July 6, 2017
Ep. #5, WebTorrent: Bringing BitTorrent to the Web
In the latest episode of Demuxed, Matt, Steve and Phil are joined by Feross Aboukhadijeh and John Hiesey for a discussion on WebTorrent.
In episode 10 of EnterpriseReady, Grant speaks with Joel Wallenstrom, CEO and President at Wickr. They discuss Joel’s background in the cyber security industry, as well as the process of bringing consumer products to enterprise, particularly for mobile-first companies.
About the Guests
Grant Miller: Hey, Joel. Welcome to the show.
Joel Wallenstrom: Thanks for having me. Happy to be here.
Grant: Yeah, really excited. Let's go ahead and dive in. Tell us a little bit about your background and what you've been up to.
Joel: OK. My background is really centered on
In 1999 I got recruited into a job at a
company called @stake, which a lot of people know.
I was a fanboy of a group called the L0pth Heavy Industries that created a tool called L0phtCrack, and I actually was surprised and excited to get asked to come work at that company and come out to California and build an office here.
Grant: What was @stake, for those who don't know? Tell us more.
Joel: @stake was a group of hackers, realistically.
The way they really burst on the scene, the
more national scene, was they testified in front of Congress.
funny, they had bathrobes on and the general gist was we can drop
the internet from our kitchens in 30 minutes.
That is oversimplifying the message, but that was the
message back in the early aughts, that people
in our industry were warning that "We're building all these
systems, which is great, and it makes things work.
But we can also make them not work."
So Battery Ventures, actually,
got the idea that we could build a company around
this set of expertise and it was ultimately-- L0phtCrack
was a product.
A lot of people know Veracode is a product that spun out of this company as well, but ultimately it was a professional services firm.
Grant: Why were you a fanboy? What were you doing that got you excited about this?
Joel: I just thought it was a contrarian way to look at all of the fun exciting
things that were happening.
It's akin to, I'm sure, when people were
building railroads and all these big machines were going
east to west there were certain people that were like "Maybe
there's something that we could do weird to the tracks," or they were looking at all
these nuances around this big economic
engine that was being created.
This is what the L0pht was doing, they were just looking at it from a different lens. So that's a really cool mindset and something that I was always attracted to.
Grant: OK, so this is '99. It's like the environment is everything internet and everything web, and so the nation's attention is on what's going on here.
So you see this group that's contrarian and has a different perspective, and you get attracted to it, and then they recruited you. How did they get in touch with you?
Joel: I just knew the CEO, and he said "You should come
My initial response was, and there's a lot of lessons to be
learned in this, was "There's no way.
I can't hold the water for these guys.
This is a level of engineering and
understanding of the full stack beyond anything I'm capable
But look, everybody brings a little bit
to the table.
So I was convinced that I could bring something to the table,
and it never--
Then I fell in love with this whole idea of this
contrarian view of technology, and understanding that
things were going to go to market, and we're here to talk about
enterprise software and enterprise businesses.
That time and that period, it was interesting.
This is when Bank of America was thinking "Should I have a
This was far
beyond "I've got this thing and I've got to figure out how to make it secure."
It was really interesting days because the Sapience and the
Science and the Vyence and Razorfish, all these
companies were raping and pillaging and building the first
web property for large organizations.
This is an interesting jump into enterprise, and security was 100% afterthought.
Grant: They were just focused on eyeballs. That was the key term back then.
Joel: Also, not being first-mover a lot of times.
A lot of people were sitting back, and so anyone entering enterprise,
you'll see that as well from a customer base.
There's all this focus on "We need a lighthouse customer, we need someone to take the leap and then everyone will follow."
A lot of people in our industry aren't old enough, or we've forgotten that there was a time not too long ago when nobody was doing anything "online." Anything, realistically. We've come a long way in a historically short period of time.
Grant: Yeah, that's cool. Then you were there for how long?
Joel: I was there for like four or five years, and then we sold to Symantec. Right after that we started a company called iSEC Partners that ostensibly was doing the same things, but we were--
Grant: You didn't stay at Symantec? You left?
Joel: No yellow jumpsuits.
I wasn't selling antivirus.
Realistically that was interesting, and the lesson to be learned there is that
the acquirers of @stake were looking
at this as solely a network security
And part of that was what network
security products can be pulled on the back end of the expertise.
Out here in San Francisco we had built out what we called our application
security center of excellence, so we were really focused on a
completely different layer, even in some cases a hardware
I say that because the world wasn't ready to think those
thoughts, so realistically our
skill set and our passion was at a different place
than companies like Symantec or Cisco or McAfee were really
even thinking or focusing.
It was really commonsensical for us to say "We're going to start something that's more focused on the application security layer."
Grant: OK. So then you started iSEC--?
Joel: iSEC Partners, with some friends.
We did basically the same thing, we were helping large
organizations understand how to secure all of their systems,
but really where we had expertise was in mobile.
We did a lot of work on the Android operating system as an example,
but at this point there were a lot of web
and/or-- Just like when there weren't any websites,
there had never been mobile applications.
Easy things, like what permissions you give to the phone, that sort of stuff. A lot of companies were jumping in without thinking about how to secure customer data.
Grant: OK, describe what one of those engagements would have looked like.
You would be working with Google on Android and your team would jump in and be thinking about it from the security angle, "How do we attack this or protect this," like threat-modeling stuff?
Joel: Boy, it was varied.
It really depended upon the maturation of the
security teams that we worked with. A
lot of this is public now, but for instance, we worked with Microsoft
on their operating systems and we weren't alone.
They would fill a room full of 12 security experts who
would just sit up there and work on the next release of the operating
system. Very waterfall-y, you've got to think this is in
the middle 2000's, so Agile wasn't a
They were doing these huge releases and they would get a bunch of experts
to come in and just beat it up. This
is a company that had spent millions already thinking and engineering
around security, then you might go to another company--
Even fast-moving early days Google and around Android,
there was no security team.
It was almost a staff-off where we would come in and be the security
But the vast majority of it was, a lot of it
was "I'm selling this product to enterprise customers and
they've asked me about security.
I've never really thought that thought.
Can you come in and help us?"
would be some combination of an architectural view.
We'd test for bugs, but at the end of the day we were
100% successful in breaking things throughout the 10
years of doing this, so it wasn't a matter of
A lot of companies would get tripped into having more
bugs than they could squash, and there'd be this big whack-a-mole
game rather than really understanding how to deal with the
problems fundamentally and how to get their developers to care,
those types of things.
We would do everything from threat-modeling to training to creating
automated processes for people to attract bugs.
