Tech Field Day Coverage
Our delegate panel includes independent writers and thought leaders, and we collect their coverage of the event, Tech Field Day presentations, and sponsoring companies here.
Ways to Amplify Unvalued Security Teams in Organizations
The security staff is often the most unappreciated members of a workforce. It is a problem that seems to be at the root of its failings. With the exponential growth of networks and the increasing number of breaches, it is clear that security is a pressing issue. However, there is a lack of awareness and understanding surrounding the imperfections and limitations of security measures. It is essential for organizations to elevate awareness, forge a cohesive internal culture, and invest in the right tools and training to support their security teams. Additionally, responsible packaging and marketing from vendors can help buyers make informed decisions. Ultimately, removing obstacles and valuing security specialists is essential for ensuring cyber resilience. Watch the delegates from the recent Security Field Day event explore this at a roundtable discussion.
Read More:
Ways to Amplify Unvalued Security Teams in Organizations
Meet Field Day Delegate – Roy Chua, Founder and Principal at AvidThink
Tom Hollingsworth interviews Roy Chua, Founder and Principal at AvidThink, in this Tech Field Day delegate spotlight. Roy shares his journey from network software engineer to product management and eventually transitioning into the analyst space with his research and analysis service, AvidThink. He discusses the challenges of staying up-to-date in the rapidly evolving technology landscape and highlights the value of focusing on targeted and cutting-edge areas. Welcome to the Tech Field Day community, Roy!
Read More:
Meet Field Day Delegate - Roy Chua, Founder and Principal at AvidThink
Is Your Network Failing or Your Application Failing? A Perspective About Kentik!
In this blog post about Kentik’s presentation at Networking Field Day, Faisal Khan discusses the concept of network observability and how Kentik’s platform tackles the challenges of network troubleshooting and visibility. With the increasing complexity of networks and the cloudification of applications, enterprises need comprehensive visibility across diverse sources. Kentik’s approach involves collecting and analyzing data from various network and application sources to provide meaningful insights and pinpoint issues quickly, ensuring reliable networks and a great digital experience.
Read More:
Is Your Network Failing or Your Application Failing? A Perspective About Kentik!
Performing On-Site Security Sweeps With NetAlly CyberScope
Site surveys are a great way to detect anomalies and track down vulnerabilities in a site network. But without a proper tool, it is a fool’s errand. NetAlly’s CyberScope, the world’s first handheld cybersecurity tool, helps mitigate risks by actively probing and scanning networks, categorizing devices, and providing real-time analytics and reports to enable effective security management. Read the review at Gestalt IT or watch the solution demo on the website.
Read More:
Performing On-Site Security Sweeps With NetAlly CyberScope
Summer Field Day Fun at Networking Field Day 32
The summer edition of Networking Field Day is set to be an exciting event with presentations from top companies to an excellent panel of delegates. Join us on Wednesday, July 26th to hear from Broadcom about their latest advancements in Ethernet for AI and ML networking. We’ll also have a delegate roundtable discussion on pressing networking issues and the opportunity for you to add your voice to the conversation. Then we’ve got Nile talking network as a service. Thursday morning has Anuta presenting their flagship ATOM platform. Don’t miss out on the live streaming and be sure to follow us on LinkedIn for updates!
Read More:
Summer Field Day Fun at Networking Field Day 32
Ramping Up Multicloud Visibility With Cisco Multicloud Defense
Enterprises’ journey to multi-cloud is often fraught with security concerns and deadlocks. As enterprises adopt multi-cloud strategies, the distribution of data and assets across various cloud providers can lead to reduced visibility, hindering security and impeding business resilience. Cisco Multicloud Defense addresses this challenge by providing unobstructed visibility and unified security across platforms, enabling consistent protection against threats and data exfiltration. Read about it at Gestalt IT or watch the demo live on the website.
