10:36 computers for 6070 years and now and
00:10:39 sending data back and forth to each
00:10:42 other and for a long time that was
00:10:45 something like an FTP or some other
00:10:48 protocols but what's going on just kind
00:10:51 of holistically is with secure data
00:10:53 exchange and help the audience
00:10:55 understand that overall concept sure
00:10:58 that's a great question and yes I do
00:10:59 remember the days of installing tcp/ip
00:11:01 on my windows box so that I could
00:11:03 connect to the internet through my
00:11:04 dial-up so yeah back in the day yes on
00:11:07 the one hand it's kind of surprising
00:11:08 that FTP as venerable as it is still
00:11:11 exists so in that regard there has
00:11:14 a whole lot of evolution whether it's
00:11:15 FTP you add on to it the SSL Security
00:11:19 layer to encrypt data and transit those
00:11:21 things have existed since 1976 I think
00:11:24 is the FTP protocol first specification
00:11:27 those things exist on mainframes on many
00:11:30 computers on desktops on servers
00:11:32 throughout the world and a surprising
00:11:34 amount of people still use FTP to
00:11:36 transfer files mainly due to the
00:11:38 interaction between two completely
00:11:40 different entities it's a legacy
00:11:41 transfer you're not in control of both
00:11:43 sides you just have to conform to
00:11:45 whatever that vendor or supplier
00:11:46 contractor asks you to do knock on wood
00:11:50 we're hoping that most people are moving
00:11:52 to the SSL enabled a secure enabled
00:11:55 version of FTP in addition to that the
00:11:58 SSH protocol another encrypted mechanism
00:12:02 to transfer files is fairly common it's
00:12:04 a little bit easier on firewalls and the
00:12:06 number of ports you have to have open
00:12:07 easier to configure a bit more secure on
00:12:10 mutual authentication so FTP and FTP
00:12:13 over SSL SSH still are the the bulk of
00:12:16 what's going on at least for the past 10
00:12:18 or 15 years more recently there's been a
00:12:21 push towards more common and firewall
00:12:24 friendly protocols like HTTP over SSL or
00:12:27 HTTPS everyone seems to support it
00:12:30 because of the browser so it's it's a
00:12:34 very common way to transfer files and
00:12:35 then over the past five years you look
00:12:37 at the evolution of that much like the
00:12:39 rest of the industry its API based it's
00:12:41 microservices based so it's not just the
00:12:44 transport of information over HTTP it's
00:12:47 the way it's consumed and produced in
00:12:49 the semantics around that exchange like
00:12:51 rest
00:12:52 ya know FTP is one of those protocols if
00:12:55 you're a casual listener here you you
00:12:57 may never have worked with their
00:12:59 experience but everyone has sent
00:13:01 received email at this point and emails
00:13:03 SMTP written back in roughly that same
00:13:06 timeframe and many of the security
00:13:09 things that we need now on a open
00:13:11 Internet were not contemplated initially
00:13:14 so folks have had to innovate and build
00:13:17 security scaffolding around something
00:13:19 that was not designed that way but these
00:13:21 protocols are implemented across
00:13:23 thousands of different types of
00:13:25 computing systems and they're very
00:13:28 lightweight and efficient at their core
00:13:29 so they can also run on embedded devices
00:13:31 so as we move to this Internet of Things
00:13:34 era you may see a resurgence I think of
00:13:38 of FTP of HTTP continuing its
00:13:42 proliferation but these lightweight
00:13:45 standards-based standard long-lived
00:13:49 protocols not gonna go anywhere anytime
00:13:51 soon
00:13:52 no not at all and I think you've touched
00:13:54 on a very important topic the IOT
00:13:56 explosion that's happening these days I
00:13:57 was fortunate enough to talk about IOT
00:14:00 and the journey of data through IOT at
00:14:02 the RSA show last year and it was or
00:14:05 this past show I should say it's
00:14:08 fascinating to contemplate how cheap
00:14:10 compute devices are these days now
00:14:12 anyone can be an entrepreneur and come
00:14:14 up with an idea that requires a physical
00:14:16 form factor processing power memory
00:14:18 internet connectivity even five years
00:14:21 ago that would have been prohibitively
00:14:22 expensive it would have been an idea
00:14:23 that you write down and say I'll never
00:14:25 do that now it's super cheap to produce
00:14:27 low-cost devices that can do whatever
00:14:29 you want and program programming those
00:14:31 devices becomes really easy because
00:14:34 languages are so advanced right now and
00:14:37 we're seeing lots and lots of vendors of
00:14:39 a full range of trustworthiness shall we
00:14:43 say producing devices that do anything
00:14:46 from measuring the water flow inside a
00:14:48 field and an agriculture business all
00:14:50 the way up to monitoring your house for
00:14:51 safety all of those devices generate
00:14:54 data the data must flow somewhere for
00:14:56 production and consumption of
00:14:58 information or workflows quite often
00:15:00 that's cloud-based so we the resurgence
00:15:02 I should say of the cloud yeah I don't
00:15:05 know if we're surgeons right we're but
00:15:06 it seems like it always comes in waves
00:15:07 the cloud was the thing and then yeah
00:15:09 not really sure what it means but now
00:15:11 the cloud is here it's real it has micro
00:15:13 services it's ubiquitous the easy access
00:15:16 cheap storage cheap compute and IOT is
00:15:19 often connected to the cloud and we're
00:15:21 going to see more and more HTTP in
00:15:23 particular based communication with
00:15:25 api's hosted in the cloud or IOT yeah
00:15:27 and then that cost of the computing
