Tech Field Day

The Independent IT Influencer Event

  • Home
    • The Futurum Group
    • FAQ
    • Staff
  • Sponsors
    • Sponsor List
      • 2025 Sponsors
      • 2024 Sponsors
      • 2023 Sponsors
      • 2022 Sponsors
    • Sponsor Tech Field Day
    • Best of Tech Field Day
    • Results and Metrics
    • Preparing Your Presentation
      • Complete Presentation Guide
      • A Classic Tech Field Day Agenda
      • Field Day Room Setup
      • Presenting to Engineers
  • Delegates
    • Delegate List
      • 2025 Delegates
      • 2024 Delegates
      • 2023 Delegates
      • 2022 Delegates
      • 2021 Delegates
      • 2020 Delegates
      • 2019 Delegates
      • 2018 Delegates
    • Become a Field Day Delegate
    • What Delegates Should Know
  • Events
    • All Events
      • Upcoming
      • Past
    • Field Day
    • Field Day Extra
    • Field Day Exclusive
    • Field Day Experience
    • Field Day Live
    • Field Day Showcase
  • Topics
    • Tech Field Day
    • Cloud Field Day
    • Mobility Field Day
    • Networking Field Day
    • Security Field Day
    • Storage Field Day
  • News
    • Coverage
    • Event News
    • Podcast
  • When autocomplete results are available use up and down arrows to review and enter to go to the desired page. Touch device users, explore by touch or with swipe gestures.

NetApp Overview of Cloud Insights

The why, what’s and how’s of Cloud Insights, monitoring the Cloud and on-premises environments. Troubleshooting end to end of resources and optimize infrastructure with right sizing and reclamation of waste.


Ixia Public, Private, and Hybrid Cloud Visibility

Businesses typically use 2-3 public cloud providers for compute, application and services. Add to this the complexities of container based applications, it is easy to feel overwhelmed when trying to optimize and secure these hybrid networks. But visibility is the cloud, be it on-premise or in the cloud need not be elusive. Sr Product Manager […]


Ixia Visibility and Performance Monitoring with the Vision Edge 1S

A lot of network, application and user data is generated at the edge of the network, a factory floors, hundreds of branch offices, and everything in between. A lot of this data never makes it to the central/regional data centers that have network and security teams operating tools to ensure their networks are safe and […]


Ixia Introducing the Vision X Network Packet Broker

We don’t see it around us but edge applications that make use of data across vast networks and across data centers is driving tremendous growth of data in hybrid data centers. Network upgrades from 10Gbps to 40Gbps to 100Gbps is happening ever so rapidly. Sr Director Taran Singh talks about the latest release of its […]


Ixia Network Visibility Fundamentals

Recep Ozdag, VP of Network Visibility Business at Ixia (A Keysight Business) talks about Keysight Technologies and the business of providing network visibility solutions to Fortune 1000 businesses and Tier-1 and 2 service providers worldwide. Ixia provides foremost solutions for data access across on-premise and hybrid cloud environments for optimizing network operations and providing real-time […]


Ixia Company Introduction

An introduction to Ixia, a Keysight Business. The acquisition of Ixia by Keysight Technologies pairs two strong, complementary innovation companies. Ixia brings deep expertise in IP network assessment and a software-centric business team. The result is a set of leading-edge test and visibility solutions that address the fastest-growing communications and networking trends including 5G, IoT, […]


Illumio Segmentation Has Nothing To Do With Vulnerability Management

Myth III: Segmentation has nothing to do with vulnerability management. Vulnerabilities are inevitable and they must be patched. BUSTED: See how overlaying vulnerability information on a real-time application dependency map helps visualize and quantify risk and prioritize patching decisions. When patching isn’t an option, use segmentation as a compensating control to minimize risk.


Illumio Host-based Solutions Cannot Do Security Segmentation

Myth II: Host-based solutions cannot do security segmentation. Host-based security segmentation is challenging to operationalize and inherently insecure. BUSTED: See how Illumio’s architecture makes it easy and seamless to deploy agents at scale backed by robust tamper prevention mechanisms.


Illumio Security Segmentation Can Be Easily Done Using My Network Devices

Myth I: Security segmentation can be easily done using my network devices. Security segmentation can be sufficiently and easily achieved using traditional networking mechanisms and constructs. BUSTED: See how decoupling security segmentation from the underlying network architecture simplifies segmentation by an order of magnitude.


