Tech Field Day

The Independent IT Influencer Event

  • Home
    • The Futurum Group
    • FAQ
    • Staff
  • Sponsors
    • Sponsor List
      • 2025 Sponsors
      • 2024 Sponsors
      • 2023 Sponsors
      • 2022 Sponsors
    • Sponsor Tech Field Day
    • Best of Tech Field Day
    • Results and Metrics
    • Preparing Your Presentation
      • Complete Presentation Guide
      • A Classic Tech Field Day Agenda
      • Field Day Room Setup
      • Presenting to Engineers
  • Delegates
    • Delegate List
      • 2025 Delegates
      • 2024 Delegates
      • 2023 Delegates
      • 2022 Delegates
      • 2021 Delegates
      • 2020 Delegates
      • 2019 Delegates
      • 2018 Delegates
    • Become a Field Day Delegate
    • What Delegates Should Know
  • Events
    • All Events
      • Upcoming
      • Past
    • Field Day
    • Field Day Extra
    • Field Day Exclusive
    • Field Day Experience
    • Field Day Live
    • Field Day Showcase
  • Topics
    • Tech Field Day
    • Cloud Field Day
    • Mobility Field Day
    • Networking Field Day
    • Security Field Day
    • Storage Field Day
  • News
    • Coverage
    • Event News
    • Podcast
  • When autocomplete results are available use up and down arrows to review and enter to go to the desired page. Touch device users, explore by touch or with swipe gestures.

DDoS plus C2 Protection with Juniper MX + Corero & SecIntel

Juniper doesn’t believe in routers as “dumb pipes” but instead that they can be used to detect and stop attacks. Find out how Juniper’s most widely-deployed MX Series router can stop volumetric DDoS attacks and block command-and-control communications to & from malicious servers.


Cover Your Apps with Juniper Cloud Workload Protection

No application is invulnerable to attack, and all applications could use a safety net to help keep them secure, especially in production. Juniper Cloud Workload Protection does exactly that and integrates with the rest of your Zero Trust data center.


Managing the Transition to SASE with Juniper Security Director Cloud

Manage your security deployments, whether they’re on-premises, in the cloud, or delivered from the cloud as you make your journey towards a SASE architecture.


Juniper Connected Security Overview with Kate Adam

in this video, get introductions to the Juniper team and why Juniper’s Connected Security strategy seeks to make defending the network easier by extending security services to all points of connection from client to workload.


Dissecting DNS Security and NetSecOps with EfficientIP


Versa Networks Presents at Security Field Day 6


Swimlane Presents at Security Field Day 6


Betacom Presents at Security Field Day 6


Intel Presents at Security Field Day 6


Cisco Presents at Security Field Day 6


Juniper Networks Presents at Security Field Day 6


Pure Storage Introduces Portworx Data Services

In this video, Pure Storage introduces their new Portworx Data Services offering, which enables database-as-a-service (DBaaS) with management, data protection, and automation. PDS 1.0 can deploy Cassandra, PostgreSQL, Couchbase, ZooKeeper, Consul, Redis, DataStax, MongoDB, ElasticSearch, Kafka, MySQL, or Microsoft SQL Server simply and quickly. Presented by Goutham Rao, CTO of Portworx.


PathSolutions TotalView Demo with Tim Titus

In this demo, Tim Titus shows an overview of TotalView and how it can be used to help troubleshoot networking issues and provide a root-cause analysis to stakeholders and IT professionals alike.


PathSolutions Solution Overview with Tim Titus

Network troubleshooting usually involves setting your NMS to collect certain data elements, then aligning the clues to the timeframe when the event occurred, and then interpreting the elements to determine what happened. This research is time-consuming and typically requires expert-level understanding of the network. What’s needed is automation of collection, interpretation, and analysis of the […]


Riverbed Troubleshooting Post-Mortem and Conclusion

Phil does a brief troubleshooting post-mortem to review what we’ve done and how Riverbed’s end-to-end visibility solution provides granular and easy network visibility from the client to the cloud.


Diving Deep into Application Performance with Riverbed AppResponse

Vince takes the information we’ve learned so far and uses AppResponse to go deep with looking at transactions between computers and our web servers. He discovers exactly where the problem is located and the root cause of poor performance.


Network Visibility and Synthetic Testing with Riverbed NetIM

Since the application is slow for everyone, including people who don’t have a crypto miner on their computer, Brandon next uses NetIM to look at several key network devices, and he uses our synthetic testing monitoring tools to get some unexpected results.


Investigating a Security Incident with Riverbed NetProfiler

Using NetProfiler, John further investigates our security breach network-wide and learns more about our crypto miner, where it is on the network, and how it’s operating.


Investigating Application Performance at the Client Level with Aternity and Riverbed

Jon starts our troubleshooting session with Aternity to investigate our airport computers, confirm poor application performance, and unexpectedly discover a security breach.


Setting the Stage for End-to-End Visibility with Riverbed

Phil sets the stage for the Riverbed demo scenario and looks at high level application metrics in Portal.


« Previous Page
Next Page »
  • Bluesky
  • LinkedIn
  • Mastodon
  • RSS
  • Twitter
  • YouTube

Event Calendar

  • May 28-May 29 — Security Field Day 13
  • Jun 4-Jun 5 — Cloud Field Day 23
  • Jun 10-Jun 11 — Tech Field Day Extra at Cisco Live US 2025
  • Jul 9-Jul 10 — Networking Field Day 38
  • Jul 16-Jul 17 — Edge Field Day 4
  • Sep 10-Sep 11 — AI Infrastructure Field Day 3
  • Oct 29-Oct 30 — AI Field Day 7

Latest Links

  • Exploring Cloud Resilience, AI, and Data at Cloud Field Day 23
  • Compliance Does Not Equal Security
  • Meraki Campus Gateway: Cloud-Managed Overlay for Complex Networks
  • Exploring the Future of Cybersecurity at Security Field Day 13
  • 5G Neutral Host: Solving Enterprise Cellular Coverage Gaps

Return to top of page

Copyright © 2025 · Genesis Framework · WordPress · Log in