Seriously, it was a huge
win in the industry when we and companies like us could get access
to bug tracking systems.
Like, "Give us Jira and let us actually put
security into your process."
Get it in the watercooler, if you will, so that people cared about
Not only cared about it, but it was operationally part of their processes to put priority on things and squash them.
Grant: A fairly common practice at that point was developers build stuff and then it goes to security review, right?
Grant: It wasn't really as integrated as oftentimes it is today, where people are trying to develop from the ground up using a lot of the same primitives for security.
Grant: So these are things you were probably teaching people.
Joel: If you think about web properties, and a good example is just input filtering-- It didn't exist. It fundamentally was not something that anyone who was building things thought about.
Joel: That brought up mobile applications, like even thinking about
what permissions are given to the device or the operating
system, that's typically not the goal.
You have people with big red Xs on their calendars in terms of
release dates and they're just pushing for-- Hopefully not MVP,
but MVP-ish type functionality.
Unit testing for security was not a thought
process that existed, so a lot of it is pretty fun because what you're trying to do is
stuff like this.
You'd have events, you'd do talks, you try and make it fun and cool and rewarding for people-- "People" being developers, to pull this into their workflow and their lives and their psyche. So, that's pretty cool.
Grant: OK. That was iSEC Partners, and you were a founder of this company. How big did it get? What was the scale?
Joel: We grew it to about 200 people, and then we sold it to a British
firm called the NCC
Maybe again, in terms of
lessons learned, we as the partners-- There are five of us, and we
looked at our future and we were going to have to
really deploy capital into sales
marketing, go to market.
Ultimately, a lot of what we did in that business-- We grew it to that size and it was all inbound, because what we were doing is our sales and marketing engine had more to do with research and doing presentations at conferences and creating demand via being smart.
Joel: There's a cap on that model we had, and we were reaching
that point where we were like "To continue to give
We viewed ourselves as an employer as really in existence for our employees and bettering their positions in their lives and their careers, and being a slingshot for them, which worked.
lot of them are CISOs all over the world right now and it's a really cool
ecosystem, but we were going to have to become
really good at filling the funnel and converting
opportunities, and becoming more of a sales
That's the thing, you have to be good at that, and you have to figure out how to be good at that, so we looked for help.
Grant: It was professional services, primarily. Was there any product or anything? Any technology you were selling on the back of that?
Joel: Not so much. When we were acquired there were some managed services on the back end of that, there were some testing tools. We tended to like to give away tools for free.
Joel: Really big distinction for us between tools and
products, so there was a lot of intellectual property and a lot of
automation, and we were really focused on doing that.
But in terms of having SLAs and licensing models and
understanding how we would go in an enterprise ready
way, go build products and monetize those and
support those, I know we had huge amount of respect for
how hard that can be.
So this was that leaping off point where we said "Look, we've
got all this IP.
You can create products, you can create more higher
margin repeatable orchestrated services, which are like
products. Managed services, if you will."
So that was the jump to NCC, and they've taken that and they've run with it.
Grant: OK, cool. You're then at NCC for a handful of years, right?
Joel: Right. Leading to where I am now at Wickr,
being in security and again being a fanboy of all the really
smart people, there was this concept of perfect forward
A kind of cryptography that existed on paper
and white papers and academia, but it was impractical because it
was too resource-intensive.
I always like to say, "If you were going to do it on a mobile
device you're going to have to carry around a building with you in order to make it
But then this sneaky little Moore's Law thing
happened and we started seeing it move into
a place where it was practical and real, that the processing on the
Node whether that be a laptop or a mobile
device or a tablet or a phone, you were going to be able to have this level of
The way it hit my brain as somebody who had 100% success rate breaking into every single product ever put in front of us, the main reason we always had success is everything was built to provide access to data. That's how it works.
At some point that business logic is going to exist such that you can go get it, and then you just ride those coattails. That's an oversimplification, but that's a big part of why things are hard to secure.
This type of cryptography means the service provider, in this case Wickr,
there's mathematical certainty we can't be that weak link.
So, Acme Company, we would go test their service
and it might be that we were able to get in through a third party, or we were
able to use business logic to get access to
things because the service provider had access to it, as an
In this case what I liked, and I used
Wickr in my business-- We were transmitting
zero-days and we had really sensitive communications, so
rather than use old tools that people couldn't figure out like
PGP, I could say to people "There's this thing called Wickr. Go
to the App Store and I'll send you the document that way."
Now we can be certain that the people
who are processing this data never ever have access to it, it's
only on your phone and only on my phone, or only on your laptop or only on
This eliminated very significant attack surfaces that we had always taken advantage of when we were trying to break into systems, or when we were hired to get access to critical information.
Grant: So diving back into some of the backstory on Wickr. It sounds like you were familiar with technology because--- You're not the founder, you're the CEO now, but you were an investor in Wickr.
Grant: You knew the team that was building this.
Grant: What's the full backstory on Wickr? How did it come about? You're telling us some of this, but just give us the overview there.
Joel: Yeah. I have a unique view on it as a early
investor who is now somebody who's there full time, and that is--
Again, this type of-- It became possible.
A lot of what we deal with in technology is-- It even
goes back to what I'm talking about.
There was an internet and it was possible to have a website.
So now all of a sudden this type of different
privacy was accessible and available and possible,
and so Wickr and another company-- Or another product,
The two products, Signal does a one to
one protocol for doing the same
"Perfect forward secrecy."
Think of it as extra
encryption, so every single message is encrypted with a new
key, which was completely impractical 10 years
ago and now it's completely practical.
Wickr does the same thing, it's just a group-based protocol so it's built
to do this with groups.
Ultimately this means that there's an extra layer
of protection if by some means somebody
got access to the back end or something, then they get
access to one message rather than every message ever sent.
Something like WhatsApp, there'll be a little bit of a different thing. If you get access to that now you have forward and backward access to everything that's been sent.
Grant: In an encrypted format, or is it un-encrypted?
Joel: You just have it, because you've already de-crypted it.
This concept of "Perfect forward and backward secrecy"
means it's a lot like a conference room.
somebody walked in right now we'd have to bring them up to speed on what
happened, and if they left they wouldn't have access to it after they
That's a decent analogy for what this type of encryption does. It adds an extra layer of protection.
Joel: I was using this and I understood this to be possible, and I understood that as somebody who batted a 100% or batted 1,000, this would be one of the things that would make us not bat 1,000. I was really excited about it and I invested in Wickr, I saw--
Grant: Were you part of the seed round?
Joel: Yeah I was part of the A round, which was the same thing. Very early days.