Illumio Technology Overview

Founding insights and a look at Illumio’s unique approach to securing applications in the data center and cloud through security segmentation. Enterprises such as Morgan Stanley, BNP Paribas, Salesforce, and Oracle NetSuite use Illumio’s Adaptive Security Platform (ASP) to reduce cyber risk and achieve regulatory compliance.


Guardicore Simplifying Microsegmentation

This session provides a deep dive and demonstration of the Guardicore Centra Security Platform and how it simplifies practical segmentation use cases. Use cases to covered include: – Visualization and microsegmentation of a critical application – Global policy creation for unsecure protocols – User identity-based policies – Fully qualified domain name policies – Breach detection […]


Guardicore Solution and Technical Overview

This session will cover fundamental approaches in the design of the Centra Security Platform and technical details of critical capabilities to address segmentation issues in the hybrid data center.


Guardicore Company Overview

Guardicore was founded in Tel Aviv, Israel in 2013 to focus on gaps in the security posture of modern data centers and clouds. Guardicore protects critical assets using flexible, quickly deployed, and east-to-understand microsegmentation controls.


ExtraHop Product Demo: Live Attack Scenario

In this session, Jeff will simulate a Red vs Blue exercise using Reveal(x) from ExtraHop to hunt a threat actor through the attack lifecycle. Based on over 20 years of experience as a coder, architect, and leader of multiple security domain teams, Jeff will showcase the Reveal(x) product by playing through a threat detection scenario […]


Chalk Talk: The ExtraHop Architecture

The ExtraHop platform was built to deliver visibility, detection, and investigation at massive scale. We consume a copy of unstructured network traffic from across your entire environment – from the data center to the cloud to the remote site – using a tap or port mirror. The ExtraHop stream processor performs line-rate decryption, decoding, and […]


ExtraHop Company Introduction and Customer Use Cases

This session starts with a brief overview of ExtraHop. Then, they’ll dive into real-world customer deployments, including Lawrence Livermore National Labs, Wood County Hospital, and more. They’ll cover a range of use cases, from pure cybersecurity to remote site visibility. ExtraHop began as an application and network analytics company focused principally on performance monitoring, but […]


VMware Workspace ONE Intelligence: Insights and Automation for the Modern Digital Workspace

Overview of Workspace ONE Intelligence, an add-on Workspace ONE service that provides insights into app deployments, app engagement and user experience to help IT admins quickly resolve issues, reduce escalations and increase employee productivity.


VMware Workspace ONE: Intelligently Secure the Digital Workspace

Overview of VMware Workspace ONE, a digital workspace platform that combines intrinsic, zero trust security with industry-leading modern management to help IT proactively secure apps and endpoints.


VMware AppDefense Demonstration

Walkthrough of integration and features discussed during presentation of vSphere Platinum with Integrated AppDefense (Overview of how AppDefense brings application visibility and intrinsic security to vSphere. Focus on integration into vSphere Platinum and technical discussion of features within Application Verification Cloud.)


VMware vSphere Platinum with Integrated AppDefense

Overview of how AppDefense brings application visibility and intrinsic security to vSphere. Focus on integration into vSphere Platinum and technical discussion of features within Application Verification Cloud.


« Previous Page
Next Page »
  • Bluesky
  • LinkedIn
  • Mastodon
  • RSS
  • Twitter
  • YouTube

Event Calendar

  • Aug 19-Aug 19 — Tech Field Day Extra at SHARE Cleveland 2025
  • Sep 10-Sep 11 — AI Infrastructure Field Day 3
  • Sep 24-Sep 25 — Security Field Day 14
  • Oct 9-Oct 9 — Tech Field Day Exclusive with Microsoft Security
  • Oct 22-Oct 23 — Cloud Field Day 24
  • Oct 29-Oct 30 — AI Field Day 7
  • Nov 5-Nov 6 — Networking Field Day 39
  • Nov 11-Nov 12 — Tech Field Day at KubeCon North America 2025

Latest Coverage

  • VCF 9.0 Best Practices: The Network View
  • You Can’t Build an AI Strategy Without a Data Strategy
  • Alkira Global Backbone-as-a-Service
  • VMware Cloud Foundation: The Next Gen
  • Cloud Consumption in Your Data Center With VCF 9.0

Tech Field Day News

  • A Look at Mainframe Innovation at Tech Field Day Extra at SHARE Cleveland 25
  • Experience the Energy of Networking Field Day!

Return to top of page

Copyright © 2025 · Genesis Framework · WordPress · Log in