72
72
Jan 13, 2016
01/16
by
CSPAN3
tv
eye 72
favorite 0
quote 0
dr. casado? >> just kind of quickly more on a positive note, i think so i'm kind of a personal success story of this. when i graduated with my ph.d. i was thinking about being a professor, and instead i sort of worked in the intelligence community who decided to fund a start-up that we were doing and they were great to work with early on. and kind of to this point i think there's a lot we can learn from the government and that turned into one of the largest tech center acquisitions in the private sector ever. and more working with the start-up ecosystem funding that allowing us access to the way that you think about the security and the technology i think will hugely help innovation. >> thank you. and i wanted to particularly note -- i think mr. wood you call it the fifth -- our fifth war fighting command is cyber here. i'm running out of my time. but if we can get -- and mr. clinton, the numbers and the comparison between private sector and the public sector and we're spending and sort of the qu
dr. casado? >> just kind of quickly more on a positive note, i think so i'm kind of a personal success story of this. when i graduated with my ph.d. i was thinking about being a professor, and instead i sort of worked in the intelligence community who decided to fund a start-up that we were doing and they were great to work with early on. and kind of to this point i think there's a lot we can learn from the government and that turned into one of the largest tech center acquisitions in the...
71
71
Jan 8, 2016
01/16
by
CSPAN3
tv
eye 71
favorite 0
quote 0
dr. casado. >> thank you, members of the committee, for the opportunity to testify today. i'm super thrilled to be here. i'm martin casado general manager of networking and vmware, the fourth largest software company in the world with revenues over $6 billion and over 18,000 employees. the breach was not unique. hackers were able to gain access to opm and department of interior systems where they were free to access and steal sensitive data over a period of several months. hackers typically use this attack methodology because perimeter centric security systems are structurally designed to be doors to the network. these doors allow authorized users access and prevent unauthorized users from entering a network or data center. however, perimeter security is a single point of entry that must be breached or circumvented to enter the network. once the intruder has passed the perimeter, there's no simple means to stop malicious activity from moving throughout the data center. in many cases the response from companies, agencies and network security investors is to add more security
dr. casado. >> thank you, members of the committee, for the opportunity to testify today. i'm super thrilled to be here. i'm martin casado general manager of networking and vmware, the fourth largest software company in the world with revenues over $6 billion and over 18,000 employees. the breach was not unique. hackers were able to gain access to opm and department of interior systems where they were free to access and steal sensitive data over a period of several months. hackers...
76
76
Jan 9, 2016
01/16
by
CSPAN2
tv
eye 76
favorite 0
quote 0
dr. casado said. has produced of the internet increases and the internet of things becomes more prolific everything has an ip address. where do you draw the line? at some level i would almost prefer people use my infrastructure because i know what we do from security perspective. i don't know what they do. to the extent you make the argument there should be some separation, there are good arguments on both sides. i would rather have them in my infrastructure. >> the approach makes a huge amount of sense when you think about all the connectivity to protect the information and identity of folks trying to access it. that is what we of seen in security over the last five years is this move to protecting networks but truly understand the information, the most sensitive information and putting the right protection around that. >> i think the witnesses for the clarity of your answers. i yield back. >> thank you. i recognize mr. swalwell. >> i think each panelist for their service. mr. casado, i want to highl
dr. casado said. has produced of the internet increases and the internet of things becomes more prolific everything has an ip address. where do you draw the line? at some level i would almost prefer people use my infrastructure because i know what we do from security perspective. i don't know what they do. to the extent you make the argument there should be some separation, there are good arguments on both sides. i would rather have them in my infrastructure. >> the approach makes a huge...
170
170
Jan 15, 2016
01/16
by
CSPAN
tv
eye 170
favorite 0
quote 0
dr. casado said. as the use of the internet increases and the internet of things becomes more prolific, everything has an ip address, so where do you draw the line? i would almost prefer that people use my infrastructure, because i know what we do from a security perspective. i don't know what they do from a security perspective. i think there are good arguments on both sides for separation. i would rather have them on my infrastructure because i know what we do. think the approach that makes sense is to understand and protect the information and the identities of the folks who are trying to access it, and that's what we are seeing insecurity over the last five less years, the move to not just protecting systems and networks, but understanding the information and putting the right kinds of protection around them. >> my time has expired. i want to thank our witnesses for the clarity of your answers. thank you, madam chairman. i yield back. rep. swalwell: thank you madam chairman. i want to thank each m
dr. casado said. as the use of the internet increases and the internet of things becomes more prolific, everything has an ip address, so where do you draw the line? i would almost prefer that people use my infrastructure, because i know what we do from a security perspective. i don't know what they do from a security perspective. i think there are good arguments on both sides for separation. i would rather have them on my infrastructure because i know what we do. think the approach that makes...