Tech Field Day

The Independent IT Influencer Event

  • Home
    • The Futurum Group
    • FAQ
    • Staff
  • Sponsors
    • Sponsor List
      • 2025 Sponsors
      • 2024 Sponsors
      • 2023 Sponsors
      • 2022 Sponsors
    • Sponsor Tech Field Day
    • Best of Tech Field Day
    • Results and Metrics
    • Preparing Your Presentation
      • Complete Presentation Guide
      • A Classic Tech Field Day Agenda
      • Field Day Room Setup
      • Presenting to Engineers
  • Delegates
    • Delegate List
      • 2025 Delegates
      • 2024 Delegates
      • 2023 Delegates
      • 2022 Delegates
      • 2021 Delegates
      • 2020 Delegates
      • 2019 Delegates
      • 2018 Delegates
    • Become a Field Day Delegate
    • What Delegates Should Know
  • Events
    • All Events
      • Upcoming
      • Past
    • Field Day
    • Field Day Extra
    • Field Day Exclusive
    • Field Day Experience
    • Field Day Live
    • Field Day Showcase
  • Topics
    • Tech Field Day
    • Cloud Field Day
    • Mobility Field Day
    • Networking Field Day
    • Security Field Day
    • Storage Field Day
  • News
    • Coverage
    • Event News
    • Podcast
  • When autocomplete results are available use up and down arrows to review and enter to go to the desired page. Touch device users, explore by touch or with swipe gestures.

Kentik Detect for DDoS and Alerting with Jim Meehan

Jim Meehan, Director of Solutions Engineering at Kentik, reviews Kentik Detect’s alerting capabilities. The solution comes with predefined alert parameters around capacity, general anomalies, and DDoS threats, but these can also be defined per user preference. This can include specific filters and datasets, as well as historical baselines for context.


Kentik Detect for DevOps, NPM, and DNS with Avi Freedman

Avi Freedman, Co-founder and CEO at Kentik, demonstrates Kentik Detect as a plugin for Grafana. This provides a subset of data from the Kentik API that can be used alongside other application metrics in an overall dashboard.


Kentik Detect for Network Peering and Planning with Jim Meehan

Jim Meehan, Director of Solutions Engineering at Kentik, reviews using Kentik Detect for network peering analysis and planning purposes. This can be used by service providers, content source networks, or CDNs. Because Kentik Detect correlates flow data with other variables at full resolution, it gives organizations easily understood information to prioritize traffic for cost or […]


Kentik Data Engine with Avi Freedman

Avi Freedman, Co-founder and CEO at Kentik, gives a technical overview of their Data Engine. This is run in the cloud, and designed by Kentik for the particularly high ingest required to maintain full resolution of all network flow data. KDE allows for realtime stream processing of network traffic for anomaly detection. Avi goes into […]


Kentik Detect SaaS Platform with Jim Meehan

Jim Meehan, Director of Solutions Engineering at Kentik, reviews the UI and functionality of the Kentik Detect SaaS platform. This is designed to keep the full resolution of network flow data, rather than an aggregated ingest. This enables the creation of summary reports, while still allowing for drill down into very narrow pieces of data.


Introduction to Kentik with Avi Freedman

Avi Freedman, Co-founder and CEO at Kentik, introduces the company to the delegates. They offer network traffic analytics, starting with flow information and augment it with routing and other metrics.


Gigamon Integration with Phantom with Robert Truesdell

Robert Truesdell, Senior Director, Product Management and Technology Alliances with Phantom, discusses the security operations center with the delegates. These SOCs are increasingly understaffed and beset by sophisticated actors using automation against them. Robert introduces Phantom as a solution to these issues, and gives an overview of how they integrate with Gigamon’s visibility solutions.


Gigamon Adaptive Response Application with Hamad Altaf

Hamad Altaf, Staff QA Engineer at Gigamon, overviews the specifics of their Adaptive Response application, using Splunk as an example. This talk focuses on the containment part of the Defender Lifecycle, which is then in turn used to feedback to improve the quality of future detection.


