WEBVTT 1 00:00:00.300 --> 00:00:02.040 Michael Novinson: Hello, this is Michael Novinson with 2 00:00:02.070 --> 00:00:05.460 Information Security Media Group. I'm joined today by Tim 3 00:00:05.490 --> 00:00:09.750 Eades. He is the CEO at vArmour. Good afternoon, Tim. How are 4 00:00:09.750 --> 00:00:09.900 you? 5 00:00:09.930 --> 00:00:11.880 Tim Eades: Michael, so great to see you again. 6 00:00:12.840 --> 00:00:15.600 Michael Novinson: Very nice having you here as well. Want to 7 00:00:15.600 --> 00:00:19.830 start off with - I know, early last year vArmour raised $58 8 00:00:19.860 --> 00:00:23.700 million from AllegisCyber and NightDragon security. What did 9 00:00:23.700 --> 00:00:26.100 you use the money for over the past 18 months or so. 10 00:00:27.180 --> 00:00:30.630 Tim Eades: Yeah, great question. So we continue to invest in the 11 00:00:30.630 --> 00:00:33.270 opportunity. We're in 14 countries now around the world. 12 00:00:34.260 --> 00:00:38.310 We've expanded our R&D department quite significantly, 13 00:00:38.790 --> 00:00:44.790 we opened up in Calgary a big data and AI group. As we start 14 00:00:44.790 --> 00:00:48.120 to look at, you know, understanding data giant scales, 15 00:00:48.780 --> 00:00:52.560 scale was quite interesting because in Calgary, you have AI 16 00:00:52.560 --> 00:00:57.030 and ML schools, one of the top in the world, because of the oil 17 00:00:57.030 --> 00:01:00.210 and gas industry. And they know a lot about graph databases. So 18 00:01:00.960 --> 00:01:05.790 we opened up a big department and an office there, we also 19 00:01:05.790 --> 00:01:10.470 opened up one in Lithuania for different purpose: to build more 20 00:01:10.470 --> 00:01:13.800 connectors out and to ingest more things into the graph. And 21 00:01:13.800 --> 00:01:19.050 so largely, it has been R&D investment, we obviously invest 22 00:01:19.050 --> 00:01:21.630 into our sales team and corresponding marketing team. 23 00:01:21.990 --> 00:01:24.000 But the investment largely has been into R&D. 24 00:01:26.340 --> 00:01:28.860 Michael Novinson: What is this international expansion done for 25 00:01:28.860 --> 00:01:29.610 you as a company? 26 00:01:30.450 --> 00:01:35.820 Tim Eades: Yeah, vArmour has always been very quickly cut off 27 00:01:35.820 --> 00:01:39.870 the bat to be international. Some of our first customers were 28 00:01:40.650 --> 00:01:44.580 in Denmark, or the customers were in Japan, and stuff. So 29 00:01:44.880 --> 00:01:47.580 we've been international for a while, but we've really pushed 30 00:01:47.580 --> 00:01:51.390 ... our customers are global. We need to be that to service them 31 00:01:51.390 --> 00:01:57.060 and look after them and drive those opportunities. So yeah, 32 00:01:57.090 --> 00:02:01.350 the investment has taken us global. We're in the Middle 33 00:02:01.350 --> 00:02:05.490 East, we're in Germany, we're in Denmark, or in Czech, we're in 34 00:02:07.110 --> 00:02:11.310 Singapore, we're in Malaysia, we're in Australia, we're all 35 00:02:11.310 --> 00:02:14.640 over the place. But it's largely based on the verticals and the 36 00:02:14.640 --> 00:02:17.520 customers that we serve. So, you know, the majority of our 37 00:02:17.520 --> 00:02:20.070 revenue comes from financial institutions, which are global 38 00:02:20.070 --> 00:02:23.010 in nature, and then you go to telco, then you go to 39 00:02:23.010 --> 00:02:26.220 governments, and then you go into a long tail of retail, and 40 00:02:26.220 --> 00:02:29.370 are now into healthcare and pharma. But, you know, the banks 41 00:02:29.370 --> 00:02:31.890 really took us global very early, and then we just built on 42 00:02:31.890 --> 00:02:32.070 that. 43 00:02:33.720 --> 00:02:35.550 Michael Novinson: I'd love to hear a little bit more about 44 00:02:35.550 --> 00:02:38.880 that. Why is banking financial services such a good fit for the 45 00:02:38.880 --> 00:02:42.270 vArmour technology? And how did their needs differ from some of 46 00:02:42.270 --> 00:02:44.520 the other verticals and sectors that you also serve? 