Building Better Applications at Reduced Cost With Couchbase

At the heart of digital transformation are applications. Couchbase provides applications a multimodel database platform that is high-performing, flexible and scalable, and provides breakthrough economics. Couchbase’s multimodel database, Capella, streamlines application development by providing developers with data technology that is flexible, fast, and efficient. Capella integrates JSON databases and a multimodel system and has differentiated capabilities like query tools, analytics on active data, multi-record transactions, and geographic replication. With Capella’s granular resource scaling, developers can handle each service with the appropriate environmental resource and achieve peak performance, and by choosing Couchbase, organizations can eliminate the cost of using an assortment of databases, reduce redundancy, simplify architecture, and reduce complexity. Read about it at Gestalt IT or watch the demo on the website.


Integrating Native Data Protection to Any Infrastructure Codelessly With HYCU R-Cloud

Companies are facing multi-cloud and SaaS infrastructures at ever-increasing rates. While data protection is already difficult, multi-cloud compounds the complexities even further, requiring data protection services to adopt new solutions, such as HYCU Protégé and R-Cloud, that offer native and automated data protection, extensive visibility, and compliance features in all infrastructures with no additional coding. HYCU’s data protection innovation and modernization efforts aim to address companies’ struggles in safeguarding their data across multi-cloud and SaaS platforms. This article from Gestalt IT discusses the latest updates to HYCU R-Cloud, which was shown as part of Cloud Field Day 17.


Ransomware Is a Real Threat but CyberSense From Index Engines Can Help

Ransomware continues to be a severe threat that organizations worldwide face, especially firms with older technologies with out-of-support software packages like Windows 2003 and Informix. This article by Denny Cherry discusses Index Engines’ CyberSense solution, which can protect organizations from ransomware by scanning, validating, and counting as safe both older and modern platforms. CyberSense distinguishes itself from other solutions in the same industry by detecting encrypted files by looking at file metadata and data themselves, detecting even slow encryption through delta comparison of entropy scores. This unique form of detection helps protect organizations from ransomware, especially with the more targeted approach observed in recent attacks.


DR as a Service With JetStream Software

Organizations seeking an economical and easy way for data protection and efficient disaster recovery (DR) could turn to disaster recovery as a service (DRaaS). JetStream aims to provide organizations with extended data protection for both the private and public cloud to enable them to migrate to DRaaS solutions from legacy DR solutions and avoid costs that come with on-prem DR infrastructure. Thanks to its Continuous Data Protection (CDP) service, JetStream can offer minimal downtime, low recovery point objectives (RPO), and recovery time objectives (RTO). JetStream achieves this by leveraging cloud object storage that is economically viable and has both on-demand and reserved instances where compute/storage can be paid for as needed, instead of having to predict capacity. Read about the solution at Gestalt IT or catch the demo on the website.


Multi-Cloud Security Requires Multi-Cloud Observability With Forward Networks

Network observability, which includes real-time contextual data for in-depth analysis towards securing resilient networks in today’s rapidly evolving digital world, is crucial for businesses. However, lack of a unified visibility solution across various cloud platforms makes observability harder to achieve in multi-cloud environments. Forward Networks took a proactive approach and deployed cloud digital twin observability into major cloud platforms, extending their cutting-edge digital twin technology to increase multi-cloud observability and security. The company’s solutions offer deep observability and enhance security through tools like Path, Posture, and Blast Radius. This article by Chris Grundemann, sponsored by Forward Networks, provides more insight following their appearance at Cloud Field Day 16.


Cisco Wireless and a Common Management Strategy With Meraki Dashboard

The Meraki Dashboard provides Cisco with high levels of observability into its clients’ networks, giving the company access to data from 12 million online Meraki devices. Designed to be as automated as possible, the platform can perform sophisticated comparisons and assist in making predictive analyses while allowing the company to troubleshoot numerous networking issues easily. With its new business unit, Cisco Wireless, Cisco is focused on having a common management strategy, allowing it to deliver a more comprehensive and seamless experience across the Meraki and Catalyst wireless platforms. Read about the transition of the Meraki Dashboard through the years at Gestalt IT or watch the demo on the website.