00:15:29 pieces just as you were talking they're
00:15:31 thinking back I've worked for three
00:15:33 months over summer after I graduated
00:15:36 from high school before I started
00:15:37 computer science in college 20 plus
00:15:39 years ago now
00:15:40 and living at home no bills my three
00:15:44 months of pay was enough to buy the
00:15:45 computer I took with me to school now a
00:15:48 Raspberry Pi for less than 50 bucks has
00:15:51 more computing power than that system
00:15:53 did and I mean I could have I could go
00:15:56 down and work at a fast food restaurant
00:15:57 for one shift for one day and pay for a
00:16:00 Raspberry Pi right
00:16:01 you know I think that's a great parallel
00:16:03 for what we're trying to build here in
00:16:04 San Antonio for the tech culture the
00:16:07 incubation of entrepreneurial activities
00:16:09 because the cheap compute power the
00:16:12 ability to get a Raspberry Pi or a next
00:16:14 thing chip you can buy these things and
00:16:17 innovate and deliver with all the tools
00:16:19 available to you in a very cheap fashion
00:16:20 and that's spawning all sorts of
00:16:22 creativity and ingenuity and
00:16:23 entrepreneurship that's what we want to
00:16:25 build in San Antonio for the businesses
00:16:28 not just the devices but also the
00:16:30 businesses make it cheap reduce the
00:16:31 barriers to entry promote creativity
00:16:35 you're listening to 1200 W AI this is
00:16:38 cyber talk radio and we're talking
00:16:40 secure data exchange a little bit about
00:16:41 the history of the San Antonio Texan and
00:16:44 joined by Greg hopper from Global scape
00:16:47 here in San Antonio one of our longest
00:16:50 and most well established technology
00:16:52 firms in the city and so Greg wealth FTP
00:16:57 is going to remain a mainstay from now
00:17:00 maybe until the the end of time at least
00:17:02 the end of our careers what new things
00:17:05 are global scape working on what new
00:17:07 things are happening in the secure data
00:17:09 exchange space well we're very excited
00:17:11 because we've recently launched a new
00:17:13 product or platform referred to as
00:17:16 kinetics which is an integrated which is
00:17:19 an integration platform as a service
00:17:21 offering at Global scape for many years
00:17:24 we've started with the client to move
00:17:25 files to a server we then evolved into
00:17:28 the server side of things to secure both
00:17:30 ends the communication and augmented
00:17:32 that with the workflow automation and
00:17:33 what we saw over many years especially
00:17:36 2004 through 2014 as we address more and
00:17:40 more customer problems around secure
00:17:42 data exchanges and workflow automation
00:17:44 is that in addition to the transfer of
00:17:48 the data the transaction of business
00:17:50 across boundaries the transfer itself
00:17:53 doesn't exist
00:17:54 just for transferring those files
00:17:56 contain data the data is consumed it's
00:17:59 moved it's involved in an automated
00:18:01 business process so we built different
00:18:03 automation components into our software
00:18:05 to help non-technical or moderately
00:18:07 technical people move consume reorients
00:18:12 do things with that data this was
00:18:14 largely done in an on-premise
00:18:16 environment which was kind of the way it
00:18:19 was done in the past but now that the
00:18:20 cloud is everywhere and cheap and does
00:18:22 so much for so many people
00:18:23 you have the Amazons and the azure
00:18:26 environments that have tons of features
00:18:28 and capabilities and cloud enablement
00:18:30 we've noticed that a lot of businesses
00:18:33 rely more upon the cloud than they do an
00:18:35 on-premises solutions we took the
00:18:37 concept of workflow automation and
00:18:39 integrating different systems previously
00:18:42 on premises and extended that to the
00:18:44 cloud offering so our kinetics platform
00:18:46 allows moderately to non-technical
00:18:48 people to use simple point-and-click
00:18:51 mechanisms to automate business process
00:18:53 workflows across different cloud
00:18:54 services for example that marketing guy
00:18:56 in the corner office that can't even
00:18:58 spell FTP can now point-and-click and
00:19:01 integrate his MailChimp with Magento
00:19:03 with Salesforce and do an end-to-end
00:19:07 business process for lead generation so
00:19:10 this is a software designed to allow a
00:19:13 business analyst I guess if I was going
00:19:15 to use a job title there to complete
00:19:19 technology integration tasks absolutely
00:19:21 okay and so now you can repurpose your
00:19:24 tech people your back-office devops
00:19:27 people from more pertinent or more
00:19:29 difficult tasks this is one of the great
00:19:30 things going on with technology in that
00:19:33 we're constantly making things more
00:19:35 accessible and more simple and as you're
00:19:38 doing that and looking out there busier
00:19:41 listening there's a couple of different
00:19:42 types of companies that you can choose
00:19:45 to get these technologies and products
00:19:47 from and this is a great kind of hinted
00:19:49 at a little bit about the Internet of
00:19:50 Things as we were talking these some
00:19:53 companies will have a security first
00:19:54 mindset as they're developing these
00:19:56 business process automation and workflow
00:19:58 tools and then others will have an ease
00:20:00 of use mindset and the ease of use
00:20:02 mindsets great for non confidential non
00:20:06 highly valuable
00:20:08 more data these are things you're
00:20:10 sending back and forth that you really
00:20:12 wouldn't maybe care if it was out there
00:20:15 on the front page of the paper but if
