WEBVTT 1 00:00:00.300 --> 00:00:02.100 Michael Novinson: Hello, this is Michael Novinson with 2 00:00:02.130 --> 00:00:05.400 Information Security Media Group. I'm joined this afternoon 3 00:00:05.400 --> 00:00:09.150 by Bipul Sinha. He is the co-founder and CEO of Rubrik. 4 00:00:09.450 --> 00:00:10.980 Good afternoon, Bipul. How are you? 5 00:00:11.670 --> 00:00:13.680 Bipul Sinha: Thank you so much, Michael, for this opportunity. 6 00:00:13.680 --> 00:00:14.670 I'm doing awesome. 7 00:00:16.230 --> 00:00:18.420 Michael Novinson: You're very welcome. Glad we could do this. 8 00:00:18.600 --> 00:00:20.760 Why don't you start off with your announcement from 9 00:00:20.760 --> 00:00:24.330 Wednesday, hitting the $400 million milestone in 10 00:00:24.330 --> 00:00:29.730 subscription ARR as well as 100% year-over-year growth. What's 11 00:00:29.730 --> 00:00:31.830 the significance of that? And why are you seeing so much 12 00:00:31.830 --> 00:00:32.220 growth? 13 00:00:33.060 --> 00:00:35.910 Bipul Sinha: It's a huge milestone for Rubrik. As you 14 00:00:35.910 --> 00:00:39.810 know, Rubrik is a cybersecurity company. We are focused on data 15 00:00:39.810 --> 00:00:43.260 security, helping businesses and governments around the world 16 00:00:43.260 --> 00:00:46.440 protect and recover from ransomware. And that's what is 17 00:00:46.440 --> 00:00:50.730 fueling our business. In fact, we have built unique technology 18 00:00:50.940 --> 00:00:55.260 around data observability, observing the core data, as 19 00:00:55.260 --> 00:00:57.690 opposed to Syslog and machine log, we are going after 20 00:00:58.320 --> 00:01:01.350 observing the core data to understand the security threat 21 00:01:01.440 --> 00:01:05.310 and bringing security threat from there, and as a result, our 22 00:01:05.310 --> 00:01:08.520 customers are not only doing initial purchase, but they are 23 00:01:08.520 --> 00:01:13.800 also expanding with us rapidly. And exceeding $400 million 24 00:01:14.070 --> 00:01:19.080 subscription ARR, growing 100% year-over-year is a testament of 25 00:01:19.080 --> 00:01:23.610 our market velocity right now. And what is also interesting is 26 00:01:23.610 --> 00:01:31.380 that over 140% NRR suggests that we not only have customers who 27 00:01:31.380 --> 00:01:34.950 love us, but also customers who are rapidly expanding on 28 00:01:34.980 --> 00:01:37.260 Rubrik's core capabilities around ransomware. 29 00:01:38.700 --> 00:01:40.560 Michael Novinson: So let's talk a little bit about how you got 30 00:01:40.560 --> 00:01:43.020 here. And now when folks think about data security, 31 00:01:43.020 --> 00:01:46.200 historically, the foundational technology was DLP or data loss 32 00:01:46.200 --> 00:01:49.380 protection. I know you got here by a little bit different path. 33 00:01:49.380 --> 00:01:51.720 So take me through how you really moved into the 34 00:01:51.720 --> 00:01:54.690 cybersecurity market and what the benefit is to how you're 35 00:01:54.690 --> 00:01:56.040 taking on data security. 36 00:01:57.590 --> 00:02:00.530 Bipul Sinha: Traditional cybersecurity industry focused 37 00:02:00.530 --> 00:02:04.640 on infrastructure security and lately on cloud security. And it 38 00:02:04.640 --> 00:02:08.150 was all around prevention, detection and investigation of 39 00:02:08.150 --> 00:02:12.770 attacks. And their assumption was that data within the four 40 00:02:12.770 --> 00:02:16.580 walls of my enterprise or in my cloud account is secure as long 41 00:02:16.580 --> 00:02:19.760 as I can secure perimeter as long as I can have the right 42 00:02:20.570 --> 00:02:25.700 controls around it. But what people have come to realize that 43 00:02:26.030 --> 00:02:30.800 the infrastructure security is good and necessary, but it's not 44 00:02:30.800 --> 00:02:33.950 100% foolproof, and breaches are still getting in. And that's why 45 00:02:33.950 --> 00:02:38.690 we have so many ransomware attack scenarios. So now, people 46 00:02:38.690 --> 00:02:42.290 have to really rethink their