Read More:
Ramping Up Multicloud Visibility With Cisco Multicloud Defense
Noname Security at Security Field Day 9 Wrap-Up
Noname Security had the opportunity to present at Security Field Day 9, and this company blog post reports the highlights. The company delivered three informative sessions discussing the problem of API security and showcasing their comprehensive suite of solutions. The presentations were well-received by the delegates, and we’re thrilled to hear that Noname Security appreciated the engaging discussions and positive feedback received. We hope to see them back at Field Day again soon!
Read More:
Noname Security at Security Field Day 9 Wrap-Up
RackN Brings Bare Metal Into the Cloud Age
Adam Fisher, in this Day Tech Note presented by RackN, discusses how RackN’s Digital Rebar has changed the infrastructure mindset by bringing modern cloud automation to traditional infrastructure. As cloud adoption increases, IT practitioners need to adapt their skillsets beyond traditional silos and embrace the agility and scalability of the public cloud in enterprise infrastructure. Digital Rebar enables centralized, end-to-end infrastructure-as-code workflows for bare metal provisioning, allowing infrastructure teams to manage, update, and scale bare metal systems with ease. Read more at Gestalt IT!
Read More:
RackN Brings Bare Metal Into the Cloud Age
Networking Field Day 32 Event Preview
Girard Kavelines is excited to return for Networking Field Day next week. The event will feature presentations from industry leaders like Broadcom, Nile, and Anuta Networks, offering insights into networking innovations and solutions. Girard looks forward to learning more about the latest developments in network-as-a-service, automation, and monitoring. See you at Networking Field Day next week!
Read More:
Networking Field Day 32 Event Preview
Commvault Metallic ThreatWise – Discerning the First Signs to Quell an Attack Early
Early warning signs of a cyberattack exist only to the most discerning eye. Unlike traditional monitoring tools, Commvault Metallic ThreatWise utilizes a defense by deception strategy, deploying decoy assets in the environment to divert attackers and buy time for defenders to take action. With its lightweight and cost-efficient architecture, ThreatWise provides real-time insights on active and hidden threats, allowing organizations to detect and mitigate attacks at the earliest stages. Read about it at Gestalt IT or watch the demo here on the website.
Read More:
Commvault Metallic ThreatWise - Discerning the First Signs to Quell an Attack Early
Executing Zero-Trust Security and Building a Protective Perimeter With HashiCorp Boundary Enterprise
Identity-driven security is critical to countering attempts of credential harvesting. HashiCorp Boundary Enterprise brings the capability to secure on-demand access with granular identity controls to organizations in regulated industries. As organizations transition to cloud-based infrastructures, traditional network perimeters become less relevant, and identity becomes the primary focus of security. By standardizing remote user access and utilizing the principle of least privilege, HashiCorp Boundary enables organizations to secure their infrastructure while granting granular authorizations and creating a centralized access workflow. Read about it at Gestalt IT or watch the demo here on the website.
Read More:
Executing Zero-Trust Security and Building a Protective Perimeter With HashiCorp Boundary Enterprise
Out-Of-Band Management – Useful Beyond Catastrophe
Aaron Conaway reflects on his participation in Tech Field Day Extra at Cisco Live, where he learned about Opengear’s out-of-band (OOB) management solutions. While traditionally used for catastrophic events, Opengear discussed how OOB gear can also be utilized for provisioning, device configuration, and monitoring purposes. This expanded functionality enhances day-to-day operations and remote troubleshooting capabilities, making an investment in OOB networks worth considering. Read more at Aaron’s blog!
Read More:
Out-Of-Band Management – Useful Beyond Catastrophe
Safety in the API Jungle
Bruno Wollmann discusses the increasing security vulnerabilities and attack vectors exposed by APIs in today’s digital landscape. Noname Security presented at Security Field Day 9 and provides a comprehensive solution to address this issue. Their platform encompasses four key pillars: discovery, posture, runtime, and testing, allowing organizations to gain visibility, detect vulnerabilities, monitor traffic, and implement dynamic application security testing (DAST) for a proactive approach to API security. Read more of Bruno’s thoughts on his blog!