Gigamon Using Metedata for Security Analysis with Noam Syrkin

Noam Syrkin, Senior Technical Marketing Engineer with Gigamon, gives an overview of how the company generates metadata, which can serve as the ingest for further tools like Splunk. The focus on metadata allows for greater efficiency due to the small amount of response time between packets, and helps overcome the limited reach of other visibly […]


Gigamon Splunk Overview of Enterprise Security and Adaptive Response Framework with Wissam Ali-Ahmad

Wissam Ali-Ahmad, Technical Lead for Global Strategic Alliances with Splunk, introduces the delegates to their solution. This allows you to take machine data from various sources and make it usable in a unified manner. This visibility gives insight into advanced threats and serves as a nerve center for modern security monitoring. This integrates with Gigamon […]


Gigamon Defender Lifecycle Model with Ananda Rajagopal

Ananda Rajagopal, Vice President, Products at Gigamon, gives an overview of the company’s Defender Lifecycle Model. This platform is based around the idea due to the velocity of traffic, real-time threat protection may not be feasible. This builds on simple principals of prevention, with a focus on detection, prediction, and containment of threats. Gigamon’s Defender […]


Cisco Tetration Analytics Security Model with Tim Garner

Cisco says their customers have used the Cisco Tetration platform to segment and build secure infrastructure for applications. This is designed to remediate the current state of networking, which provides little knowledge of how applications interact, what infrastructure services they depend on, and how to effectively implement segmentation.


Cisco Tetration Analytics Refresher with Tim Garner

Cisco says their Tetration analytics engine gives them visibility into every packet in a network environment via metadata filtering. Tetration is able to intelligently whitelist traffic based on usage, without requiring explicit configuration from a network engineer.


Pluribus Networks Embedded Visibility and Insight Analytics with Steven Shalita

Steven Shalita, Vice President of Marketing with Pluribus Networks, gives a high level overview of their analytics capabilities built into their Adaptive Cloud Fabric architecture. This goes beyond looking at basic network functions by generating metadata from the network itself via performance metrics. By using their fabric based model, Pluribus Networks has built their analytics […]


Pluribus Networks Network Services with Alessandro Barbieri

Alessandro Barbieri, Vice President Product Management at Pluribus Networks, reviews some of the network services available with their Adaptive Cloud Fabric. This includes a deep dive into the architecture behind their automation features, powered by their Pluribus UNUM Fabric Manager.


Pluribus Networks Adaptive Cloud Fabric Architecture and Network Services with Alessandro Barbieri

Alessandro Barbieri, Vice President Product Management at Pluribus Networks, goes into a technical deep dive on the company’s Adaptive Cloud Fabric. This starts with an overview of the architecture, then delves into how it can be applied to solve problems with services like microsegmentation, automation, and VMware integration.


Introduction to the Pluribus Netvisor OS and Adaptive Cloud Fabric with Steven Shalita

Steven Shalita, Vice President of Marketing with Pluribus Networks, introduces the delegates to the Netvisor OS, their virtualized operating system, and their Adaptive Cloud Fabric architecture. The latter was introduced around April 2017 as their vision for a simplified, distributed network.


DataCore Presents at Tech Field Day 15


Actifio Presents at Tech Field Day 15


Riverbed Presents at Tech Field Day 15


« Previous Page
Next Page »
  • Bluesky
  • LinkedIn
  • Mastodon
  • RSS
  • Twitter
  • YouTube

Event Calendar

  • Jul 9-Jul 10 — Networking Field Day 38
  • Aug 19-Aug 19 — Tech Field Day Extra at SHARE Cleveland 2025
  • Sep 10-Sep 11 — AI Infrastructure Field Day 3
  • Sep 24-Sep 25 — Security Field Day 14
  • Oct 22-Oct 23 — Cloud Field Day 24
  • Oct 29-Oct 30 — AI Field Day 7
  • Nov 5-Nov 6 — Networking Field Day 39

Latest Coverage

  • Fortinet fully acquired Everest Networks to complete its Wi-Fi offering for large public venues
  • Automating the network design, what does it really mean?
  • Key Takeaways from Security Field Day
  • Ubiquiti’s Growing Presence in the Enterprise Market
  • Backups That Belong in the Cloud—But Not Too Close

Tech Field Day News

  • Experience the Energy of Networking Field Day!
  • Have A Classy Time with Tech Field Day Extra at Cisco Live US 2025

Return to top of page

Copyright © 2025 · Genesis Framework · WordPress · Log in