data security strategy, because 47 00:02:42.290 --> 00:02:46.040 data delivers fundamental business resiliency. And if you 48 00:02:46.040 --> 00:02:49.370 have access to your data, in spite of an attack, you can 49 00:02:49.370 --> 00:02:52.400 actually reconstitute your business. And that's what we are 50 00:02:52.400 --> 00:02:56.870 focused on - how to make the customer's core asset, which is 51 00:02:56.870 --> 00:03:02.090 data, always be available and drive the security intelligence 52 00:03:02.090 --> 00:03:05.360 from the point of view of data in terms of like how far 53 00:03:05.360 --> 00:03:08.450 ransomware went, which file/which server got impacted? 54 00:03:09.470 --> 00:03:12.650 Like whether you have a double extortion risk in that scenario, 55 00:03:12.650 --> 00:03:16.670 because the bad guys got to your sensitive content. Do you have 56 00:03:16.670 --> 00:03:22.370 malware in the data stream? How do you quarantine it so that 57 00:03:22.370 --> 00:03:25.610 when you recover, you're not getting reinfected and having a 58 00:03:25.610 --> 00:03:29.810 Groundhog Day kind of scenario. So what we did was we built a 59 00:03:29.810 --> 00:03:34.250 brand new software and data backup technology sits at the 60 00:03:34.250 --> 00:03:38.450 heart of it. But we have built like AI-ML based data 61 00:03:38.450 --> 00:03:42.830 observability engine that drives this fundamental security 62 00:03:42.830 --> 00:03:43.700 intelligence. 63 00:03:43.000 --> 00:03:46.750 Michael Novinson: Let's talk a little bit about the market 64 00:03:46.750 --> 00:03:49.690 landscape. If you're in a competitive bid scenario, who 65 00:03:49.690 --> 00:03:53.200 are you encountering most often? And what differentiates Rubrik 66 00:03:54.100 --> 00:03:55.720 from your biggest rivals? 67 00:03:56.650 --> 00:03:59.200 Bipul Sinha: The traditional market in data backup and 68 00:03:59.200 --> 00:04:02.860 recovery has been focused on infrastructure and storage 69 00:04:02.890 --> 00:04:06.190 because they were trying to solve a problem where you have 70 00:04:06.190 --> 00:04:10.240 natural flood, fire, natural disaster, or human error or 71 00:04:10.660 --> 00:04:14.710 operations error. But the cyber disasters of today in the last 72 00:04:14.710 --> 00:04:18.640 several years have changed the landscape. And Rubrik took a 73 00:04:18.640 --> 00:04:21.940 unique approach from Day 1 where we said we will build a brand 74 00:04:21.940 --> 00:04:26.710 new software focused on data security problem. At the 75 00:04:26.710 --> 00:04:31.060 foundational level is zero trust security principle that Rubrik 76 00:04:31.060 --> 00:04:34.300 applied, which said that the data will not sit over the 77 00:04:34.300 --> 00:04:37.780 network and have anybody over the network with a standard 78 00:04:37.780 --> 00:04:42.400 protocol can access it. It will always be a policy-driven, full 79 00:04:42.400 --> 00:04:47.020 authentication platform that drives the data security across 80 00:04:47.020 --> 00:04:51.160 your enterprise cloud and SaaS. And that vision, that decision 81 00:04:51.160 --> 00:04:55.630 based on zero trust principles, based on the natural 82 00:04:56.290 --> 00:05:00.820 platform-driven data resiliency plus the data observability 83 00:05:00.820 --> 00:05:04.480 engine that we built based on AI-ML has given our customers 84 00:05:04.480 --> 00:05:08.560 the full suite of capabilities for them to understand the 85 00:05:08.560 --> 00:05:11.380 impact of ransomware and recover from it. 86 00:05:12.630 --> 00:05:15.150 Michael Novinson: So what companies do you actually see 87 00:05:15.150 --> 00:05:17.940 most often in the market, particularly when trying to 88 00:05:17.940 --> 00:05:19.800 address security-related challenges? 