Grant: Super early, this technology becomes possible, you had been in the industry for a while and you probably knew some of the founders and some of the folks that were working on it. You were like, "I want to invest. This seems great."
Joel: Part of it was also collegial, "I just think this is cool. We've been reading these white papers forever and I want to support this type of technology getting to market."
Grant: Like, that's the thing you believe in at your
You're like, "I want this to exist, and I want it so badly that I'll invest to make it happen."
Joel: Yeah. It's an important step forward in privacy.
That's always-- Look, when they weren't
gargantuan but we took a percentage of our profits
in my previous companies and we put it towards things we believed in.
Some of that was the EFF and a lot of it had to do with privacy.
A really important thing is back in the early days of
I'm just going to say SSL or TLS,
when these things were starting to come to
fruition and we would promote them as
possible, the enterprise typically would say
"No. There's too much overhead.
There's going to be latency, there's a performance issue."
We would have to prove mathematically that "No actually,
This is just smart.
I know it might be a little bit of a pain in the ass to change what you've
done in the past, but this is better."
Now it's drinking water, and to a certain extent
we're smart enough and fast enough on our nodes to be able to do this
at the edge, if you will.
I really believe this type of
protection should be like drinking
At the user conference and developer
conferences this week Apple said the same thing, like
"Look. We're capable of doing this and it doesn't
introduce any performance issues, so we're going to do it."
Now they're doing it because they think they're going to sell more shiny
phones, and I don't know-- They should be unapologetic about that.
That's their business model, but the key takeaway for me there is
It's doable, so let's do it.
When I invested in Wickr the first thing-- This was a very
cool thing, it was very focused on journalists
and people overseas in hostile
environments, and the thickest of the thick tinfoil
requirement drove the product decisions, which meant it was completely
anonymous, which meant that nothing lasted more than seven
days a week, so it was a very
smart and appropriate tool for very
People who understood what a handle was, and then what ended up
happening and the reason I'm here at Wickr is it leaked into the
enterprise but the vast majority of the enterprise doesn't know what a handle
is and the vast majority of enterprise projects
last more than seven days.
turns out a lot of enterprises have these pesky little things called
"Regulators" who have data retention requirements, and
the practical realities of using software in the enterprise
were misaligned with this heavy tinfoil
hat free messaging app.
The call from the enterprise, when I entered there was already a
product market fit in so much as people were saying "I need this
level of protection, I just don't know how to build it for the
enterprise. Can you do that?"
So that's been my task, and the team's task over the last two years, is to build something enterprise ready.
Grant: Cool. So when Wickr first launched, pure consumer-oriented, just in the app stores, was there a desktop app at that point too or was it mainly--?
Joel: No, it was just a mobile app.
Grant: Just mobile? Like a secure way to communicate-- The most secure way to communicate, realistically.
Joel: Yeah, exactly.
Grant: Different rating organizations always give Wickr the highest ratings in terms of privacy and security and safety.
Joel: A really key thing there in terms of the product vision there
was it needed to be and it had to be
anonymous, with anonymity being
the polar opposite of virility
There's this other product I mentioned, Signal, where the
decision was "We want to be viral.
You're not going to be anonymous, it's tied to your phone number.
So in fact if you get it, it announces to everybody 'I'm on this thing and I'm using this product.'" I'm not saying it's a bad decision, but for a certain user group that was not what they were looking for.
They needed to be more of a needle in a needle stack if they were over in a hostile geography, so anonymity was a really big important part of that. Turns out that to deploy in the enterprise, anonymity is impossible.
I used it in my "enterprise usage," but it was
a relatively small deployment, and there are definitely customers who've
used things like naming conventions around handles and figured
out ways to almost in spite of the
anonymous product figured out how to use it in an enterprise fashion.
But that's not the goal of the-- We have a Wickr pro product that
is enterprise, and so it's been all about building things that
are required by the enterprise.
It's a pretty big pivot and it's been fun, and a lot of it is helping people understand what their requirements are so we can build them and execute against them.
Grant: Is it one team builds both products, or--? How do you think about--?
Joel: That's really important.
There were some surprises along the way, but
we're a 40 person company and so the thing that we
needed to do was build
effectively so that we could support efficiently.
That meant getting everything on the same
back end and getting everything on the same code base, sharing the same
Building and supporting
multiple products is a slippery slope to really
inefficient capital expenditures.
So that was the first step, is to say "We're going to have different products and different customers, but how do we do this efficiently and how do we make sure that we're not supporting more than we can handle?"
Grant: OK. You started to feel this pull from the enterprise,
so that was-- I love the idea that there's some
companies, and even you yourself when you were at
NCC, you were using it in some enterprise ways.
But you saw some patterns that people were doing.
I love the idea of how they were probably pre-fixing a handle in order to make it
an identifiable handle.
So you saw some of this, like "Look.
There's demand from enterprise."
Maybe some customers brought use cases to you and said, "Look. If
we had an enterprise version of this that we could
So, what are the core features that you added in to pro to make it enterprise-y versus consumer? I think that's always really interesting.
Joel: Yeah. We'll talk about features, because that's what you
asked, and there's another element I'll get to in a second which is in
terms of deployment.
But on a feature basis, it was actually pretty stark to us and to our customers that when you're in enterprise software you're in the software deployment business first and foremost. How do you get 10,000 people the software?
Joel: Because if you can't get it to them then it becomes problematic. So SSO became the first thing.
Joel: That was the thing we had to do, which-- That's not a
light lift, and it's certainly not a light lift also from a
When you have an organization that thinks "We just have to get this thing up on the App Store and we're good," that is not necessarily how the enterprise thinks about software and software deployment, and it's certainly not how IT organizations want to control it.
So really quickly on the back end of that, we were-- I don't know if we were forced, but it became obvious that we had to then--
Grant: So, when you joined there was there was no pro offering? It was like, "We're going to come in--" You didn't even probably have the idea of teams where you could invite people to come into a workspace or something, right?
Joel: Yeah. There was a way to basically input into--
You could input handles into
a CSV file and just upload it.
That was the thought process.
I don't have metrics on this but I would say it's probably a pretty standard way to get MVP-ish, would be my guess, in the history of deploying software. But that's not going to work.
Grant: Initially the product was all mobile, so now you at least need a website or an admin--
Joel: An admin site.
Grant: An admin site where you can go in and at least upload a CSV.
Joel: Yeah, exactly.
Grant: So it's like, "Step one. Create the admin site." OK, now you add some features in like "Upload CSV" and then you start moving into SSO, or I should say "Single sign on."
