Tech Field Day

The Independent IT Influencer Event

  • Home
    • The Futurum Group
    • FAQ
    • Staff
  • Sponsors
    • Sponsor List
      • 2025 Sponsors
      • 2024 Sponsors
      • 2023 Sponsors
      • 2022 Sponsors
    • Sponsor Tech Field Day
    • Best of Tech Field Day
    • Results and Metrics
    • Preparing Your Presentation
      • Complete Presentation Guide
      • A Classic Tech Field Day Agenda
      • Field Day Room Setup
      • Presenting to Engineers
  • Delegates
    • Delegate List
      • 2025 Delegates
      • 2024 Delegates
      • 2023 Delegates
      • 2022 Delegates
      • 2021 Delegates
      • 2020 Delegates
      • 2019 Delegates
      • 2018 Delegates
    • Become a Field Day Delegate
    • What Delegates Should Know
  • Events
    • All Events
      • Upcoming
      • Past
    • Field Day
    • Field Day Extra
    • Field Day Exclusive
    • Field Day Experience
    • Field Day Live
    • Field Day Showcase
  • Topics
    • Tech Field Day
    • Cloud Field Day
    • Mobility Field Day
    • Networking Field Day
    • Security Field Day
    • Storage Field Day
  • News
    • Coverage
    • Event News
    • Podcast
  • When autocomplete results are available use up and down arrows to review and enter to go to the desired page. Touch device users, explore by touch or with swipe gestures.

Unified Security, Multitenancy and Single Pass Architecture with Versa Networks

Unification of security policies across all devices and platforms in a SASE infrastructure is mission critical. Versa provides unique multi-tenancy and single pass parallel processing to deliver secure connectivity to users and devices anywhere in the world.


Versa SASE Delivered On-Premises

Versa provides SASE on-premises to deliver the best networking and security within the perimeter. In this session, Matthew will showcase control and management plane protection and how to achieve zero touch provisioning (ZTP) with strong authentication.


Versa Networks Cloud-Agnostic Disaster Recovery-as-a-Service

Achieving cross-cloud compliance and disaster recovery of services in the event of a DoS attack is easy with Versa. Rohan will be demonstrating how organizations can protect and recover their data, assets, services, and applications with full availability.


Reducing Risk Across Multi-Cloud with Versa Networks

Versa automates risk mitigation by containing malware and other threats from one compromised cloud workload to other workloads. In this session, use cases and demos of how to protect against lateral movement with identity-based segmentation will be shown.


Securing Hybrid Multi-Cloud with Versa SASE

This video is a deep dive into how Versa enables organizations to embrace hybrid multi-cloud security and compliance. Rohan will be showcasing the use cases for automating security in the cloud and provide demos of protecting against threats and mitigating vulnerabilities.


Protecting Your Data Everywhere with Versa Networks

This session highlights how to detect Insider Threats and why organizations need Cloud Access Security Broker (CASB) to provide granular application visibility and control for SaaS applications. Versa provides use cases and live demos of CASB and Data Loss Prevention for consistent policy enforcement.


Versa Networks Cloud Security Threat Detection and Mitigation for Modern Threats

Versa protects against new threats and vulnerabilities in the cloud. Suraj provides a detailed breakdown of all the components of Versa’s advanced cloud security capabilities such as Secure Web Gateway and Unified Threat Management. Demos of a cloud firewall and other threat detection and mitigation capabilities will be shown.


Enabling Versa Networks’s Zero Trust Network Access for a Post-Pandemic World

Zero Trust Network Architecture is necessary to enable identity & context-based access control, geo-fencing, device security check, and network obfuscation for workforce connecting from anywhere and everywhere. In this presentation by Versa, Suraj will show how organizations can protect access in a post-pandemic world.


Versa Networks Intro and SASE Defined

In this video, hear the story of Versa Networks origins, their mission, and the overview of Versa SASE which is delivered via the cloud, on-premises, or as a blended combination of both.