89 00:05:20.400 --> 00:05:23.010 Bipul Sinha: So we typically see like old infrastructure 90 00:05:23.010 --> 00:05:28.440 companies such as EMC, such as Veritas and others, but that 91 00:05:28.500 --> 00:05:32.100 industry is changing. What we are doing is we are replacing 92 00:05:32.400 --> 00:05:36.060 legacy backup and recovery with a modern data security platform 93 00:05:36.330 --> 00:05:40.170 with the resilience, observability engine and 94 00:05:40.170 --> 00:05:43.080 remediation capabilities with quarantine built into it. 95 00:05:44.490 --> 00:05:46.440 Michael Novinson: I know you had mentioned earlier that part of 96 00:05:46.890 --> 00:05:49.410 what's fueling your growth is expanding wallet share with 97 00:05:49.410 --> 00:05:52.830 existing customers. And I was wondering which features, which 98 00:05:52.830 --> 00:05:55.710 capabilities within the Rubrik portfolio are you seeing the 99 00:05:55.710 --> 00:05:59.370 most growth with today as existing customers expand and 100 00:05:59.000 --> 00:06:04.640 Bipul Sinha: We are seeing a lot of success on our core platform, 101 00:05:59.000 --> 00:06:40.910 Michael Novinson: I see. I know you'd also disclosed on 102 00:05:59.370 --> 00:05:59.760 why? 103 00:06:04.940 --> 00:06:09.230 which has like a data dependency. So as the data 104 00:06:09.230 --> 00:06:12.320 grows, as customers want to secure more applications, we 105 00:06:12.320 --> 00:06:17.030 grow. And then we layer on top of it the cybersecurity data 106 00:06:17.030 --> 00:06:21.740 security services, such as the ransomware monitoring and 107 00:06:21.740 --> 00:06:26.480 investigation service, such as your sensitive data discovery 108 00:06:26.480 --> 00:06:29.900 service, such as threat hunting and monitoring service. So these 109 00:06:29.900 --> 00:06:35.750 are all the SaaS attach we do on top of our core platform. 110 00:06:40.910 --> 00:06:45.140 Wednesday that you were launching Rubrik Zero Labs. How 111 00:06:45.140 --> 00:06:47.750 will customers benefit from this threat research unit? 112 00:06:48.560 --> 00:06:50.090 Bipul Sinha: So if you look at the market and the traditional 113 00:06:50.090 --> 00:06:51.830 threat research, they have been very focused on infrastructure 114 00:06:51.830 --> 00:07:00.710 threats, authentication threats, again, around prevention and 115 00:07:00.710 --> 00:07:05.990 investigation of issues. Nobody has looked at what your data is 116 00:07:05.990 --> 00:07:08.060 really experiencing. Well, at the end of the day, you're 117 00:07:08.060 --> 00:07:11.840 trying to protect your data. So we are taking a new approach, a 118 00:07:11.840 --> 00:07:14.540 pioneering approach, where we are saying that we are going to 119 00:07:14.630 --> 00:07:19.520 do a core focus on your data and understand from the data, what 120 00:07:19.550 --> 00:07:23.840 threats are being attached to your data. And so understanding 121 00:07:23.840 --> 00:07:26.960 of global threat landscape, understanding of emerging data 122 00:07:26.960 --> 00:07:30.440 threat issues, we had ransomware, the wipers are the 123 00:07:30.440 --> 00:07:33.290 new thing, then something else will come in future; 124 00:07:33.830 --> 00:07:38.270 understanding and delivering the latest source of information, 125 00:07:38.540 --> 00:07:43.190 and also sharing with broader ecosystem to really bring about 126 00:07:43.220 --> 00:07:46.730 awareness of data security challenges, data security 127 00:07:46.730 --> 00:07:51.050 issues, how folks can understand where the attackers are going, 128 00:07:51.050 --> 00:07:54.170 who are the players, whether it's nation state versus 129 00:07:54.200 --> 00:07:58.130 individual groups. There is a lot to be done. And we have 130 00:07:58.130 --> 00:08:02.300 found a great leader to head this effort. We hired Steve 131 00:08:02.300 --> 00:08:07.220 Stone out of Mandiant, where he actually was the VP and leader 132 00:08:07.250 --> 00:08:10.220 of the adversary threat research with like hundreds of 133 00:08:10.220 --> 00:08:14.990 researchers under him. And prior to that, he had 15-20 years of 134 00:08:14.990 --> 00:08:19.160 experience working in the U.S. government, as well as private 135 00:08:19.160 --> 00:08:23.420 companies around cyber and cyberthreat-related issues. 