00:20:17 you have highly confidential highly
00:20:19 sensitive information or if you have
00:20:21 regulatory compliance via financial
00:20:24 services health care or other industries
00:20:26 then looking at your vendor selection
00:20:28 process I would be thinking about
00:20:30 companies with the security first
00:20:31 mindset and then ones that are allowing
00:20:35 you to still complete the automation and
00:20:38 business processes that you need but
00:20:41 doing it in a way that is going to
00:20:43 protect the information first rather
00:20:45 than the ease-of-use first I think
00:20:47 you're absolutely right and at global
00:20:48 scape we've worked with many customers
00:20:50 large customers throughout the world and
00:20:52 we have heard that exact message so take
00:20:54 for example the ubiquity of the boxes
00:20:57 and drop boxes and onedrive lots of
00:21:00 really great systems exist out there
00:21:02 that allow even my mom to upload files
00:21:04 and share with lots of other people I
00:21:06 think the ease of use there is just
00:21:09 through the roof it's fantastic and
00:21:11 often people use this for an important
00:21:15 date or non sensitive data I should say
00:21:17 to my mom her pictures are important but
00:21:19 leaking of the pictures of our family
00:21:20 trip is not that bad if those are on the
00:21:22 front page of the paper you might be
00:21:23 proud right unfortunately the same
00:21:25 people that use that for the non
00:21:27 sensitive information
00:21:28 realize how easy it is to do things and
00:21:30 they start using that as their de facto
00:21:32 ad hoc delivery of sensitive information
00:21:35 through a corporation so we see over and
00:21:37 over again that large enterprises like
00:21:39 the ease of use but they really need to
00:21:41 control how the data is flowing in and
00:21:43 out of these systems and they don't
00:21:45 necessarily want to disempower their
00:21:47 knowledge workers from achieving their
00:21:48 goals but they definitely need to be
00:21:50 stewards of the information and protect
00:21:53 the interests of the company so often
00:21:55 they need to find an alternative it's
00:21:57 more secure that's more governed whether
00:22:00 it's falling under GDP our regulations
00:22:02 in Europe or PCI compliance in the
00:22:04 States or across the world so we feel
00:22:09 that global scape is fairly uniquely
00:22:10 positioned because ease of use is one
00:22:12 facet of an important one important
00:22:15 facet of a software solution but
00:22:17 security we feel is a lot more important
00:22:20 long term more important we start from
00:22:22 the ground up with security and data
00:22:26 transformation with transacting
00:22:28 information across different systems and
00:22:30 then we can build on top of that
00:22:32 world-class ease of use as opposed to
00:22:35 the ease of use forward type companies
00:22:37 that treat security as an afterthought
00:22:40 it's a little bit more of a challenge I
00:22:41 think eventually we'll both converge I
00:22:43 mean we're all eventually going to be
00:22:45 very secure and very easy to use but I
00:22:48 see that in the current term companies
00:22:51 such as Global scape kind of covers both
00:22:53 bases yeah it's a one that's going to be
00:22:56 important for these ease-of-use guys is
00:22:59 to really consider to think about the
00:23:01 security and for those of you choosing
00:23:03 those products out there if they do have
00:23:04 a security issue holding them
00:23:06 accountable either with feedback to them
00:23:10 or with your wallet by choosing to pick
00:23:12 a different solution we're getting ready
00:23:14 to head into the bottom of the hour
00:23:16 break here for a news traffic and
00:23:19 weather update
00:23:20 if you've just tuned in to us on the
00:23:22 radio dial you're listening to cyber
00:23:24 talk radio on 1200 W AI your host Brett
00:23:28 Hyatt and joined by Greg coffer from
00:23:31 global escape and we're talking secure
00:23:33 data exchange you'll stick with us
00:23:35 through the bottom of the hour break we
00:23:37 will be talking about managed file
00:23:40 transfer and some more details into what
00:23:43 that does and then as well out there in
00:23:45 your business how some of these security
00:23:47 and compliance standards that you're
00:23:49 likely held - whether it's a PCI that
00:23:53 applies to almost everyone as almost
00:23:55 every business accepts credit cards
00:23:56 these days or through to some others
00:24:00 such as a GD P R if you're doing
00:24:02 business overseas and Greg had also
00:24:04 mentioned now that software like that
00:24:07 from Global scape is allowing developers
00:24:09 to work on more complicated and a more
00:24:11 interesting tasks than just basic data
00:24:13 integrations these days I may get the
00:24:16 chance to ask Greg what does a developer
00:24:18 global scape do and they feel you're a
00:24:20 software developer out there in the
00:24:21 audience what skills should you build to
00:24:23 work for
00:24:24 like that
00:24:29 [Music]
00:24:41 [Music]
00:25:02 [Music]
00:25:14 welcome back to cyber talk radio if
00:25:18 you're just joining us after the break
00:25:19 this is a weekly program where we
00:25:22 discuss cybersecurity topics trends and
00:25:25 technologies this week we're talking
00:25:27 secure data exchange platforms with Greg
00:25:30 Hoffer from global scape a one of San
00:25:34 Antonio's earliest big technology
00:25:36 success stories if you have not heard
00:25:39 about them what a web browser Google in
00:25:41 global scape and you will learn quite a
00:25:44 bit about one of the stories that's been
00:25:46 here for over 20 years and not talked
00:25:49 about as much as it should be so before
