SecureX Cisco’s Security Platform

Event: Tech Field Day Virtual Cisco Live Experience

Appearance: Cisco Security Presents at Tech Field Day Virtual Cisco Live Experience

Company: Cisco

Video Links:

Personnel: Ben Greenbaum

Cisco has been building an integrated security architecture for years. Threat Response was the flagship portal into that integration. With SecureX, Cisco is taking it several steps further. In this session, you’ll see what that means for Cisco customers, how it will lead to greater operational effectiveness and improved situational awareness, and how the power of integration unlocks maximum value from the products you already have.


Cisco Wireless Technologies and Use Cases in Industrial IoT

Event: Tech Field Day Virtual Cisco Live Experience

Appearance: Cisco IoT Presents at Tech Field Day Virtual Cisco Live Experience

Company: Cisco

Video Links:

Personnel: Patrick Grossetete

This session dives into the many domain-specific wireless network technologies that are available and overviews the Cisco IoT Wireless portfolio and future evolution.


Networking Field Day Experience Roundtable: The Rise of Cloud

Event: Networking Field Day Experience at Aruba Atmosphere Digital

Appearance: Networking Field Day Roundtable at Aruba Atmosphere Digital

Company: HPE Aruba Networking

Video Links:

Personnel: Drew Conry-Murray, Jason N. Beshara, Jennifer Huber, Jennifer Minella, Jonathan Davis, Keith R. Parsons, Mitch Dickey, Nick Shoemaker, Tom Hollingsworth

Cloud is everywhere. It is leading the charge for digital transformation and changing the way we do business daily. But what does cloud offer for traditional infrastructure players? Is there room in the cloud for wireless or networking or even infrastructure security? Join Tom Hollingsworth and the Networking Field Day Experience delegates as they get their head out of the clouds and take a look at what it all means.


Networking Field Day Experience Roundtable: The New Edge

Event: Networking Field Day Experience at Aruba Atmosphere Digital

Appearance: Networking Field Day Roundtable at Aruba Atmosphere Digital

Company: HPE Aruba Networking

Video Links:

Personnel: Drew Conry-Murray, Jason N. Beshara, Jennifer Huber, Jennifer Minella, Jonathan Davis, Keith R. Parsons, Mitch Dickey, Nick Shoemaker, Tom Hollingsworth

The rise of Internet of Things (IoT) is driving digital transformation at a rapid pace. What role can the wireless edge play in this shift? What can traditional infrastructure vendors play in determining who the owners and facilitators of this new edge might be? Join the Networking Field Day Experience delegates and Tom Hollingsworth as they explore these ideas and try to find out what the new edge looks like.


Powering the Aruba Zero Trust Network

Event: Networking Field Day Experience at Aruba Atmosphere Digital

Appearance: Powering the Aruba Zero Trust Network

Company: HPE Aruba Networking

Video Links:

Personnel: Marc Ibanez, Samuel Perez, Viwesh Ananthakrishnan

Zero Trust is a hot topic with a wide variety of definitions and applications. Applying a Zero Trust approach to the network starts with user and device visibility combined with integrated identity-based access control. This session will showcase the integrated, end-to-end network-powered Zero Trust that is built into Aruba networks including ClearPass Device Insight (device discovery and profiling) and ClearPass Policy Manager (access control and segmentation).


Breaking Down Network Siloes with an Aruba Unified Infrastructure

Event: Networking Field Day Experience at Aruba Atmosphere Digital

Appearance: Breaking Down Network Siloes with an Aruba Unified Infrastructure

Company: HPE Aruba Networking

Video Links:

Personnel: Justin Noonan, Jyothi Sreekumar, Samuel Perez, Scott Calzia, Steve Brar, William Choe

Siloed management of WAN, wired, and wireless networks—orchestrated by standalone tools—creates IT complexity that often leads to downtime and user experience concerns.
It’s time to break down the silos. Tune in as Aruba shares its vision for a unified infrastructure that drives simplicity across campus, branch, re¬¬mote worker, and data center locations. Discover how IT can streamline deployments, strengthen security measures, and ensure the best user experience—all from a single pane of glass.