Using Swimlane Low-Code Security Automation to Solve Cross-Departmental Security Use Cases

This real-world use case highlights how a Swimlane Fortune 500 financial services customer matured its implementation of low-code security automation beyond common SOAR use cases and the SOC. Swimlane’s Bryon Page (Director Solutions Architecture) and Cody Cornell (Co-founder and Chief Security Officer) showcase how Swimlane is used across departments to build workflows that update security […]


Threat Hunting and Automatically Responding to Credential Compromises with Swimlane

This real-world use case highlights how a Swimlane Fortune 500 financial services customer encountered a sophisticated phish attempt using credentials exposed on the Dark Web. Swimlane’s Bryon Page, director of solutions architecture, and Cody Cornell, co- founder and chief security officer, demonstrate how the SecOps team extended its use of low-code security automation (SOAR) from […]


Automating Phishing Analysis and Response with Swimlane

This real-world use case highlights the initial phase of how a Swimlane Fortune 500 financial services customer navigated from a security event and phishing awareness training, to implementing low-code security automation (SOAR). Swimlane’s Bryon Page, director solutions architecture, and Cody Cornell, co-founder and chief security officer, showcase the details and data on phishing attempts and […]


Cloud-Scale, Low-Code Security Automation from Swimlane

Swimlane low-code security automation goes beyond just SOAR to improve how security teams overcome process and data fatigue, and chronic staffing shortages. Swimlane unlocks the potential of automation beyond the SOC by serving as a system-of-record for the entire security organization. In this presentation, co-founder and chief strategy officer Cody Cornell introduces Swimlane and how […]


Betacom 5GaaS Security with Ravinder Jarral

This presentation details Betacom 5GaaS end to end security. Ravinder reviews how security is part of every step in the Plan, Design, Install, and Operate Betacom methodology. Zero trust design principles and separate communication channels are discussed. The Betacom Security and Service Operations Center (SSOC) is the key to managed security.


4G and 5G Security with Betacom

In this presentation, Ravinder Jarral provides an overview of 4G/5G security. He highlights the multi-layered approach, as well as reviews common threats and mitigations in private networks


Betacom Overview with Brian Watkins

Betacom plans, designs, installs and operates private networks using dedicated CBRS wireless spectrum. Betacom 5G As-A-Service is the industry’s first fully managed private wireless service. In this presentation, Brian Watkins introduces Betacom, discusses Private 5G Networks, and describes Smart Airport use cases.


Intel FIDO Device Onboard (FDO)

Onboarding and provisioning of IOT devices is the first critical step in the deployment of new industrial or enterprise systems. Currently this is often handled manually – an approach that is expensive, time consuming and insecure. A new industry standard – FIDO Device Onboard is now available to specifically address these challenges by offering an […]


Intel How Ethical Facial Recognition Can Identify Security Threats in Real Time

Facial recognition offers tremendous benefits to businesses and society when used effectively and responsibly. It’s a convenient way to unlock your phone or enter your office space, but it’s becoming more controversial. As with any new technology, valid questions have been raised and concerns voiced about facial recognition’s application and shortcomings. In this session, AnyVision […]


Confidential Computing with Intel & Fortanix

The intersection of data transformation and emerging cybersecurity threats is driving a massive up-tick in regulations and the need for real protections for maintaining the confidentiality and integrity of data. Confidential Computing addresses this next frontier by protecting code and data while being processed in memory, especially applicable for sensitive workloads and Multi-party Compute scenarios […]


Cisco Innovations in Industrial Switching and Security

Visibility is imperative to enable organizations to define and deploy security policies in industrial environments. In this session, Cisco dives into how they are developing innovations to provide rich industrial visibility and enable the ability to effectively deploy Enterprise Security solutions.


« Previous Page
Next Page »
  • Bluesky
  • LinkedIn
  • Mastodon
  • RSS
  • Twitter
  • YouTube

Event Calendar

  • Aug 19-Aug 19 — Tech Field Day Extra at SHARE Cleveland 2025
  • Sep 10-Sep 11 — AI Infrastructure Field Day 3
  • Sep 24-Sep 25 — Security Field Day 14
  • Oct 22-Oct 23 — Cloud Field Day 24
  • Oct 29-Oct 30 — AI Field Day 7
  • Nov 5-Nov 6 — Networking Field Day 39
  • Nov 11-Nov 12 — Tech Field Day at KubeCon North America 2025

Latest Coverage

  • Look Before You Leap into VCF 9.0
  • Qlik Answers from the New Zealand Government 2025 Budget
  • Cloud Storage: It’s Not Just for Hyperscalers Anymore!
  • VCF 9.0 Live Patching Ends Maintenance Window Dread
  • VCF 9.0 and the New Era of Platform Engineering: Self-Service at Scale

Tech Field Day News

  • A Look at Mainframe Innovation at Tech Field Day Extra at SHARE Cleveland 25
  • Experience the Energy of Networking Field Day!

Return to top of page

Copyright © 2025 · Genesis Framework · WordPress · Log in