Joel: Right. In terms of the way we looked at
the business, "What's the line of demarcation? Where's
the breaking point of uploading CSVs?"
It's certainly somewhere less than 10,000 people or users. The initial use cases that came to us were "We want to offer this to the enterprise."
Grant: Did you have design partners, like did you have early customers that were like--?
Grant: OK, so did you talk about who those were or what the use cases were?
Joel: We're in the security industry, so a lot of the customers tend to be pretty
opaque, but big professional services
Which brings up a really important feature, and that is
what we call "Federation," or the ability to talk outside the
network is really important.
So a lot of what this was where I personally saw Wickr being used before I got to Wickr, was threat intel teams across different organizations who wanted to like, "I'm getting this signal and I want to ask if people are getting the same signal."
In some cases there are regulations where people are not supposed to share information with other companies, but they wanted to do so in a manner where they thought it was fast and secure and private. They're trying to fight bad guys in real time.
Grant: So, "We're getting this attack from some IP address over here. It's based in Pakistan, and we got to look at it. Are you seeing the same thing?"
Grant: Like, sharing some information in order to collectively battle.
Grant: So Wickr became a place for those security IT professionals who were using-- Then they were like, "OK. We want to do this at a bigger scale, we need to get the rest the team on, we need admin tools and things."
Joel: I'd say this has been historically
common. IRC was something that was used in the past.
Certainly people use Wickr now, they use Signal, there's
always been this desire.
One of the really cool and gratifying things about the
security industry is you hear people say "You only have to be
not the slowest."
If eBay wants to be a little bit more secure than Amazon back in the day, or whatever. But at the same time as much as there was competition, we're all helping each other.
Joel: You see competitive financial services firms, you see
competitive e-commerce firms really sharing
Especially, maybe not at a CISO level, but the people who
actually do work and get stuff done who are in the trenches are always
talking to each other.
They would use tools like this to do that. An important part was not just to deploy this to my folks, but give me the ability to allow people to talk outside to whether it's lawyers, or threat intel firms, or whomever that they may need to talk to.
Grant: You're saying, by working with professional services teams early on, by default those teams are working with lots of different groups across--
Grant: Yeah, clients, and then third party teams as well. They have both clients and contemporary people they collaborate with.
Joel: In my days, if I was sending a message
saying "We found a zero-day in the thing
and you need to patch this," you don't want to do that in an email.
You just can't.
analogy to that is, "We think the price on
that company you want to buy--" If you think about corp dev
and people doing deals, same thing.
Oftentimes there's software built for that which is just really flimsy
and terrible, and so they would turn to these products to
basically have really secure conversations about really
meaningful projects that were going to have impact on
If you're a professional services firm and you're emailing those documents
internally or externally, you're just exposing
things to people who want to benefit from that information.
Oftentimes that can be nation states, but it doesn't have to be. There can just be people who are smart and understand that sitting on deal flow is a really good way to make a nickel if you're smart about it.
Grant: Yeah, sure.
Joel: That's another way that if you're a large professional services firm or an investment banker, or something. A law firm--
Grant: Prevent insider trading information from leaking to people that might use it.
Joel: Yes. An enterprise requirement was SSO, but
very rapidly we then needed to accommodate things like
2-factor authentication, mobile device management, the types of
things that are just inherent to the way
that company handles software.
But also, once we started talking to lawyers, there are
real needs to keep things certainly more than seven
days, and sometimes for longer.
There might be a regulatory need.
The real trick and the thing that we've done that is very unique in the market is we've given people the ability to essentially proactively enforce data deletion and retention policies.
Going back to that core principle, we never have
access to it. The
service provider isn't saying, "OK.
Cool. You want to retain this?
We've got this for you."
We flip the bits and we make the data transfer happen, but
ultimately they always maintain ownership, so if something needs
to be dropped into cold storage and encrypted for regulatory
purposes they can do that.
They can keep it and keep it protected, and we the service provider never provide an attack surface, which is pretty cool.
Grant: Yeah. I think about this a lot in terms of, "How do you
secure data and do it well?" Because
the other solution that the enterprise tries to bring, and Box and Salesforce
talk about it, it's something they call "Enterprise key management."
Grant: This is basically where the enterprise has
an HSM, a harbor security module, and then they create unique
keys. Then the trick is that these
SaaS services like Salesforce or Box can make a request at that HSM
and get a new key to basically de-crypt all your information.
For some cached amount of time they have all your data in an
un-encrypted fashion, and in memory all of the data is
un-encrypted. They could log it out incorrectly, and so they have access
to un-encrypted data.
I would say it's like that shell game
where you're moving a shell-- You still
have to trust the vendor.
In your case right with Wickr, you're like "No. We provably-- You don't have to trust us. We carry the encrypted bits to and from, but we can't ever see them."
Joel: Yeah. I don't think necessarily this idea of centralized key management is 100% all bad, but you've nailed it.
At some level it requires management, it requires human oversight. It's cool to rely on math.
Like, that was my thing. I got to this point where I thought, "Here is a problem that exists for a real significant set of users where you can solve it with math rather than process and procedure."
Grant: I love that.
Joel: That's cool when you can do that, and when you can simplify that and deploy
really smart resources to other problems, because we're all in
a finite resource bind here.
I like the simplification of this.
People are moving really
fast towards trying to figure out how to move that shell game and make
that as fast as possible, and I get that, because when you architect a
system that is reliant upon that you're
forced down that strategic path.
I get it. But there is a point at which simple is good, so that's what we're doing.
Grant: That's really cool. You said something that was really interesting, dive into it if you can. MDM, which is "Mobile device management," I think you're the first person we've had on that's really been a mobile-first enterprise software company.
Grant: You'll see more and more of that, there's all these apps are really mobile-oriented. Talk about what MDM is, like what is it? How do you do it? What's the value it brings? How'd you hear of it?
Joel: OK. That's pretty nuanced, because I do
think that there is a population of security experts out there
who is seeing diminishing returns on this concept of mobile
However, for anyone who wants to get into the enterprise with anything mobile,
it's a requirement.
What it is, is mobile device management.
You, via MDM as an IT shop can manage what does and does not get on to the mobile device, so you're controlling what software exists and it's like a white listing or black listing of things on the device. I'd look at it that way.
Grant: This is built into the operating system? iOS and Android have native MDM, or do you use a third party MDM?
Joel: That's the really interesting question.
For most, it was always third party.
There's almost this branding thing
Good software was mobile device management, it was
on BlackBerries and people think
about it as being one thing. But
it started off as two separate things.
Just like antivirus, antivirus is
dead because Microsoft and Google and people are
just saying "We'll do this native to the operating system," it is
very much becoming more and more native to the mobile
ecosystem, if you will.