136 00:08:25.610 --> 00:08:28.010 Michael Novinson: Very interesting. So what are you 137 00:08:28.010 --> 00:08:31.550 hoping to see this unit do out of the gate? What are some of 138 00:08:31.550 --> 00:08:34.310 the things you're hoping to get involved with here in the coming 139 00:08:34.000 --> 00:08:38.200 Bipul Sinha: It is like a multi-faceted approach. It's 140 00:08:34.310 --> 00:08:34.820 months? 141 00:08:38.200 --> 00:08:41.530 both internal and external approach or internally doing 142 00:08:41.530 --> 00:08:44.620 threat research, helping with our product and providing 143 00:08:44.620 --> 00:08:48.040 product input to our internal team. Externally, we want to 144 00:08:48.040 --> 00:08:51.340 publish our point of view, what we are seeing in the 145 00:08:51.340 --> 00:08:55.090 marketplace, what is really happening, what does the threat 146 00:08:55.090 --> 00:09:00.100 landscape look like? I mean, again, we are driving this new 147 00:09:00.100 --> 00:09:04.030 vision on data security, which we believe would be a very 148 00:09:04.030 --> 00:09:08.650 important, large cybersecurity segment. And we want to create 149 00:09:08.680 --> 00:09:12.100 this partnership with ecosystem partners as well as our 150 00:09:12.100 --> 00:09:16.510 customers and broader ecosystem to really drive data security 151 00:09:16.510 --> 00:09:19.060 intelligence and awareness so that folks can protect 152 00:09:19.000 --> 00:09:23.500 Michael Novinson: I want to talk to you a little bit about how 153 00:09:19.060 --> 00:09:19.600 themselves. 154 00:09:23.530 --> 00:09:27.310 you're using machine learning in the world of data security. What 155 00:09:27.310 --> 00:09:30.040 are you finding to be some of the applications of ML, and 156 00:09:30.040 --> 00:09:32.890 how's it different than folks who have used it in the industry 157 00:09:32.890 --> 00:09:33.790 up until today? 158 00:09:34.830 --> 00:09:37.050 Bipul Sinha: It's a very, very interesting question. If you 159 00:09:37.050 --> 00:09:40.890 look at the cybersecurity industry, most of the data that 160 00:09:40.890 --> 00:09:44.280 folks talk about or machine learning/artificial intelligence 161 00:09:44.280 --> 00:09:48.750 they talked about is mostly around applying artificial 162 00:09:48.750 --> 00:09:52.410 intelligence/machine learning into Syslog or into machine log 163 00:09:52.410 --> 00:09:56.430 or access log to make inferences on what is happening to the 164 00:09:56.430 --> 00:10:00.060 data. But ultimately, everybody's goal is to protect 165 00:10:00.060 --> 00:10:04.830 the data. Rubrik has a unique opportunity and unique position 166 00:10:04.830 --> 00:10:08.490 where we have access to the customer data. And we are 167 00:10:08.490 --> 00:10:11.580 protecting that data. So what we are doing is we are applying 168 00:10:11.580 --> 00:10:14.610 machine learning/artificial intelligence directly on to the 169 00:10:14.610 --> 00:10:19.740 customer data to understand the security threat happening to the 170 00:10:19.740 --> 00:10:24.660 data from data out. And that is the source of truth. And that's 171 00:10:24.660 --> 00:10:27.780 why where we believe that we sit at the intersection of the two 172 00:10:27.780 --> 00:10:33.780 of the most important trends of today and next 10-15 years is 173 00:10:33.780 --> 00:10:36.960 around data and security. And applying machine learning, 174 00:10:36.960 --> 00:10:41.370 applying artificial intelligence to actual data that you are 175 00:10:41.370 --> 00:10:44.610 protecting, will actually drive this industry in a whole new 176 00:10:44.610 --> 00:10:47.340 direction. And we are taking the lead, and we are defining this 177 00:10:47.340 --> 00:10:47.940 market. 178 00:10:49.530 --> 00:10:52.080 Michael Novinson: Interesting. Why don't you talk a little bit 179 00:10:52.080 --> 00:10:56.100 about public-private sector collaboration. I was wondering - 180 00:10:56.130 --> 00:10:58.770 a two parter for you - first, what do you see as the biggest 181 00:10:58.770 --> 00:11:01.680 challenges or obstacles in getting the government and 182 00:11:01.680 --> 00:11:04.470 industry to work together? And what are some of the things 183 00:11:04.470 --> 00:11:07.290 you're looking at Rubrik to try to help bridge that divide? 