Title: Secure Data Exchange Platforms
Aired: August 26, 2017
Featured Segments: Secure Data Exchange Platforms
Bret Piatt, CTR Host and Greg Hoffer with Globalscape talk about the secure movement and integration of data.
Follow Us & Stay Informed:
Bret Piatt (left), Greg Hoffer (right)
00:00:04 from the dark web to your radio dial you 00:00:08 were listening to cyber talk radio on 00:00:10 news 1200 WOAI 00:00:24 [Music] 00:00:25 welcome to cyber talk radio 00:00:28 I'm your host Bret Pyatt a 20-year 00:00:30 internet security veteran this week 00:00:33 we're gonna be talking about secure data 00:00:35 exchange platforms you may wonder what 00:00:38 that is but if you'll stick with us here 00:00:39 on the program you will learn all about 00:00:41 it and more if you're listening to us on 00:00:44 I Heart Radio online thank you for 00:00:48 joining in or if you're listening to us 00:00:50 here in San Antonio on 1200 W a I thank 00:00:52 you as well 00:00:53 we're a weekly cybersecurity focused 00:00:57 radio program you can listen to past 00:00:59 episodes on our web site at WWF or a do 00:01:04 calm as well as on iTunes podcast pocket 00:01:07 casts and our YouTube channel the format 00:01:09 of the program is I'm joined by an 00:01:12 expert and being in San Antonio with 00:01:15 many cyber security companies and tons 00:01:18 of cybersecurity professionals we've had 00:01:20 the opportunity to have great guests on 00:01:22 I'm very thrilled to be joined this week 00:01:24 by Greg Hoffer from a company called 00:01:27 Global scape that really goes all the 00:01:30 way back here in San Antonio and helped 00:01:32 get some of the cyber security scenes 00:01:34 started huh thank you for joining us 00:01:35 Greg thank you very much yeah so can you 00:01:38 a share for our audience who's global 00:01:42 scapin and how did you get to join the 00:01:44 team there sure global scape is a sleepy 00:01:47 little tech company here in San Antonio 00:01:48 that started out in 1996 with a single 00:01:52 product called cute FTP back in the day 00:01:56 this was the really the only commercial 00:01:58 FTP client available on the wind 3.1 00:02:01 platform if you can believe it all the 00:02:02 way back then yes and then we took it 00:02:04 commercial 00:02:05 started to build out lots of features 00:02:07 around security SSL connections but 00:02:10 primarily focused on delivering those 00:02:12 HTML files up to web servers when 00:02:15 everyone was doing things that way that 00:02:18 was 1996 we have evolved since then and 00:02:20 to delivering secure file transfer 00:02:22 solutions on the server side as well 00:02:24 with EFT which is our brand name for 00:02:27 enhanced file transfer server that not 00:02:30 only secures the exchange of data but 00:02:32 also allows for some pretty complex 00:02:34 workflow automation so steps to take up 00:02:38 delivering files or receiving files to 00:02:40 help business processes become automated 00:02:42 compliant and secure and this is I think 00:02:46 one of the real big pieces of security 00:02:51 so everyone hopes are thinking often 00:02:54 about securing data at rest in a 00:02:56 database and behind a perimeter but 00:02:59 informations not useful if it's locked 00:03:01 in a vault you have to be able to access 00:03:03 that information you have to be able to 00:03:04 share that information with business 00:03:06 partners with vendors with customers and 00:03:10 the flow of that information and being 00:03:12 able to share it in a safe and secure 00:03:14 way and audit it and guarantee that it 00:03:16 is safe and secure really is the kind of 00:03:20 magic of Technology it's because if you 00:03:22 go into the physical world having to get 00:03:25 a secured courier service and armored 00:03:26 cars and all of this to move stuff back 00:03:28 and forth really expensive really 00:03:30 complicated they make great action 00:03:32 movies about it with that that briefcase 00:03:33 piece that businesses don't want to have 00:03:36 to do that to send information back and 00:03:38 forth these days yeah absolutely right 00:03:40 the way I like to characterize it within 00:03:42 the walls of global scape is that data 00:03:44 or files do not exist in and of 00:03:46 themselves I mean they are transacted 00:03:48 they are moved across borders whether 00:03:50 it's within your own organization 00:03:51 between systems but more importantly 00:03:53 across borders into your partner 00:03:55 suppliers vendors etc so it's the 00:03:58 transaction of information that is 00:04:00 really the important part of securing 00:04:01 that transaction or securing the data 00:04:03 exchange and further one must think of 00:04:07 security as not just protecting or 00:04:09 encrypting the data but it's also the 00:04:12 regulatory compliance associated with it 00:04:14 you must follow the rules so you must 00:04:16 protect your corporate interests to make 00:04:18 sure you're in compliance and largely 00:04:21 it's about risk management as well so if 00:04:24 I'm transacting very large financial 00:04:26 numbers with my my banking institution 00:04:31 that has much greater import then say 00:04:34 the hoursworked of my employees for the 00:04:37 week that I tend to run reports on so 00:04:39 you must assess the risk associated with 00:04:41 the data figure out where it's being 00:04:43 transacted and then secure it at rest in 00:04:45 transit in a compliant manner 00:04:48 yeah so with your background at global 00:04:52 scape and seeing both as a company and 00:04:55 then as a San Antonio as a city the tech 00:04:59 evolution here over the the course of 00:05:01 the last 20 years and we started tec 00:05:02 block now just a handful of years ago 00:05:04 global scape was one of the founding 00:05:07 members and helped get that up and going 00:05:09 as we're now organizing into a community 00:05:12 but what have you you've seen in San 00:05:14 Antonio over this evolutionary period 00:05:17 well do you look back over 20 years and 00:05:19 I think it's really amazing what has 00:05:21 happened I've being a San Antonio native 00:05:24 and watching it for the past 20 years I 00:05:26 especially as an employer I've been 00:05:29 really excited to see the evolution of 00:05:30 things such as geekdom or UTSA si center 00:05:35 for information assurance for the Joint 00:05:38 Base San Antonio and all the stuff that 00:05:39 is going on the tech block scene is 00:05:42 pretty amazing recently but thinking 00:05:45 back it used to be just a few key 00:05:47 cornerstone tenants of the tech 00:05:49 community here in San Antonio the us's 00:05:52 of the world and really cool stuff they 00:05:53 were doing 00:05:55 Rackspace came in and that was a coup 00:05:57 for San Antonio to help the burgeoning 00:05:58 tech scene and it's been a rather slow 00:06:01 evolution but especially over the past 00:06:04 five or ten years I can't express how 00:06:06 excited I am looking at tech blocks 00:06:09 founding the cast school for example to 00:06:12 help the young brilliant minds get 00:06:14 educated in this tech arena I can't 00:06:17 express how important that is because if 00:06:19 you look at the traditional education 00:06:21 system especially at a young age it's 00:06:23 usually manned or staffed by a little 00:06:26 bit older