Juniper Networks Presents at Cloud Field Day 12
Prosimo Presents at Cloud Field Day 12

Multi-Cloud Networking has changed from being an exploratory topic to an essential tool for enterprises in their cloud journey. In this session, Prosimo experts walk through the challenges that enterprises face in their multi-cloud journey, a cloud-native approach to solving the networking challenges and use-cases driving customer adoption. Three specific customer case studies will be […]
Dissecting NetSecOps Roundtable with EfficientIP
What is NetSecOps? Where has the rise of this term come from? Are networking teams and security teams finally coming together like the Grand Unified Theory of Physics predicts? And are we on the verge of even greater efficiency from this union of former rivals in the enterprise? Join the Security Field Day 6 delegates […]
Improving DNS Security Roundtable with EfficientIP
The world of DNS is a fragile one indeed. As more advanced security threats emerge to take advantage of the coverage holes in our organizations, how can we improve the security of a service that is critical for the operation of the modern Internet? Is there a magic solution to all our ills? Or is […]
Unified Security, Multitenancy and Single Pass Architecture with Versa Networks
Unification of security policies across all devices and platforms in a SASE infrastructure is mission critical. Versa provides unique multi-tenancy and single pass parallel processing to deliver secure connectivity to users and devices anywhere in the world.
Versa SASE Delivered On-Premises
Versa provides SASE on-premises to deliver the best networking and security within the perimeter. In this session, Matthew will showcase control and management plane protection and how to achieve zero touch provisioning (ZTP) with strong authentication.
Versa Networks Cloud-Agnostic Disaster Recovery-as-a-Service
Achieving cross-cloud compliance and disaster recovery of services in the event of a DoS attack is easy with Versa. Rohan will be demonstrating how organizations can protect and recover their data, assets, services, and applications with full availability.
Reducing Risk Across Multi-Cloud with Versa Networks
Versa automates risk mitigation by containing malware and other threats from one compromised cloud workload to other workloads. In this session, use cases and demos of how to protect against lateral movement with identity-based segmentation will be shown.
Securing Hybrid Multi-Cloud with Versa SASE
This video is a deep dive into how Versa enables organizations to embrace hybrid multi-cloud security and compliance. Rohan will be showcasing the use cases for automating security in the cloud and provide demos of protecting against threats and mitigating vulnerabilities.
Protecting Your Data Everywhere with Versa Networks
This session highlights how to detect Insider Threats and why organizations need Cloud Access Security Broker (CASB) to provide granular application visibility and control for SaaS applications. Versa provides use cases and live demos of CASB and Data Loss Prevention for consistent policy enforcement.
Versa Networks Cloud Security Threat Detection and Mitigation for Modern Threats
Versa protects against new threats and vulnerabilities in the cloud. Suraj provides a detailed breakdown of all the components of Versa’s advanced cloud security capabilities such as Secure Web Gateway and Unified Threat Management. Demos of a cloud firewall and other threat detection and mitigation capabilities will be shown.
Enabling Versa Networks’s Zero Trust Network Access for a Post-Pandemic World
Zero Trust Network Architecture is necessary to enable identity & context-based access control, geo-fencing, device security check, and network obfuscation for workforce connecting from anywhere and everywhere. In this presentation by Versa, Suraj will show how organizations can protect access in a post-pandemic world.
Versa Networks Intro and SASE Defined
In this video, hear the story of Versa Networks origins, their mission, and the overview of Versa SASE which is delivered via the cloud, on-premises, or as a blended combination of both.
Using Swimlane Low-Code Security Automation to Solve Cross-Departmental Security Use Cases
This real-world use case highlights how a Swimlane Fortune 500 financial services customer matured its implementation of low-code security automation beyond common SOAR use cases and the SOC. Swimlane’s Bryon Page (Director Solutions Architecture) and Cody Cornell (Co-founder and Chief Security Officer) showcase how Swimlane is used across departments to build workflows that update security […]
Threat Hunting and Automatically Responding to Credential Compromises with Swimlane
This real-world use case highlights how a Swimlane Fortune 500 financial services customer encountered a sophisticated phish attempt using credentials exposed on the Dark Web. Swimlane’s Bryon Page, director of solutions architecture, and Cody Cornell, co- founder and chief security officer, demonstrate how the SecOps team extended its use of low-code security automation (SOAR) from […]
Automating Phishing Analysis and Response with Swimlane
This real-world use case highlights the initial phase of how a Swimlane Fortune 500 financial services customer navigated from a security event and phishing awareness training, to implementing low-code security automation (SOAR). Swimlane’s Bryon Page, director solutions architecture, and Cody Cornell, co-founder and chief security officer, showcase the details and data on phishing attempts and […]
Cloud-Scale, Low-Code Security Automation from Swimlane
Swimlane low-code security automation goes beyond just SOAR to improve how security teams overcome process and data fatigue, and chronic staffing shortages. Swimlane unlocks the potential of automation beyond the SOC by serving as a system-of-record for the entire security organization. In this presentation, co-founder and chief strategy officer Cody Cornell introduces Swimlane and how […]
Betacom 5GaaS Security with Ravinder Jarral
This presentation details Betacom 5GaaS end to end security. Ravinder reviews how security is part of every step in the Plan, Design, Install, and Operate Betacom methodology. Zero trust design principles and separate communication channels are discussed. The Betacom Security and Service Operations Center (SSOC) is the key to managed security.
4G and 5G Security with Betacom
In this presentation, Ravinder Jarral provides an overview of 4G/5G security. He highlights the multi-layered approach, as well as reviews common threats and mitigations in private networks
Betacom Overview with Brian Watkins
Betacom plans, designs, installs and operates private networks using dedicated CBRS wireless spectrum. Betacom 5G As-A-Service is the industry’s first fully managed private wireless service. In this presentation, Brian Watkins introduces Betacom, discusses Private 5G Networks, and describes Smart Airport use cases.
Intel FIDO Device Onboard (FDO)
Onboarding and provisioning of IOT devices is the first critical step in the deployment of new industrial or enterprise systems. Currently this is often handled manually – an approach that is expensive, time consuming and insecure. A new industry standard – FIDO Device Onboard is now available to specifically address these challenges by offering an […]