So iOS will-- You can control what software is on your devices, you're not going to need a third party going forward, so you're seeing MDM software getting--
Grant: Baked into the--
Joel: Baked in, getting acquired.
However it's this, in a lot of
cases, sometimes unwieldy legacy
software that large enterprises-- Once they go through the process of
getting something working they're pretty
anti-unplugging it and going to some other
It'll be around for a while, so one of the things is the challenge for us is we go to Acme Company and they're using one MDM provider and we're going to Bacme and they're using another.
Grant: So, what's the product? What are you as an application developer--? Is it shipping to a different app store? What's the difference from your perspective when you're developing?
Joel: Ultimately from a process standpoint, what matters to us
is there will be a team ostensibly in the IT
organization that's responsible for-- It's not
white listing, but having MDM accommodate this software.
We have to basically be accommodated, we have to go through
that process and this whole-- There'll be some vetting.
Like, "Have we looked at these guys?
Has there been a security assessment?
Do we have approvals?
Have they gone through the chain of command to be approved?"
Then we have to essentially give them a "build" that accommodates their mobile device management strategy, if you will.
Grant: Maybe you have to like build specific SDKs into your apps for these different platforms or different APIs?
Joel: Yeah, there are hooks. It's all been-- Yeah, it's an API. It's usually IP.
Grant: These are some standards that you, as a application developer delivering a mobile application, need to have to probably expose some end points in your application and hook into some things.
Joel: Here's a good analogy on the SSO side.
There's something called "Open ID," which is an industry standard.
People have looked at this and said, "Man it's crazy to have to
go through this process for 100 different MDM providers, or
Let's come up with some industry standards."
Oftentimes you can lean on something like Open ID to say, "We understand that you need us to accommodate your software security strategy that includes SSO or MDM, whatever the case may be. We write to these open standards and we can do this." Usually, that's enough.
Grant: I love this.
The whole point of Enterprise Ready is to provide the
guidance and insight into the features you have to deliver as an enterprise
just hadn't really thought about it from the mobile side, even though
interestingly my previous company was in the mobile enterprise
But we were an SDK, so we weren't actually delivering
an app to the app store, we were delivering an SDK that you could
build into any app.
But this idea, if you're going to build a mobile first enterprise software company, you need to understand how to integrate with MDM and do that-- You're basically saying it's a core requirement. You're not going to get very far without doing that.
Joel: The alternative is that you are shadow IT.
That runs a little contrary for our go-to market,
because ultimately what we're saying to the enterprise
is "You've got this shadow IT problem."
One of our financial services customers
took-- This goes to that "Who's going to jump first?"
None of the other banks were really doing anything other
than turning a blind eye to the fact that consumer apps
like WhatsApp and
WeChat and Wickr and Signal existed.
of those things existed out there, but "We're just not going to have a point of view on
it because we're not ready to have it."
Then they were doing real-- There's real deal flow going
down on WeChat, so they're sitting back looking at this saying
"Wait a second.
People are using their own devices to do
Significant deals for our large organization on a product where we have no access or control, but the Chinese government does? That's not a sustainable place for us. What are we going to do? We have to deploy something to--"
Grant: As an alternative. To provide the same functionality, but within the control and purview of the enterprise.
Joel: The key, the really interesting and hard thing here is that
when they deploy something, and they say
"Everything is being watched and recorded,"
then they're squishing the balloon and sending people back to WeChat.
What we do is we give them a hybrid approach to say
"Grant wants to talk to me, his
employee, about a health care issue."
There are rules within our organization where some things are completely
private and we'll never have access to them because we're using a service provider
that never has access to it.
However, if we're talking about something in a
regulated deal or in a regulated part of our
business, we're going to turn on retention because-- We're
going to show you, we're going to signal that to you in UI, there's no surprises.
We're having an honest conversation with you and that has to be
retained. If you don't provide that hybrid approach, if you just keep doing this thing
where you're like "Here's a secure thing, but we're watching everything."
Then smart people in your organization are like, "I'm not going to
trust that, because now I love my IT guys, but
going to leave a hole. I
can't let our adversaries get access to that so I'm going to go
use this thing out of the App Store," and it just keeps fluctuating back and forth.
We're attacking this from a very different standpoint than
people have in the past, which is "I have to give you this--" As
much as MDM is a requirement-- I
saw a study where 60% of titles at Citibank have compliance in
People are not-- The enterprise does not say "I don't care about the regulators."
If they're regulated they care a lot, so giving a solution, that was a really big requirement.
Then the thing that surprised me most, the
other requirement I wanted to get to
was, my day one I was like "OK.
We are not going to deploy on prem because that'll be too
Day two I was like "OK, yes we
are. All the signal from the customers who care the most
about real security have requirements,
whether regulatory or otherwise.
We've got to deploy on prem in our
own cloud, or whatever.
They can't just go and stick
a thumb in the eye of the people who regulate their
Day two we were trying to
figure out how we were going to containerize our
software, and that had never been done
before by us or by
many of our employees.
That in and of itself, I know that's near and dear to your heart, but that is a thing I can remember just sitting back and thinking "I didn't think about this. How are we going to do this, and how are we going to do this in a manner that 40 people can still live and breathe while delivering software to their customers?"
Grant: It's one of those things.
My previous company I mentioned, we were enterprise software.
I didn't get it.
I didn't get on prem, I thought everything would be multi-tenant SaaS.
Then as soon as I started to really understand--
I was actually a pain in the ass to our
security guy, I was using shadow IT and I was the worst.
Then as I started understand a little more,
"Wait. We use GitHub enterprise, why is that?""Because all this data would
go un-encrypted in GitHub," and I was like "OK.
You don't want that."
I started to understand it a little bit.
I was like, "Man.
I was an asshole."
I actually apologize to our former security leads.
I was like, "I'm sorry for the transgression-- My former
Then we figured
out "Software can be deployed on prem.
There's a bunch of new technologies that are emerging, Docker and
Kubernetes and all these things just make it so much easier than it would have been
10 years ago."
We've been stoked to work with your team. They're super smart and they've been incredible.
Joel: Yeah, the team at Wickr I just am enamored
by. It's been so lucky to work with them, they're all very smart people.
This is not what we were used to delivering though, and so the first board meeting I had I said "Look. We're approaching this problem like we're restocking a Coca-Cola machine, when ultimately our customers want us to launch a space shuttle."
It's a very complex and important
process. We have customers that keep a lot of people
alive, so all of a sudden we got thrust into this
niche where we had to deliver really important software to
really important customers, and we'd never really containerized
something before and given them a build.
