Intel How Ethical Facial Recognition Can Identify Security Threats in Real Time

Facial recognition offers tremendous benefits to businesses and society when used effectively and responsibly. It’s a convenient way to unlock your phone or enter your office space, but it’s becoming more controversial. As with any new technology, valid questions have been raised and concerns voiced about facial recognition’s application and shortcomings. In this session, AnyVision […]

Confidential Computing with Intel & Fortanix

The intersection of data transformation and emerging cybersecurity threats is driving a massive up-tick in regulations and the need for real protections for maintaining the confidentiality and integrity of data. Confidential Computing addresses this next frontier by protecting code and data while being processed in memory, especially applicable for sensitive workloads and Multi-party Compute scenarios […]

Cisco Innovations in Industrial Switching and Security

Visibility is imperative to enable organizations to define and deploy security policies in industrial environments. In this session, Cisco dives into how they are developing innovations to provide rich industrial visibility and enable the ability to effectively deploy Enterprise Security solutions.

Cisco Security: Zero Trust and Secure Access Service Edge (SASE)

This session explores some of the new offerings, advancements, and strategy of Cisco SASE and Zero Trust. You will be the first to see a demo of the advancements Cisco has made in ZTNA, passwordless, and you’ll see a demo of their brand new single segmentation policy engine.

Cisco Treasure Hunt: An Exploration of Threat Hunting

Threat hunting has become quite mainstream over the past several years, but what is it and should your organization be doing it? In this session, Cisco dives into threat hunting as a concept, explores real world findings and the concepts of threat hunting. You’ll also see a few lessons learned from building a global platform, […]

Cisco SecureX vs. the Acronyms

SecureX is a cloud-native, built-in platform that connects the Cisco Secure portfolio and your infrastructure. It allows you to radically reduce dwell time and human-powered tasks. In this session, you’ll learn how and why SecureX compares to the hot topic of the moment.

Defending OT Environments with the Juniper Converged Industrial Edge

If anything has become clear from the cyberattacks this past year, it’s that critical infrastructure must be better protected. The Converged Industrial Edge automates and protects these environments from targeted attacks while maintaining uptime in trifecta of reliable connectivity, threat intelligence, and precision enforcement.

DDoS plus C2 Protection with Juniper MX + Corero & SecIntel

Juniper doesn’t believe in routers as “dumb pipes” but instead that they can be used to detect and stop attacks. Find out how Juniper’s most widely-deployed MX Series router can stop volumetric DDoS attacks and block command-and-control communications to & from malicious servers.

Cover Your Apps with Juniper Cloud Workload Protection

No application is invulnerable to attack, and all applications could use a safety net to help keep them secure, especially in production. Juniper Cloud Workload Protection does exactly that and integrates with the rest of your Zero Trust data center.

Juniper Connected Security Overview with Kate Adam

in this video, get introductions to the Juniper team and why Juniper’s Connected Security strategy seeks to make defending the network easier by extending security services to all points of connection from client to workload.

Pure Storage Introduces Portworx Data Services

In this video, Pure Storage introduces their new Portworx Data Services offering, which enables database-as-a-service (DBaaS) with management, data protection, and automation. PDS 1.0 can deploy Cassandra, PostgreSQL, Couchbase, ZooKeeper, Consul, Redis, DataStax, MongoDB, ElasticSearch, Kafka, MySQL, or Microsoft SQL Server simply and quickly. Presented by Goutham Rao, CTO of Portworx.

PathSolutions TotalView Demo with Tim Titus

In this demo, Tim Titus shows an overview of TotalView and how it can be used to help troubleshoot networking issues and provide a root-cause analysis to stakeholders and IT professionals alike.

PathSolutions Solution Overview with Tim Titus

Network troubleshooting usually involves setting your NMS to collect certain data elements, then aligning the clues to the timeframe when the event occurred, and then interpreting the elements to determine what happened. This research is time-consuming and typically requires expert-level understanding of the network. What’s needed is automation of collection, interpretation, and analysis of the […]

Sign up for updates to
Tech Field day events

Thank you for being part of the Tech Field Day community! Our mailing list is a great way to stay up to date on our events and technical content, and we appreciate your signup.

We promise that we’ll never spam you, send ads, or sell your information. This list will only be used to communicate with our community about our events and content. And we’ll limit it to no more than one message per week.

Although we only need your email address, it would be nice if you provided a little more information to help us get to know you better!