Tech Field Day

The Independent IT Influencer Event

  • Home
    • The Futurum Group
    • FAQ
    • Staff
  • Sponsors
    • Sponsor List
      • 2025 Sponsors
      • 2024 Sponsors
      • 2023 Sponsors
      • 2022 Sponsors
    • Sponsor Tech Field Day
    • Best of Tech Field Day
    • Results and Metrics
    • Preparing Your Presentation
      • Complete Presentation Guide
      • A Classic Tech Field Day Agenda
      • Field Day Room Setup
      • Presenting to Engineers
  • Delegates
    • Delegate List
      • 2025 Delegates
      • 2024 Delegates
      • 2023 Delegates
      • 2022 Delegates
      • 2021 Delegates
      • 2020 Delegates
      • 2019 Delegates
      • 2018 Delegates
    • Become a Field Day Delegate
    • What Delegates Should Know
  • Events
    • All Events
      • Upcoming
      • Past
    • Field Day
    • Field Day Extra
    • Field Day Exclusive
    • Field Day Experience
    • Field Day Live
    • Field Day Showcase
  • Topics
    • Tech Field Day
    • Cloud Field Day
    • Mobility Field Day
    • Networking Field Day
    • Security Field Day
    • Storage Field Day
  • News
    • Coverage
    • Event News
    • Podcast
  • When autocomplete results are available use up and down arrows to review and enter to go to the desired page. Touch device users, explore by touch or with swipe gestures.

Citrix Secure Private Access End-User Experience Demo

This demo covers how end users use the Citrix Secure Access Agent and Citrix Enterprise Browser to securely access any type of application including on-premises applications in addition to web and SaaS applications. The demo also covers how to enable secure access for different end-user needs on both managed and unmanaged devices using agents or agentless […]


Citrix Secure Private Access Admin Experience Demo

This demo walks through how an IT admin can set up Citrix Secure Private Access and enable zero trust access for end users. It will also cover how to determine which applications end users are currently using, how to configure ZTNA policies, and how to quickly identify problems.


Citrix Secure Private Access

Learn about what is driving customer needs to secure application access and take a deep dive into the Citrix zero trust architecture that can be deployed on-premises or in the cloud. The flexibility to deploy on any infrastructure enables any user on any device to securely access any application.


All About Citrix with Kiran Ghodgaonkar

Get an overview of the Citrix platform, the Citrix approach to zero trust, and the evolution toward a modern, secure application delivery architecture built on zero-trust principles. This session serves as an introduction to the rest of the presentation with key concepts and how Citrix embraces them.


SonicWall SonicPlatform and Managed Security Services

Tarun will introduce SonicPlatform, our integrated management console for service providers and customers. In the demo he’ll show how a unified platform combined with a 24/7 SOC staffed by experts is essential to protect against modern threats.


SonicWall Secure SD-WAN and Firewall

Chirag outlines SonicWall’s network security portfolio with common deployment scenarios, and demos how organizations can secure their sensitive data across branches, HQ, and distributed hybrid workforce.


SonicWall Cloud Secure Edge

Tarun introduces SonicWall’s newest offering – Cloud Secure Edge (CSE), formerly Banyan Security. He demos how to apply a Zero Trust security model to enable your workforce to securely access any resource from any device.


Introducing the New SonicWall Cybersecurity Platform

SonicWall has transformed from a traditional network security vendor to a comprehensive modern cybersecurity platform. Chirag will introduce the new SonicWall platform and detail its adoption by our partners and customers.


Dell’s Cybersecurity Strategy for the Future

In this wrap up, Steve Kenniston discusses how Dell is building a holistic cybersecurity solution for the future that embraces key technology advantages. Included is a discussion of post-quantum cryptography and how Dell will be implementing these new standards.


How Dell Technologies Enables Recovery from a Cyberattack

In this session, Sr. Consultant Brian White will discuss how Dell Technologies helps elevate customers cyber resilience strategy to preserve the confidentiality, integrity, and availability of data to ensure recoverability in the event of a cyberattack.


Detect and Respond to Threats with Dell Technologies

In this session, Adam Miller will discuss Dell Technologies’ strategy to help customers quickly detect and respond to threats across their organization, exploring what we’re hearing from our customers and how solutions from endpoints to managed services can.