47 00:02:44.880 --> 00:02:47.610 Tim Eades: Yeah, so what vArmour does is we look at applications 48 00:02:47.610 --> 00:02:49.230 and the relationships and dependencies of those 49 00:02:49.230 --> 00:02:53.220 applications to understand risk and understand resiliency on 50 00:02:53.220 --> 00:02:56.550 those things. So the sales model that we build and the customer 51 00:02:56.550 --> 00:02:59.430 engagement model that we build is very much of you go in and 52 00:02:59.430 --> 00:03:02.940 discover what is happening in your environment and then look 53 00:03:02.940 --> 00:03:07.260 at what should happen. And then look out how do you take control 54 00:03:07.260 --> 00:03:09.870 to reduce your attack surface. So let me give you an example. 55 00:03:09.990 --> 00:03:14.970 If workload A is talking to B, and to C to D, if B goes down, 56 00:03:15.360 --> 00:03:18.000 A, C and D are affected, they will have relationships or have 57 00:03:18.000 --> 00:03:22.620 dependencies. So, you know, if it's Tim and Michael's pizzeria, 58 00:03:23.220 --> 00:03:25.800 and we're selling on it, and we're running our application on 59 00:03:25.830 --> 00:03:29.550 AWS, our salespeople can sell to you, the product will provide 60 00:03:29.550 --> 00:03:34.320 value. But we do really well where the customer is hybrid and 61 00:03:34.350 --> 00:03:37.200 the customer is complex. If you look like Frankenstein, where 62 00:03:37.200 --> 00:03:39.990 you've got, you know, five fingers probably moving from 63 00:03:39.990 --> 00:03:44.100 different hands, it's great. I mean, one of our customers is a 64 00:03:44.130 --> 00:03:48.720 big European bank. They have Cisco ACI, they have NSX, they 65 00:03:48.720 --> 00:03:53.490 have 100,000 agents, they have Windows Defender, they have 66 00:03:53.640 --> 00:03:59.070 Azure, they have AWS. And they need to understand, you know, 67 00:03:59.070 --> 00:04:02.250 those applications, there's dependencies that run on those 68 00:04:02.250 --> 00:04:05.490 things. And so, what do we do is we go in and we understand it. 69 00:04:05.490 --> 00:04:10.170 So banks, highly regulated, so they have consequence. If 70 00:04:10.170 --> 00:04:14.910 something goes wrong, those regulations drive actions, 71 00:04:17.160 --> 00:04:20.430 frankly, to purchase software and to control that risk. And so 72 00:04:20.700 --> 00:04:25.200 that's always been home for us. Then telco has always been a 73 00:04:25.200 --> 00:04:27.000 good place for us to learn because again, they're very 74 00:04:27.000 --> 00:04:31.110 large with scalable challenges. And so we fit into that market 75 00:04:31.110 --> 00:04:34.230 very well. But now, we're doing more and more to governments. 76 00:04:36.420 --> 00:04:38.580 Michael Novinson: Very interesting. Once you get into a 77 00:04:38.580 --> 00:04:42.390 little bit in terms of the vArmour technology here, what 78 00:04:42.390 --> 00:04:44.610 are the biggest advancements that you've made from a product 79 00:04:44.610 --> 00:04:46.410 or from an R&D standpoint this year? 80 00:04:47.730 --> 00:04:53.910 Tim Eades: Yes, over the last 18 months, we went to early adopter 81 00:04:53.910 --> 00:04:57.090 customers with our SaaS offering. We launched that was 82 00:04:57.090 --> 00:05:01.500 SOC type 2 and that allowed us to really help them. The digital 83 00:05:01.500 --> 00:05:05.310 transformation for customers allows us to accelerate our 84 00:05:05.310 --> 00:05:08.790 business model and drive more value quicker for our customers. 