John Hess, Product Manager at Ventev introduces the VenGo Mobile Wireless case and how it creates flexibility in the wireless market. He outlines the features and benefits of the VenGo case and describes several use cases for the device and how end users can provides wireless access when there is limited or no power.
AI-Driven Wi-Fi Assurance with Wyebot
In this session we will be discussing Wyebot’s unique approach to cloud-based, scalable, AI-driven WiFi Assurance platform combined with game-changing simplicity of deployment and ease- of-use. We will start off with a quick overview of the solution, followed by what has changed since we last presented at Mobility Field Day last year. We will then […]
Druva Security Demo with Badri Raghunathan
Join to see how Druva’s cyber resiliency cloud capabilities enhance and empower Security and IT teams to respond and recover from a ransomware attack with a customer workflow perspective.
Druva Real-time Ransomware Response and Recovery
As data is growing, the challenges associated with protecting and managing that data, wherever it resides, are compounding. Druva takes real-world ransomware experiences and showcases Druva’s unique capabilities to address inherent gaps in security with a 100% cloud native architecture.
Why Backup and Data Protection Needed to be Reinvented with Druva
In today’s dynamic business environment, organizations are continuously assessing their priorities, including the ability to recover from ransomware, reducing costs and complexity, modernizing IT infrastructure with an accelerated cloud strategy, empowering a secure hybrid workforce, and improving efficiencies with AI and automation. Druva leads the discussion on what organizations can do to better manage these […]
Druva Analysis of Ransomware Attacks – Their Gain Your Loss
Using open source reporting we analyze recent high profile breaches believed to be by the same threat actor, “Scattered spider” and will discuss lessons learned from each that can help strengthen your cyber incident response plan.
Druva’s Data Resiliency Cloud with Neil Ashworth
We briefly explore Druva’s Data Resiliency Cloud, empowering organizations efforts in data center modernization, ransomware recovery, cyber resilience, multi-cloud and end user protection.
Forward Networks Demo: How a Digital Twin Transforms Network Security
So how does it work? Our seasoned network engineer, Mike Lossmann pops open the Forward Enterprise application to walk the XFD audience through the full network digital twin functionality. Mike guides the delegates through intent-checking and blast radius exposure, security posture / zero trust and network vulnerabilities, network verification for layer 3 to layer 7, […]
The Game Changer – Network Digital Twin for Network Security with Forward Networks
Why are so many network security breaches hitting the headlines lately? Former State Department cybersecurity professional Matt Honea guides the Security Field Day audience through the latest news-worthy exploitations of network vulnerabilities and how a network digital twin could have mitigated the disasters. Matt outlines the key steps to build a successful network security program […]
Demo: Elastic Energy Distributed Edge Infrastructure with Intel Ethernet and Intel IPU
In this session, Brian will demonstrate how we can implement a federated energy observability/manageability stack to achieve “Energy Elastic Edge” configuration for optimized Carbon Footprint and Energy Costs with 3 Key Strategies: Adaptive systems that implement energy proportionality in multiple levels System and federated approaches for observability and control Energy Time/Space shifting across large scale […]
Intel Demo Achieving Power Savings for Comms Workloads Using Localized Workload Telemetry
In this session Patrick Kutch, Principal Engineer, will discuss and demonstrate the pathfinding work he has been doing using a “Telemetry Pipe” from a workload that can be used to quickly and dynamically optimize power utilization.
Improving Sustainability at the Edge with Intel Energy Elastic Systems
In this session Brian Johnson, Sr. Solutions Architect, will discuss different operational carbon footprint optimization possibilities, the latest pathfinding research for optimizing power consumption and architecture concepts using Intel Ethernet and Intel Infrastructure Processing Units (Intel IPU). The discussion will focus on two aspects of Energy Elastic Systems from customer perspective. 1. Business Level Service […]
Intel Networking for AI with Naru Sundar
With generative AI and other ML workloads exploding, the design and structure of fabrics interconnecting AI elements becomes an important concern. This talk walks through the current state of the AI networking fabric and discusses challenges and tensions arising from the use of proprietary technologies. We present a view of a more open, standards based […]
Securing Remote Users and Micro Branches with Fortinet Universal SASE Demo
The flexible connectivity demonstration of Fortinet Universal SASE encompasses a comprehensive walkthrough of various key components. This includes a detailed exploration of Secure Internet Access (SIA) through both Agent-based and Agentless approaches. Additionally, it covers the Micro Branch use case utilizing FEX wireless WAN (LTE/4G), as well as a walkthrough of Secure Private Access (SPA) […]
Flexible Connectivity Options to Secure Remote Users, Micro Branches and Campuses with Fortinet Universal SASE
With the hybrid workforce model becoming a permanent fixture, it is imperative for organizations to maintain a consistent network and security experience across all edges, which encompass remote users, micro-branches, and campuses. This consistency is essential for streamlining operations.
Orchestrating SD-WAN Policies and Monitoring Traffic with Fortinet Secure SD-WAN
The Fortinet Secure SD-WAN demo offers an in-depth exploration of policy orchestration, monitoring, and security, particularly the implementation of a Zero Trust model. This centralized approach not only simplifies the process but also ensures scalability to accommodate thousands of sites. It seamlessly integrates with the Fortinet Security Fabric, fortifying the protection of users, devices, and […]