00:25:51 the break we've kind of covered the high
00:25:54 level of secure data exchange sending
00:25:56 stuff back and forth talked about a
00:25:57 protocols and how those things are
00:25:59 happening if you wanted to listen to
00:26:02 that you can catch up with it
00:26:04 well post it online Tuesday after this
00:26:06 programs airing here on Saturday if you
00:26:08 happen to be listening to us on one of
00:26:09 those replays or rebroadcast thank you
00:26:11 very much we will be up on our website
00:26:15 at wwlp.com as well as on itunes
00:26:18 podcasts pocket cast for Android devices
00:26:21 or YouTube for those of you that would
00:26:24 like to see a picture of Greg and I wow
00:26:26 you listen to the audio so Greg again
00:26:28 thank you for coming in and joining us
00:26:30 and we had a promise the listeners too
00:26:32 we were gonna dive in and talk a little
00:26:35 bit about security compliance and and
00:26:39 some of the things that drive this
00:26:40 secure need for data transfer of it
00:26:42 there's been a lot of conversation over
00:26:43 this last few years people talk about
00:26:45 big data and the internet and if you're
00:26:48 gonna send a petabyte which now you can
00:26:51 fit a petabyte of data in less than one
00:26:55 cabinet of equipment maybe even into a
00:26:58 really large single server if you were
00:27:01 to deliver that petabyte of data over a
00:27:03 internet circuit are you gonna get it
00:27:06 from one coast to the other anytime soon
00:27:09 it's actually a good point I think data
00:27:11 sizes continue to grow and at a very
00:27:14 explosive rate when you think about the
00:27:17 advent of big data analytics and machine
00:27:19 learning where everyone retains all data
00:27:21 and minds it to get operational
00:27:23 intelligence when you think of
00:27:25 the nasan but growing Internet of Things
00:27:27 or IOT market where lots of sensors
00:27:30 distributed throughout lots of locations
00:27:31 are all generating bits of data very
00:27:34 frequently data sizes continue to grow
00:27:37 and data transfer nians are never going
00:27:39 to diminish we although we have seen
00:27:42 quite a growth in bandwidth capabilities
00:27:44 throughout the world and even in the
00:27:47 United States as San Antonio is crossing
00:27:48 their fingers for Google Fiber for
00:27:50 example one thing that is often
00:27:51 overlooked is the challenge of moving
00:27:53 large data across large distances I
00:27:55 think we've kind of cracked the nut of
00:27:57 small distances whether it's within the
00:27:59 data center or across town but the
00:28:03 single biggest impediment to large bits
00:28:06 of data going across large distances is
00:28:08 something we have no control over and
00:28:09 that's the speed of light there is
00:28:10 necessarily a latency involved in
00:28:12 transferring data from New York for
00:28:14 example to London or worse Singapore to
00:28:17 San Francisco the distance is your
00:28:20 limiting factor
00:28:21 part of that limiting factor is because
00:28:24 of the nature of the underlying protocol
00:28:25 as tcp/ip communicates packets back and
00:28:28 forth there's a flow control there's a
00:28:30 mechanism it requires both sides to
00:28:31 agree on how much data is flowing so I
00:28:33 guess I'm getting a bit technical here
00:28:35 but that's okay but the folks have stuck
00:28:38 with us this long we can get nerdy let
00:28:41 me high level it a little bit more here
00:28:42 the the larger the distance the less
00:28:44 you're able to use your available
00:28:46 bandwidth so at some point you reach
00:28:48 diminishing return it doesn't matter if
00:28:49 you have 100 megabit per second or a
00:28:50 gigabit per second line between Tokyo
00:28:53 and San Francisco over tcp/ip channels
00:28:56 it will eventually reach a bottleneck
00:28:58 based upon that protocol
00:29:00 companies such as global scape and many
00:29:02 others have proposed alternative
00:29:04 solutions and we offer UDP based
00:29:06 protocols or different ways of flow
00:29:08 control between those two endpoints to
00:29:10 try to achieve more of the available
00:29:12 bandwidth but those are at this point
00:29:15 kind of one-off or considered not
00:29:17 mainstream it's somewhat proprietary so
00:29:19 it doesn't enjoy the same success as the
00:29:21 universally accepted FTP HTTP or SFTP
00:29:25 protocols so I guess that's the good
00:29:28 news and bad news bad news is speed of
00:29:31 light slowing us down from most cases
00:29:32 the good news is we have ways to get
00:29:34 even faster it just requires a bit more
00:29:37 about
00:29:37 yeah I have a used to give a
00:29:39 presentation to explain the big data
00:29:41 stuff to folks it in there and then you
00:29:43 can find it online probably on
00:29:45 SlideShare it's got a picture of a UPS
00:29:48 truck with flames painted on the side
00:29:50 and then like going through explaining
00:29:52 to folks like the 10 megabit connection
00:29:54 we used to have and then 100 megabit
00:29:57 used to be the thing to your desktop and
00:29:59 now we all basically have gigabit and
00:30:01 even if the folks on Wi-Fi now you're
00:30:04 starting to get gigabit speeds over
00:30:05 Wi-Fi instead of wired connections
00:30:08 inside the office and but even in that
00:30:11 that gigabit connection to send a
00:30:14 terabyte of data even you're talking
00:30:15 about hours and and you get to hundreds
00:30:18 of terabytes or a petabyte of data and
00:30:20 the fastest way to get it from one coast
00:30:22 to the other is to put it in that UPS
00:30:24 truck and drive it right yeah yeah we
00:30:27 have a white paper and I've spoken about
00:30:29 this at a conference where if you're