teacher right you don't have 00:06:28 the tech savvy people teaching the young 00:06:30 minds so we had kind of a disconnect 00:06:32 there between how do I get that tech 00:06:33 infusion into the young minds that they 00:06:36 really need and I think the 00:06:38 collaboration of different efforts here 00:06:39 in San Antonio is really helping us to 00:06:41 build up from the young age up to the 00:06:43 older age getting more talent more 00:06:45 interest and hopefully a bit more 00:06:49 entrepreneurship as well to bring 00:06:50 anymore yeah I think that's one of the 00:06:52 things I'm excited about is we've 00:06:54 on-and-off had 00:06:56 large tech employment centers here 00:06:59 AT&T still has a large amount of tech 00:07:02 jobs 00:07:03 USAA a ton of tech jobs and then we've 00:07:05 had companies headquartered here such as 00:07:07 global scape and Rackspace and a handful 00:07:09 of others over time but there hasn't 00:07:11 been that whole entrepreneurial 00:07:13 ecosystem here really where you have 00:07:15 hundreds of companies starting every 00:07:17 year and maybe ten of those are 00:07:19 successful and the other ninety that 00:07:22 we're not successful those folks move on 00:07:24 and go participate in the next hundred 00:07:26 things that are getting started up the 00:07:27 year after that and you get this 00:07:28 ecosystem of creativity and innovation 00:07:31 going with the acceptance that not every 00:07:35 company and idea and projects going to 00:07:37 succeed and this is something that San 00:07:40 Antonio has been somewhat risk-averse 00:07:42 over time which maybe helps us building 00:07:45 the cybersecurity talent here risk 00:07:46 aversion is a good thing but on the get 00:07:49 the entrepreneurship side it's one where 00:07:52 folks need to be able to have the belief 00:07:55 that if they do try something and it 00:07:56 does not work out that there is going to 00:07:59 be a job available for them still 00:08:01 they're not going to be looked at as a 00:08:03 failure per se which i think has 00:08:06 happened to some here in the past I 00:08:08 absolutely agree and that's something I 00:08:10 tried to coach my team with as well it's 00:08:13 I think it's your perspective right when 00:08:16 you're working at a company you want to 00:08:17 impress your boss you want to do well 00:08:18 you're afraid of failure but the 00:08:20 mentality of that failure is a good it's 00:08:22 a learning experience it's just labeled 00:08:23 failure when in reality it's a 00:08:25 scientific process that allows you to 00:08:27 make a choice that's better than an 00:08:29 earlier choice I think that's the 00:08:32 mentality we need yes certainly cyber 00:08:34 security information assurance is a 00:08:36 little bit more risk-averse I do think 00:08:38 that as institutions like UTSA grow in 00:08:41 their prominence and their education for 00:08:43 the tech sector the tech grow in their 00:08:46 area for educating tech students we will 00:08:50 see more of that I think that's the 00:08:51 advantage that say up in Austin are 00:08:54 really big prominent school lots of 00:08:56 businesses surrounding the University of 00:08:58 Texas in Austin and other institutions 00:09:00 so they have a little bit more of that 00:09:01 infrastructure in place we are coming 00:09:03 long ways in the past five or ten years 00:09:05 I think we'll we'll get there very soon 00:09:07 yeah if you look at all of the other 00:09:10 major tech hubs around the world they 00:09:13 all have at least one world-class 00:09:15 research institution within 50 miles of 00:09:17 them so the the growth of UTSA is 00:09:22 helpful in the quality at Trinity and 00:09:24 some of the other smaller schools around 00:09:26 the area is amazing but you have to have 00:09:28 that large scale research university is 00:09:32 what we've seen from tech hubs all 00:09:34 across the globe whether it's here in 00:09:36 the US or in places like Israel or over 00:09:41 in Asia same everywhere you see that top 00:09:44 quality research university is part of 00:09:46 and a core component of that tech 00:09:49 ecosystem emerging exactly so you guys 00:09:53 started off back with FTP and that was 00:09:57 one way to send files back and forth and 00:09:59 to handle secure data exchange 20 years 00:10:02 ago when we were having to install a 00:10:04 tcp/ip stack on the operating system 00:10:07 like chameleon or some of the other 00:10:08 versions of tcp/ip yes for you folks 00:10:12 listening that were born in the iPhone 00:10:13 generation computers 20 years ago which 00:10:17 is not that long in the grand scheme of 00:10:19 timelines did not come with tcp/ip like 00:10:22 there was the web browser has only been 00:10:24 around for slightly over 20 years as 00:10:27 well so this idea of graphical browsing 00:10:31 of content online is relatively young 00:10:34 and new but businesses have been using 00:10:36 computers for 6070 years and now and 00:10:39 sending data back and forth to each 00:10:42 other and for a long time that was 00:10:45 something like an FTP or some other 00:10:48 protocols but what's going on just kind 00:10:51 of holistically is with secure data 00:10:53 exchange and help the audience 00:10:55 understand that overall concept sure 00:10:58 that's a great question and yes I do 00:10:59 remember the days of installing tcp/ip 00:11:01 on my windows box so that I could 00:11:03 connect to the internet through my 00:11:04 dial-up so yeah back in the day yes on 00:11:07 the one hand it's kind of surprising 00:11:08 that FTP as venerable as it is still 00:11:11 exists so in that regard there has 00:11:14 a whole lot of evolution whether it's 00:11:15 FTP you add on to it the SSL Security 00:11:19 layer to encrypt data and transit those 00:11:21 things have existed since 1976 I think 00:11:24 is the FTP protocol first specification 00:11:27 those things exist on mainframes on many 00:11:30 computers on desktops on servers 00:11:32 throughout the world and a surprising 00:11:34 amount of people still use FTP to 00:11:36 transfer files mainly due to the 00:11:38 interaction between two completely 00:11:40 different entities it's a legacy 00:11:41 transfer you're not in control of both 00:11:43 sides you just have to conform to 00:11:45 whatever that vendor or supplier 00:11:46 contractor asks you to do knock on wood 00:11:50 we're hoping that most people are moving 00:11:52 to the SSL enabled a secure enabled 00:11:55 version of FTP in addition to that the 00:11:58 SSH protocol another encrypted mechanism 00:12:02 to transfer files is fairly common it's 00:12:04 a little bit easier on firewalls and the 00:12:06 number of ports you have to have open 00:12:07 easier to configure a bit more secure on 00:12:10 mutual authentication so FTP and FTP 00:12:13 over SSL SSH still are the the bulk of 00:12:16 what's going on at least for the past 10 00:12:18 or 15 years more recently there's been a 00:12:21 push towards more common and firewall 00:12:24 friendly protocols like HTTP over SSL or 00:12:27 HTTPS everyone seems to support it 00:12:30 because of the browser so it's it's a 00:12:34 very common way to transfer files and 00:12:35 then over the past five years you look 00:12:37 at the evolution of that much like the 00:12:39 rest of the industry its