Why now
Why computer software operators in palo alto are moving on AI
Why AI matters at this scale
Tom Gillis, operating under the domain brkt.com, is a large-scale enterprise software company, specifically in the cybersecurity sector, founded in Palo Alto in 2011. With over 10,000 employees, it operates at a scale where manual security processes are untenable. The company likely provides comprehensive security platforms for large organizations, managing vast and complex data flows to protect critical infrastructure. At this size and in this domain, AI is not a luxury but a core operational necessity. The sheer volume of security telemetry, the sophistication of modern cyber threats, and the high cost of breaches demand intelligent automation. For a firm of this magnitude, AI adoption directly translates to enhanced product efficacy, operational efficiency for clients, and a defensible market position against both legacy vendors and agile startups.
Concrete AI Opportunities with ROI Framing
1. Enhanced Threat Detection & Intelligence: By implementing advanced machine learning models on network and endpoint data, the company can move beyond signature-based detection. This reduces false positives and identifies novel, sophisticated attacks (like zero-days or insider threats) much faster. The ROI is clear: for enterprise clients, reducing the Mean Time to Detect (MTTD) a breach by even minutes can prevent millions in damages, directly strengthening the platform's value proposition and reducing customer churn.
2. Automated Incident Response Orchestration: AI can be used to triage alerts, correlate events from disparate sources, and execute complex, multi-step remediation playbooks automatically. This addresses the critical industry shortage of skilled security analysts. The ROI manifests in dramatically reduced Mean Time to Respond (MTTR), lower labor costs for clients, and the ability for a single analyst to manage far more incidents, increasing the efficiency of security operations centers (SOCs).
3. Intelligent Security Policy Management: Natural Language Processing (NLP) can allow security administrators to define policies in plain English, which AI translates into technical enforcement rules across cloud and on-premise environments. This reduces configuration errors—a major source of vulnerabilities—and accelerates deployment. The ROI includes reduced risk exposure from misconfigurations, lower training overhead for new staff, and faster policy adaptation to new threats.
Deployment Risks Specific to This Size Band
Deploying AI at this enterprise scale introduces unique challenges. Integration Complexity: The company likely has a sprawling, legacy-inclusive tech stack. Integrating new AI capabilities without disrupting existing services for a global client base is a massive undertaking requiring careful phased rollouts and robust APIs. Data Governance & Quality: Effective AI requires clean, unified, and representative data. At this scale, data is often siloed across product lines and regions, necessitating significant investment in data engineering and governance before models can be reliably trained. Organizational Change Management: Rolling out AI-driven workflows impacts thousands of employees, from engineers to sales teams. Resistance to change, skill gaps, and the need to redefine roles can stall adoption if not managed with comprehensive training and clear communication of benefits. Finally, Ethical & Compliance Risks: In cybersecurity, AI-driven decisions (like blocking traffic or isolating systems) carry high stakes. Ensuring models are explainable, free from bias that could unfairly target certain network behaviors, and compliant with global regulations (like GDPR) is critical to maintain trust and avoid liability.
tom gillis at a glance
What we know about tom gillis
AI opportunities
4 agent deployments worth exploring for tom gillis
AI-Powered Threat Hunting
Automated Incident Response
Predictive Vulnerability Management
Natural Language Policy Configuration
Frequently asked
Common questions about AI for computer software
Industry peers
Other computer software companies exploring AI
People also viewed
Other companies readers of tom gillis explored
See these numbers with tom gillis's actual operating data.
Get a private analysis with quantified savings ranges, deployment timeline, and use-case prioritization specific to tom gillis.