Mako Networks – a World-Class PCI-Certified Network-As-A-Service Ecosystem

Mako Networks presented its own hardware and software as a service for retail edge at the recent Edge Field Day event, and this sponsored article by Ben Young dives deep into this concept. The company has made strides in the distributed retail enterprise business in North America and Europe, thanks to its all-in-one ecosystem. Mako technology is PCI-certified, making it a no-brainer choice for organizations that require ready compliance at the network layer, centralized management, and bulk configuration functionality.


Overcoming the Uncomfortable Aspects of Network Identity Management With Arista Networks’ CloudVision AGNI

Arista Networks presented its AI-driven NAC solution CloudVision AGNI at Mobility Field Day, hoping to achieve its potential for zero-trust security. AGNI expands Arista’s flagship CloudVision solution with features such as secure onboarding, dynamic access control, and AI-driven policy enforcement, among others. Built from scratch in the cloud, the solution embodies modern cloud-first principles, and it has a modern microservices architecture that delivers elastic scalability from tens to thousands of devices in a few clicks, self-service style onboarding for wireless with single sign-on (SSO), and reduced average deployment time from weeks to hours. Read more in this article by Sulagna Saha, and watch the entire presentation on the Tech Field Day website!


Elevating the Zoom Experience With Juniper Networks’ Marvis

Juniper Networks has updated its AI assistant, Marvis, to include Zoom data and ChatGPT to improve its ability to respond to complex networking queries. Marvis combines AI, ML, and data science to expedite operations and optimize user experience. The AI-powered predictive observability offered by Marvis allows users to solve technical errors efficiently, as AI algorithms are trained on billions of datasets, enabling them to magnify nuances long before a problem becomes an anomaly that affects the user experience. Read about it at Gestalt IT or watch the demo on the website.


Fortinet Takes on Even Bigger Challenges With FortiAIOps V2.0

The world has moved on from training humans to code to teaching computers to do it themselves. Fortinet’s FortiAIOps v2.0 is a fine specimen of that. Powered by more advanced AI, the new version of FortiAIOps offers broad monitoring capabilities, deep analytics, and sophisticated troubleshooting tools. Read about it on Gestalt IT or watch the demo on the website.


Excitement in the Air With Tech Field Day Extra at Cisco Live US 2023

Tech Field Day Extra returns to Cisco Live US 2023, featuring presentations from Cisco as well as Opengear and BackBox, streaming live on June 6 and 7. Tuesday begins with Opengear, followed by Cisco Enterprise, ThousandEyes, and Security. Wednesday features a presentation from BackBox and more presentations Cisco focused on IoT, Cloud and Compute, and Secure Policy. Check out the live stream on LinkedIn and the Tech Field Day website!


Defending Against the Widening Threat Landscape With Racktop BrickStor SP

Despite smaller businesses believing they are not significant targets for ransomware attacks, they are increasingly vulnerable with 62% of information security incidents targeting the top 2.1% of businesses, according to public records. RackTop’s BrickStor SP (Security Platform) provides easy and automatic cyberstorage solutions for SMBs and large organizations alike, not only encrypting data and creating a rolling snapshot of every file but also providing high-speed monitoring for unusual activity to detect data modifications such as those in ransomware attacks. BrickStor SP’s scalability makes it a fitting solution for any businesses, regardless of their size or net growth. This Gestalt IT Tech Note, sponsored by RackTop, gives Jody Lemoine’s perspective.


Active Defense Against Ransomware With RackTop Systems’ BrickStor SP

RackTop Systems’ BrickStor SP is an active cyberstorage solution safeguarding data assets against cybersecurity breaches. The software leverages a zero-trust architecture built on continuous validation before access grant. BrickStor SP’s data-centric zero-trust principle analyzes every user interaction for potential security alerts and provides real-time detection and quick response and recovery against threats such as insider theft and ransomware attacks through built-in encryption, policy-based key rotation and auditing, and user and entity behavior analysis. This article by Gerard Kavelines, sponsored by RackTop, explores BrickStor from the perspective of a network security expert.