85 00:05:08.790 --> 00:05:13.320 So that has been an endeavor. And some of our customers are, 86 00:05:13.350 --> 00:05:16.500 air gapped customers that still require on-prem. It's the same 87 00:05:16.500 --> 00:05:19.680 architecture wherever it works. But the SaaS offering that we've 88 00:05:19.680 --> 00:05:24.180 rolled out, and some of the clustering and some of the AI 89 00:05:24.180 --> 00:05:31.050 and ML-round application behaviors has been, you know, 90 00:05:31.080 --> 00:05:33.900 something that we've invested that has worked out really, 91 00:05:33.900 --> 00:05:34.320 really well. 92 00:05:36.150 --> 00:05:38.130 Michael Novinson: What's the significance of being able to 93 00:05:38.130 --> 00:05:41.070 offer this on a SaaS basis to your customers? Why is that 94 00:05:41.070 --> 00:05:41.640 important? 95 00:05:42.000 --> 00:05:43.800 Tim Eades: Because I can't go after Tim and Michael's 96 00:05:43.800 --> 00:05:49.350 pizzeria. The significance of delivering it as a SaaS offering 97 00:05:50.700 --> 00:05:54.930 really accelerates the engagement model of the customer 98 00:05:55.080 --> 00:06:00.300 and the simplicity. One of our customers, for example, is a 99 00:06:00.300 --> 00:06:06.930 large retail store, very famous retail store, you know. They 100 00:06:06.960 --> 00:06:11.400 kicked off testing our software one Sunday afternoon, and they 101 00:06:11.400 --> 00:06:14.130 will were completely live, and so all of the application flows 102 00:06:14.130 --> 00:06:18.360 by like Monday lunchtime. And then map delegates policies, you 103 00:06:18.360 --> 00:06:24.330 know, against in that case is very PCI-orientated and deliver 104 00:06:24.330 --> 00:06:28.140 very quickly. So it's a time to value for the customer and 105 00:06:28.140 --> 00:06:32.430 accelerate it because it's just easier for us to do it for them. 106 00:06:34.590 --> 00:06:36.180 Michael Novinson: What's the fastest growing part of the 107 00:06:36.210 --> 00:06:38.430 vArmour portfolio today and why? 108 00:06:39.210 --> 00:06:42.390 Tim Eades: The fastest part or the growing part of the 109 00:06:42.390 --> 00:06:46.350 portfolio of vArmour is government. The government 110 00:06:46.350 --> 00:06:51.810 business for us has really started to take off. Parts of 111 00:06:51.810 --> 00:06:53.910 the government don't understand what we would refer to as their 112 00:06:53.910 --> 00:06:56.820 terrain. If you like the application terrain, 113 00:06:57.120 --> 00:07:00.180 understanding, you know, the relationships, the dependencies, 114 00:07:00.180 --> 00:07:06.450 the consequences if they go down. And with Jen Easterly in 115 00:07:06.480 --> 00:07:09.090 the greater position in the CISA to understand that and control 116 00:07:09.090 --> 00:07:15.000 that has been exceptional for us. We're seeing that really 117 00:07:15.000 --> 00:07:17.250 take off. That's the fastest part by a mile. 118 00:07:18.300 --> 00:07:19.890 Michael Novinson: What investments have you made at 119 00:07:19.890 --> 00:07:23.010 vArmour to support this continued growth in the 120 00:07:23.010 --> 00:07:24.900 government space? So when you say government, are you 121 00:07:24.900 --> 00:07:27.750 referring specifically to the U.S. government or are you also 122 00:07:27.750 --> 00:07:31.110 supporting other governments across the globe? 