Reduce the Attack Surface with Dell Technologies

During this section we will examine ways to minimize cybersecurity vulnerabilities and entry points. We will discuss strategies, best practices, and how Dell products and services help our customers advance these objectives.


Dell Technologies Cybersecurity Overview

In this session we will review Dell’s overall cybersecurity strategy from the ground up starting with our Secure Supply Chain and a review of our key practice areas, Reduce the Attack Surface, Detect and Respond to Cyber Threats and Recover from a Cyberattack to leading with zero trust principles. We will outline how Dell approaches customers […]


DigiCert ONE Demo with Frank Agurto-Machado

In the final portion of the presentation, we provide a demonstration of DigiCert’s Trust Lifecycle Manager product. This demo showcases how the platform streamlines the lifecycle of digital certificates, from issuance to expiration, across a variety of use cases. By illustrating key features like automated workflows, certificate tracking, and centralized management, attendees can see firsthand […]


Establishing & Managing Trust with DigiCert

In this portion of the event, we go over how DigiCert plays a crucial role in establishing and managing digital trust by issuing and overseeing infrastructure that verify identities, encrypt communications, and secure online interactions. We delve deeper into how DigiCert helps mitigate security risks and fosters a trusted, transparent digital environment.


Introduction to DigiCert and Digital Trust

This portion of the presentation provides an overview of who DigiCert is today, highlighting its current role as a global leader digital trust. Here, we explore DigiCert’s evolution, its contributions to digital trust, and its commitment to future-proofing security in an increasingly digital world.


Simplify and Accelerate AI Adoption with Pure Storage Platform – Real-World Insights & Use Cases

In this presentation, Pure Storage outlines its approach to help organizations meet their AI storage needs while accelerating and simplifying adoption of their AI initiatives. With the Pure Storage platform, organizations can maximize performance and efficiency of AI workflows, unify data, simplify data storage management and take advantage of a scalable AI data infrastructure. Scaling […]


Simplify and Accelerate AI Adoption with Pure Storage Platform – FlashBlade Internals

In this presentation, Pure Storage outlines its approach to help organizations meet their AI storage needs while accelerating and simplifying adoption of their AI initiatives. With the Pure Storage platform, organizations can maximize performance and efficiency of AI workflows, unify data, simplify data storage management and take advantage of a scalable AI data infrastructure. An […]


Simplify and Accelerate AI Adoption with Pure Storage Platform – FlashBlade Overview

In this presentation, Pure Storage outlines its approach to help organizations meet their AI storage needs while accelerating and simplifying adoption of their AI initiatives. With the Pure Storage platform, organizations can maximize performance and efficiency of AI workflows, unify data, simplify data storage management and take advantage of a scalable AI data infrastructure. An […]


Ignite Talks at Security Field Day 12


« Previous Page
Next Page »
  • Bluesky
  • LinkedIn
  • Mastodon
  • RSS
  • Twitter
  • YouTube

Event Calendar

  • Sep 24-Sep 25 — Security Field Day 14
  • Oct 9-Oct 9 — Tech Field Day Exclusive with Microsoft Security
  • Oct 15-Oct 15 — Tech Field Day Experience at NetApp INSIGHT 2025
  • Oct 22-Oct 23 — Cloud Field Day 24
  • Oct 29-Oct 30 — AI Field Day 7
  • Nov 5-Nov 6 — Networking Field Day 39
  • Nov 11-Nov 12 — Tech Field Day at KubeCon North America 2025

Latest Coverage

  • How Mainframe Observability Bridges Legacy and Modern Systems
  • Share Cleveland 25 Took Mainframe to the Next Level
  • PopUp Mainframe: The Key to Faster, Cheaper, and Better Mainframe DevOps
  • Using Agentic AI to Assist Resilience with Opengear
  • cPacket: Every Packet Counts

Tech Field Day News

  • Pushing the Boundaries of AI Performance, Scale, and Innovation at AI Infrastructure Field Day 3
  • A Look at Mainframe Innovation at Tech Field Day Extra at SHARE Cleveland 25

Return to top of page

Copyright © 2025 · Genesis Framework · WordPress · Log in