00:30:32 gonna transfer a terabyte of data pick
00:30:34 some arbitrary large size from New York
00:30:36 to London and you have a hundred megabit
00:30:38 per second line which is pretty fast
00:30:40 right but you do the math and it takes
00:30:42 well over a day to transfer that file
00:30:45 it's actually faster to put it on a hard
00:30:47 disk and put it in Virgin Atlantic's
00:30:49 flight number whatever 25 and transport
00:30:52 it physically so we still have some of
00:30:54 those challenges we're getting better
00:30:56 but it's a slow road yeah so as you're
00:30:59 looking in this data transfer space and
00:31:03 a little segue back to the the
00:31:04 compliance pieces so for the listeners
00:31:08 out there I think everyone has heard
00:31:11 about PCI compliance at this point or
00:31:13 the if you you haven't this is the
00:31:16 standard that all the banks and credit
00:31:19 card merchants and and retailers out
00:31:21 there have agreed to on the private
00:31:23 sector this is not a law
00:31:25 this is private sector regulating itself
00:31:27 to try to keep the transfer of credit
00:31:31 card information and all the associated
00:31:33 details around that that piece safe how
00:31:36 does the that standard tie in to data
00:31:39 transfer well it ties in almost directly
00:31:42 one-for-one there are some areas and PCI
00:31:44 compliance or PCI standards to which
00:31:47 organizations must comply
00:31:49 that are outside the scope of data
00:31:51 transfer things like physical security
00:31:52 or how do you oughtn't eight endpoints
00:31:55 that are joined to your network etc but
00:31:57 a large part of the PCI initiative is to
00:32:00 make sure that sensitive information
00:32:02 such as the personally identifiable
00:32:05 information on a card or the credit card
00:32:06 numbers any payment instruments
00:32:08 sensitive information is stored securely
00:32:11 and transferred securely so there are
00:32:14 elements of that standard to which
00:32:17 global scape helps adhere and force and
00:32:19 report when the data you're dealing with
00:32:22 through our managed file transfer
00:32:23 solution is PCI falls under PCI
00:32:25 compliance yeah and as you're thinking
00:32:28 about that is that merchants you may
00:32:31 have multiple store locations somebody
00:32:33 may come in to one of your stores they
00:32:35 scan their credit card they sign up for
00:32:37 your loyalty program at that store and
00:32:39 then there may be a nightly process
00:32:41 where all of the new customers that
00:32:43 signed up to the loyalty program at that
00:32:44 store that information is packaged up
00:32:46 and sent back to a central office to
00:32:49 then be distributed out to all the
00:32:51 stores so then if you you go to a
00:32:52 different location the following day you
00:32:55 have the ability to get your membership
00:32:57 points there and the things show up some
00:32:59 retailers are getting more real-time
00:33:01 than daily now but even for many of them
00:33:03 they're still even on a process where
00:33:05 these things happen
00:33:06 over the course of a nightly batch
00:33:08 process and those are the types of file
00:33:10 transfers that are going on out there
00:33:12 all the time that need to stay safe and
00:33:14 secure that's right and I think the
00:33:17 point you made earlier is really
00:33:18 important as well this is not a mandate
00:33:19 this is not a government regulation that
00:33:21 falls under civil or criminal Pendulum
00:33:25 penalties if you don't do it but it's
00:33:26 enforced by the market and I think
00:33:27 that's a good system especially for a
00:33:29 capitalistic society right so credit
00:33:32 card companies the visas the chase the
00:33:34 mastercards discovers of the world
00:33:36 require that the people accepting those
00:33:40 payments are in compliance with PCI as a
00:33:43 standard so that they know that their
00:33:45 customers you and me who have the credit
00:33:47 cards are secure when we swipe it or dip
00:33:50 it and we have that transaction with
00:33:52 that business so outside of
00:33:56 payment card and payment transaction
00:33:58 processing what are some other industry
00:34:00 examples where businesses are out there
00:34:02 using managed file transfer secure data
00:34:05 exchange to pass records back and forth
00:34:08 sure what I like to do when I talk to
00:34:10 employees customers and prospects is
00:34:13 mentally divided two basic camps I think
00:34:17 that the traditional managed file
00:34:19 transfer arena concentrates on the
00:34:21 transaction of business across vendors
00:34:23 suppliers etc so a supply chain is a
00:34:26 great example
00:34:26 I am a retail outlet I don't manufacture
00:34:30 the clothes I don't order the shipment
00:34:34 of clothes I don't have to market the
00:34:36 clothes or figure out how to do the
00:34:38 returns or payment processing or even do
00:34:40 my payroll I'm just a retail outlet that
00:34:43 focuses on the branding marketing
00:34:45 merchandising acquiring of customers and
00:34:47 delivering them the best clothes that I
00:34:48 select so when you think of the supply
00:34:51 chain of that retail organization and
00:34:53 all the elements involved there's a lot
00:34:55 of business that must be transacted for
00:34:58 product shipment for product tracking
00:35:01 for acquiring new products for the
00:35:03 payment and remittance of payment across
00:35:05 those different individuals all of that
00:35:07 data transacted across company borders
00:35:09 between two entities that's a really
00:35:13 good example of how managed file
00:35:14 transfer does its thing another good
00:35:18 example there because we have a lot of
00:35:19 customers doing this is in healthcare if
