Cisco Systems, Inc. (NASDAQ:CSCO) Morgan Stanley Technology, Media & Telecom Investor Conference Call February 25, 2019 11:45 AM ET
- Company Participants
- Jeff Reed - SVP of Product Management, Security
- Conference Call Participants
- James Faucette - Morgan Stanley
- James Faucette
We'll go ahead and get started just as the last few people are coming into the room just to make sure we try to stay on time for the rest of the day. My name is James Faucette. I am the senior North America equipment analyst at Morgan Stanley. I am very pleased to have Jeff Reed, the Senior VP and General Manager of the Security business. For Cisco we also have Marilyn Mora, the Head of Cisco IR here in the front row in case you screw up.
- Jeff Reed
- Exactly.
- James Faucette
So before we get going, I know that I've got a quick disclosure as does Jeff. So I'll go ahead and make that and I'll turn it over to you and we'll go from there. So quick note that all important disclosures including personal holdings disclosures and Morgan Stanley disclosures appear on the Morgan Stanley public website at MorganStanley.com/research disclosures or at the registration desk on site. Jeff?
Jeff Reed
So we'll be making some forward-looking statements. So please refer to our filing, SEC filings on the Cisco IR website.
James Faucette
You guys are a lot better there. So Jeff thank you for being here. I think for us and the way that we think about the networking space generally and about Cisco specifically, security is a very important part of that thought process and how we think about the opportunity and a lot of time people talk about well, security is a very small part of Cisco, but for me it's kind of growing but it's also on a key kind of a typical spirit if you will as we go forward.
So we have thought and I have thought a lot about how I think that security, the approach IT security is changing, should be changing in order to drive better efficiency and return and frankly just better results from security overall, but looking back how the strategy of security business evolved and how do you see the business changing in the foreseeable future?
Jeff Reed
I'll maybe pontificate a little but here, go back where we were say five years ago in security, which - what really is security player that way. There are classic layer, three level firewall, have a really good email security product, that was kind of it. So you're right that time though we saw the landscape was fundamentally changing and we made kind of our initial first couple kind of strategic bet and bet number one was network.
The one thing that was common about the threat is they travel through network. So there could do a better job of those usually network to deliver better security architecture, moving around segmentation, that's a huge piece of what we're doing in the networking side and I was actually in networking for the first seven years at Cisco. So that was kind of like the network visibility. So the vapor from the network is a great analytics data source for us to find the types of threat.
That was kind of bet one. The second bet there was really the investment in world class for that capability. We didn't really have that at Cisco before. We acquired Sourcefire is kind of like the any one of the new Cisco security world. So that really brought with it the house of that research team. So we have a - large research team is kind of private enterprise in the world. Fantastic quadrant leading IPS functionality, world class base events, file announce technology.
So that really kind of started our process and frankly those two pillars remain just as relevant today as they were five years ago and then a couple things have changed I would say kind of a long relay and kind of the one of the two changes was we think of the cloud, you kind of fundamentally applications and data are and frankly where users are accessing is changing. That huge and where we need to put security controls into the environment and you've seen that with our acquisition and frankly even again leverage the network because traffic swing across the networks and helping you leverage the network as those traffic patterns change
No comments:
Post a Comment