Read More:
Querying Data at Source With Cribl Search
At the recent Security Field Day event, Cribl presented Cribl Search, a service included in Cribl Suite. Cribl Search allows users to query data in scattered addresses without having to move them. No matter where the data resides, Cribl Search lets users explore and investigate datasets in real time. Read about Cribl Search at Gestalt IT or watch the demo live on the website.
Read More:
Querying Data at Source With Cribl Search
Overlay Management
Aaron Conaway highlights his participation in Tech Field Day 27, specifically focusing on Men & Mice, a company that presented Micetro, their overlay management product for DHCP, DNS, and IPAM. He explains the benefits of using an overlay management system like Micetro, such as centralized changes, deferred service expertise, and scalability.
Read More:
Embedding Security in the Code With Noname Security’s Active Testing V2
API security is front and center in cybersecurity, and integral to the future of APIs. Noname Security’s Active Testing v2 offers dynamic testing of APIs in shift left security, enabling organizations to infuse security deep within the code. By integrating security into the CI/CD processes, Active Testing v2 enables teams to proactively detect vulnerabilities and minimize the chances of API exploits. With its user-friendly interface and comprehensive testing capabilities, the solution empowers developers to embrace shift left security and ensure the early detection and mitigation of potential issues. Read about it at Gestalt IT or watch the demo live on the website.
Read More:
Embedding Security in the Code With Noname Security’s Active Testing V2
RackN Bridges the Gap Between People and Platforms
Adam Fisher discusses the power of Digital Rebar from RackN in this Tech Note, the first of a series sponsored by RackN. With technology evolving rapidly, the need for automation in deploying applications at scale has become crucial. RackN’s Digital Rebar serves as a reliable automation platform that empowers IT Ops to effectively manage infrastructure in the modern era, bridging the gap between people and platforms.
Read More:
RackN Bridges the Gap Between People and Platforms
Fast-Tracking Decision Making and Incident Response With Cisco’s Secure Network Analytics and XDR
The relentless onslaught of cyberattacks has made it amply clear that the appropriate countermeasure is a stringent routine of intelligently devised and religiously enforced practices. Cisco makes the path from observation to action short and speedy with Cisco Secure Network Analytics and the new Cisco XDR. Secure Network Analytics (SNA) serves as a collector and aggregator of network telemetry, providing broad security analytics, while XDR collects telemetry from various sources and analyzes it to identify threats and incidents. Together, these solutions streamline data processing, enhance threat detection, and enable prompt response, making high-security standards a priority. Read the review at Gestalt IT or watch the demo here at the website.
Read More:
Fast-Tracking Decision Making and Incident Response With Cisco's Secure Network Analytics and XDR
Cross Training for Career Completeness
The importance of cross-training with different technology disciplines is emphasized in a thought-provoking blog post by Tom Hollingsworth. Drawing inspiration from martial artist Bruce Lee, the author highlights the value of incorporating new skills and knowledge into one’s expertise to stay relevant in the ever-evolving tech industry. Using the example of wireless engineers understanding the bigger security picture, the article encourages professionals to embrace cross-training and see the bigger picture to have a successful and prolonged career.
Read More:
Cross Training for Career Completeness
Designing a Lossless AI/ML Network With Cisco Data Center Networking Blueprint
Cisco presented the Cisco Data Center Networking Blueprint for AI/ML Applications, a detailed and instructive handbook on AI/ML network, at the recent Tech Field Day event. The document decodes the strict requirements of modern AI/ML workloads, and provides a blueprint for building a high-performing AI/ML network. Cisco’s Nexus 9000 Series switches offer high throughput, low latency, and congestion management features necessary for AI/ML applications, including RDMA over Converged Ethernet (RoCE) in network transport. Read about it at Gestalt IT or watch the presentation here at Tech Field Day.
Read More:
Designing a Lossless AI/ML Network With Cisco Data Center Networking Blueprint







