Automation Anywhere Product Deep Dive

Event: Tech Field Day 19

Appearance: Automation Anywhere Presents at Tech Field Day 19

Company: Automation Anywhere

Video Links:

Personnel: Steve Shah

Steve Shah covers the technical aspects for using RPA in combination with AI to reengineer the future with the industry’s most sophisticated architecture and secure RPA platform.

Steve Shah, head of the RPA product team at Automation Anywhere, gave an in-depth presentation at Tech Field Day 19, emphasizing how RPA can be seamlessly integrated with AI to build the next generation of enterprise automation. Shah highlighted the platform’s user-friendliness, making it accessible even for non-programmers who typically engage in Excel or basic function writing. He stressed how ease of use is paramount for business users and IT operators, allowing them to construct bots using intuitive web interfaces, drag-and-drop functionalities, and logical flowcharts. This approach reduces the learning curve and enables rapid adoption and deployment within organizations.

On the IT operations front, Shah discussed the importance of scalable and secure bot management, including governance and cost-efficiency. As businesses expand RPA usage, managing thousands of bots requires robust governance, security policies, and an efficient infrastructure to ensure seamless operation. He pointed out that Automation Anywhere’s platform addresses these needs by supporting both attended and unattended bot scenarios, with tools for secure password storage, detailed audit trails, and integrations with industry-standard security systems like CyberArk. Additionally, the architecture supports both on-premise and cloud deployments, providing flexibility and adherence to privacy standards.

Shah also addressed developers, emphasizing the newly introduced ability to integrate inline scripting within bots, supporting languages like Python and VBScript. This capability allows developers to create sophisticated automation by marrying business process workflows with powerful machine learning libraries. The addition of developer-centric features such as debugging tools, version control, and diff tools ensures that the platform can cater to complex automation needs, capable of connecting with both modern SaaS applications and legacy systems. Automation Anywhere aims to facilitate a collaborative environment where varied expertise—ranging from business users to seasoned developers—can harness the platform’s capabilities to its fullest.


Automation Anywhere Portfolio and Roadmap

Event: Tech Field Day 19

Appearance: Automation Anywhere Presents at Tech Field Day 19

Company: Automation Anywhere

Video Links:

Personnel: Abhijit Kakhandiki

Abhijit Kakhandiki will share the latest advancements in Digital Workers as it pertains to ready-to-deploy digital personas with higher cognitive/analytical abilities than contemporary bots plus how to implement them in the cloud. In the presentation, Abhijit Kakhandiki, who leads products and engineering for Automation Anywhere, outlines the company’s comprehensive product vision which intertwines Robotic Process Automation (RPA) with Artificial Intelligence (AI). He explains how the synergy between RPA and AI is pivotal, with RPA feeding data and context to AI, which in turn enhances RPA by extracting signal from noise. The broader vision focuses on delivering a versatile digital workforce platform that can suit small to large enterprises, allowing them to scale and personalize their services. The platform’s versatility is emphasized through its capability to be utilized by varying roles within companies, from business people to IT professionals and bot developers, across different consumption models (public cloud, private cloud, or on-premise).

Kakhandiki elaborates on the different stakeholders involved in deploying a digital workforce successfully: business users, IT, and developers. Business users prioritize ease of use, ROI, and maximum process automation incorporating decision-making powered by AI. IT’s concerns revolve around scalability, security, and the smooth integration of the platform into their enterprise ecosystem, ensuring centralized control and the prevention of bots going rogue. Developers, ranging from novice business users to advanced programmers, benefit from features like drag-and-drop bot creation and the option to build more sophisticated bots using Java or Python, which promotes better engagement with the platform from varying skill levels. The three principles guiding their product vision—working for any size company, being adoptable by anyone, and providing flexible deployment options—are critical to meeting these diverse stakeholder needs.

Touching on the portfolio, Kakhandiki introduces a suite of products like the IQ Bot line for AI capabilities and Bot Insight for business and operational analytics. The IQ Bot line focuses on enabling bots to learn from transactions, thereby increasing their intelligence and adapting over time. Bot Insight provides critical insights across human and bot activities, aiding in the identification of patterns and potential business growth opportunities. The platform’s support for thousands of bots is underscored, addressing the need for effective management, scalability, and cost optimization. Additionally, Kakhandiki emphasizes the role of their bot store, which features a plethora of bots, many developed by partners, and the release of the command SDK for developers to contribute and monetize their own automation commands. The platform is designed to provide end-to-end AI model lifecycle support, facilitating complex automations and enabling businesses to leverage domain intelligence for tasks such as mortgage processing and customer service inquiries.