We don't even touch the environment in which-- We never see it, we don't know anything
Part of it was scary and a lot
of it was invigorating, to say "This is going to be hard."
We were weeks
in terms of getting releases out, and I mean that going
back and forth with the customer.
With the help of you guys we're at 15 minutes, or 10 minutes.
We can get this done fast.
A testimony to what Replicated
does is the market
So, this is what happens. People
can have visions of grandeur of "It's all going to be multi-tenant and
the world should just drink from this this cup of goodness."
But the reality is enterprise has to do certain
things, so there is a huge void for companies like
Wickr to say "How do we do this? How
do we use Kubernetes to make this a company that
can stay 40 people rather than be 200
people flipping process, if you will?"
It's been really impactful, and
the coolest thing is to watch our customers on the other side.
It's release time and they've gone from "Here we go again," to "This is cool. This is great. I know that I'm going to be able to get something that's predictable, I'm going to get it out there it's going to deploy, it's not going to be a huge suck of my of my resources and we can get on to doing our important work."
Grant: Focusing on the enterprise IT admin and trying to make their life easy has
been-- No one really thinks about them.
You think about end users because you want end users to have a great experience and people build for that, but the IT admin is often a little bit ignored, so we wanted to deliver something that would be a really pleasurable and great experience there.
Joel: They're ignored, and they're human.
Joel: All of us, what we really like a lot are our W2s and our
weekends. If you give them a
process that is destined to be off
schedule and viewed as not
successful, that sucks for their W2 and that also sucks
for their weekends.
not just down to W2s and weekends, but I think about that a lot in
terms of our enterprise customers and the people who are responsible
for deploying and managing the software.
If we don't make their lives easier then that's difficult, because there's a whole train of software products just waiting to make their lives more difficult.
Grant: This is actually one of things I love about enterprise software
in general, you can deliver
great experience-- We spend so much time working.
This is what we do with 40 to 80 hours of our weeks, we spend it in an office doing work and we deserve software and tools that are going to be great, that are going to be easy to use and they're not going to be the cause of our pain.
Grant: When we get to come in, and a thing that you said too is
acknowledging when you're talking about the difference
between jumping between a secure app and a
non-secure app, and you're using both of these.
mix of the company provided app that was
totally monitored versus now they go to some consumer app that is totally
What Wickr did is just acknowledge that the world is
not black and white but it requires shades of gray, and by
providing a solution that allows for the shades of
gray to exist.
What you're doing is you're really making everyone's lives
easier and better, and they can get better work done and they can
actually meet the compliance requirements, because
compliance is serious.
You go to jail if you do it wrong. So, it's fun to do that stuff.
Joel: There's an anti-sales pitch on that for Wickr a
little bit, it's that I do think we make people's lives easier, but you brought up a
really good point.
You have to have a point of view in terms of what those shades of
One of the things that's been very interesting in the enterprise
is we say, "This is
actually mathematically certain enforcement of your
data retention and data deletion
When people don't have
them-- To a certain extent there's some customers
who look back at us and say "I've been
meaning to get those data retention and deletion
policies," but that's important.
That's why it's a really-- That's one of the things that I'm enjoying about this is we can go in and say "Take a deep breath. It's not that hard. You have them, they exist. Everyone has some set of information governance policies, so use this. It can help you enforce those.
Maybe you do need to be a little more mature in terms of data segmentation and understanding how data is going to be handled, but the alternative is right now people are just handling data in one way.
There's just one fashion, and maybe they go
back and they try and retroactively enforce some
viewpoint or shade of gray or policy on
data, and that's not a winning
got to understand organizations are going to
be-- We're seeing GDPR do this, obviously what FTC
just did to Facebook, although really that's not even big enough
or enough, the downgrading of Equifax.
We're starting to see regulators come in and say "We're going to increase
the liability for you neither having a point of view
nor enforcing it."
Again, going back to that
ease, I know what we're doing is we're giving
technology to IT shops and compliance shops to say
"We can deploy this and we can go back to a regulator and say, 'No.
It maps exactly to our policies.
Now you may tell us we need to change our policies, and that's fine. Then we can change the way we deploy this thing. But we have something that's enforcing this so we're being as responsible with the data as we can be.'"
Grant: It's interesting because it's both. The funny part is there's some requirements that you need to keep data for a long time, and there's some requirements where you're like, "No. We need to get rid of it faster because it's sensitive and you don't want to actually have it around," and being able to enforce on both ends is really cool.
Joel: The key here in a lot of cases is where it's
retained. It doesn't have to be on the endpoint, it doesn't have to be
There's no reason why it can't just be pulled down and put
into cold storage. There's a lot of--
One of the things that I
brought to Wickr from an experience standpoint
is as I was wrapping up the career in the
professional services world around security, it was the advent of e-mail
retention policies, and we would go and say
"You should probably not retain everything forever.
Server side or certainly on the client side."
We would enforce these 30 day, 60 day e-mail retention policies, and invariably there were executives who'd yell and scream and say "I can't do my job if I don't have access to all the old stuff."
Because it was a change and it was a really scary
change for them, and ultimately all you had to say
was "No, we've got it.
If you think the world is going to crumble if you don't get access to the thing,
we've got this thing air-gapped and I'll go through that
process with you to get it."
It was just that assurance that made
people start to operate down the path of this
retention policy, and then it just died down.
They started operating in a more secure fashion, the
non-Podesta fashion, if you will.
That's one of the things that we're doing as
well, we're saying they look at a tool they're like "Wait a second, this stuff is
gone after 90 days or a year?
What if I need to go back to look at those deal terms in seven
years, or what if the regulators want to?"
You just air-gap it. It's just gone, and it's encrypted, and
more than anything else-- I'm going to go back to it.
Wickr never has it, so the one thing that you can eliminate is that is a service provider and that's an attack surface that is just completely eliminated. So again, that's different.
Grant: It's interesting. The
regulatory environment is always really interesting.
The stuff that we've seen with GDPR
and with the California Privacy Act and some of these other
ones, it's just making people more
aware that data is--
We always thought about it as an
asset, but it's also really a liability for anybody that has it.
You have to understand how you're
storing it and what you're doing with it, because we just see
constantly that people mishandle this data.
One of the ways to not mishandle data is to not keep it.
Joel: Right. Historically people have been tuned into that, but if you go to some place like Google and if you have a data balance sheet the upside is it's more of an asset than it is a liability.
Joel: They get a $57 million dollar slap on the wrist
related to GDPR this year and it's a
celebration. It's like, "Oh my God.
