GITEX 2012 INTERVIEWS ITU TELECOM World 2012 - Teletimes

GITEX 2012 INTERVIEWS ITU TELECOM World 2012 - Teletimes GITEX 2012 INTERVIEWS ITU TELECOM World 2012 - Teletimes

teletimesinternational.com
from teletimesinternational.com More from this publisher
12.07.2015 Views

“If you can’t doit in the cloud,you can’t do itat all!”Jay ChaudhryFounder and Chief Executive Officer,ZscalerInterview: Gulraiz KhalidTeletimes - How is yourexperience at GITEX on abusiness level?Jay Chaudhry - Good. ActuallyZscaler couldn’t be happier,our partner Etisalat haslaunched our services at GITEXso it’s a wonderful businessopportunity for us. Etisalat isthe biggest telecom providerin the country and having themas a partner to go to marketwith us is a wonderful businessopportunity for us.TT - Could you elaborate onyour complete business modelfor the region? And howyou’ve grown?JC - So we are technologyprovider for cloud basedservices. We’ve built thistechnology from scratch. Itspurpose built for cloud basedservices unlike lots of othercompanies that are takingtraditional applications andthey are racking and stackingthem in a data center andcalling it a cloud.But we also realise that inthe Middle East, serviceproviders play a very importantrole. There are regulatoryrequirements. Your traffic mustterminate within the countryfor inspection. Your logs mustJay Chaudhry is a seasoned entrepreneur with a track record ofsuccess. He is an innovator and trendsetter who has founded andfunded several successful companies including Zscaler, AirDefense,CipherTrust, CoreHarbor, Air2Web, and SecureIT. Chaudhry’s 25years of sales, marketing and engineering experience also includesleadership roles at leading companies such as IBM, NCR andUnisys.Chaudhry was honored as Entrepreneur of the Year in the USSoutheast and as a finalist for the US National by Ernst & Young.He was named an Innovator & Influencer by Information Weekmagazine and “Who’s Who” by the Atlanta Business Chronicle. Hewas recognized as a Market Entrepreneur by SC Magazine. He wonEntrepreneur of the Year award from Catalyst magazine threetimes and has appeared in Atlanta’s “Top 50 Names to Know”many times.Chaudhry founded AirDefense, which pioneered the wirelesssecurity market and had a successful merger with Motorola.He also founded CipherTrust, creating the industry’s first emailsecurity gateway appliance and led its successful merger withSecure Computing. He also founded CoreHarbor, the first ASPfor e-procurement solutions, which was acquired by USi/AT&T.In 1996, Chaudhry founded SecureIT, the first pure-play Internetsecurity services company, as a self-funded venture. SecureITexperienced exponential revenue growth and was acquired byVeriSign, where Chaudhry served as vice president and generalmanager of the Security Services Division. Prior to that, he heldvarious sales and marketing management positions at NCR,IBM, Unisys, and IQ Software. He holds a Master’s in ComputerEngineering, Master’s in Industrial Engineering, and Master’s inBusiness Administration from the University of Cincinnati.30 November 2012www.teletimesinternational.com

stay in the country. So ourarchitecture was designed tobe able to do so. This is why wehave partners like Etisalat inthe UAE. Partners like Telecomin Egypt or our partner in SaudiArabia. So these partners areessentially leveraging ourtechnology and providing localservices to local customers.TT - So with your technologyare you primarily focusing onTelcos or other institutions aswell?JC - Telcos are our channel orour go-to-market partners.So they are actually goingto enterprises and otherinstitutions and organizationsthat maybe be highereducation, retail, financialservices. These are all targetcustomers for us.We are the only ones providingcloud services in the regionthat are approved by theauthorities.TT - In your opinion, what arethe differences and how isthis better- having securityin the cloud as opposed tovendors who provide securityapplications?JC - That’s a fairlystraightforward answer. Youknow years ago we didn’thave running electricity. If youwanted electricity you bought apower generator. But then theparadigm shifted to the powercompanies who built powerplants and then consumerssimply plugged into the socketand got their power. And youpaid for what you used.Computing and security isgoing through the sameparadigm shift. Why should youhave to buy and manage boxeswhen you can get it from thecloud based on your needs. Itjust makes business sense.The customer need to buy anyhardware or any software.So where do we sit? We sitbetween the user and theinternet as a check post. So alltraffic that goes from the pcor phone, goes through ourcloud that makes sure thatsecurity is offered and thatyour company’s policies areenforced. Customers do notneed to buy anything or deployanything. They pay an annualsubscription fee based on thenumber of employees that theyhave.TT - So when you go in formeetings is it mostly the casethat they are not so receptivesince cloud itself is at aconceptual stage these days?JC - I think there are someadditional dynamics going onin the corporate world in howit addresses security. So if youimagine what’s going on withinan organization. Historicallyyou would have users, anetwork and services. And theywould have all been within theorganization. And the ability“We sit between the user and the internetas a check post. Securing all trafficthat goes from the pc or phone.”to build a hard security wallaround that environment wasvery easy.If you think about what’shappening now today.Where are your users? Arethey all stuck on a networkin the office? NO. They areout on their iphones on theirblackberries, they are outside.So it becomes more difficultto protect our users becauseguess what. They aren’t ona corporate network anymore. Now think about what’shappening to the servers. Doyou use things like dropbox,salesforce.com? The servers areno longer within the corporatewalls. The servers are now outof the organization. So now asan IT security director I havejust an impossible situation. Ihave to apply security to myusers and my data who areno longer on my corporateenvironment.So it’s now a case of- if yournot doing it in the cloud youcan’t do it at all. So you’revery right, the hesitance ofcorporate in moving to thecloud is definitely there butthis is not something thatthey can or cannot do. Theyjust have to get down to itbecause their users and theirdata are now moving out tothe internet. And if you thinkabout it from an architecturalperspective. There is no way ofbuying a box and putting thatbox in my corporate enterpriseand applying security ona conversation that nevertouches that box.You know there are 2 kind ofparadigm shifts- that’s that onein terms of where our usersand our data are and thenthere’s a separate one. Of ‘Idon’t want to buy hardwareand software anymore’. Iwant to buy security as autility service. If my businessgrows and I have more usersI will increase my usage if mybusiness shrinks I can reducethis. It’s kind of a utility basedpricing as well as a utility basedservice.TT - Can you talk us throughin-country privacy issues andhow you are managing to getaround that?JC - The country requirestwo things from cloud basedNovember 2012www.teletimesinternational.com31