123 00:07:32.100 --> 00:07:34.950 Tim Eades: We do it. We do some European governments, but mainly 124 00:07:34.950 --> 00:07:37.920 the U.S. government is our kind of core focus. We are starting 125 00:07:37.920 --> 00:07:42.420 to see some stuff in Australia and New Zealand via some of our 126 00:07:42.660 --> 00:07:46.620 long-standing investors and partners. But the investments 127 00:07:46.620 --> 00:07:50.880 that we're doing there is it's largely people at the moment, 128 00:07:50.910 --> 00:07:53.250 it's making sure that we have the right sales teams, the right 129 00:07:53.250 --> 00:07:57.030 suppliers in place to service the opportunity. The tech that 130 00:07:57.030 --> 00:08:00.420 we have is very portable. So if you have a large bank in 131 00:08:00.420 --> 00:08:04.020 Manhattan, or your government institution, it's the same tech. 132 00:08:04.050 --> 00:08:08.400 We're not obviously building anything specific. But I do 133 00:08:08.400 --> 00:08:12.660 think you have to have the people with the right clearances 134 00:08:12.720 --> 00:08:15.510 to get into the right conversations. And we spend a 135 00:08:15.510 --> 00:08:18.420 lot of time and investment on that and with the right 136 00:08:18.420 --> 00:08:20.280 suppliers to service the opportunity. 137 00:08:21.540 --> 00:08:23.040 Michael Novinson: How do the needs and requirements of the 138 00:08:23.040 --> 00:08:27.210 U.S. government differ from your heritage, the customers you've 139 00:08:27.210 --> 00:08:30.480 served historically in the banking and financial services 140 00:08:30.480 --> 00:08:30.870 arena? 141 00:08:31.470 --> 00:08:36.150 Tim Eades: Truthfully, they don't differ too much. The scale 142 00:08:36.150 --> 00:08:39.120 is obviously gigantic for some of the parts of the government. 143 00:08:39.300 --> 00:08:41.490 But some of the large banks and the lifestyle business that we 144 00:08:41.490 --> 00:08:46.290 service and supply in North America are pretty big too. So 145 00:08:46.560 --> 00:08:48.990 we look after some of the largest telcos in the States, 146 00:08:48.990 --> 00:08:54.510 and in some of the largest banks in North America, so they look 147 00:08:54.510 --> 00:08:56.820 like each other, which is fortunate because you don't want 148 00:08:56.820 --> 00:09:00.420 to build things specifically for people. And the U.S. government 149 00:09:00.420 --> 00:09:05.100 has its own parts in a slightly different, but generally 150 00:09:05.100 --> 00:09:09.780 speaking, you know, the tech that they've been supplied and 151 00:09:09.780 --> 00:09:13.560 the applications that they run. It's all the same kind of stuff 152 00:09:13.560 --> 00:09:14.070 to us. 153 00:09:16.170 --> 00:09:17.940 Michael Novinson: When you look at the market landscape, if 154 00:09:17.940 --> 00:09:20.700 you're in a competitive bid situation, who are you coming up 155 00:09:20.700 --> 00:09:23.220 against the most often against vArmour? What do you feel 156 00:09:23.220 --> 00:09:26.160 differentiates your approach from your biggest rivals? 157 00:09:26.630 --> 00:09:30.200 Tim Eades: That's a great question. So, the market is 158 00:09:30.200 --> 00:09:32.750 maturing significantly. So let's talk about the market for a 159 00:09:32.750 --> 00:09:37.370 second. Gartner would refer to as exposure management. So you 160 00:09:37.370 --> 00:09:41.060 break exposure management into two. Exposure management is 161 00:09:41.060 --> 00:09:44.480 divided into EASM (external attack surface management), 162 00:09:44.750 --> 00:09:48.380 which great companies like Synack and CyCognito and some 163 00:09:48.380 --> 00:09:51.530 great companies out there tried to understand the external 164 00:09:51.530 --> 00:09:55.910 attack surface. Then you look at the internal attack surface. 165 00:09:56.870 --> 00:10:02.600 First it was CAASM (cyber asset attack surface management), and 166 00:10:02.660 --> 00:10:05.960 in that space, that space is maturing quite significantly. It 167 00:10:05.960 --> 00:10:10.550 started off with just the devices people, the manage and 168 00:10:10.550 --> 00:10:15.230 unmanaged devices people. So think of Axonius, Forescout. 