00:35:21 you have followed any of the healthcare
00:35:23 debate you know that there are so many
00:35:25 different principles involved in any
00:35:26 amount of healthcare provided there's
00:35:28 you go down to your local clinic they
00:35:31 have suppliers of medical equipment
00:35:33 they've got insurance companies they
00:35:34 have to deal with they've got regulatory
00:35:36 agencies they've got to file with so
00:35:38 healthcare generates a lot of data the
00:35:40 data is very sensitive
00:35:41 it must be predicted both at that clinic
00:35:44 or location you visit and across to the
00:35:46 different entities that need to consume
00:35:49 or produce data involved so managed file
00:35:51 transfer is a great way to do the
00:35:53 automated transaction of that
00:35:54 information in a secure and regulatory
00:35:56 compliant manner yeah and those
00:35:57 healthcare ones that's a law that's a
00:36:01 HIPAA this was a Health Information
00:36:04 Portability and Accountability Act and
00:36:06 it was about making electronic map
00:36:08 or records and it's become a full
00:36:12 security and compliance standard with
00:36:14 some follow-ons of what's called HIPAA
00:36:16 high-tech I don't remember what the
00:36:18 second half of that algorithm stands for
00:36:19 I don't remember what the second half of
00:36:21 that acronym stands for but one thing
00:36:24 that lawmakers are good at is making
00:36:25 long acronyms that sound good and
00:36:27 actually have some real meaning back
00:36:29 behind them but in that space so this
00:36:32 electronic medical records in exchange
00:36:34 between insurers clinics hospitals and
00:36:36 all of these folks when I go in I feel
00:36:40 like I was over just this past week and
00:36:43 I saw the big wall of paper still in the
00:36:45 office there it have health care
00:36:48 providers really all made things
00:36:51 electronic this point and gotten online
00:36:52 or is it still in the setup and
00:36:54 configuration adoption phase I think
00:36:57 it's the latter unfortunately although
00:36:59 there have been many initiatives over
00:37:00 the past ten years to make health
00:37:02 records electronic and I think we're
00:37:04 making inroads there it's a very very
00:37:06 slow process at this point my
00:37:08 observation is that the business is
00:37:10 entrenched in the legacy way of doing
00:37:12 things there's a lot of existing doctors
00:37:15 nurses practitioners that are
00:37:17 comfortable with how it goes today maybe
00:37:20 we just need a new wave of the younger
00:37:22 up-and-coming doctors who embrace
00:37:24 technology from day one when they look
00:37:27 at their iPhone or whatever the next
00:37:29 generation is technology is becoming a
00:37:31 more pervasive part of life and I think
00:37:34 generationally we will become much
00:37:37 better at electronic health records I
00:37:38 mean I think is do we see some of these
00:37:41 folks at least smaller doctors as well
00:37:43 maybe just the fear of like I've never
00:37:46 had a data security problem with my
00:37:48 medical records when they were in paper
00:37:49 and now I've got to put them in these
00:37:50 computer systems I don't understand and
00:37:53 it's one where hopefully they're
00:37:56 listening and then maybe they'll work
00:37:58 with someone like you
00:38:00 so that they can securely send them from
00:38:01 their office up to the hospital or the
00:38:03 surgical center or the long-term care
00:38:06 facility or all of the other folks that
00:38:08 even a solo general practitioner is
00:38:10 gonna interact with these days and need
00:38:12 to exchange records with sure and I
00:38:14 think that perhaps cost or anticipation
00:38:17 of costs was a challenge as well even
00:38:19 ten years
00:38:20 small doctor's office or healthcare
00:38:23 provider might have been faced with some
00:38:24 challenges to acquire an IT consultancy
00:38:26 to come in and help them do something
00:38:27 because they don't have the expertise
00:38:29 these days with cloud-based services and
00:38:32 boutique vendors popping up that helped
00:38:34 cover soup-to-nuts the entire healthcare
00:38:37 requirements through a operational cost
00:38:40 of a monthly payment I think maybe that
00:38:43 will help us get to a more adoption of
00:38:45 electronic health records and workflow
00:38:46 yeah and as a consumer out there
00:38:49 listening you're like well why do I want
00:38:50 my medical records to be electronic and
00:38:53 if you you think about the fact that
00:38:56 maybe you're on vacation and you get
00:38:59 into an accident that hospital or of the
00:39:03 trauma facility or whatever you you go
00:39:05 into there is working off of incomplete
00:39:07 information they're not going to have
00:39:09 any of your medical history other than
00:39:11 whatever one of your your friends or
00:39:12 family that's with you is filled out on
00:39:14 that piece of paper this is an it's one
00:39:17 where that portability of a medical
00:39:20 record can give you better care and
00:39:22 across the whole system can give
00:39:24 everyone better care because this is one
00:39:27 as well right now even at an anonymized
00:39:29 level there's not the exchange of
00:39:32 information between the hospitals and
00:39:34 medical researchers to understand if hey
00:39:36 here's a set of symptoms here's things
00:39:38 we did and here we're the outcomes from
00:39:41 that that information is not getting
00:39:42 shared so that the pace and improvement
00:39:45 of care is not happening and gaining
00:39:47 from the advantages and benefits of
00:39:49 technology like many other industries
00:39:51 yet exactly and I think the privacy is
00:39:53 probably the single biggest detriment to