API based it's 00:12:41 microservices based so it's not just the 00:12:44 transport of information over HTTP it's 00:12:47 the way it's consumed and produced in 00:12:49 the semantics around that exchange like 00:12:51 rest 00:12:52 ya know FTP is one of those protocols if 00:12:55 you're a casual listener here you you 00:12:57 may never have worked with their 00:12:59 experience but everyone has sent 00:13:01 received email at this point and emails 00:13:03 SMTP written back in roughly that same 00:13:06 timeframe and many of the security 00:13:09 things that we need now on a open 00:13:11 Internet were not contemplated initially 00:13:14 so folks have had to innovate and build 00:13:17 security scaffolding around something 00:13:19 that was not designed that way but these 00:13:21 protocols are implemented across 00:13:23 thousands of different types of 00:13:25 computing systems and they're very 00:13:28 lightweight and efficient at their core 00:13:29 so they can also run on embedded devices 00:13:31 so as we move to this Internet of Things 00:13:34 era you may see a resurgence I think of 00:13:38 of FTP of HTTP continuing its 00:13:42 proliferation but these lightweight 00:13:45 standards-based standard long-lived 00:13:49 protocols not gonna go anywhere anytime 00:13:51 soon 00:13:52 no not at all and I think you've touched 00:13:54 on a very important topic the IOT 00:13:56 explosion that's happening these days I 00:13:57 was fortunate enough to talk about IOT 00:14:00 and the journey of data through IOT at 00:14:02 the RSA show last year and it was or 00:14:05 this past show I should say it's 00:14:08 fascinating to contemplate how cheap 00:14:10 compute devices are these days now 00:14:12 anyone can be an entrepreneur and come 00:14:14 up with an idea that requires a physical 00:14:16 form factor processing power memory 00:14:18 internet connectivity even five years 00:14:21 ago that would have been prohibitively 00:14:22 expensive it would have been an idea 00:14:23 that you write down and say I'll never 00:14:25 do that now it's super cheap to produce 00:14:27 low-cost devices that can do whatever 00:14:29 you want and program programming those 00:14:31 devices becomes really easy because 00:14:34 languages are so advanced right now and 00:14:37 we're seeing lots and lots of vendors of 00:14:39 a full range of trustworthiness shall we 00:14:43 say producing devices that do anything 00:14:46 from measuring the water flow inside a 00:14:48 field and an agriculture business all 00:14:50 the way up to monitoring your house for 00:14:51 safety all of those devices generate 00:14:54 data the data must flow somewhere for 00:14:56 production and consumption of 00:14:58 information or workflows quite often 00:15:00 that's cloud-based so we the resurgence 00:15:02 I should say of the cloud yeah I don't 00:15:05 know if we're surgeons right we're but 00:15:06 it seems like it always comes in waves 00:15:07 the cloud was the thing and then yeah 00:15:09 not really sure what it means but now 00:15:11 the cloud is here it's real it has micro 00:15:13 services it's ubiquitous the easy access 00:15:16 cheap storage cheap compute and IOT is 00:15:19 often connected to the cloud and we're 00:15:21 going to see more and more HTTP in 00:15:23 particular based communication with 00:15:25 api's hosted in the cloud or IOT yeah 00:15:27 and then that cost of the computing 00:15:29 pieces just as you were talking they're 00:15:31 thinking back I've worked for three 00:15:33 months over summer after I graduated 00:15:36 from high school before I started 00:15:37 computer science in college 20 plus 00:15:39 years ago now 00:15:40 and living at home no bills my three 00:15:44 months of pay was enough to buy the 00:15:45 computer I took with me to school now a 00:15:48 Raspberry Pi for less than 50 bucks has 00:15:51 more computing power than that system 00:15:53 did and I mean I could have I could go 00:15:56 down and work at a fast food restaurant 00:15:57 for one shift for one day and pay for a 00:16:00 Raspberry Pi right 00:16:01 you know I think that's a great parallel 00:16:03 for what we're trying to build here in 00:16:04 San Antonio for the tech culture the 00:16:07 incubation of entrepreneurial activities 00:16:09 because the cheap compute power the 00:16:12 ability to get a Raspberry Pi or a next 00:16:14 thing chip you can buy these things and 00:16:17 innovate and deliver with all the tools 00:16:19 available to you in a very cheap fashion 00:16:20 and that's spawning all sorts of 00:16:22 creativity and ingenuity and 00:16:23 entrepreneurship that's what we want to 00:16:25 build in San Antonio for the businesses 00:16:28 not just the devices but also the 00:16:30 businesses make it cheap reduce the 00:16:31 barriers to entry promote creativity 00:16:35 you're listening to 1200 W AI this is 00:16:38 cyber talk radio and we're talking 00:16:40 secure data exchange a little bit about 00:16:41 the history of the San Antonio Texan and 00:16:44 joined by Greg hopper from Global scape 00:16:47 here in San Antonio one of our longest 00:16:50 and most well established technology 00:16:52 firms in the city and so Greg wealth FTP 00:16:57 is going to remain a mainstay from now 00:17:00 maybe until the the end of time at least 00:17:02 the end of our careers what new things 00:17:05 are global scape working on what new 00:17:07 things are happening in the secure data 00:17:09 exchange space well we're very excited 00:17:11 because we've recently launched a new 00:17:13 product or platform referred to as 00:17:16 kinetics which is an integrated which is 00:17:19 an integration platform as a service 00:17:21 offering at Global scape for many years 00:17:24 we've started with the client to move 00:17:25 files to a server we then evolved into 00:17:28 the server side of things to secure both 00:17:30 ends the communication and augmented 00:17:32 that with the workflow automation and 00:17:33 what we saw over many years especially 00:17:36 2004 through 2014 as we address more and 00:17:40 more customer problems around secure 00:17:42 data exchanges and workflow automation 00:17:44 is that in addition to the transfer of 00:17:48 the data the transaction of business 00:17:50 across boundaries the transfer itself 00:17:53 doesn't exist 00:17:54 just for transferring those files 00:17:56 contain data the data is consumed it's 00:17:59 moved it's involved in an automated 00:18:01 business process so we built different 00:18:03 automation components into our software 00:18:05 to help non-technical or moderately 00:18:07 technical people move consume reorients 00:18:12 do things with that data this was 00:18:14 largely done in an on-premise 00:18:16 environment which was kind of the way it 00:18:19 was done in the past but now that the 00:18:20 cloud is everywhere and cheap and does 00:18:22 so much for so many people 00:18:23 you have the Amazons and the azure 00:18:26 environments that have tons of features 00:18:28 and capabilities and cloud enablement 00:18:30 we've noticed that a lot of businesses 00:18:33 rely more upon the cloud than they do an 00:18:35 on-premises solutions we took the 00:18:37 concept of workflow automation and 00:18:39 integrating different systems previously 00:18:42 on premises and extended that to the 00:18:44 