Aruba Using AIOps to Redefine IT Outcomes

Event: Networking Field Day Experience at Aruba Atmosphere Digital

Appearance: Using Aruba AIOps to Redefine IT Outcomes

Company: HPE Aruba Networking

Video Links:

Personnel: Jose Tellado, Jyothi Sreekumar, Patrick LaPorte, Rajesh Bhagwat, Sri Ventkiteswaran

Aruba AIOps allows network operations teams to react and resolve reported issues quickly, eliminate support tickets by predicting and preempting issues before they impact users or the business and exceed SLAs by continuously implementing optimization recommendations based on learnings from peers.


Juniper Encrypted Traffic Analysis Overview

Event: Security Field Day 3

Appearance: Juniper Networks Presents at Security Field Day 3

Company: Juniper Networks

Video Links:

Personnel: Krystle Portocarrero

With encryption on the rise and challenges in decryption for both privacy and technical reasons, this presentation and demonstration show one of Juniper’s most recent product announcements for ETA, or Encrypted Traffic Analysis. Juniper is introducing the ability to detect malicious activity over encrypted traffic without the need for interception and decryption. We will describe Juniper’s approach and the technology that makes it all possible.


Juniper Demo Multicloud Connected Security

Event: Security Field Day 3

Appearance: Juniper Networks Presents at Security Field Day 3

Company: Juniper Networks

Video Links:

Personnel: Josh McKenzie

SRX-enforced security policies, enabling L4-L7 traffic inspection for known and unknown malware, are deployed across AWS and Azure using a single set of metadata tags to follow instances as they are created. After a threat is detected, effected hosts are automatically isolated from the rest of the network.


Juniper Multicloud Connected Security

Event: Security Field Day 3

Appearance: Juniper Networks Presents at Security Field Day 3

Company: Juniper Networks

Video Links:

Personnel: Josh McKenzie

Enterprises are increasingly shifting workloads to the cloud to take advantage of dynamic scaling and flexible deployment options. This also introduces new challenges for security administrators, especially when multiple cloud environments need to work together. Learn how we can leverage the metadata features across various cloud environments to describe workloads and extend security policies that adapt alongside your services no matter what cloud provider hosts them.


Juniper AI for a Threat Aware Network

Event: Security Field Day 3

Appearance: Juniper Networks Presents at Security Field Day 3

Company: Juniper Networks

Video Links:

Personnel: Krystle Portocarrero

Enterprises have to strike a delicate balance between business agility and security which can often be seen at odds with one another. By leveraging machine learning data driven improvements can be made by providing more efficient and effective security models. Combining signals from both the network and security infrastructure you already have in place, you can start to not only automate the detection but also the defense against malicious activity. You need context to accurately determine the full severity of an event before you can start remediating the threat. By correlating multiple events into high fidelity signals we can more accurately confirm what devices have been compromised and effectively use automation to remediate, reducing your risk and shorten time to resolution.


Juniper Connected Security Overview

Event: Security Field Day 3

Appearance: Juniper Networks Presents at Security Field Day 3

Company: Juniper Networks

Video Links:

Personnel: Oliver Schuermann

Join Oliver Schuermann as he gives a brief overview of the Juniper Connected Security strategy, which allows customers to take advantage of their Juniper infrastructure, as well as other components to create a Threat Aware Network. Juniper Connected Security is about Safeguarding Users, Applications, and Infrastructure by extending security to all points of connection across the network. Security, or classic perimeter-based security, is now converging with the network.


Tempered Cloud, Virtualization, Containers, and APIs

Event: Security Field Day 3

Appearance: Tempered Presents at Security Field Day 3

Company: Tempered

Video Links:

Personnel: Thomas Kee

In this video, Thomas will cover the finer details of virtualization, cloud, containers, and APIs for Tempered. He’s been driving the engagement with cloud applications and marketplaces.


Tempered Host Identity Protocol (HIP): Identities and Trust and Achieving Zero Trust Security

Event: Security Field Day 3

Appearance: Tempered Presents at Security Field Day 3

Company: Tempered

Video Links:

Personnel: Ludwin Fuchs

In this video, Ludwin Fuchs, the authority on Host Identity Protocol (HIP) will cover identities, trust, the networking data plane, and intelligent multi-homing


What Is Tempered Airwall?