184 00:11:08.530 --> 00:11:11.890 Bipul Sinha: So if you look at cybersecurity landscape, it's 185 00:11:11.890 --> 00:11:16.480 not the old world where some bored teenager is sitting in the 186 00:11:16.480 --> 00:11:19.810 basement and trying to show middle finger to big company 187 00:11:19.810 --> 00:11:23.350 saying, "Look, I can get in and show you how I can backtrack 188 00:11:23.350 --> 00:11:26.080 your defenses." Today's cybersecurity is about 189 00:11:26.080 --> 00:11:29.830 cybercrime, it's about financial crime. Today's cyber is about 190 00:11:30.130 --> 00:11:34.780 nation-state cyber warfare, industrial espionage, IP issues. 191 00:11:34.990 --> 00:11:41.710 So government is playing and has to play a bigger role in today's 192 00:11:41.710 --> 00:11:45.550 cyber. And if you look at White House, they had directives 193 00:11:45.550 --> 00:11:48.670 around the disclosure of attacks. They had the 194 00:11:48.670 --> 00:11:52.210 cybersecurity summit. Again, they are creating cyber 195 00:11:52.210 --> 00:11:56.380 taskforce. Really the private industry and government have to 196 00:11:56.380 --> 00:12:02.650 come together because this is a national security issue. It is a 197 00:12:02.650 --> 00:12:05.440 national economic security issue. Ransomware, if you just 198 00:12:05.440 --> 00:12:08.740 look at one instance of this, it's a largest threat to our 199 00:12:08.740 --> 00:12:12.610 economy. So what we are doing is we are actually building 200 00:12:12.910 --> 00:12:17.290 expertise in Rubrik to help bridge this private-public. So 201 00:12:17.290 --> 00:12:22.420 we actually got Chris Krebs to set up a CISO Advisory Board to 202 00:12:22.420 --> 00:12:25.720 really think through like what are the data security 203 00:12:25.720 --> 00:12:30.490 challenges? How do we drive what we are learning and contributing 204 00:12:30.490 --> 00:12:33.370 back to the ecosystem, back to the government and other 205 00:12:33.370 --> 00:12:36.580 entities who are interested in learning what's going on. We 206 00:12:36.580 --> 00:12:42.700 also got Mike Mestrovich to join Rubrik as Rubrik CISO. His prior 207 00:12:43.150 --> 00:12:48.250 job was CISO of CIA and he ran a large organization with lots of 208 00:12:48.250 --> 00:12:52.450 adversaries that you can imagine. So we are taking a 209 00:12:52.450 --> 00:12:55.930 broader look at the space. We are taking a look at it not just 210 00:12:55.930 --> 00:13:00.850 from inside out of Rubrik but also outside in and figuring out 211 00:13:00.850 --> 00:13:06.670 how do we create a coalition of willing partners who can really 212 00:13:06.790 --> 00:13:12.460 take on this threat in a broader way, and really help our fellow 213 00:13:12.460 --> 00:13:16.000 companies, businesses as well as government and work together. 214 00:13:16.000 --> 00:13:19.390 Michael Novinson: I want to speak specifically about Chris 215 00:13:19.390 --> 00:13:22.420 and Mike, with Chris Krebs joining to chair the CISO 216 00:13:22.420 --> 00:13:26.050 Advisory Board and Mike joining as your chief information 217 00:13:26.050 --> 00:13:29.590 security officer, how will your customer community benefit from 218 00:13:30.730 --> 00:13:33.760 their knowledge and expertise of having them working closely with 219 00:13:33.760 --> 00:13:34.300 Rubrik? 220 00:13:35.110 --> 00:13:37.090 Bipul Sinha: See, the thing is that we are sharing best 221 00:13:37.090 --> 00:13:41.080 practices that we are implementing internally with our 222 00:13:41.080 --> 00:13:44.560 broader ecosystem. And that's one of the things that Mike 223 00:13:44.830 --> 00:13:47.800 would do, where he would actually share his thoughts of 224 00:13:47.830 --> 00:13:50.860 running large organization, organization that is always 225 00:13:50.860 --> 00:13:55.000 under threat. How he did it? What are the best practices? How 226 00:13:55.000 --> 00:13:57.790 Rubrik thinks about data security? Because we are giving 227 00:13:57.790 --> 00:14:01.480 a new vision to this market. Our vision is company has to think 228 00:14:01.480 --> 00:14:04.240 about everything else is compromised, and how do you 229 00:14:04.240 --> 00:14:07.630 protect your data? And how do you think inside out security. 