cloud offering so our kinetics platform 00:18:46 allows moderately to non-technical 00:18:48 people to use simple point-and-click 00:18:51 mechanisms to automate business process 00:18:53 workflows across different cloud 00:18:54 services for example that marketing guy 00:18:56 in the corner office that can't even 00:18:58 spell FTP can now point-and-click and 00:19:01 integrate his MailChimp with Magento 00:19:03 with Salesforce and do an end-to-end 00:19:07 business process for lead generation so 00:19:10 this is a software designed to allow a 00:19:13 business analyst I guess if I was going 00:19:15 to use a job title there to complete 00:19:19 technology integration tasks absolutely 00:19:21 okay and so now you can repurpose your 00:19:24 tech people your back-office devops 00:19:27 people from more pertinent or more 00:19:29 difficult tasks this is one of the great 00:19:30 things going on with technology in that 00:19:33 we're constantly making things more 00:19:35 accessible and more simple and as you're 00:19:38 doing that and looking out there busier 00:19:41 listening there's a couple of different 00:19:42 types of companies that you can choose 00:19:45 to get these technologies and products 00:19:47 from and this is a great kind of hinted 00:19:49 at a little bit about the Internet of 00:19:50 Things as we were talking these some 00:19:53 companies will have a security first 00:19:54 mindset as they're developing these 00:19:56 business process automation and workflow 00:19:58 tools and then others will have an ease 00:20:00 of use mindset and the ease of use 00:20:02 mindsets great for non confidential non 00:20:06 highly valuable 00:20:08 more data these are things you're 00:20:10 sending back and forth that you really 00:20:12 wouldn't maybe care if it was out there 00:20:15 on the front page of the paper but if 00:20:17 you have highly confidential highly 00:20:19 sensitive information or if you have 00:20:21 regulatory compliance via financial 00:20:24 services health care or other industries 00:20:26 then looking at your vendor selection 00:20:28 process I would be thinking about 00:20:30 companies with the security first 00:20:31 mindset and then ones that are allowing 00:20:35 you to still complete the automation and 00:20:38 business processes that you need but 00:20:41 doing it in a way that is going to 00:20:43 protect the information first rather 00:20:45 than the ease-of-use first I think 00:20:47 you're absolutely right and at global 00:20:48 scape we've worked with many customers 00:20:50 large customers throughout the world and 00:20:52 we have heard that exact message so take 00:20:54 for example the ubiquity of the boxes 00:20:57 and drop boxes and onedrive lots of 00:21:00 really great systems exist out there 00:21:02 that allow even my mom to upload files 00:21:04 and share with lots of other people I 00:21:06 think the ease of use there is just 00:21:09 through the roof it's fantastic and 00:21:11 often people use this for an important 00:21:15 date or non sensitive data I should say 00:21:17 to my mom her pictures are important but 00:21:19 leaking of the pictures of our family 00:21:20 trip is not that bad if those are on the 00:21:22 front page of the paper you might be 00:21:23 proud right unfortunately the same 00:21:25 people that use that for the non 00:21:27 sensitive information 00:21:28 realize how easy it is to do things and 00:21:30 they start using that as their de facto 00:21:32 ad hoc delivery of sensitive information 00:21:35 through a corporation so we see over and 00:21:37 over again that large enterprises like 00:21:39 the ease of use but they really need to 00:21:41 control how the data is flowing in and 00:21:43 out of these systems and they don't 00:21:45 necessarily want to disempower their 00:21:47 knowledge workers from achieving their 00:21:48 goals but they definitely need to be 00:21:50 stewards of the information and protect 00:21:53 the interests of the company so often 00:21:55 they need to find an alternative it's 00:21:57 more secure that's more governed whether 00:22:00 it's falling under GDP our regulations 00:22:02 in Europe or PCI compliance in the 00:22:04 States or across the world so we feel 00:22:09 that global scape is fairly uniquely 00:22:10 positioned because ease of use is one 00:22:12 facet of an important one important 00:22:15 facet of a software solution but 00:22:17 security we feel is a lot more important 00:22:20 long term more important we start from 00:22:22 the ground up with security and data 00:22:26 transformation with transacting 00:22:28 information across different systems and 00:22:30 then we can build on top of that 00:22:32 world-class ease of use as opposed to 00:22:35 the ease of use forward type companies 00:22:37 that treat security as an afterthought 00:22:40 it's a little bit more of a challenge I 00:22:41 think eventually we'll both converge I 00:22:43 mean we're all eventually going to be 00:22:45 very secure and very easy to use but I 00:22:48 see that in the current term companies 00:22:51 such as Global scape kind of covers both 00:22:53 bases yeah it's a one that's going to be 00:22:56 important for these ease-of-use guys is 00:22:59 to really consider to think about the 00:23:01 security and for those of you choosing 00:23:03 those products out there if they do have 00:23:04 a security issue holding them 00:23:06 accountable either with feedback to them 00:23:10 or with your wallet by choosing to pick 00:23:12 a different solution we're getting ready 00:23:14 to head into the bottom of the hour 00:23:16 break here for a news traffic and 00:23:19 weather update 00:23:20 if you've just tuned in to us on the 00:23:22 radio dial you're listening to cyber 00:23:24 talk radio on 1200 W AI your host Brett 00:23:28 Hyatt and joined by Greg coffer from 00:23:31 global escape and we're talking secure 00:23:33 data exchange you'll stick with us 00:23:35 through the bottom of the hour break we 00:23:37 will be talking about managed file 00:23:40 transfer and some more details into what 00:23:43 that does and then as well out there in 00:23:45 your business how some of these security 00:23:47 and compliance standards that you're 00:23:49 likely held - whether it's a PCI that 00:23:53 applies to almost everyone as almost 00:23:55 every business accepts credit cards 00:23:56 these days or through to some others 00:24:00 such as a GD P R if you're doing 00:24:02 business overseas and Greg had also 00:24:04 mentioned now that software like that 00:24:07 from Global scape is allowing developers 00:24:09 to work on more complicated and a more 00:24:11 interesting tasks than just basic data 00:24:13 integrations these days I may get the 00:24:16 chance to ask Greg what does a developer 00:24:18 global scape do and they feel you're a 00:24:20 software developer out there in the 00:24:21 audience what skills should you build to 00:24:23 work for 00:24:24 like that 00:24:29 [Music] 00:24:41 [Music] 00:25:02 [Music] 00:25:14 welcome back to cyber talk radio if 00:25:18 you're just joining us after the break 00:25:19 this is a weekly program where we 00:25:22 discuss cybersecurity topics trends and 00:25:25 technologies this week we're talking 00:25:27 secure data exchange platforms with Greg 00:25:30 Hoffer from global scape a one of