RackTop BrickStor – Protecting Data Against Ransomware

Data storage and security solutions provider, RackTop Systems, has introduced its BrickStor Security Platform (SP) that is designed to cover both insider and external threats to prevent ransomware attacks that have become prevalent in recent months. Karen Lopes explores their Data-Centric Zero Trust Policy approach in this sponsored article. It evaluates user behavior, account permissions, file activity, metadata about files and the user, and other features to protect unstructured data for SMB and NFS file shares, thereby enabling speedy detection and lock-out that saves money and time for the resumption of normal operations. The platform also identifies user behavior anomalies with User and Entity Behavior Analysis and, once detected, stops all access by that user that was the weak point.


Analyzing Wi-Fi on Site With NetAlly CyberScope

As technology advances, network security for modern architectures must prioritize their legacy applications to support endless use cases while accommodating more dispersed and transitory users than ever with BYOD, utility management, digital signage, and the continuous expansion of new devices joining the network. NetAlly’s CyberScope offers sophisticated deep dive capabilities into device attributes, unauthorized endpoint discovery and easy-to-spot errors and failures allowing technicians to locate and analyze Wi-Fi site assessments on one all-in-one portable analyzer. Network managers can use CyberScope’s visibility to perform real-time security analysis, enabling them to stay updated and manage the network in a more efficient and secure manner with total visibility of the system. Read about it on Gestalt IT or watch NetAlly’s presentation of the solution on the website.


The Power of Expertise at Ventev

Tom Hollingsworth explores Ventev’s capabilities in wireless antennas and enclosures. The company has experts in IoT and industrial segments, and provides solutions for a variety of wireless challenges, including hostile environments. Ventev’s IoT solutions, such as the integrated enclosure solution that matches Aruba switches, include AC, DC power, and UPS, ensuring the network’s safety during power outages. The combination of expertise in research and data analysis, antenna designs, and power suggests that it may be worth consulting with Ventev for almost any wireless project.


Identity-Centric and Data-Centric Security With RackTop BrickStor

RackTop Systems’ BrickStor is a comprehensive cyberstorage solution that helps organizations secure their digital assets from ransomware attacks with an identity-centric and data-centric approach. This sponsored article by Chris Grundemann explores the system’s zero trust architectures for the effective authorization of subject and resource ensuring only approved access is granted. BrickStor’s active security platform uniquely intersects identity and data-centric security with encryption, policy-based key rotation, auditing, and UEBA and SOAR capabilities to begin securing data from day one, over unstructured data.


Mako Networks – Security-First Networking at the Edge

At Edge Field Day, Mako Networks demonstrated their comprehensive set of network appliances and services that include security gateways, managed switches, and access points, to solve networking problems in the retail sector. Their Mako system, consisting of wireless and wired technology components, was designed from the ground up to comply with the widely-accepted PCI DSS Level 1 security standard, addressing the unique challenges of the retail, healthcare, and MNSP industry verticals and emphasizing the importance of organizations protecting customer data. Mako’s focus on security and serving the specific needs of these industries differentiates their product, making it a must-have solution for organizations with critical governance and compliance needs. This sponsored Tech Note by Carl Fugate explores the Mako offerings.


Meet Field Day Delegate – Raymond Hendrix, Owner of Wi-Fi Wise International

Raymond Hendrix is a new Field Day delegate who serves the RF side of communication, particularly in the wireless domain. He has expanded his IT knowledge through military training, learning about token ring networking and electronic warfare and working with a 16-kilowatt jamming vehicle growing his interest in RF and antennas. His biggest challenge is obtaining clear requirements from customers, requiring effective communication skills in his field. Meet Raymond in this discussion with Tom Hollingsworth.


Meet Field Day Delegate – Kerry Kulp, Founding Partner at Velaspan

This article introduces Kerry Kulp, Founding Partner of Velaspan, who was among the new delegates attending Mobility Field Day 9. Kulp wears many hats at Velaspan, fulfilling roles in business leadership, development, and consulting. In a conversation with Tom Hollingsworth, Kulp shares his journey into the IT industry, his early days in wireless and mobility, and his interests in technology, particularly cybersecurity.