169 00:10:15.860 --> 00:10:19.430 There's clarity in that space doing IT and OT kind of 170 00:10:19.430 --> 00:10:23.480 understanding. Those devices are fantastic, the companies are 171 00:10:23.480 --> 00:10:25.910 fantastic. But they don't understand the business context. 172 00:10:25.910 --> 00:10:27.560 And they don't have any knowledge of the applications 173 00:10:27.560 --> 00:10:30.860 that are running on those devices. So that market ... that 174 00:10:30.860 --> 00:10:34.370 attack surface is playing out and that's a great market. On 175 00:10:34.370 --> 00:10:36.470 top of that now, to understand how attack surface goes into 176 00:10:36.470 --> 00:10:39.680 applications, the application knowledge kind of gets broken 177 00:10:39.680 --> 00:10:43.760 down into, you know, do you understand your application, 178 00:10:43.790 --> 00:10:47.750 you're working on a A goes to B to C to D. So that's what we do. 179 00:10:48.620 --> 00:10:52.760 Axonius and people say, "Well, that's a device," but they don't 180 00:10:52.760 --> 00:10:56.180 know that that device is communicating to a billing 181 00:10:56.180 --> 00:10:58.910 application, or the cafeteria, they can't tell the difference. 182 00:10:59.240 --> 00:11:01.520 So that's why that market to understand your attack surface 183 00:11:01.580 --> 00:11:05.270 has to include not just devices managed and unmanaged, but it 184 00:11:05.270 --> 00:11:07.370 has to include application knowledge, because that way you 185 00:11:07.370 --> 00:11:10.010 actually have the business context to the risk that you're 186 00:11:10.010 --> 00:11:12.560 trying to control. So the competitors that we see in that 187 00:11:12.560 --> 00:11:17.180 space, you see some of the observability people, right? But 188 00:11:17.180 --> 00:11:21.560 observability people that don't understand policy, and that 189 00:11:21.560 --> 00:11:25.820 can't take control of it, because you also have to enforce 190 00:11:25.820 --> 00:11:29.210 the policy won't actually win because nobody actually wants to 191 00:11:29.210 --> 00:11:31.370 be a system of insight anymore. They want to be a system of 192 00:11:31.370 --> 00:11:35.300 action. Otherwise, you're just another screen - a noisy screen. 193 00:11:35.330 --> 00:11:37.400 No, you have to do something about it, which means you have 194 00:11:37.400 --> 00:11:42.440 to take your knowledge and do something with it. So, I mean, 195 00:11:42.440 --> 00:11:46.550 we do see some of the segmentation people around the 196 00:11:46.550 --> 00:11:50.480 world. So there's an Illumio company that's out there. They 197 00:11:50.480 --> 00:11:54.350 do micro-segmentation. But they leverage agents, right? So it's 198 00:11:54.350 --> 00:11:57.230 a great company, but they put agents down inside the 199 00:11:57.230 --> 00:12:01.100 infrastructure. We try and use and we do use the infrastructure 200 00:12:01.100 --> 00:12:05.780 that you've already bought. So like CrowdStrike or VMware, NSX, 201 00:12:05.780 --> 00:12:09.500 or Cisco ACI, we don't want to put more tech down, we want to 202 00:12:09.500 --> 00:12:12.140 leverage the things that you've already bought, and still 203 00:12:12.140 --> 00:12:14.900 provide the same value or discover what is happening, look 204 00:12:14.900 --> 00:12:19.160 at what should, and then take control. So then, we will see 205 00:12:19.160 --> 00:12:23.630 them a little bit, we would - mostly, the alternatives that 206 00:12:23.630 --> 00:12:29.780 the customers have is its people, like 70% of the way that 207 00:12:29.780 --> 00:12:31.760 they try and understand their attack surface is actually 208 00:12:31.760 --> 00:12:37.100 manual right now. So the discoverability, observability 209 00:12:37.100 --> 00:12:39.890 people are out there, but then you need to turn it into action. 