San 00:25:34 Antonio's earliest big technology 00:25:36 success stories if you have not heard 00:25:39 about them what a web browser Google in 00:25:41 global scape and you will learn quite a 00:25:44 bit about one of the stories that's been 00:25:46 here for over 20 years and not talked 00:25:49 about as much as it should be so before 00:25:51 the break we've kind of covered the high 00:25:54 level of secure data exchange sending 00:25:56 stuff back and forth talked about a 00:25:57 protocols and how those things are 00:25:59 happening if you wanted to listen to 00:26:02 that you can catch up with it 00:26:04 well post it online Tuesday after this 00:26:06 programs airing here on Saturday if you 00:26:08 happen to be listening to us on one of 00:26:09 those replays or rebroadcast thank you 00:26:11 very much we will be up on our website 00:26:15 at wwlp.com as well as on itunes 00:26:18 podcasts pocket cast for Android devices 00:26:21 or YouTube for those of you that would 00:26:24 like to see a picture of Greg and I wow 00:26:26 you listen to the audio so Greg again 00:26:28 thank you for coming in and joining us 00:26:30 and we had a promise the listeners too 00:26:32 we were gonna dive in and talk a little 00:26:35 bit about security compliance and and 00:26:39 some of the things that drive this 00:26:40 secure need for data transfer of it 00:26:42 there's been a lot of conversation over 00:26:43 this last few years people talk about 00:26:45 big data and the internet and if you're 00:26:48 gonna send a petabyte which now you can 00:26:51 fit a petabyte of data in less than one 00:26:55 cabinet of equipment maybe even into a 00:26:58 really large single server if you were 00:27:01 to deliver that petabyte of data over a 00:27:03 internet circuit are you gonna get it 00:27:06 from one coast to the other anytime soon 00:27:09 it's actually a good point I think data 00:27:11 sizes continue to grow and at a very 00:27:14 explosive rate when you think about the 00:27:17 advent of big data analytics and machine 00:27:19 learning where everyone retains all data 00:27:21 and minds it to get operational 00:27:23 intelligence when you think of 00:27:25 the nasan but growing Internet of Things 00:27:27 or IOT market where lots of sensors 00:27:30 distributed throughout lots of locations 00:27:31 are all generating bits of data very 00:27:34 frequently data sizes continue to grow 00:27:37 and data transfer nians are never going 00:27:39 to diminish we although we have seen 00:27:42 quite a growth in bandwidth capabilities 00:27:44 throughout the world and even in the 00:27:47 United States as San Antonio is crossing 00:27:48 their fingers for Google Fiber for 00:27:50 example one thing that is often 00:27:51 overlooked is the challenge of moving 00:27:53 large data across large distances I 00:27:55 think we've kind of cracked the nut of 00:27:57 small distances whether it's within the 00:27:59 data center or across town but the 00:28:03 single biggest impediment to large bits 00:28:06 of data going across large distances is 00:28:08 something we have no control over and 00:28:09 that's the speed of light there is 00:28:10 necessarily a latency involved in 00:28:12 transferring data from New York for 00:28:14 example to London or worse Singapore to 00:28:17 San Francisco the distance is your 00:28:20 limiting factor 00:28:21 part of that limiting factor is because 00:28:24 of the nature of the underlying protocol 00:28:25 as tcp/ip communicates packets back and 00:28:28 forth there's a flow control there's a 00:28:30 mechanism it requires both sides to 00:28:31 agree on how much data is flowing so I 00:28:33 guess I'm getting a bit technical here 00:28:35 but that's okay but the folks have stuck 00:28:38 with us this long we can get nerdy let 00:28:41 me high level it a little bit more here 00:28:42 the the larger the distance the less 00:28:44 you're able to use your available 00:28:46 bandwidth so at some point you reach 00:28:48 diminishing return it doesn't matter if 00:28:49 you have 100 megabit per second or a 00:28:50 gigabit per second line between Tokyo 00:28:53 and San Francisco over tcp/ip channels 00:28:56 it will eventually reach a bottleneck 00:28:58 based upon that protocol 00:29:00 companies such as global scape and many 00:29:02 others have proposed alternative 00:29:04 solutions and we offer UDP based 00:29:06 protocols or different ways of flow 00:29:08 control between those two endpoints to 00:29:10 try to achieve more of the available 00:29:12 bandwidth but those are at this point 00:29:15 kind of one-off or considered not 00:29:17 mainstream it's somewhat proprietary so 00:29:19 it doesn't enjoy the same success as the 00:29:21 universally accepted FTP HTTP or SFTP 00:29:25 protocols so I guess that's the good 00:29:28 news and bad news bad news is speed of 00:29:31 light slowing us down from most cases 00:29:32 the good news is we have ways to get 00:29:34 even faster it just requires a bit more 00:29:37 about 00:29:37 yeah I have a used to give a 00:29:39 presentation to explain the big data 00:29:41 stuff to folks it in there and then you 00:29:43 can find it online probably on 00:29:45 SlideShare it's got a picture of a UPS 00:29:48 truck with flames painted on the side 00:29:50 and then like going through explaining 00:29:52 to folks like the 10 megabit connection 00:29:54 we used to have and then 100 megabit 00:29:57 used to be the thing to your desktop and 00:29:59 now we all basically have gigabit and 00:30:01 even if the folks on Wi-Fi now you're 00:30:04 starting to get gigabit speeds over 00:30:05 Wi-Fi instead of wired connections 00:30:08 inside the office and but even in that 00:30:11 that gigabit connection to send a 00:30:14 terabyte of data even you're talking 00:30:15 about hours and and you get to hundreds 00:30:18 of terabytes or a petabyte of data and 00:30:20 the fastest way to get it from one coast 00:30:22 to the other is to put it in that UPS 00:30:24 truck and drive it right yeah yeah we 00:30:27 have a white paper and I've spoken about 00:30:29 this at a conference where if you're 00:30:32 gonna transfer a terabyte of data pick 00:30:34 some arbitrary large size from New York 00:30:36 to London and you have a hundred megabit 00:30:38 per second line which is pretty fast 00:30:40 right but you do the math and it takes 00:30:42 well over a day to transfer that file 00:30:45 it's actually faster to put it on a hard 00:30:47 disk and put it in Virgin Atlantic's 00:30:49 flight number whatever 25 and transport 00:30:52 it physically so we still have some of 00:30:54 those challenges we're getting better 00:30:56 but it's a slow road yeah so as you're 00:30:59 looking in this data transfer space and 00:31:03 a little segue back to the the 00:31:04 compliance pieces so for the listeners 00:31:08 out there I think everyone has heard 00:31:11 about PCI compliance at this point or 00:31:13 the if you you haven't this is the 00:31:16 standard that all the banks and credit 00:31:19 card merchants and and retailers out 00:31:21 there have agreed to on the private 00:31:23 sector this is not a law 00:31:25 this is private sector regulating itself 00:31:27 to try to keep the transfer of credit 00:31:31 card information and all the associated 00:31:33 details around that that piece safe how 