Tech Field Day

The Independent IT Influencer Event

  • Home
    • The Futurum Group
    • FAQ
    • Staff
  • Sponsors
    • Sponsor List
      • 2025 Sponsors
      • 2024 Sponsors
      • 2023 Sponsors
      • 2022 Sponsors
    • Sponsor Tech Field Day
    • Best of Tech Field Day
    • Results and Metrics
    • Preparing Your Presentation
      • Complete Presentation Guide
      • A Classic Tech Field Day Agenda
      • Field Day Room Setup
      • Presenting to Engineers
  • Delegates
    • Delegate List
      • 2025 Delegates
      • 2024 Delegates
      • 2023 Delegates
      • 2022 Delegates
      • 2021 Delegates
      • 2020 Delegates
      • 2019 Delegates
      • 2018 Delegates
    • Become a Field Day Delegate
    • What Delegates Should Know
  • Events
    • All Events
      • Upcoming
      • Past
    • Field Day
    • Field Day Extra
    • Field Day Exclusive
    • Field Day Experience
    • Field Day Live
    • Field Day Showcase
  • Topics
    • Tech Field Day
    • Cloud Field Day
    • Mobility Field Day
    • Networking Field Day
    • Security Field Day
    • Storage Field Day
  • News
    • Coverage
    • Event News
    • Podcast
  • When autocomplete results are available use up and down arrows to review and enter to go to the desired page. Touch device users, explore by touch or with swipe gestures.

Cisco Intent-Based Networking Presents at Tech Field Day Virtual Cisco Live Experience


Cisco Service Provider Presents at Tech Field Day Virtual Cisco Live Experience


Cisco Security Presents at Tech Field Day Virtual Cisco Live Experience


Cisco IoT Presents at Tech Field Day Virtual Cisco Live Experience


Cisco Meraki Presents at Tech Field Day Virtual Cisco Live Experience


Opengear Presents at Tech Field Day Virtual Cisco Live Experience


Using Aruba AIOps to Redefine IT Outcomes

Aruba AIOps allows network operations teams to react and resolve reported issues quickly, eliminate support tickets by predicting and preempting issues before they impact users or the business and exceed SLAs by continuously implementing optimization recommendations based on learnings from peers.


Breaking Down Network Siloes with an Aruba Unified Infrastructure

Networking teams face insurmountable complexity when supporting remote workforces, onboarding thousands of new IoT devices, and providing secure connectivity to services in the cloud and data center. Compounding this complexity is fragmented management of WAN, wired, and wireless networks, with siloed tools and an operational framework marred by manual processes and insufficient insights for troubleshooting. […]


Juniper Encrypted Traffic Analysis Overview

With encryption on the rise and challenges in decryption for both privacy and technical reasons, this presentation and demonstration show one of Juniper’s most recent product announcements for ETA, or Encrypted Traffic Analysis. Juniper is introducing the ability to detect malicious activity over encrypted traffic without the need for interception and decryption. We will describe […]


Juniper Demo Multicloud Connected Security

SRX-enforced security policies, enabling L4-L7 traffic inspection for known and unknown malware, are deployed across AWS and Azure using a single set of metadata tags to follow instances as they are created. After a threat is detected, effected hosts are automatically isolated from the rest of the network.


Juniper Multicloud Connected Security

Enterprises are increasingly shifting workloads to the cloud to take advantage of dynamic scaling and flexible deployment options. This also introduces new challenges for security administrators, especially when multiple cloud environments need to work together. Learn how we can leverage the metadata features across various cloud environments to describe workloads and extend security policies that […]


Juniper AI for a Threat Aware Network

Enterprises have to strike a delicate balance between business agility and security which can often be seen at odds with one another. By leveraging machine learning data driven improvements can be made by providing more efficient and effective security models. Combining signals from both the network and security infrastructure you already have in place, you […]


Juniper Connected Security Overview

Join Oliver Schuermann as he gives a brief overview of the Juniper Connected Security strategy, which allows customers to take advantage of their Juniper infrastructure, as well as other components to create a Threat Aware Network. Juniper Connected Security is about Safeguarding Users, Applications, and Infrastructure by extending security to all points of connection across […]


Powering the Aruba Zero Trust Network

Zero Trust is a very hot topic and one which has a variety of definitions and interpretations. Regardless of which framework you subscribe to, there are some common elements that any Zero Trust approach must have. It starts with support for user and device visibility and identity-based access control built into the network. This session […]


Tempered Cloud, Virtualization, Containers, and APIs

In this video, Thomas will cover the finer details of virtualization, cloud, containers, and APIs for Tempered. He’s been driving the engagement with cloud applications and marketplaces.


Tempered Host Identity Protocol (HIP): Identities and Trust and Achieving Zero Trust Security

In this video, Ludwin Fuchs, the authority on Host Identity Protocol (HIP) will cover identities, trust, the networking data plane, and intelligent multi-homing


What Is Tempered Airwall?

In this session we will discuss lessons learned in the trenches, what is the Tempered Airwall Solution for Zero Trust Network Access, have an overview of our platform, and short demos.


Who Is Tempered?

Our CEO and founder, Jeff Hussey founded F5 Networks and changed the world. He’s out to do that again. Tempered is his vision of a secure and private connected world. Learn more about it in this video. In this session we will discuss lessons learned in the trenches, what is the Tempered Airwall Solution for […]


VMware Introduction to the VMware NSX Web Application Firewall

VMware’s Intelligent Web Application Firewall solution provides application security and networking teams with an elastic and analytics-driven solution that scales and simplifies policy customization and administration through central management. The WAF solution gives administrators an important point of security enforcement and intelligence, protecting web applications from common vulnerabilities as identified by OWASP, such as SQL […]


VMware NSX Intelligence: Policy Creation & Microsegmentation Made Easy

NSX Intelligence is a distributed analytics engine built natively into NSX-T that provides continuous data center-wide visibility for network and application security teams, helping them deliver a more granular and dynamic security posture, simplify compliance analysis, and streamline security operations. NSX Intelligence provides deep insight at the packet level into virtualized and containerized workloads, allowing […]


« Previous Page
Next Page »
  • Bluesky
  • LinkedIn
  • Mastodon
  • RSS
  • Twitter
  • YouTube

Event Calendar

  • Jul 9-Jul 10 — Networking Field Day 38
  • Aug 19-Aug 20 — Tech Field Day Extra at SHARE Cleveland 2025
  • Sep 10-Sep 11 — AI Infrastructure Field Day 3
  • Sep 24-Sep 25 — Security Field Day 14
  • Oct 22-Oct 23 — Cloud Field Day 24
  • Oct 29-Oct 30 — AI Field Day 7

Latest Coverage

  • Fortinet fully acquired Everest Networks to complete its Wi-Fi offering for large public venues
  • Automating the network design, what does it really mean?
  • Key Takeaways from Security Field Day
  • Ubiquiti’s Growing Presence in the Enterprise Market
  • Backups That Belong in the Cloud—But Not Too Close

Tech Field Day News

  • Experience the Energy of Networking Field Day!
  • Have A Classy Time with Tech Field Day Extra at Cisco Live US 2025

Return to top of page

Copyright © 2025 · Genesis Framework · WordPress · Log in