Tech Field Day

The Independent IT Influencer Event

  • Home
    • The Futurum Group
    • FAQ
    • Staff
  • Sponsors
    • Sponsor List
      • 2026 Sponsors
      • 2025 Sponsors
      • 2024 Sponsors
      • 2023 Sponsors
      • 2022 Sponsors
    • Sponsor Tech Field Day
    • Best of Tech Field Day
    • Results and Metrics
    • Preparing Your Presentation
      • Complete Presentation Guide
      • A Classic Tech Field Day Agenda
      • Field Day Room Setup
      • Presenting to Engineers
  • Delegates
    • Delegate List
      • 2025 Delegates
      • 2024 Delegates
      • 2023 Delegates
      • 2022 Delegates
      • 2021 Delegates
      • 2020 Delegates
      • 2019 Delegates
      • 2018 Delegates
    • Become a Field Day Delegate
    • What Delegates Should Know
  • Events
    • All Events
      • Upcoming
      • Past
    • Field Day
    • Field Day Extra
    • Field Day Exclusive
    • Field Day Experience
    • Field Day Live
    • Field Day Showcase
  • Topics
    • Tech Field Day
    • Cloud Field Day
    • Mobility Field Day
    • Networking Field Day
    • Security Field Day
    • Storage Field Day
  • News
    • Coverage
    • Event News
    • Podcast
  • When autocomplete results are available use up and down arrows to review and enter to go to the desired page. Touch device users, explore by touch or with swipe gestures.

DDoS plus C2 Protection with Juniper MX + Corero & SecIntel

Juniper doesn’t believe in routers as “dumb pipes” but instead that they can be used to detect and stop attacks. Find out how Juniper’s most widely-deployed MX Series router can stop volumetric DDoS attacks and block command-and-control communications to & from malicious servers.

Cover Your Apps with Juniper Cloud Workload Protection

No application is invulnerable to attack, and all applications could use a safety net to help keep them secure, especially in production. Juniper Cloud Workload Protection does exactly that and integrates with the rest of your Zero Trust data center.

Managing the Transition to SASE with Juniper Security Director Cloud

Manage your security deployments, whether they’re on-premises, in the cloud, or delivered from the cloud as you make your journey towards a SASE architecture.

Juniper Connected Security Overview with Kate Adam

in this video, get introductions to the Juniper team and why Juniper’s Connected Security strategy seeks to make defending the network easier by extending security services to all points of connection from client to workload.

Dissecting DNS Security and NetSecOps with EfficientIP

Versa Networks Presents at Security Field Day 6

Swimlane Presents at Security Field Day 6

Betacom Presents at Security Field Day 6

Intel Presents at Security Field Day 6

Cisco Presents at Security Field Day 6

Juniper Networks Presents at Security Field Day 6

Pure Storage Introduces Portworx Data Services

In this video, Pure Storage introduces their new Portworx Data Services offering, which enables database-as-a-service (DBaaS) with management, data protection, and automation. PDS 1.0 can deploy Cassandra, PostgreSQL, Couchbase, ZooKeeper, Consul, Redis, DataStax, MongoDB, ElasticSearch, Kafka, MySQL, or Microsoft SQL Server simply and quickly. Presented by Goutham Rao, CTO of Portworx.

PathSolutions TotalView Demo with Tim Titus

In this demo, Tim Titus shows an overview of TotalView and how it can be used to help troubleshoot networking issues and provide a root-cause analysis to stakeholders and IT professionals alike.

PathSolutions Solution Overview with Tim Titus

Network troubleshooting usually involves setting your NMS to collect certain data elements, then aligning the clues to the timeframe when the event occurred, and then interpreting the elements to determine what happened. This research is time-consuming and typically requires expert-level understanding of the network. What’s needed is automation of collection, interpretation, and analysis of the […]

Riverbed Troubleshooting Post-Mortem and Conclusion

Phil does a brief troubleshooting post-mortem to review what we’ve done and how Riverbed’s end-to-end visibility solution provides granular and easy network visibility from the client to the cloud.

Diving Deep into Application Performance with Riverbed AppResponse

Vince takes the information we’ve learned so far and uses AppResponse to go deep with looking at transactions between computers and our web servers. He discovers exactly where the problem is located and the root cause of poor performance.

Network Visibility and Synthetic Testing with Riverbed NetIM

Since the application is slow for everyone, including people who don’t have a crypto miner on their computer, Brandon next uses NetIM to look at several key network devices, and he uses our synthetic testing monitoring tools to get some unexpected results.

Investigating a Security Incident with Riverbed NetProfiler

Using NetProfiler, John further investigates our security breach network-wide and learns more about our crypto miner, where it is on the network, and how it’s operating.

Investigating Application Performance at the Client Level with Aternity and Riverbed

Jon starts our troubleshooting session with Aternity to investigate our airport computers, confirm poor application performance, and unexpectedly discover a security breach.

Setting the Stage for End-to-End Visibility with Riverbed

Phil sets the stage for the Riverbed demo scenario and looks at high level application metrics in Portal.

« Previous Page
Next Page »
  • Bluesky
  • LinkedIn
  • Mastodon
  • RSS
  • Twitter
  • YouTube

Event Calendar

  • Jan 28-Jan 30 — AI Infrastructure Field Day 4
  • Mar 11-Mar 12 — Cloud Field Day 25
  • Mar 23-Mar 24 — Tech Field Day Extra at RSAC 2026
  • Apr 8-Apr 10 — Networking Field Day 40
  • Apr 15-Apr 16 — AI AppDev Field Day 3
  • Apr 29-Apr 30 — Security Field Day 15
  • May 6-May 8 — Mobility Field Day 14
  • May 13-May 14 — AI Field Day 8

Latest Coverage

  • Managing Edge AI and Computer Vision at Scale
  • Digitate ignio and the 2025 AIOps Question: Build or Buy?
  • Reimagining AI from a Security Risk into an Asset with Fortinet
  • ResOps: The Convergence of Security and Operations
  • How Collaboration is Helping HPE Leverage AI in Practical Applications

Tech Field Day News

  • Cutting-Edge AI Networking and Storage Kick Off 2026 at AI Infrastructure Field Day 4
  • Commvault Shift 2025 Live Blog

Return to top of page

Copyright © 2026 · Genesis Framework · WordPress · Log in