00:31:36 does the that standard tie in to data 00:31:39 transfer well it ties in almost directly 00:31:42 one-for-one there are some areas and PCI 00:31:44 compliance or PCI standards to which 00:31:47 organizations must comply 00:31:49 that are outside the scope of data 00:31:51 transfer things like physical security 00:31:52 or how do you oughtn't eight endpoints 00:31:55 that are joined to your network etc but 00:31:57 a large part of the PCI initiative is to 00:32:00 make sure that sensitive information 00:32:02 such as the personally identifiable 00:32:05 information on a card or the credit card 00:32:06 numbers any payment instruments 00:32:08 sensitive information is stored securely 00:32:11 and transferred securely so there are 00:32:14 elements of that standard to which 00:32:17 global scape helps adhere and force and 00:32:19 report when the data you're dealing with 00:32:22 through our managed file transfer 00:32:23 solution is PCI falls under PCI 00:32:25 compliance yeah and as you're thinking 00:32:28 about that is that merchants you may 00:32:31 have multiple store locations somebody 00:32:33 may come in to one of your stores they 00:32:35 scan their credit card they sign up for 00:32:37 your loyalty program at that store and 00:32:39 then there may be a nightly process 00:32:41 where all of the new customers that 00:32:43 signed up to the loyalty program at that 00:32:44 store that information is packaged up 00:32:46 and sent back to a central office to 00:32:49 then be distributed out to all the 00:32:51 stores so then if you you go to a 00:32:52 different location the following day you 00:32:55 have the ability to get your membership 00:32:57 points there and the things show up some 00:32:59 retailers are getting more real-time 00:33:01 than daily now but even for many of them 00:33:03 they're still even on a process where 00:33:05 these things happen 00:33:06 over the course of a nightly batch 00:33:08 process and those are the types of file 00:33:10 transfers that are going on out there 00:33:12 all the time that need to stay safe and 00:33:14 secure that's right and I think the 00:33:17 point you made earlier is really 00:33:18 important as well this is not a mandate 00:33:19 this is not a government regulation that 00:33:21 falls under civil or criminal Pendulum 00:33:25 penalties if you don't do it but it's 00:33:26 enforced by the market and I think 00:33:27 that's a good system especially for a 00:33:29 capitalistic society right so credit 00:33:32 card companies the visas the chase the 00:33:34 mastercards discovers of the world 00:33:36 require that the people accepting those 00:33:40 payments are in compliance with PCI as a 00:33:43 standard so that they know that their 00:33:45 customers you and me who have the credit 00:33:47 cards are secure when we swipe it or dip 00:33:50 it and we have that transaction with 00:33:52 that business so outside of 00:33:56 payment card and payment transaction 00:33:58 processing what are some other industry 00:34:00 examples where businesses are out there 00:34:02 using managed file transfer secure data 00:34:05 exchange to pass records back and forth 00:34:08 sure what I like to do when I talk to 00:34:10 employees customers and prospects is 00:34:13 mentally divided two basic camps I think 00:34:17 that the traditional managed file 00:34:19 transfer arena concentrates on the 00:34:21 transaction of business across vendors 00:34:23 suppliers etc so a supply chain is a 00:34:26 great example 00:34:26 I am a retail outlet I don't manufacture 00:34:30 the clothes I don't order the shipment 00:34:34 of clothes I don't have to market the 00:34:36 clothes or figure out how to do the 00:34:38 returns or payment processing or even do 00:34:40 my payroll I'm just a retail outlet that 00:34:43 focuses on the branding marketing 00:34:45 merchandising acquiring of customers and 00:34:47 delivering them the best clothes that I 00:34:48 select so when you think of the supply 00:34:51 chain of that retail organization and 00:34:53 all the elements involved there's a lot 00:34:55 of business that must be transacted for 00:34:58 product shipment for product tracking 00:35:01 for acquiring new products for the 00:35:03 payment and remittance of payment across 00:35:05 those different individuals all of that 00:35:07 data transacted across company borders 00:35:09 between two entities that's a really 00:35:13 good example of how managed file 00:35:14 transfer does its thing another good 00:35:18 example there because we have a lot of 00:35:19 customers doing this is in healthcare if 00:35:21 you have followed any of the healthcare 00:35:23 debate you know that there are so many 00:35:25 different principles involved in any 00:35:26 amount of healthcare provided there's 00:35:28 you go down to your local clinic they 00:35:31 have suppliers of medical equipment 00:35:33 they've got insurance companies they 00:35:34 have to deal with they've got regulatory 00:35:36 agencies they've got to file with so 00:35:38 healthcare generates a lot of data the 00:35:40 data is very sensitive 00:35:41 it must be predicted both at that clinic 00:35:44 or location you visit and across to the 00:35:46 different entities that need to consume 00:35:49 or produce data involved so managed file 00:35:51 transfer is a great way to do the 00:35:53 automated transaction of that 00:35:54 information in a secure and regulatory 00:35:56 compliant manner yeah and those 00:35:57 healthcare ones that's a law that's a 00:36:01 HIPAA this was a Health Information 00:36:04 Portability and Accountability Act and 00:36:06 it was about making electronic map 00:36:08 or records and it's become a full 00:36:12 security and compliance standard with 00:36:14 some follow-ons of what's called HIPAA 00:36:16 high-tech I don't remember what the 00:36:18 second half of that algorithm stands for 00:36:19 I don't remember what the second half of 00:36:21 that acronym stands for but one thing 00:36:24 that lawmakers are good at is making 00:36:25 long acronyms that sound good and 00:36:27 actually have some real meaning back 00:36:29 behind them but in that space so this 00:36:32 electronic medical records in exchange 00:36:34 between insurers clinics hospitals and 00:36:36 all of these folks when I go in I feel 00:36:40 like I was over just this past week and 00:36:43 I saw the big wall of paper still in the 00:36:45 office there it have health care 00:36:48 providers really all made things 00:36:51 electronic this point and gotten online 00:36:52 or is it still in the setup and 00:36:54 configuration adoption phase I think 00:36:57 it's the latter unfortunately although 00:36:59 there have been many initiatives over 00:37:00 the past ten years to make health 00:37:02 records electronic and I think we're 00:37:04 making inroads there it's a very very 00:37:06 slow process at this point my 00:37:08 observation is that the business is 00:37:10 entrenched in the legacy way of doing 00:37:12 things there's a lot of existing doctors 00:37:15 nurses practitioners that are 00:37:17 comfortable with how it goes today maybe 00:37:20 we just need a new wave of the younger 00:37:22 up-and-coming doctors who embrace 00:37:24 technology from day one when they look 00:37:27 at their iPhone or whatever the next 00:37:29 generation is