Breaking Down Network Siloes with an Aruba Unified Infrastructure

Event: Networking Field Day Experience at Aruba Atmosphere Digital

Appearance: Breaking Down Network Siloes with an Aruba Unified Infrastructure

Company: HPE Aruba Networking

Video Links:

Personnel: Justin Noonan, Jyothi Sreekumar, Samuel Perez, Scott Calzia, Steve Brar, William Choe

Siloed management of WAN, wired, and wireless networks—orchestrated by standalone tools—creates IT complexity that often leads to downtime and user experience concerns.
It’s time to break down the silos. Tune in as Aruba shares its vision for a unified infrastructure that drives simplicity across campus, branch, re¬¬mote worker, and data center locations. Discover how IT can streamline deployments, strengthen security measures, and ensure the best user experience—all from a single pane of glass.


Aruba Using AIOps to Redefine IT Outcomes

Event: Networking Field Day Experience at Aruba Atmosphere Digital

Appearance: Using Aruba AIOps to Redefine IT Outcomes

Company: HPE Aruba Networking

Video Links:

Personnel: Jose Tellado, Jyothi Sreekumar, Patrick LaPorte, Rajesh Bhagwat, Sri Ventkiteswaran

Aruba AIOps allows network operations teams to react and resolve reported issues quickly, eliminate support tickets by predicting and preempting issues before they impact users or the business and exceed SLAs by continuously implementing optimization recommendations based on learnings from peers.


Juniper Encrypted Traffic Analysis Overview

Event: Security Field Day 3

Appearance: Juniper Networks Presents at Security Field Day 3

Company: Juniper Networks

Video Links:

Personnel: Krystle Portocarrero

With encryption on the rise and challenges in decryption for both privacy and technical reasons, this presentation and demonstration show one of Juniper’s most recent product announcements for ETA, or Encrypted Traffic Analysis. Juniper is introducing the ability to detect malicious activity over encrypted traffic without the need for interception and decryption. We will describe Juniper’s approach and the technology that makes it all possible.


Juniper Demo Multicloud Connected Security

Event: Security Field Day 3

Appearance: Juniper Networks Presents at Security Field Day 3

Company: Juniper Networks

Video Links:

Personnel: Josh McKenzie

SRX-enforced security policies, enabling L4-L7 traffic inspection for known and unknown malware, are deployed across AWS and Azure using a single set of metadata tags to follow instances as they are created. After a threat is detected, effected hosts are automatically isolated from the rest of the network.


Juniper Multicloud Connected Security

Event: Security Field Day 3

Appearance: Juniper Networks Presents at Security Field Day 3

Company: Juniper Networks

Video Links:

Personnel: Josh McKenzie

Enterprises are increasingly shifting workloads to the cloud to take advantage of dynamic scaling and flexible deployment options. This also introduces new challenges for security administrators, especially when multiple cloud environments need to work together. Learn how we can leverage the metadata features across various cloud environments to describe workloads and extend security policies that adapt alongside your services no matter what cloud provider hosts them.


Juniper AI for a Threat Aware Network

Event: Security Field Day 3

Appearance: Juniper Networks Presents at Security Field Day 3

Company: Juniper Networks

Video Links:

Personnel: Krystle Portocarrero

Enterprises have to strike a delicate balance between business agility and security which can often be seen at odds with one another. By leveraging machine learning data driven improvements can be made by providing more efficient and effective security models. Combining signals from both the network and security infrastructure you already have in place, you can start to not only automate the detection but also the defense against malicious activity. You need context to accurately determine the full severity of an event before you can start remediating the threat. By correlating multiple events into high fidelity signals we can more accurately confirm what devices have been compromised and effectively use automation to remediate, reducing your risk and shorten time to resolution.