00:39:55 forward progress everyone wants their
00:39:57 medical information kept private it's
00:40:00 very sensitive to that person and it
00:40:02 doesn't help that we keep hearing about
00:40:03 data breaches because somebody secured
00:40:05 their data incorrectly and records get
00:40:08 lost and shared on the web and so it's
00:40:12 really important that people adhere to
00:40:13 the regulations like HIPAA hi-tech to
00:40:16 help ensure the privacy of the
00:40:17 information so that we as a community
00:40:19 can gain more trust that it's okay to do
00:40:22 that and then we make that forward
00:40:24 progress that can help everyone outside
00:40:26 of that retail supply chain and where no
00:40:28 one wants to have inventory before they
00:40:30 need it and then
00:40:31 here in this healthcare I think folks
00:40:33 can see the benefits of securely
00:40:36 transferring data back in both of those
00:40:38 areas the financial services world so
00:40:41 banks do wire transfers and all sorts of
00:40:44 financial transactions but where else
00:40:47 inside of the financial sector does
00:40:50 managed secure transfer services get
00:40:53 used well that's a great question and I
00:40:55 think that much like there's HIPPA
00:40:57 hi-tech or PCI that we're familiar with
00:40:59 there are an awful lot of regulations
00:41:01 that financial institutions must fall
00:41:03 under that most people haven't heard of
00:41:05 but we help our customers secure the
00:41:08 transaction automation or automatic
00:41:10 processing of that information through
00:41:13 our systems whether it's payment
00:41:16 remittance and ACH clearances or cheque
00:41:19 21 which is the mechanism in the US
00:41:22 which says a picture of a cheque is
00:41:24 equivalent to a paper check that's why
00:41:26 you can now take a picture of your
00:41:27 cheque and upload it to USAA and they
00:41:29 can cash the cheque for you that's
00:41:30 because there was a law that allows
00:41:32 those images to act as the physical
00:41:33 cheque
00:41:34 so an advancement in our society but it
00:41:36 changed the way that technology is used
00:41:38 and so now the data transfer has to be
00:41:40 secured all the way from your iPhone or
00:41:42 Android phone all the way to your
00:41:44 business so with every change that helps
00:41:47 us get better there's an equal challenge
00:41:49 we help where we can I think that you
00:41:53 also need to look at insurance agencies
00:41:55 and healthcare providers and there as
00:41:57 they're viewed as dealing with the money
00:42:00 so I would kind of treat them under the
00:42:02 financial area as well anything dealing
00:42:05 with money it's really really important
00:42:08 to be incredibly secure there's a lot of
00:42:10 talk these days about the electronic
00:42:13 currency the bitcoins the blockchain
00:42:15 Ledger's etc so I think we'll see more
00:42:18 growth in that area as well how can we
00:42:20 better leverage things like blockchain
00:42:23 to both protect our anonymity but also
00:42:25 do a little bit freer use of cash or
00:42:30 monetary instruments yeah no I think
00:42:32 there's gonna be some interesting
00:42:34 innovation there as well just from an
00:42:36 audit trail perspective to have a shared
00:42:39 immutable audit trail can
00:42:42 create that trust in the transaction the
00:42:46 trust in a data transfer data exchange
00:42:48 so I know most of you listening out
00:42:51 there probably heard of just Bitcoin as
00:42:53 this thing maybe that you used to pay a
00:42:55 ransom and ransomware or you can buy
00:42:57 stuff from overstock.com with it that
00:43:00 it's the blockchain is going to be used
00:43:02 for much more than just online
00:43:04 transactions or financial transactions
00:43:07 there's many things that it ties into
00:43:09 related to exchange between two parties
00:43:13 even the talk of replacement of escrow
00:43:15 services or all sorts of other trust
00:43:18 based things that are very complicated
00:43:20 right now that could be made much more
00:43:23 simple by that shared immutable ledger
00:43:26 yeah I'm really excited about the
00:43:27 Entrepreneurship in that area to see
00:43:29 what comes out so we've been going back
00:43:31 and forth talking about computers
00:43:34 exchanging information with each item it
00:43:36 what other types of secure data
00:43:39 exchanges out there yeah this falls into
00:43:41 the second category I had mentioned
00:43:43 earlier in addition to transacting
00:43:45 business across your corporate
00:43:48 boundaries a lot of our customers need
00:43:51 managed file transfer or this exchange
00:43:54 of information for more of a
00:43:56 collaborative role and this might
00:43:57 involve a marketing department
00:43:59 generating materials for a white paper
00:44:02 or a case study it needs to be sent to
00:44:04 some creative agency to make it look all
00:44:06 pretty it needs to be then shared with
00:44:08 legal entity to make sure that it falls
00:44:10 under compliance we're not stating
00:44:12 anything that's wrong
00:44:13 lots of different people involved in the
00:44:16 creation composition editing and final
00:44:19 generation of content whether it's
00:44:21 documents it could be audio it could be
00:44:23 video that oftentimes these things
00:44:26 become not only collaborative but also
00:44:29 quite large if you're dealing with
00:44:30 movies being generated or Game of
00:44:33 Thrones and you don't want it leaked
00:44:35 then you have to manage that asset just
00:44:37 as much as you have to manage credit
00:44:39 card information or financial
00:44:41 instruments yeah whoops on the game of
00:44:44 thrones one sorry yeah yeah so if if you
00:44:49 happen to be watching that series you