technology is becoming a 00:37:31 more pervasive part of life and I think 00:37:34 generationally we will become much 00:37:37 better at electronic health records I 00:37:38 mean I think is do we see some of these 00:37:41 folks at least smaller doctors as well 00:37:43 maybe just the fear of like I've never 00:37:46 had a data security problem with my 00:37:48 medical records when they were in paper 00:37:49 and now I've got to put them in these 00:37:50 computer systems I don't understand and 00:37:53 it's one where hopefully they're 00:37:56 listening and then maybe they'll work 00:37:58 with someone like you 00:38:00 so that they can securely send them from 00:38:01 their office up to the hospital or the 00:38:03 surgical center or the long-term care 00:38:06 facility or all of the other folks that 00:38:08 even a solo general practitioner is 00:38:10 gonna interact with these days and need 00:38:12 to exchange records with sure and I 00:38:14 think that perhaps cost or anticipation 00:38:17 of costs was a challenge as well even 00:38:19 ten years 00:38:20 small doctor's office or healthcare 00:38:23 provider might have been faced with some 00:38:24 challenges to acquire an IT consultancy 00:38:26 to come in and help them do something 00:38:27 because they don't have the expertise 00:38:29 these days with cloud-based services and 00:38:32 boutique vendors popping up that helped 00:38:34 cover soup-to-nuts the entire healthcare 00:38:37 requirements through a operational cost 00:38:40 of a monthly payment I think maybe that 00:38:43 will help us get to a more adoption of 00:38:45 electronic health records and workflow 00:38:46 yeah and as a consumer out there 00:38:49 listening you're like well why do I want 00:38:50 my medical records to be electronic and 00:38:53 if you you think about the fact that 00:38:56 maybe you're on vacation and you get 00:38:59 into an accident that hospital or of the 00:39:03 trauma facility or whatever you you go 00:39:05 into there is working off of incomplete 00:39:07 information they're not going to have 00:39:09 any of your medical history other than 00:39:11 whatever one of your your friends or 00:39:12 family that's with you is filled out on 00:39:14 that piece of paper this is an it's one 00:39:17 where that portability of a medical 00:39:20 record can give you better care and 00:39:22 across the whole system can give 00:39:24 everyone better care because this is one 00:39:27 as well right now even at an anonymized 00:39:29 level there's not the exchange of 00:39:32 information between the hospitals and 00:39:34 medical researchers to understand if hey 00:39:36 here's a set of symptoms here's things 00:39:38 we did and here we're the outcomes from 00:39:41 that that information is not getting 00:39:42 shared so that the pace and improvement 00:39:45 of care is not happening and gaining 00:39:47 from the advantages and benefits of 00:39:49 technology like many other industries 00:39:51 yet exactly and I think the privacy is 00:39:53 probably the single biggest detriment to 00:39:55 forward progress everyone wants their 00:39:57 medical information kept private it's 00:40:00 very sensitive to that person and it 00:40:02 doesn't help that we keep hearing about 00:40:03 data breaches because somebody secured 00:40:05 their data incorrectly and records get 00:40:08 lost and shared on the web and so it's 00:40:12 really important that people adhere to 00:40:13 the regulations like HIPAA hi-tech to 00:40:16 help ensure the privacy of the 00:40:17 information so that we as a community 00:40:19 can gain more trust that it's okay to do 00:40:22 that and then we make that forward 00:40:24 progress that can help everyone outside 00:40:26 of that retail supply chain and where no 00:40:28 one wants to have inventory before they 00:40:30 need it and then 00:40:31 here in this healthcare I think folks 00:40:33 can see the benefits of securely 00:40:36 transferring data back in both of those 00:40:38 areas the financial services world so 00:40:41 banks do wire transfers and all sorts of 00:40:44 financial transactions but where else 00:40:47 inside of the financial sector does 00:40:50 managed secure transfer services get 00:40:53 used well that's a great question and I 00:40:55 think that much like there's HIPPA 00:40:57 hi-tech or PCI that we're familiar with 00:40:59 there are an awful lot of regulations 00:41:01 that financial institutions must fall 00:41:03 under that most people haven't heard of 00:41:05 but we help our customers secure the 00:41:08 transaction automation or automatic 00:41:10 processing of that information through 00:41:13 our systems whether it's payment 00:41:16 remittance and ACH clearances or cheque 00:41:19 21 which is the mechanism in the US 00:41:22 which says a picture of a cheque is 00:41:24 equivalent to a paper check that's why 00:41:26 you can now take a picture of your 00:41:27 cheque and upload it to USAA and they 00:41:29 can cash the cheque for you that's 00:41:30 because there was a law that allows 00:41:32 those images to act as the physical 00:41:33 cheque 00:41:34 so an advancement in our society but it 00:41:36 changed the way that technology is used 00:41:38 and so now the data transfer has to be 00:41:40 secured all the way from your iPhone or 00:41:42 Android phone all the way to your 00:41:44 business so with every change that helps 00:41:47 us get better there's an equal challenge 00:41:49 we help where we can I think that you 00:41:53 also need to look at insurance agencies 00:41:55 and healthcare providers and there as 00:41:57 they're viewed as dealing with the money 00:42:00 so I would kind of treat them under the 00:42:02 financial area as well anything dealing 00:42:05 with money it's really really important 00:42:08 to be incredibly secure there's a lot of 00:42:10 talk these days about the electronic 00:42:13 currency the bitcoins the blockchain 00:42:15 Ledger's etc so I think we'll see more 00:42:18 growth in that area as well how can we 00:42:20 better leverage things like blockchain 00:42:23 to both protect our anonymity but also 00:42:25 do a little bit freer use of cash or 00:42:30 monetary instruments yeah no I think 00:42:32 there's gonna be some interesting 00:42:34 innovation there as well just from an 00:42:36 audit trail perspective to have a shared 00:42:39 immutable audit trail can 00:42:42 create that trust in the transaction the 00:42:46 trust in a data transfer data exchange 00:42:48 so I know most of you listening out 00:42:51 there probably heard of just Bitcoin as 00:42:53 this thing maybe that you used to pay a 00:42:55 ransom and ransomware or you can buy 00:42:57 stuff from overstock.com with it that 00:43:00 it's the blockchain is going to be used 00:43:02 for much more than just online 00:43:04 transactions or financial transactions 00:43:07 there's many things that it ties into 00:43:09 related to exchange between two parties 00:43:13 even the talk of replacement of escrow 00:43:15 services or all sorts of other trust 00:43:18 based things that are very complicated 00:43:20 right now that could be made much more 00:43:23 simple by that shared immutable ledger 00:43:26 yeah I'm really excited about the 00:43:27 Entrepreneurship in that area to see 00:43:29 what comes out so we've been going back 00:43:31 and forth