230 00:14:08.200 --> 00:14:13.360 And so that's where Mike is focused on. In terms of Krebs, 231 00:14:13.540 --> 00:14:16.870 we are again thinking about this newest phase that is going to 232 00:14:16.870 --> 00:14:21.670 emerge, which is data security. And we don't have this bravado 233 00:14:21.670 --> 00:14:24.670 that we know it all. We need to learn from experts, we have to 234 00:14:24.670 --> 00:14:29.080 learn from broader industry. So having the CISO Advisory Board 235 00:14:29.080 --> 00:14:33.220 would help us bring experts to give us perspective from outside 236 00:14:33.220 --> 00:14:36.460 in as we are thinking about product vision and ideas from 237 00:14:36.460 --> 00:14:40.510 inside out. And with the two coming together will be really 238 00:14:40.510 --> 00:14:43.390 the new vision that we're going to drive in this marketplace. 239 00:14:44.590 --> 00:14:46.510 Michael Novinson: Very interesting. Let me ask you here 240 00:14:46.510 --> 00:14:50.050 finally, I want to talk a little bit about the roadmap at Rubrik. 241 00:14:50.050 --> 00:14:54.160 So what are some of the key milestones, some of the key 242 00:14:54.160 --> 00:14:57.700 landmarks that customers should be watching for as we head into 243 00:14:57.700 --> 00:14:59.380 late 2022 and early 2023? 244 00:15:00.260 --> 00:15:03.530 Bipul Sinha: Look, I mean, I'm not discussing actual roadmaps 245 00:15:03.530 --> 00:15:08.060 on this call. But overall, if you can imagine we sit at the 246 00:15:08.060 --> 00:15:11.090 intersection of two of the most important trends of today and 247 00:15:11.090 --> 00:15:15.710 going to be the next decade, and data and security. And if you 248 00:15:15.710 --> 00:15:18.200 think about application of machine learning/artificial 249 00:15:18.200 --> 00:15:22.130 intelligence to drive data security, it's going to be a key 250 00:15:22.130 --> 00:15:26.720 question that our customers or partners will be asking. And my 251 00:15:26.720 --> 00:15:29.930 own perspective is that the cybersecurity today - the 252 00:15:29.930 --> 00:15:34.040 volume, variety and velocity of attack has gone beyond human 253 00:15:34.040 --> 00:15:37.670 comprehension. So we have to aid human comprehension with machine 254 00:15:37.670 --> 00:15:40.580 learning and artificial intelligence, to be smart about 255 00:15:41.240 --> 00:15:45.410 these attacks, to understand the adversary, to understand how do 256 00:15:45.410 --> 00:15:48.860 we protect ourselves and recover from it and continue to operate 257 00:15:48.860 --> 00:15:54.410 the business in spite of attack scenarios that are happening all 258 00:15:55.070 --> 00:15:59.600 over us. And also, we have to realize that every organization 259 00:15:59.600 --> 00:16:04.100 has a toehold of bad guys. It's just a matter of time and attack 260 00:16:04.100 --> 00:16:07.970 happens. So if the folks are prepared to continue to operate 261 00:16:07.970 --> 00:16:10.280 in spite of an attack, that's the need of today. 262 00:16:12.210 --> 00:16:14.610 Michael Novinson: Good talk, Bipul. Thank you so much for the 263 00:16:14.610 --> 00:16:15.000 time. 264 00:16:15.630 --> 00:16:17.520 Bipul Sinha: Thank you so much for this opportunity, Michael. 265 00:16:17.550 --> 00:16:18.540 Really appreciate it. 266 00:16:19.050 --> 00:16:20.610 Michael Novinson: You're very welcome. We've been speaking 267 00:16:20.610 --> 00:16:24.300 with Bipul Sinha. He is the co-founder and CEO at Rubrik. 268 00:16:24.630 --> 00:16:27.810 For Information Security Media Group, this is Michael Novinson. 269 00:16:28.020 --> 00:16:28.920 Have a nice day.