Automation Anywhere Introduction to RPA

Event: Tech Field Day 19

Appearance: Automation Anywhere Presents at Tech Field Day 19

Company: Automation Anywhere

Video Links:

Personnel: Mihir Shukla

Mihir Shukla welcomes the Tech Field Day audience. He illustrates the business imperative in adopting the RPA platform to building a Digital Workforce.

In his presentation at Tech Field Day 19, Mihir Shukla underscores the journey and vision behind Automation Anywhere and its Robotic Process Automation (RPA) platform. He describes his own evolution from a passionate developer who initially saw programming as a form of art to an innovator aiming to solve the significant inefficiencies created by using human labor to connect disparate software applications. This realization led him to found his sixth startup, focusing on what is now known as RPA, which aims to turn every application’s interface into a virtual API, effectively allowing for widespread automation.

Shukla highlights the transformative potential of automation in the workplace, arguing that automating routine and repetitive tasks can free human workers from “robotic” jobs and enable them to engage in more creative and meaningful activities. The Automation Anywhere platform democratizes automation by making it accessible not only to developers but also to business users, thus broadening the impact and utility of the technology. By leveraging AI and an ecosystem of third-party developers through the Automation Anywhere Bot Store, the company envisions a future where digital assistants are ubiquitous, significantly altering the nature of work.

The long-term vision presented by Shukla is ambitious and optimistic. He imagines a world where every job is augmented by a digital assistant, leading to a significant increase in the number of roles requiring higher levels of creativity and innovation. Shukla stresses the societal importance of this shift, envisioning a future where technology not only enhances productivity and efficiency but also fundamentally redefines what work is. This vision aligns with a broader goal of creating a more fulfilling and democratized workforce, where technology serves as a powerful equalizer and enabler of human potential.


NetApp User Behavior Analytics

Event: Tech Field Day 19

Appearance: NetApp Presents at Tech Field Day 19

Company: NetApp

Video Links:

Personnel: James Holden

How Cloud Insights upcoming feature will be able to detect insider threats, malware, and other malicious activity on the data and help prevent further damage.


NetApp Cost Optimization in the Cloud

Event: Tech Field Day 19

Appearance: NetApp Presents at Tech Field Day 19

Company: NetApp

Video Links:

Personnel: James Holden

Rapid innovation in the Cloud can lead to out of control costs. This upcoming feature of Cloud Insights provides recommendations tailored to the forecasted behavior with dollar savings based on actual billing data.


NetApp Deeper Dive into Kubernetes Support

Event: Tech Field Day 19

Appearance: NetApp Presents at Tech Field Day 19

Company: NetApp

Video Links:

Personnel: James Holden

New technology, with similar problems found from monitoring a cloud environment, just more complex and requiring data and analytics to help solve.


NetApp Overview of Cloud Insights

Event: Tech Field Day 19

Appearance: NetApp Presents at Tech Field Day 19

Company: NetApp

Video Links:

Personnel: James Holden

The why, what’s and how’s of Cloud Insights, monitoring the Cloud and on-premises environments. Troubleshooting end to end of resources and optimize infrastructure with right sizing and reclamation of waste.


Ixia Public, Private, and Hybrid Cloud Visibility

Event: Tech Field Day 19

Appearance: Keysight Technologies Presents at Tech Field Day 19

Company: Ixia

Video Links:

Personnel: Sushil Srinivasan

Businesses typically use 2-3 public cloud providers for compute, application and services. Add to this the complexities of container based applications, it is easy to feel overwhelmed when trying to optimize and secure these hybrid networks. But visibility is the cloud, be it on-premise or in the cloud need not be elusive. Sr Product Manager Sushil Srinivasan talks about Ixia’s CloudLens solution, built as a cloud-native solution to virtually tap and securely access customer data for analytics, be it compliance, security threats or for network optimization.