Event: Security Field Day 3

Appearance: Tempered Presents at Security Field Day 3

Company: Tempered

Video Links:

Personnel: Bryan Skene

In this session we will discuss lessons learned in the trenches, what is the Tempered Airwall Solution for Zero Trust Network Access, have an overview of our platform, and short demos.


Who Is Tempered?

Event: Security Field Day 3

Appearance: Tempered Presents at Security Field Day 3

Company: Tempered

Video Links:

Personnel: Jeff Hussey

Our CEO and founder, Jeff Hussey founded F5 Networks and changed the world. He’s out to do that again. Tempered is his vision of a secure and private connected world. Learn more about it in this video.

In this session we will discuss lessons learned in the trenches, what is the Tempered Airwall Solution for Zero Trust Network Access, have an overview of our platform, and short demos.


VMware Introduction to the VMware NSX Web Application Firewall

Event: Security Field Day 3

Appearance: VMware Presents at Security Field Day 3

Company: VMware by Broadcom

Video Links:

Personnel: Ashish Shah

VMware’s Intelligent Web Application Firewall solution provides application security and networking teams with an elastic and analytics-driven solution that scales and simplifies policy customization and administration through central management.

The WAF solution gives administrators an important point of security enforcement and intelligence, protecting web applications from common vulnerabilities as identified by OWASP, such as SQL Injection (SQLi) and Cross-site Scripting (XSS), while providing the ability to customize the rule set for each application. It analyzes security rules that match a particular transaction and provides that insight in real-time as applications and attack patterns are learned. This application intelligence, paired with intuitive one-click rule customization, allows VMware’s WAF to sharply reduce false-positives.


VMware NSX Intelligence: Policy Creation & Microsegmentation Made Easy

Event: Security Field Day 3

Appearance: VMware Presents at Security Field Day 3

Company: VMware by Broadcom

Video Links:

Personnel: Ray Budavari

NSX Intelligence is a distributed analytics engine built natively into NSX-T that provides continuous data center-wide visibility for network and application security teams, helping them deliver a more granular and dynamic security posture, simplify compliance analysis, and streamline security operations. NSX Intelligence provides deep insight at the packet level into virtualized and containerized workloads, allowing for intuitive, highly automated network and security policy generation and enforcement.

NSX Intelligence helps eliminate blind spots to reduce security risk and accelerate security incident remediation through visualization and deep insight into every flow across the entire datacenter. Users gain holistic context for security troubleshooting and improve collaboration between infrastructure and security teams through a converged pane for security operations. Together with VMware vRealize Network Insight and NSX Intelligence, customers can gain comprehensive visibility, analytics and troubleshooting to improve network and security operations.


VMware NSX Distributed Intrusion Detection & Prevention (IDS/IPS)

Event: Security Field Day 3

Appearance: VMware Presents at Security Field Day 3

Company: VMware by Broadcom

Video Links:

Personnel: Dhruv Jain, Stijn Vanveerdeghem

VMware NSX Distributed IDS/IPS is an application-aware traffic inspection engine purpose built for analyzing internal east-west traffic and detecting lateral threat movements. The engine runs within the hypervisor to optimize packet inspection. NSX Distributed IDS/IPS combines industry-leading signature sets, protocol decoders and anomaly detection-based mechanisms to hunt for known and unknown attacks in the traffic flow. It also benefits from rich application context, driving lower false positive rates while incurring minimal computational overhead on the host.


Introduction to the VMware Service-Defined Firewall

Event: Security Field Day 3

Appearance: VMware Presents at Security Field Day 3

Company: VMware by Broadcom

Video Links:

Personnel: Dhruv Jain, Stijn Vanveerdeghem

VMware Service-defined Firewall is an innovative approach to internal firewalling that reduces the attack surface for on-premises and cloud environments with security that is an intrinsic part of the infrastructure. The VMware Service- defined Firewall combines unprecedented application visibility and understanding of known good application behavior with intelligent, automated and adaptive firewalling capabilities to help better protect apps, data and users.

This solution works bare metal, VM and container-based application environments, and will support hybrid cloud environments such as VMware Cloud on AWS and AWS Outposts in the future. Enterprises can use this solution as their sole firewall solution for their internal needs.