Juniper Connected Security Overview

Event: Security Field Day 3

Appearance: Juniper Networks Presents at Security Field Day 3

Company: Juniper Networks

Video Links:

Personnel: Oliver Schuermann

Join Oliver Schuermann as he gives a brief overview of the Juniper Connected Security strategy, which allows customers to take advantage of their Juniper infrastructure, as well as other components to create a Threat Aware Network. Juniper Connected Security is about Safeguarding Users, Applications, and Infrastructure by extending security to all points of connection across the network. Security, or classic perimeter-based security, is now converging with the network.


Tempered Cloud, Virtualization, Containers, and APIs

Event: Security Field Day 3

Appearance: Tempered Presents at Security Field Day 3

Company: Tempered

Video Links:

Personnel: Thomas Kee

In this video, Thomas will cover the finer details of virtualization, cloud, containers, and APIs for Tempered. He’s been driving the engagement with cloud applications and marketplaces.


Tempered Host Identity Protocol (HIP): Identities and Trust and Achieving Zero Trust Security

Event: Security Field Day 3

Appearance: Tempered Presents at Security Field Day 3

Company: Tempered

Video Links:

Personnel: Ludwin Fuchs

In this video, Ludwin Fuchs, the authority on Host Identity Protocol (HIP) will cover identities, trust, the networking data plane, and intelligent multi-homing


What Is Tempered Airwall?

Event: Security Field Day 3

Appearance: Tempered Presents at Security Field Day 3

Company: Tempered

Video Links:

Personnel: Bryan Skene

In this session we will discuss lessons learned in the trenches, what is the Tempered Airwall Solution for Zero Trust Network Access, have an overview of our platform, and short demos.


Who Is Tempered?

Event: Security Field Day 3

Appearance: Tempered Presents at Security Field Day 3

Company: Tempered

Video Links:

Personnel: Jeff Hussey

Our CEO and founder, Jeff Hussey founded F5 Networks and changed the world. He’s out to do that again. Tempered is his vision of a secure and private connected world. Learn more about it in this video.

In this session we will discuss lessons learned in the trenches, what is the Tempered Airwall Solution for Zero Trust Network Access, have an overview of our platform, and short demos.


VMware Introduction to the VMware NSX Web Application Firewall

Event: Security Field Day 3

Appearance: VMware Presents at Security Field Day 3

Company: VMware by Broadcom

Video Links:

Personnel: Ashish Shah

VMware’s Intelligent Web Application Firewall solution provides application security and networking teams with an elastic and analytics-driven solution that scales and simplifies policy customization and administration through central management.

The WAF solution gives administrators an important point of security enforcement and intelligence, protecting web applications from common vulnerabilities as identified by OWASP, such as SQL Injection (SQLi) and Cross-site Scripting (XSS), while providing the ability to customize the rule set for each application. It analyzes security rules that match a particular transaction and provides that insight in real-time as applications and attack patterns are learned. This application intelligence, paired with intuitive one-click rule customization, allows VMware’s WAF to sharply reduce false-positives.


VMware NSX Intelligence: Policy Creation & Microsegmentation Made Easy

Event: Security Field Day 3

Appearance: VMware Presents at Security Field Day 3

Company: VMware by Broadcom

Video Links:

Personnel: Ray Budavari

NSX Intelligence is a distributed analytics engine built natively into NSX-T that provides continuous data center-wide visibility for network and application security teams, helping them deliver a more granular and dynamic security posture, simplify compliance analysis, and streamline security operations. NSX Intelligence provides deep insight at the packet level into virtualized and containerized workloads, allowing for intuitive, highly automated network and security policy generation and enforcement.

NSX Intelligence helps eliminate blind spots to reduce security risk and accelerate security incident remediation through visualization and deep insight into every flow across the entire datacenter. Users gain holistic context for security troubleshooting and improve collaboration between infrastructure and security teams through a converged pane for security operations. Together with VMware vRealize Network Insight and NSX Intelligence, customers can gain comprehensive visibility, analytics and troubleshooting to improve network and security operations.