210 00:12:39.890 --> 00:12:44.780 So it's a massive market and maturing really quickly. Some of 211 00:12:44.780 --> 00:12:48.290 the pharmaceuticals and healthcare companies, because of 212 00:12:48.710 --> 00:12:52.850 the regulations coming out from the U.S. government, are really 213 00:12:52.850 --> 00:12:56.180 moving very fast to try and understand and control attacks. 214 00:12:58.140 --> 00:13:01.050 Michael Novinson: Very interesting. So when you fear to 215 00:13:01.050 --> 00:13:03.930 gaze into the crystal ball here, what do you see coming down the 216 00:13:03.930 --> 00:13:09.330 pipe in 2023, in terms of R&D roadmap, a product roadmap, what 217 00:13:09.330 --> 00:13:12.060 should customers and prospects be watching for from vArmour in 218 00:13:12.060 --> 00:13:12.690 the coming year? 219 00:13:13.440 --> 00:13:15.750 Tim Eades: That's a great question. So, as I look back in 220 00:13:15.750 --> 00:13:25.770 on 2022 and 2023, I think, as you look into that ... we are in 221 00:13:25.770 --> 00:13:30.990 tech, right? So here's where I would go on that. So we look at 222 00:13:30.990 --> 00:13:34.740 the world like this. 10 years ago, we looked at workload, we 223 00:13:34.740 --> 00:13:37.830 looked at application security. Over the last five years, 224 00:13:38.040 --> 00:13:40.560 everybody's talked about workload security, and you will 225 00:13:40.560 --> 00:13:44.280 continue to talk about workload security but by far, the 226 00:13:44.280 --> 00:13:47.790 investment model now needs to move toward data security. Data 227 00:13:47.790 --> 00:13:49.950 security is broken down through loads of different ways, 228 00:13:49.950 --> 00:13:54.090 obviously, data and news, data in motion, your data at rest 229 00:13:54.090 --> 00:13:57.600 from an encryption perspective, then you look at data 230 00:13:57.600 --> 00:14:02.010 classification, data cataloging from that kind of model. But 231 00:14:02.010 --> 00:14:04.620 also, you're going to look at data traversing the 232 00:14:04.620 --> 00:14:07.050 infrastructure. As data traverses the infrastructure, 233 00:14:07.230 --> 00:14:11.850 extremely fragile as it does. So when you look from us, over the 234 00:14:11.850 --> 00:14:14.640 next 18 months, in particular, we've been working with design 235 00:14:14.640 --> 00:14:17.640 partners to understand resiliency as it relates to 236 00:14:17.640 --> 00:14:21.990 data, data lineage, data traverse, all of the data kind 237 00:14:21.990 --> 00:14:27.360 of model. So let me give an example. As an application with 238 00:14:27.360 --> 00:14:30.540 eyes on data, it will pull the information across from the 239 00:14:30.540 --> 00:14:33.450 repository to serve it, right? But as it goes through 240 00:14:33.450 --> 00:14:37.440 middleware and file systems, it loses some of its headers. So 241 00:14:37.440 --> 00:14:40.350 when there's an outage, or when there's an attack, you know, you 242 00:14:40.350 --> 00:14:43.350 can't see where it came from. Think of it like Spaghetti 243 00:14:43.350 --> 00:14:45.870 Junction, a piece of data will come into a piece of middleware, 244 00:14:46.050 --> 00:14:48.330 and it will go in five different directions. But if there's an 245 00:14:48.330 --> 00:14:52.320 outage, you don't know where it came from, or what caused it. So 246 00:14:52.440 --> 00:14:54.660 that's an area that we've been investing in with some design 247 00:14:54.660 --> 00:14:58.590 partners over the last year or so. We've been writing blogs 248 00:14:58.590 --> 00:15:01.110 about it every now and again, but as soon as it comes to 249 00:15:01.110 --> 00:15:03.000 market, that's something we're going to bring to market. 