What Comes After Data-to-Everything?

Product Apr 06, 2020

A good hockey player skates to where the puck is. A great hockey player skates to where the puck is going to be. - Wayne Gretzky

It might be cliche, but I’m an avid hockey player and coach.  I’ve got as much of a right as anyone to quote the great one.

I’ve spent the last few years of my career at Splunk helping to integrate a company called Phantom. I joined Phantom early in its life; before the product was finished.  We didn’t have a pricing model or even customers.  I led field engineering at Phantom and worked with the rest of the executive team to build the company into the leader in Security Orchestration Automation and Response (SOAR) before we were acquired by Splunk in 2018.  

(Also joining me on the path from Phantom to Splunk, and now to Polarity, are my colleagues CP Morey and Rick Rutledge.)

Our business flourished at Splunk as the entire company continually exceeded expectations and evolved into the Data-to-Everything Platform.

Splunk’s view on the opportunity is clear.  Data can change the world, but only if you do something with it.  Splunk’s Data-to-Everything Platform “aims to help customers turn real-time data into doing.” In other words, make sense of volumes of structured and unstructured data so that knowledge workers can operationalize their decisions into business outcomes.  It’s an impressive strategy, but what about Gretzky?

Well, once you have Data-to-Everything, then what?  I’m looking to where the puck is going to be, and that’s where Polarity comes into focus.

Polarity does two things: it allows you to see the data even clearer by providing contextual information on the fly, but it also allows you to take those insights into every other platform or tool you use.  It does this with augmented reality, but in software, on your desktop.  It uses computer vision to recognize what is on an analyst’s screen and then overlays relevant contextual information in real-time.  Splunk is right, data can change the world.  Although if you want to act on it, then you need context to understand why and what action to take.  

Inevitably the data gives you insights and Polarity allows you to annotate any string with information worth sharing or remembering.  This could be notes on a contact, evidence from an investigation, or intelligence on a threat.  By instantly recognizing everything you or your teammates have annotated, Polarity enables collaboration across any workflow with superhuman data awareness and recall, sharing this context on screen in a heads-up display.

With more than 100 integrations, Polarity also works well with the tools you already have in place. Here are few simple examples of how Polarity works with Splunk, Flashpoint, and GoogleTranslate, just to name a few.

Don’t take my word for it. See for yourself with a demo or trial. Tune into our next Community Tech Tuesday to learn more.

-Swami

Dan Ramaswami is SVP, Field Engineering at Polarity.  Prior to joining Polarity, Dan spent 2 years at Splunk helping to integrate Phantom into Splunk’s Security Market Group and driving the business to grow in excess of 400%.  At Phantom, Dan was VP of Security Engineering, where he collaborated with customers as the key technical advisor and product advocate.  Prior to Phantom, Dan led the US Commercial Security Engineering team at Cisco and drove revenue growth of more than 20% per year.  Before Cisco, Dan led the South & East Security Engineering teams at Sourcefire during a period when the company quintupled revenue.  Dan’s resume also includes experience managing the Information Security team at Celera Genomics - the biotech firm that first successfully mapped the human genome.

In addition to leading successful security engineering teams, Dan has consulted with organizations in a wide range of industries including financial, healthcare, retail, education, and entertainment.  He has worked with many of the Fortune 1000 firms as well as top federal, state and local government agencies to design and implement comprehensive network security architectures.