VMware NSX Distributed Intrusion Detection & Prevention (IDS/IPS)

Event: Security Field Day 3

Appearance: VMware Presents at Security Field Day 3

Company: VMware by Broadcom

Video Links:

Personnel: Dhruv Jain, Stijn Vanveerdeghem

VMware NSX Distributed IDS/IPS is an application-aware traffic inspection engine purpose built for analyzing internal east-west traffic and detecting lateral threat movements. The engine runs within the hypervisor to optimize packet inspection. NSX Distributed IDS/IPS combines industry-leading signature sets, protocol decoders and anomaly detection-based mechanisms to hunt for known and unknown attacks in the traffic flow. It also benefits from rich application context, driving lower false positive rates while incurring minimal computational overhead on the host.


Introduction to the VMware Service-Defined Firewall

Event: Security Field Day 3

Appearance: VMware Presents at Security Field Day 3

Company: VMware by Broadcom

Video Links:

Personnel: Dhruv Jain, Stijn Vanveerdeghem

VMware Service-defined Firewall is an innovative approach to internal firewalling that reduces the attack surface for on-premises and cloud environments with security that is an intrinsic part of the infrastructure. The VMware Service- defined Firewall combines unprecedented application visibility and understanding of known good application behavior with intelligent, automated and adaptive firewalling capabilities to help better protect apps, data and users.

This solution works bare metal, VM and container-based application environments, and will support hybrid cloud environments such as VMware Cloud on AWS and AWS Outposts in the future. Enterprises can use this solution as their sole firewall solution for their internal needs.


PathSolutions TotalView SecOps Manager Demo

Event: Security Field Day 3

Appearance: PathSolutions Presents at Security Field Day

Company: PathSolutions

Video Links:

Personnel: Tim Titus

In this presentation, Tim Titus reviews PathSolutions TotalView SecOps Manager and demonstrates the capabilities of the product as it relates to networking and security professionals in the small and medium enterprise market.


PathSolutions TotalView Security Operations Manager

Event: Security Field Day 3

Appearance: PathSolutions Presents at Security Field Day

Company: PathSolutions

Video Links:

Personnel: Tim Titus

In this presentation, learn about the problems with visibility and SOAR software as well as how PathSolutions TotalView optimizes SOAR and SecOps teams to keep your network secure from threats.


Red Hat Strategic Outlook of the Container Market

Event: Tech Field Day Virtual with Red Hat

Appearance: Tech Field Day Virtual with Red Hat Afternoon Session

Company: Red Hat

Video Links:

Personnel: Brian Gracely

Brian Gracely (@bgracely) is presenting on the state of Kubernetes in the marketplace, from project growth to community adoption to on-going trends. He looks at how the Kubernetes ecosystem is evolving beyond Kubernetes. And he explores how Hybrid Cloud is as much a business-centric decision than a technology-centric decision.


Red Hat Advanced Kubernetes Networking

Event: Tech Field Day Virtual with Red Hat

Appearance: Tech Field Day Virtual with Red Hat Afternoon Session

Company: Red Hat

Video Links:

Personnel: Marc Curry

Marc Curry- Product Manager will discuss how Red hat is leading in Kubernetes networking innovations. Viewers will learn about stability and security features for OpenShift. He will review performance and scale features on OpenShift 4.4. Viewers will learn how Red Hat is building new features to market to enable 5G and edge computing. Finally, he will review the innovative multus plug-in, ipv6, and multi network support in OpenShift 4.4


Red Hat Virtualization with OpenShift

Event: Tech Field Day Virtual with Red Hat

Appearance: Tech Field Day Virtual with Red Hat Afternoon Session

Company: Red Hat

Video Links:

Personnel: Andrew Sullivan

Fabian Deutsch -Engineering Manager and Andrew Sullivan- Technical Marketing Manager will walk through the latest OpenShift 4.4 feature, OpenShift virtualization based on KubeVirt. OpenShift 4.4 provides a single platform to manage your virtual machines and containers. OpenShift 4.4 discusses the benefits for infrastructure owners and application developers. VIewers will see a demonstration of OpenShift
virtualization.