A history of the evolution of data protection, including what each development solved and didn’t solve, leading us to a SaaS-only approach.
Druva Company Update
Jaspreet gives a company update for Druva and how they are focusing on Data protection for the Cloud Era.
Automation Anywhere Bot Marketplace and Monetization
Brendan Foley will showcase the opportunity and resources for developers that Automation Anywhere provides, covering Community Edition, Developer Documentation and Bot Games, Developer Community (APeople), Automation Anywhere University, and Bot Store Monetization. Brendan Foley, who manages product for the Bot Store and oversees developer evangelism, explains Automation Anywhere’s strategy to engage a wide range of […]
Automation Anywhere The New AI Augmented RPA
Steve Van Lare, Head of Cognitive Solutions at Automation Anywhere, introduces the concept of AI-augmented Robotic Process Automation (RPA) in a presentation at Tech Field Day 19. Van Lare underscores that RPA is the top delivery vehicle for AI, particularly when incorporating cognitive aspects that allow software to learn and improve over time. He highlights […]
Automation Anywhere Product Deep Dive
Steve Shah covers the technical aspects for using RPA in combination with AI to reengineer the future with the industry’s most sophisticated architecture and secure RPA platform. Steve Shah, head of the RPA product team at Automation Anywhere, gave an in-depth presentation at Tech Field Day 19, emphasizing how RPA can be seamlessly integrated with […]
Automation Anywhere Portfolio and Roadmap
Abhijit Kakhandiki will share the latest advancements in Digital Workers as it pertains to ready-to-deploy digital personas with higher cognitive/analytical abilities than contemporary bots plus how to implement them in the cloud. In the presentation, Abhijit Kakhandiki, who leads products and engineering for Automation Anywhere, outlines the company’s comprehensive product vision which intertwines Robotic Process […]
Automation Anywhere Introduction to RPA
Mihir Shukla welcomes the Tech Field Day audience. He illustrates the business imperative in adopting the RPA platform to building a Digital Workforce. In his presentation at Tech Field Day 19, Mihir Shukla underscores the journey and vision behind Automation Anywhere and its Robotic Process Automation (RPA) platform. He describes his own evolution from a […]
NetApp User Behavior Analytics
How Cloud Insights upcoming feature will be able to detect insider threats, malware, and other malicious activity on the data and help prevent further damage.
NetApp Cost Optimization in the Cloud
Rapid innovation in the Cloud can lead to out of control costs. This upcoming feature of Cloud Insights provides recommendations tailored to the forecasted behavior with dollar savings based on actual billing data.
NetApp Deeper Dive into Kubernetes Support
New technology, with similar problems found from monitoring a cloud environment, just more complex and requiring data and analytics to help solve.
NetApp Overview of Cloud Insights
The why, what’s and how’s of Cloud Insights, monitoring the Cloud and on-premises environments. Troubleshooting end to end of resources and optimize infrastructure with right sizing and reclamation of waste.
Ixia Public, Private, and Hybrid Cloud Visibility
Businesses typically use 2-3 public cloud providers for compute, application and services. Add to this the complexities of container based applications, it is easy to feel overwhelmed when trying to optimize and secure these hybrid networks. But visibility is the cloud, be it on-premise or in the cloud need not be elusive. Sr Product Manager […]
Ixia Visibility and Performance Monitoring with the Vision Edge 1S
A lot of network, application and user data is generated at the edge of the network, a factory floors, hundreds of branch offices, and everything in between. A lot of this data never makes it to the central/regional data centers that have network and security teams operating tools to ensure their networks are safe and […]
Ixia Introducing the Vision X Network Packet Broker
We don’t see it around us but edge applications that make use of data across vast networks and across data centers is driving tremendous growth of data in hybrid data centers. Network upgrades from 10Gbps to 40Gbps to 100Gbps is happening ever so rapidly. Sr Director Taran Singh talks about the latest release of its […]
Ixia Network Visibility Fundamentals
Recep Ozdag, VP of Network Visibility Business at Ixia (A Keysight Business) talks about Keysight Technologies and the business of providing network visibility solutions to Fortune 1000 businesses and Tier-1 and 2 service providers worldwide. Ixia provides foremost solutions for data access across on-premise and hybrid cloud environments for optimizing network operations and providing real-time […]
Ixia Company Introduction
An introduction to Ixia, a Keysight Business. The acquisition of Ixia by Keysight Technologies pairs two strong, complementary innovation companies. Ixia brings deep expertise in IP network assessment and a software-centric business team. The result is a set of leading-edge test and visibility solutions that address the fastest-growing communications and networking trends including 5G, IoT, […]
Illumio Segmentation Has Nothing To Do With Vulnerability Management
Myth III: Segmentation has nothing to do with vulnerability management. Vulnerabilities are inevitable and they must be patched. BUSTED: See how overlaying vulnerability information on a real-time application dependency map helps visualize and quantify risk and prioritize patching decisions. When patching isn’t an option, use segmentation as a compensating control to minimize risk.
Illumio Host-based Solutions Cannot Do Security Segmentation
Myth II: Host-based solutions cannot do security segmentation. Host-based security segmentation is challenging to operationalize and inherently insecure. BUSTED: See how Illumio’s architecture makes it easy and seamless to deploy agents at scale backed by robust tamper prevention mechanisms.
Illumio Security Segmentation Can Be Easily Done Using My Network Devices
Myth I: Security segmentation can be easily done using my network devices. Security segmentation can be sufficiently and easily achieved using traditional networking mechanisms and constructs. BUSTED: See how decoupling security segmentation from the underlying network architecture simplifies segmentation by an order of magnitude.
Illumio Technology Overview
Founding insights and a look at Illumio’s unique approach to securing applications in the data center and cloud through security segmentation. Enterprises such as Morgan Stanley, BNP Paribas, Salesforce, and Oracle NetSuite use Illumio’s Adaptive Security Platform (ASP) to reduce cyber risk and achieve regulatory compliance.