250 00:15:04.260 --> 00:15:05.760 Michael Novinson: Very interesting. Let me ask you 251 00:15:05.760 --> 00:15:09.030 here, Tim, finally. I've been very intrigued by your 252 00:15:09.030 --> 00:15:11.970 background in this conversation. What are we looking at? What's 253 00:15:11.970 --> 00:15:12.930 its significance? 254 00:15:13.650 --> 00:15:17.070 Tim Eades: So this actually is a cake. Believe it or not. My wife 255 00:15:17.070 --> 00:15:19.830 and I are on the board of a non-profit called Cake for Kids. 256 00:15:19.860 --> 00:15:23.430 She's been running it for 10 years. She's currently president 257 00:15:23.460 --> 00:15:27.990 of it. And so Cake for Kids is an organization started in in 258 00:15:28.020 --> 00:15:31.530 Northern California, where we deliver, we bake and deliver 259 00:15:31.560 --> 00:15:34.380 birthday cakes to children at risk, and children in foster 260 00:15:34.380 --> 00:15:38.490 homes. This is a cake made for a young lady who likes to read, 261 00:15:38.490 --> 00:15:41.640 and it's actually called bookworm. Every child will get a 262 00:15:41.640 --> 00:15:44.430 cake that's tailored to them. So it's Tim and he lives in 263 00:15:44.460 --> 00:15:47.880 Oakland, and he's a Liverpool fan, he'll get on his 14th 264 00:15:47.910 --> 00:15:50.430 birthday or whatever, in Liverpool, a birthday cake 265 00:15:50.580 --> 00:15:53.820 delivered to his home. This year, we'll deliver about 11,000 266 00:15:53.820 --> 00:15:57.000 birthday cakes across the states. And it's been one of 267 00:15:57.090 --> 00:15:59.490 those interesting things. It was growing fast prior to the 268 00:15:59.490 --> 00:16:02.430 pandemic, but during the pandemic, it just took off like 269 00:16:02.430 --> 00:16:07.200 a rocket. Because you even turn on the TV and get extremely 270 00:16:07.200 --> 00:16:09.600 depressed by looking at the news. All you wanted to do 271 00:16:09.600 --> 00:16:14.310 something positive. And so prior to the pandemic, I think we 272 00:16:14.310 --> 00:16:17.970 would do like two and a half to 3000 birthday cakes, you know. 273 00:16:17.970 --> 00:16:21.540 This year, 11,000. All across the states we're just opening 274 00:16:21.540 --> 00:16:23.970 up. I think this week in Raleigh, Durham, North Carolina, 275 00:16:24.210 --> 00:16:27.210 but it's gone everywhere from Boston to Chicago to Oregon to 276 00:16:27.210 --> 00:16:32.100 Arizona. And it's really taken off but yeah, this year, 11,000 277 00:16:32.100 --> 00:16:34.560 birthday cakes to children in foster homes. Many of those have 278 00:16:34.560 --> 00:16:37.590 never had a birthday cake, and you're trying to deliver smiles 279 00:16:37.800 --> 00:16:40.230 and to try to deliver self-esteem. It's something that 280 00:16:40.620 --> 00:16:43.050 I'm extremely passionate about, as you could probably tell. 281 00:16:44.010 --> 00:16:45.990 Michael Novinson: It's very powerful stuff. Tim, thank you 282 00:16:45.990 --> 00:16:49.080 for sharing a little bit more about that. Of course for 283 00:16:49.500 --> 00:16:51.720 telling us a little bit about what's going on at vArmour. We 284 00:16:51.720 --> 00:16:52.590 really appreciate it. 285 00:16:52.980 --> 00:16:54.720 Tim Eades: Yeah, it's been fantastic. Really appreciate 286 00:16:54.720 --> 00:16:55.080 your time. 287 00:16:55.680 --> 00:16:58.230 Michael Novinson: Absolutely. We've been speaking with Tim 288 00:16:58.230 --> 00:17:02.310 Eades. He is the CEO at vArmour. For Information Security Media 289 00:17:02.310 --> 00:17:05.040 Group, this is Michael Novinson. Have a nice day.