stay in the country. So ourarchitecture was designed tobe able to do so. This is why wehave partners like Etisalat inthe UAE. Partners like Telecomin Egypt or our partner in SaudiArabia. So these partners areessentially leveraging ourtechnology and providing localservices to local customers.TT - So with your technologyare you primarily focusing onTelcos or other institutions aswell?JC - Telcos are our channel orour go-to-market partners.So they are actually goingto enterprises and otherinstitutions and organizationsthat maybe be highereducation, retail, financialservices. These are all targetcustomers for us.We are the only ones providingcloud services in the regionthat are approved by theauthorities.TT - In your opinion, what arethe differences and how isthis better- having securityin the cloud as opposed tovendors who provide securityapplications?JC - That’s a fairlystraightforward answer. Youknow years ago we didn’thave running electricity. If youwanted electricity you bought apower generator. But then theparadigm shifted to the powercompanies who built powerplants and then consumerssimply plugged into the socketand got their power. And youpaid for what you used.Computing and security isgoing through the sameparadigm shift. Why should youhave to buy and manage boxeswhen you can get it from thecloud based on your needs. Itjust makes business sense.The customer need to buy anyhardware or any software.So where do we sit? We sitbetween the user and theinternet as a check post. So alltraffic that goes from the pcor phone, goes through ourcloud that makes sure thatsecurity is offered and thatyour company’s policies areenforced. Customers do notneed to buy anything or deployanything. They pay an annualsubscription fee based on thenumber of employees that theyhave.TT - So when you go in formeetings is it mostly the casethat they are not so receptivesince cloud itself is at aconceptual stage these days?JC - I think there are someadditional dynamics going onin the corporate world in howit addresses security. So if youimagine what’s going on withinan organization. Historicallyyou would have users, anetwork and services. And theywould have all been within theorganization. And the ability“We sit between the user and the internetas a check post. Securing all trafficthat goes from the pc or phone.”to build a hard security wallaround that environment wasvery easy.If you think about what’shappening now today.Where are your users? Arethey all stuck on a networkin the office? NO. They areout on their iphones on theirblackberries, they are outside.So it becomes more difficultto protect our users becauseguess what. They aren’t ona corporate network anymore. Now think about what’shappening to the servers. Doyou use things like dropbox,salesforce.com? The servers areno longer within the corporatewalls. The servers are now outof the organization. So now asan IT security director I havejust an impossible situation. Ihave to apply security to myusers and my data who areno longer on my corporateenvironment.So it’s now a case of- if yournot doing it in the cloud youcan’t do it at all. So you’revery right, the hesitance ofcorporate in moving to thecloud is definitely there butthis is not something thatthey can or cannot do. Theyjust have to get down to itbecause their users and theirdata are now moving out tothe internet. And if you thinkabout it from an architecturalperspective. There is no way ofbuying a box and putting thatbox in my corporate enterpriseand applying security ona conversation that nevertouches that box.You know there are 2 kind ofparadigm shifts- that’s that onein terms of where our usersand our data are and thenthere’s a separate one. Of ‘Idon’t want to buy hardwareand software anymore’. Iwant to buy security as autility service. If my businessgrows and I have more usersI will increase my usage if mybusiness shrinks I can reducethis. It’s kind of a utility basedpricing as well as a utility basedservice.TT - Can you talk us throughin-country privacy issues andhow you are managing to getaround that?JC - The country requirestwo things from cloud basedNovember <strong>2012</strong>www.teletimesinternational.com31

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!