That is the least punitive thing we could have ever imagined."
Now there's every indication
that you're seeing that liability
increase, so again, these are smart business people
so this metaphor of the data balance sheet is a real thing.
As liability starts to increase they're going to look at this and say
"Wait. There is a risk to keeping
I always use the example
of Netflix doesn't need to
know, or I don't think they want to know that Joel
Wallenstrom watches Gilmore Girls on Tuesdays, or that
I'm a Gilmore Girls fan.
They do want to know that for a very short period of time so
they can aggregate it with all the other data and make really smart informed
But it immediately starts to carry
liability as soon as there are proper nouns and locations and
anything that can be attributed as a breach in privacy is going to
become a thing for them.
I'm not saying the data is not important, I'm
just saying keeping it forever and the liability is starting to
That's the hypothesis here, is that that
liability is going to-- Look, Elizabeth Warren wants to
break up companies realistically on the basis
of their irresponsible data
At least that's part of it, there's a competitive aspect to it as well. But that starts to look like a real liability.
Grant: Yeah, it's true. Going
back to something interesting you said earlier, you mentioned that one of the things that
you do at Wickr is around Federation.
In talking around the same concepts,
we're really excited about a new technology in the Federated machine learning space.
TensorFlow just announced TensorFlow Federated, they did a really great cartoon comic strip about what Federation is, and I actually learned things from it."
This is a really interesting and exciting technology because basically what it does is it allows you to actually have machine learning that is learning from all this data, but the data never has to leave the different devices.
You can keep it all locally in Wickr and you could learn
how to actually know predictive text and
stuff. Then once it's learned, then you send up these
learnings to a server where they're further anonymized
through some crazy techniques that I learned about.
basically mix in some zero sum stuff in order
to never have the data actually be raw in itself.
But when you add it all together and aggregate all together
it zeros itself out so you get the real
Then you learn from it and then you
send down new algorithms to all the devices and you keep learning in
this way. But
this is a really interesting technology, it is truly privacy preserving.
You never have to centralize any of the data, so you're never sending anything but totally encrypted data through a server. But on the devices, you can have true AI and ML.
Joel: There'll be voices who say or would
have said, "Why do you even go through that process if nobody
cares about protecting that data?"
This is a signal to "You are not
going to have access to markets if you don't treat data the right way."
So that's what's really punitive, somewhat GDPR is
trying to accomplish and even this idea of antitrust,
I don't know that I buy into that.
The real penalty is not giving access to a market.
So it's almost like the serial data abusers
have an anklet, an ankle bracelet that doesn't let them out
of the "I'm going to abuse your data" house.
They can't-- The most damaging thing that can happen now-- Something
that I take-- I don't if I take pride in it,
but there's validation in Mark Zuckerberg saying "We
think the future is completely private, small group
That's what we are doing, that's what we've been doing
forever. Again I don't think that's philanthropic, I think he
sees from his data what customers want down the line.
People ask me if I'm worried about that competitively and quite
honestly, like we talked about earlier, we're all in this for privacy.
That is a genuine statement and I
welcome more and more organizations providing
that level of privacy, but if people
are just making that an advertising campaign and
lulling the enterprise or the consumer or whomever into
this false sense of privacy, then there
needs to be an ankle bracelet.
That's where regulators could come in and say "No. You've
defined yourself as somebody who abuses
data. Consumers or enterprises can
make their decision to work with you, but you can't go out and
advertise that you're protecting data."
Because there are, like we're doing and like Apple is doing, there are ways that you can do this mathematically and if you're not using those techniques then realistically you're not protecting it.
Grant: It's interesting too, because some of these
things-- TLS is a great example, it's the kind of thing that people
can grok pretty easily, where the end user experience is
You just go to sites and it all looks the same as if it's encrypted or
un-encrypted in transit.
You don't really know that it's happening, but it is protecting you.
It's behind the scenes and so these things that are happening behind the scenes, it's almost like it's too seamless. Wickr feels like any other chat, which is good, but it's doing so much more in the background.
Grant: The thing that I love about TLS, they have done some interesting
stuff. Even if it's little, the browsers built in the little locks
and the green and the different colors.
ways to show that
"This is encrypted," or just the
idea that the devices or the client
need to display something a bit more
like abruptly to let that "You're actually sending
un-encrypted data beyond."
There's stuff that will come together to help make this more obvious, but it's one of those interesting challenges where you're like, "We made it so easy and so good."
Joel: This is a really important aspect, and
for people listening to this who are trying to build
matters a ton.
So some anecdotal experiences I have that are right in line
with what you're talking about before my Wickr days I got
We did a lot of work with Google and there were some
security-focused UI people, and
you talk about the lock-- They'd do focus groups and they're like "I
like that shopping bag."
The point being, it's really hard and
nuanced. You've got to understand that you're going to have to get that feedback.
We did this thing, ultimately I'm
responsible for this misstep, and that was
one of the things that we understood from our customers is they liked the
fact that we went to extra measures to essentially
remove data from the device to shred it.
We called it "Shredder," and there were multiple layers of
shredding and we figured out how to do it
My thought process
was, "Let's just give everybody maximum shredding and let's
build it into the product and we don't have to take up that
UI space or that decision making
tree for the consumer to be like 'Do I want to shred? On
what frequency do I want it?'
We're just going to be the world's best at this and we're going to
bake it into the product."
The second we took out optionality around shredding, people were
What they were saying is "I like to push the shredder button, that
makes me feel comfortable.
That gives me a sense of security."
would respond and they would typically, via
Twitter via customer service, we'd say "We're just doing
that for you." They
would ultimately say "That's great, but
I want to see it happen.
I'd rather do that."
That's something that we constantly do.
The messages used to burn, they literally would,
we would have animation of fire or
smoke and we didn't think that was very enterprise-y.
Ultimately the data we get back from the enterprise is they're right. We don't necessarily need that, but there is still a population in those enterprise customers where "I thought that was fun. Can you make the things explode again?"
There is an interesting balance between building products and building products that do things well, and how you engage with the customer and how you engage with the consumer versus an enterprise customer. It's very nuanced and important.
Grant: Yeah. It's this interesting balance, because when you add enterprise in
now you instantly have not just an end user but all
these intermediate users that could be anything from the
admin, to the IT admin, to the executives.
You have all these different layers and
ultimately the end user, you want them to
use the product and love the product, but it seems to be the consumerization of
IT that they don't always write the check.
Sometimes the CFO is like, "Why do you make these animations?" You're like, "OK. We'll pull it out." Then all of a sudden it's like--
Joel: The user base is like, "No."