00:44:51 can watch the whole season online if you
00:44:53 go into some of the dark web areas there
00:44:56 places to download it now you'll be
00:44:57 violating some of HBO's ownership not
00:45:00 recommended if you don't want to be
00:45:02 committing a crime but it's all out
00:45:04 there on the internet now whether HBO
00:45:07 likes it or not yeah so I think the big
00:45:08 takeaway is regardless of how
00:45:09 information is shared until we become a
00:45:12 society of Hermits where everyone just
00:45:14 Garner's their own information and does
00:45:15 nothing with it or until we became
00:45:17 become some socialist communist
00:45:21 everything freely we will exist in the
00:45:24 middle ground where some information is
00:45:26 incitive and private and important to me
00:45:28 others other information has to be
00:45:31 transacted across some boundary shared
00:45:33 with other people for collaboration or
00:45:35 transaction purposes and therefore the
00:45:37 information must be secured it must fall
00:45:39 under some regulation hopefully to
00:45:42 ensure that it's secure so that the
00:45:43 consumers of the data can trust that it
00:45:45 is secure for those in the tech industry
00:45:47 are looking to get into the tech
00:45:49 industry maybe they're at UTSA or one of
00:45:51 the other universities here in the area
00:45:52 or they may be listening online on I
00:45:54 Heart Radio all across the u.s. of the
00:45:56 world thinking about getting into secure
00:46:00 data exchange cybersecurity what are the
00:46:02 type of things you're looking for in a
00:46:06 prospective engineer research and
00:46:08 development type of a hire for your
00:46:10 company well first and foremost we
00:46:12 always want people that are passionate
00:46:13 and engaged and can help us further our
00:46:16 culture and community of collaborative
00:46:19 energetic smart people developing
00:46:21 commercial software I really put a lot
00:46:24 of emphasis on the culture and the
00:46:26 ability for people to work together
00:46:27 collaboratively on the technical front
00:46:30 we at Global scape are primarily a
00:46:32 window shop so we do an awful lot of
00:46:34 windows he plus plus development which
00:46:37 at for a number of years was really hard
00:46:40 to get because it's being replaced by
00:46:42 the Java's and the C sharps and then the
00:46:44 rubies and pythons etc of the world but
00:46:47 I think C++ has experienced quite a bit
00:46:49 of a renaissance over the past three or
00:46:51 four years as the language has evolved
00:46:53 and it has a lot of abstractions much
00:46:56 like the modern languages but it's as
00:46:58 close to bare metal as you can get for a
00:46:59 lot of speed so we're very proud that we
00:47:01 have a pretty strong and growing set of
00:47:03 C++ developers
00:47:06 the other half of what we do is very
00:47:08 web-based because we do micro services
00:47:11 and web UIs for our products so at this
00:47:15 point we use a lot of html5 angular kind
00:47:19 of that front-end stack aligned with
00:47:22 usability and our big emphasis there is
00:47:26 to make sure that our code is correct
00:47:28 reusable maintainable and very very user
00:47:31 friendly yeah so C++ is a common
00:47:34 language for for us as well and I think
00:47:36 you go across the cybersecurity
00:47:38 landscape it's a good one to go get
00:47:41 yourself familiar with you can on the
00:47:44 Microsoft side these days Visual Studio
00:47:46 Community Edition it's free you can
00:47:49 compile C++ with that you can get your
00:47:53 hands on code you could start working
00:47:55 with the learning and yet all those
00:47:57 abstractions that you may have in a
00:48:00 Python or Java is they're also available
00:48:05 to you in C++ but as Greg was saying you
00:48:08 can also go all the way down into the
00:48:10 details and you can inline assembly code
00:48:12 into your C++ if you'd like you probably
00:48:15 have never taken an assembly language
00:48:16 programming class if you're in college
00:48:18 right now but you can go down and do
00:48:21 that in C++ it's the the spider-man
00:48:24 warning of computer languages of with
00:48:27 great power comes great responsibility
00:48:28 there's lots of things you can do in C++
00:48:30 to hurt yourself to yeah I'm kind of an
00:48:32 academic nut myself and what I love
00:48:34 about C++ is it's truly the only
00:48:36 language on the planet that has
00:48:38 high-level abstractions at zero cost
00:48:40 there is it's all compiled away at
00:48:42 compile time so it's pretty amazing and
00:48:44 if don't be afraid of C++ and think that
00:48:46 it's a niche area if you look at a lot
00:48:48 of prominent solutions out there
00:48:49 including some companies you might have
00:48:51 heard of like Google and Facebook
00:48:52 there's an awful lot of C++ going on
00:48:54 yeah for sure
00:48:56 so in closing great what do you see for
00:49:01 the future of San Antonio's taxine for
00:49:03 the future of data security and a file
00:49:06 transfer I love the future of San
00:49:09 Antonio because
00:49:10 the burgeoning tech scene and the great
00:49:12 work being done by so many people to
00:49:13 help build up the community through tech
00:49:15 block piqued them etc I really look
00:49:18 forward to participating and
00:49:19 contributing where I can and hopefully
00:49:21 it'll be a lot of companies that help us
00:49:23 secure our data because it will always
00:49:25 be a problem there are many threat
00:49:27 actors out there and they will not go
00:49:28 away thank you very much for joining us
00:49:30 this week and for being a leader at one
00:49:33 of the longest and most well established
00:49:34 tech firms here in San Antonio
00:49:41 [Music]
00:49:48 you