Tech Field Day

The Independent IT Influencer Event

  • Home
    • The Futurum Group
    • FAQ
    • Staff
  • Sponsors
    • Sponsor List
      • 2025 Sponsors
      • 2024 Sponsors
      • 2023 Sponsors
      • 2022 Sponsors
    • Sponsor Tech Field Day
    • Best of Tech Field Day
    • Results and Metrics
    • Preparing Your Presentation
      • Complete Presentation Guide
      • A Classic Tech Field Day Agenda
      • Field Day Room Setup
      • Presenting to Engineers
  • Delegates
    • Delegate List
      • 2025 Delegates
      • 2024 Delegates
      • 2023 Delegates
      • 2022 Delegates
      • 2021 Delegates
      • 2020 Delegates
      • 2019 Delegates
      • 2018 Delegates
    • Become a Field Day Delegate
    • What Delegates Should Know
  • Events
    • All Events
      • Upcoming
      • Past
    • Field Day
    • Field Day Extra
    • Field Day Exclusive
    • Field Day Experience
    • Field Day Live
    • Field Day Showcase
  • Topics
    • Tech Field Day
    • Cloud Field Day
    • Mobility Field Day
    • Networking Field Day
    • Security Field Day
    • Storage Field Day
  • News
    • Coverage
    • Event News
    • Podcast
  • When autocomplete results are available use up and down arrows to review and enter to go to the desired page. Touch device users, explore by touch or with swipe gestures.

Index Engines CyberSense Demo with Jim McGann

In this demo, See how CyberSense from Index Engines empowers smarter recovery from ransomware with AI and an intuitive user interface.


Index Engines CyberSense Version 8.6 Update

CyberSense 8.6 supports smarter recovery from ransomware attacks, introduces customizable threshold alerts and broadens platform and workload compatibility. Also highlighted is support for new platforms and applications.


Introduction to Index Engines CyberSense AI-Powered Data Analysis

Distinguishing itself as the only data integrity software, harnessing over 200 content-based analytics indicative of ransomware corruption, CyberSense employs robust AI-based machine learning models to generate alerts with 99.5% accuracy when corruption is detected. Furthermore, CyberSense’s post-attack reports furnish the intelligence necessary for expedited recovery with minimal data loss.


Index Engines Understanding the Ransomware Challenge

Cyber criminals are getting more sophisticated, deploying ransomware variants that are harder to detect with thresholds, metadata-level scanning or entropy changes alone. Cyber criminals are using AI and slow encryption to corrupt data without detection. The results have been devastating for organizations worldwide. Why is it critical to winning the war against ransomware? Data integrity […]


Introduction to Index Engines with Geoff Barrall

For over 20 years Index Engines has provided purpose-built enterprise software. Discover how they’re developing the last line of defense against ransomware attacks, and the first line of recovery with CyberSense. Today we will be discussing how to recover smarter by harnessing AI to recover from ransomware.


Revolutionizing Cloud Data Security – A Palo Alto Prisma Cloud DSPM Demo

Vinayak Shastri, Product Line Manager for Prisma Cloud DSPM at Palo Alto Networks, provides an in-depth walkthrough of the Prisma Cloud DSPM platform, featuring diverse use cases. In this session, participants will gain insights into addressing the top questions posed by CISOs: What data resides across our multi-cloud environments? Who has access to our most […]


Revolutionizing Cloud Data Security with Palo Alto DSPM and DDR

Are you thinking about data security in 2024? Growing data volumes and increased regulation make it difficult for organizations to understand which sensitive data they hold, who can access it and where it’s exposed. To regain visibility and control, organizations are exploring data security posture management with data detection and response. In this session you’ll […]


Zerto Cyber Resilience Vault Deep Dive

Dive into the Zerto cyber resilience vault headfirst and learn how the only journal based cyber vault and clean room combined, can keep your data protected and recover over 99% faster compared to other solutions.


Isolate and Lock Ransomware Attacks with Zerto

94% of ransomware attacks attempted to compromise backup data. Learn how to properly isolate and lock your data to ensure it is not compromised during an attack. The discussion includes an overview of immutable journaling, object locks, and clean room recovery.