talking about computers 00:43:34 exchanging information with each item it 00:43:36 what other types of secure data 00:43:39 exchanges out there yeah this falls into 00:43:41 the second category I had mentioned 00:43:43 earlier in addition to transacting 00:43:45 business across your corporate 00:43:48 boundaries a lot of our customers need 00:43:51 managed file transfer or this exchange 00:43:54 of information for more of a 00:43:56 collaborative role and this might 00:43:57 involve a marketing department 00:43:59 generating materials for a white paper 00:44:02 or a case study it needs to be sent to 00:44:04 some creative agency to make it look all 00:44:06 pretty it needs to be then shared with 00:44:08 legal entity to make sure that it falls 00:44:10 under compliance we're not stating 00:44:12 anything that's wrong 00:44:13 lots of different people involved in the 00:44:16 creation composition editing and final 00:44:19 generation of content whether it's 00:44:21 documents it could be audio it could be 00:44:23 video that oftentimes these things 00:44:26 become not only collaborative but also 00:44:29 quite large if you're dealing with 00:44:30 movies being generated or Game of 00:44:33 Thrones and you don't want it leaked 00:44:35 then you have to manage that asset just 00:44:37 as much as you have to manage credit 00:44:39 card information or financial 00:44:41 instruments yeah whoops on the game of 00:44:44 thrones one sorry yeah yeah so if if you 00:44:49 happen to be watching that series you 00:44:51 can watch the whole season online if you 00:44:53 go into some of the dark web areas there 00:44:56 places to download it now you'll be 00:44:57 violating some of HBO's ownership not 00:45:00 recommended if you don't want to be 00:45:02 committing a crime but it's all out 00:45:04 there on the internet now whether HBO 00:45:07 likes it or not yeah so I think the big 00:45:08 takeaway is regardless of how 00:45:09 information is shared until we become a 00:45:12 society of Hermits where everyone just 00:45:14 Garner's their own information and does 00:45:15 nothing with it or until we became 00:45:17 become some socialist communist 00:45:21 everything freely we will exist in the 00:45:24 middle ground where some information is 00:45:26 incitive and private and important to me 00:45:28 others other information has to be 00:45:31 transacted across some boundary shared 00:45:33 with other people for collaboration or 00:45:35 transaction purposes and therefore the 00:45:37 information must be secured it must fall 00:45:39 under some regulation hopefully to 00:45:42 ensure that it's secure so that the 00:45:43 consumers of the data can trust that it 00:45:45 is secure for those in the tech industry 00:45:47 are looking to get into the tech 00:45:49 industry maybe they're at UTSA or one of 00:45:51 the other universities here in the area 00:45:52 or they may be listening online on I 00:45:54 Heart Radio all across the u.s. of the 00:45:56 world thinking about getting into secure 00:46:00 data exchange cybersecurity what are the 00:46:02 type of things you're looking for in a 00:46:06 prospective engineer research and 00:46:08 development type of a hire for your 00:46:10 company well first and foremost we 00:46:12 always want people that are passionate 00:46:13 and engaged and can help us further our 00:46:16 culture and community of collaborative 00:46:19 energetic smart people developing 00:46:21 commercial software I really put a lot 00:46:24 of emphasis on the culture and the 00:46:26 ability for people to work together 00:46:27 collaboratively on the technical front 00:46:30 we at Global scape are primarily a 00:46:32 window shop so we do an awful lot of 00:46:34 windows he plus plus development which 00:46:37 at for a number of years was really hard 00:46:40 to get because it's being replaced by 00:46:42 the Java's and the C sharps and then the 00:46:44 rubies and pythons etc of the world but 00:46:47 I think C++ has experienced quite a bit 00:46:49 of a renaissance over the past three or 00:46:51 four years as the language has evolved 00:46:53 and it has a lot of abstractions much 00:46:56 like the modern languages but it's as 00:46:58 close to bare metal as you can get for a 00:46:59 lot of speed so we're very proud that we 00:47:01 have a pretty strong and growing set of 00:47:03 C++ developers 00:47:06 the other half of what we do is very 00:47:08 web-based because we do micro services 00:47:11 and web UIs for our products so at this 00:47:15 point we use a lot of html5 angular kind 00:47:19 of that front-end stack aligned with 00:47:22 usability and our big emphasis there is 00:47:26 to make sure that our code is correct 00:47:28 reusable maintainable and very very user 00:47:31 friendly yeah so C++ is a common 00:47:34 language for for us as well and I think 00:47:36 you go across the cybersecurity 00:47:38 landscape it's a good one to go get 00:47:41 yourself familiar with you can on the 00:47:44 Microsoft side these days Visual Studio 00:47:46 Community Edition it's free you can 00:47:49 compile C++ with that you can get your 00:47:53 hands on code you could start working 00:47:55 with the learning and yet all those 00:47:57 abstractions that you may have in a 00:48:00 Python or Java is they're also available 00:48:05 to you in C++ but as Greg was saying you 00:48:08 can also go all the way down into the 00:48:10 details and you can inline assembly code 00:48:12 into your C++ if you'd like you probably 00:48:15 have never taken an assembly language 00:48:16 programming class if you're in college 00:48:18 right now but you can go down and do 00:48:21 that in C++ it's the the spider-man 00:48:24 warning of computer languages of with 00:48:27 great power comes great responsibility 00:48:28 there's lots of things you can do in C++ 00:48:30 to hurt yourself to yeah I'm kind of an 00:48:32 academic nut myself and what I love 00:48:34 about C++ is it's truly the only 00:48:36 language on the planet that has 00:48:38 high-level abstractions at zero cost 00:48:40 there is it's all compiled away at 00:48:42 compile time so it's pretty amazing and 00:48:44 if don't be afraid of C++ and think that 00:48:46 it's a niche area if you look at a lot 00:48:48 of prominent solutions out there 00:48:49 including some companies you might have 00:48:51 heard of like Google and Facebook 00:48:52 there's an awful lot of C++ going on 00:48:54 yeah for sure 00:48:56 so in closing great what do you see for 00:49:01 the future of San Antonio's taxine for 00:49:03 the future of data security and a file 00:49:06 transfer I love the future of San 00:49:09 Antonio because 00:49:10 the burgeoning tech scene and the great 00:49:12 work being done by so many people to 00:49:13 help build up the community through tech 00:49:15 block piqued them etc I really look 00:49:18 forward to participating and 00:49:19 contributing where I can and hopefully 00:49:21 it'll be a lot of companies that help us 00:49:23 secure our data because it will always 00:49:25 be a problem there are many threat 00:49:27 actors out there and they will not go 00:49:28 away thank you very much for joining us 00:49:30 this week and for being a leader at one 00:49:33 of the longest and most well established 00:49:34 tech firms here in San Antonio 00:49:41 [Music] 00:49:48 you