Zerto Cyber Resilience Vault Deep Dive

Dive into the Zerto cyber resilience vault headfirst and learn how the only journal based cyber vault and clean room combined, can keep your data protected and recover over 99% faster compared to other solutions.

Isolate and Lock Ransomware Attacks with Zerto

94% of ransomware attacks attempted to compromise backup data. Learn how to properly isolate and lock your data to ensure it is not compromised during an attack. The discussion includes an overview of immutable journaling, object locks, and clean room recovery.

Zerto Continuous Data Protection – Replicate and Detect

Learn how Zerto’s unique Continuous data protection enables RPOs of seconds with the earliest warning sign an attack maybe occurring in your environment. This presentation also discusses journaling of changes to ensure proper recovery is easy and secure. The presentation also includes a demo of the system detecting ransomware infections.

Achieving Ransomware Resilience with Zerto

Explore and learn how Zerto can help Organizations successfully detect and recover from even the worst ransomware attacks. In this high-level session see how Zerto can help you address your security posture and see highlights of the cost of ransomware attacks if left undefended.

Aryaka Demo – Unified SASE as a Service

This presentation is a hands-on Demo of Aryaka Unified SASE as a Service via the MyAryaka customer portal covering following co-management capabilities: Introduction Onboarding – Enable SD-WAN Provisioning – Enable Security Services Scaling – Consistent security policies for multiple sites Managing changes – Add/Modify/Delete Monitoring – Service status Troubleshooting – Connectivity and security Service Summary

Deep Dive Into the Aryaka Platform and Architecture

A deep dive into the design principles of the Aryaka Platform and its OnePass Architecture, Zero Trust WAN, Network, Security and Observability services, and flexible delivery options. We explain the how and why Aryaka Unified SASE as a Service delivers performance, agility, simplicity and security without tradeoffs.

Aryaka Overview – Unified SASE as a Service

This video features an Aryaka company overview and introduction of the four elements of Aryaka Unified SASE as a Service. This solution tackles the challenges faced by organizations in a hybrid workforce and hybrid app deployment to ensure global secure network access.

Palo Alto Networks Presents at Security Field Day 11

Palo Alto Networks Presented at Security Field Day 11

Revolutionizing Cloud Data Security with DSPM & DDR Are you thinking about data security in 2024? Growing data volumes and increased regulation make it difficult for organizations to understand which sensitive data they hold, who can access it and where it’s exposed. To regain visibility and control, organizations are exploring data security posture management with […]

A Closer Look at the Technology Architecture Behind the Nile Access Service

Suresh and Ozer from team Nile review the key components of the Nile Access Service: Nile Service Blocks, Nile Services Cloud and Nile AI Applications. Nile Service Blocks bring principles of cloud delivery to the campus and branch, Nile Services Cloud enables real-time observability and continuous optimization of the edge wired and wireless network, and […]

Aviz Networks Network Copilot and Networking Enterprise Suite Technical Overview

In this video, witness live demos of our Open Network Enterprise Suite (ONES) and Network Copilot, showcasing their transformative impact on network management and operations. Explore our suite of products, including the Fabric Test Automation Suite (FTAS) to ensure the quality of SONiC deployments, ONES for advanced network management, Open Packet Broker (OPB) for enhanced […]

Aviz Networks Overview and Networking 3.0 Unpacked

In this introduction, learn how to unlock the potential of your network with our data-centric Networking 3.0 stack, designed for open, cloud, and AI-first networks. The Aviz Networking 3.0 stack redefines the landscape with a vendor-agnostic approach, supporting a wide range of ASICs, switches, clouds, and LLMs. At Aviz we enable open-source SONiC for NOS […]

Forward Networks How Many Devices Do You Have – Network Lifecycle and Why You Need to Care

Before Fiserv became a Forward Networks customer, the network team was faced with solving several enterprise network challenges: addressing CVE events, managing the perimeter, audits and compliance findings, and smoothly enabling automation. In this customer testimonial, Michael describes how Forward Enterprise uniquely delivered solutions for the known list of challenges, and also provided unexpected value […]

The Power of A.I. in a Forward Networks Digital Twin

Nikhil Handigol demonstrates how generative A.I. in unlocks network insights and shows the delegates how Forward Networks now seamlessly incorporates generative A.I. into its network digital twin software. Inside the most popular product feature, Network Query Engine, every user can perform natural language queries to access crucial network data in seconds.

Sign up for updates to
Tech Field day events

Thank you for being part of the Tech Field Day community! Our mailing list is a great way to stay up to date on our events and technical content, and we appreciate your signup.

We promise that we’ll never spam you, send ads, or sell your information. This list will only be used to communicate with our community about our events and content. And we’ll limit it to no more than one message per week.

Although we only need your email address, it would be nice if you provided a little more information to help us get to know you better!