Zerto Continuous Data Protection – Replicate and Detect

Learn how Zerto’s unique Continuous data protection enables RPOs of seconds with the earliest warning sign an attack maybe occurring in your environment. This presentation also discusses journaling of changes to ensure proper recovery is easy and secure. The presentation also includes a demo of the system detecting ransomware infections.


Achieving Ransomware Resilience with Zerto

Explore and learn how Zerto can help Organizations successfully detect and recover from even the worst ransomware attacks. In this high-level session see how Zerto can help you address your security posture and see highlights of the cost of ransomware attacks if left undefended.


Aryaka Demo – Unified SASE as a Service

This presentation is a hands-on Demo of Aryaka Unified SASE as a Service via the MyAryaka customer portal covering following co-management capabilities: Introduction Onboarding – Enable SD-WAN Provisioning – Enable Security Services Scaling – Consistent security policies for multiple sites Managing changes – Add/Modify/Delete Monitoring – Service status Troubleshooting – Connectivity and security Service Summary


Deep Dive Into the Aryaka Platform and Architecture

A deep dive into the design principles of the Aryaka Platform and its OnePass Architecture, Zero Trust WAN, Network, Security and Observability services, and flexible delivery options. We explain the how and why Aryaka Unified SASE as a Service delivers performance, agility, simplicity and security without tradeoffs.


Aryaka Overview – Unified SASE as a Service

This video features an Aryaka company overview and introduction of the four elements of Aryaka Unified SASE as a Service. This solution tackles the challenges faced by organizations in a hybrid workforce and hybrid app deployment to ensure global secure network access.


Palo Alto Networks Presents at Security Field Day 11

Palo Alto Networks Presented at Security Field Day 11

Revolutionizing Cloud Data Security with DSPM & DDR Are you thinking about data security in 2024? Growing data volumes and increased regulation make it difficult for organizations to understand which sensitive data they hold, who can access it and where it’s exposed. To regain visibility and control, organizations are exploring data security posture management with […]


Zerto Presents at Security Field Day 11

Zerto Presented at Security Field Day 11

Aryaka Presents at Security Field Day 11

Aryaka Presented at Security Field Day 11

Nile Live Demo – Closed Loop Automation with Nile AI for Software Issues and Software Upgrades

In this live demonstration, Karthik and Dipen from team Nile showcase how, within the Nile Access Service, software bugs within network elements and corresponding software upgrades can be fully automated without time consuming IT support workflows. Thanks to closed loop automation powered by AI, Nile Access Service significantly reduces the manual labor and time required […]


Nile Live Demo – Closed Loop Automation with Nile AI for External Wireless Coverage and Wired Link Issues

In this live demonstration, Dipen and Karthik from team Nile showcase how, within the Nile Access Service, wireless coverage issues due to external factors and wired link errors due to poor cabling can be automatically detected and resolved without any manual troubleshooting required. Thanks to closed loop automation powered by AI, Nile Access Service significantly […]


A Closer Look at the Technology Architecture Behind the Nile Access Service

Suresh and Ozer from team Nile review the key components of the Nile Access Service: Nile Service Blocks, Nile Services Cloud and Nile AI Applications. Nile Service Blocks bring principles of cloud delivery to the campus and branch, Nile Services Cloud enables real-time observability and continuous optimization of the edge wired and wireless network, and […]


« Previous Page
Next Page »
  • Bluesky
  • LinkedIn
  • Mastodon
  • RSS
  • Twitter
  • YouTube

Event Calendar

  • Jun 10-Jun 11 — Tech Field Day Extra at Cisco Live US 2025
  • Jul 9-Jul 10 — Networking Field Day 38
  • Jul 16-Jul 17 — Edge Field Day 4
  • Sep 10-Sep 11 — AI Infrastructure Field Day 3
  • Oct 22-Oct 23 — Cloud Field Day 24
  • Oct 29-Oct 30 — AI Field Day 7

Latest Links

  • Have A Classy Time with Tech Field Day Extra at Cisco Live US 2025
  • Scaling Smarter Optimizes Cloud Costs in the Age of Data Abundance
  • Exploring Cloud Resilience, AI, and Data at Cloud Field Day 23
  • Compliance Does Not Equal Security
  • Meraki Campus Gateway: Cloud-Managed Overlay for Complex Networks

Return to top of page

Copyright © 2025 · Genesis Framework · WordPress · Log in