Something that we've done at Wickr over the last
year and a half two years is--
Again, I talked about it
being the most tinfoil-hatty product, so one of the things
was there was a promise that we did this thing from the very
beginning. This is a very different way to look at
security for a software company.
We did something called "Security promises"and I'm going to get to what
we're talking about here in a second.
But that ultimately meant that we were going to say "All things being
equal we're going to make these promises, and it's going to be very binary.
We protect your data and we're saying we protect this data
because we're making this assertion that we encrypt things in this
Using an example is
a verifiable statement so we have third parties come in to verify that
we're doing the thing that guarantees that we are keeping
We make all of these promises
so that we don't have to have a 50 pen test for every customer that
comes in. We're placating that
enterprise user and what their requirement is on a
But that doesn't necessarily mean that the end user is telling us what they want, and it also doesn't mean that we can't listen to that end user, so part of the real tinfoil hat was "We'll never get signal back from the clients as to what button is being pushed."
Joel: If people are pushing the shredder button they don't really care if
Wickr knows that.
That is not an invasion of their privacy, and we're going to tell people we don't think that's an invasion of their privacy and we're going to be very open that we're going to look and see what buttons are being pushed so that we can accentuate those features for them.
Joel: But in the sake of privacy, originally, we were like "The
hypothesis is we'll never know what anyone's ever doing with the
product and we're going to build a good
Boy, is that-- Talk about running into
a forest with a blindfold.
That's a tough one.
Sometimes there's too much security, and you have to be
objective about this and say "I need to be able to go
talk to the customer and see what the customer is
doing. If they ever came back to us and said "I don't want you to know that
we're using this feature," then we could
But ultimately that's what they want.
They want to have that conversation with you, and you don't have to-- In
our case, that doesn't make their communications any less secure, doesn't
make their file transfers any less secure, their video conferences-- It does
none of those things.
If we know that everyone is doing screen share and that's the most important thing for them, then we're going to keep innovating around screen sharing.
Grant: Yeah, it's a nuanced balance though because
you don't want to pull out too much
information. Obviously there's a hard line around any content, but
how about the length of every message? How
about the size of files?
There's different things that you're like, "That would actually be
useful so we know if we need to do at larger file transfer size," but you're
like, "I don't want to--" So then you end up just
incrementing it, and you're like "OK. Let's
just do categories. Is
Are people trying to send stuff over 5MBPS or something?"
You start to balance it back and forth, but there's a lot of thought that goes into deciding that.
Joel: It's funny, for a very secure
company that basically says "We're not going to give people access to
information," we're really rooted in transparency in
terms of how we communicate with our customers.
Getting it 100% right is impossible, but we can
always do is be 100% transparent with everybody in
terms of how we deal with these issues.
Going back to enterprise software, for people out there who are
trying to understand how to build products, you're never going to build a secure
product that's going to meet everybody's
criteria for security.
But have a process, be honest and be open and show that
you have the ability to fix things
fast, and you have the
inclination to not snake oil people.
That's going to end up really-- Ultimately in the enterprise sales cycle, when that type of approach hits their team who's doing the evaluation, that matters more than perfection. Because perfection, especially in anything that's even remotely agile, who cares what it looks like Tuesday the 4th at 3 o'clock?
You have to show that you have a process and an organization and a will to continue to push the envelope and do the right things, and communicate it honestly with the customer.
What we do is we just don't want to surprise anyone ever.
That's a bad business for us to get into, we are in the trust
business so we want to be really transparent
with our customers about everything we do.
If we ever do something, or if for some reason all of our customers say "It's untenable for us that we're using your product to make video conferencing calls," then we can change. We just really commonsensically don't think that's a problem.
Grant: Yeah. That makes total sense. Joel, this has been amazing. I've loved the conversation. I could ask you a million more questions and we could go on for hours.
Joel: We'll do it again sometime.
Grant: Yeah. I'd love that.
But before we go, I just think it's really interesting to
hear how CEOs do the elevator pitch.
What's the pitch you give in one or two minutes, or whatever you want to do--?
Just tell us what Wickr does in your own words. I just think it's really interesting to hear.
Joel: OK. Wickr takes a different approach to data security
in so much as we are a service provider that
never ever mathematically certainly has access
to any of the information that's being transmitted on our platform.
That's a very different type of security that can be offered to
customers who typically really care about
this and have big either corporate market
capitalization risk associated with being
"owned by adversaries--"
Or, let's just say their lives are on the
line, so it's a different way of transferring data.
When we first looked at this as a need, what we
saw was communications.
What we do is we provide messaging, team
collaboration, channels, groups, video
conferencing, file transfer-- Anything that you can imagine in
a communication or collaboration product that
is completely secure.
This is oftentimes used to replace email or other
virtual collaboration products, but it's also used as a complement.
We view this as something where we're very focused on
integration, so our customers build integrations
into Slack or into other products so that they
can secure the conversations and still use other products
Something we haven't talked about that's really key to our strategy is
as a smaller software company what we really are is
have customers who are building and we're exposing the capability
for them to build their own customized workflows, so in a
lot of ways what we are is we are a platform where you're one step away
from building your own end to end encrypted workflow.
We're seeing people use orchestration with swim
lane or phantom or different products to build
orchestrated incident response processes.
We see executive teams using our platform to
distribute sensitive information on an orchestrated regular
basis to executives so that it only goes to their
phone and it only lives for a certain amount of time on their phone, providing an
extra layer of security.
real sales pitch, and the real elevator pitch right now, is we
are a really secure collaboration product but the future that's really
cool is we're giving developers the ability to build
their own workflows on top of our platform.
That's probably, from a vision standpoint, the most exciting and fun part of the company.
Grant: That's really cool, I was actually thinking there was probably a big opportunity to
do that in our earlier conversation. That
makes a lot of sense.
You're offering this primitive encryption, secrecy primitive that other folks can build in the workflows. Because as we were talking I was thinking through lots of different use cases, so that's really great that you guys are onto that.
Joel: A good example, the one I use a lot is
AWS offers Lumber Yard for game developers.
They just say, "Come and build.
We're giving you the tools.
We're not the best game developers, but we're going to give you the
tools to build whatever you want to build."
We can't think of every circumstance where people
have a need. Communications
is a commonsensical one, and that's where we started, but we want to give
people the ability to just build what they need to build and
orchestrate what they need to orchestrate.
To do it and not have to worry about our ability to be the weak link in their process, we just help them make it happen but we never have access to the data.
Grant: Very cool. Joel, thank you so much.
Joel: I appreciate the time.
Grant: Yeah, that was really fun.