Ixia Visibility and Performance Monitoring with the Vision Edge 1S

Event: Tech Field Day 19

Appearance: Keysight Technologies Presents at Tech Field Day 19

Company: Ixia

Video Links:

Personnel: Taran Singh

A lot of network, application and user data is generated at the edge of the network, a factory floors, hundreds of branch offices, and everything in between. A lot of this data never makes it to the central/regional data centers that have network and security teams operating tools to ensure their networks are safe and working at their best. In this session Sr Director Taran Singh discusses the need to have tools placed right where the data is, and the introduction of their latest edge solution, the Vision Edge 1S helps customers steer traffic to local tools for analysis, generate flow data or use remote troubleshooting capabilities, all in one.


Ixia Introducing the Vision X Network Packet Broker

Event: Tech Field Day 19

Appearance: Keysight Technologies Presents at Tech Field Day 19

Company: Ixia

Video Links:

Personnel: Taran Singh

We don’t see it around us but edge applications that make use of data across vast networks and across data centers is driving tremendous growth of data in hybrid data centers. Network upgrades from 10Gbps to 40Gbps to 100Gbps is happening ever so rapidly.
Sr Director Taran Singh talks about the latest release of its flag family of Vision™ network packet brokers, the Vision X. Being a modular platform with very high density and configurability allows customers to keep up with data growth and an ability to capture everything in the network today and tomorrow.


Ixia Network Visibility Fundamentals

Event: Tech Field Day 19

Appearance: Keysight Technologies Presents at Tech Field Day 19

Company: Ixia

Video Links:

Personnel: Recep Ozdag

Recep Ozdag, VP of Network Visibility Business at Ixia (A Keysight Business) talks about Keysight Technologies and the business of providing network visibility solutions to Fortune 1000 businesses and Tier-1 and 2 service providers worldwide. Ixia provides foremost solutions for data access across on-premise and hybrid cloud environments for optimizing network operations and providing real-time access to network data for security operations.


Ixia Company Introduction

Event: Tech Field Day 19

Appearance: Keysight Technologies Presents at Tech Field Day 19

Company: Ixia

Video Links:

Personnel: Recep Ozdag

An introduction to Ixia, a Keysight Business. The acquisition of Ixia by Keysight Technologies pairs two strong, complementary innovation companies. Ixia brings deep expertise in IP network assessment and a software-centric business team. The result is a set of leading-edge test and visibility solutions that address the fastest-growing communications and networking trends including 5G, IoT, security, cloud, and application performance across the network.


Illumio Segmentation Has Nothing To Do With Vulnerability Management

Event: Security Field Day 2

Appearance: Illumio Presents at Security Field Day 2

Company: Illumio

Video Links:

Personnel: Pierre-Louis Gingembre

Myth III: Segmentation has nothing to do with vulnerability management. Vulnerabilities are inevitable and they must be patched.

BUSTED: See how overlaying vulnerability information on a real-time application dependency map helps visualize and quantify risk and prioritize patching decisions. When patching isn’t an option, use segmentation as a compensating control to minimize risk.


Illumio Host-based Solutions Cannot Do Security Segmentation

Event: Security Field Day 2

Appearance: Illumio Presents at Security Field Day 2

Company: Illumio

Video Links:

Personnel: Pierre-Louis Gingembre

Myth II: Host-based solutions cannot do security segmentation.
Host-based security segmentation is challenging to operationalize and inherently insecure.

BUSTED: See how Illumio’s architecture makes it easy and seamless to deploy agents at scale backed by robust tamper prevention mechanisms.


Illumio Security Segmentation Can Be Easily Done Using My Network Devices

Event: Security Field Day 2

Appearance: Illumio Presents at Security Field Day 2

Company: Illumio

Video Links:

Personnel: Jason Williams

Myth I: Security segmentation can be easily done using my network devices.

Security segmentation can be sufficiently and easily achieved using traditional networking mechanisms and constructs.

BUSTED: See how decoupling security segmentation from the underlying network architecture simplifies segmentation by an order of magnitude.


Illumio Technology Overview

Event: Security Field Day 2

Appearance: Illumio Presents at Security Field Day 2

Company: Illumio

Video Links:

Personnel: PJ Kirner

Founding insights and a look at Illumio’s unique approach to securing applications in the data center and cloud through security segmentation. Enterprises such as Morgan Stanley, BNP Paribas, Salesforce, and Oracle NetSuite use Illumio’s Adaptive Security Platform (ASP) to reduce cyber risk and achieve regulatory compliance.


Guardicore Simplifying Microsegmentation

Event: Security Field Day 2

Appearance: Guardicore Presents at Security Field Day 2

Company: Guardicore

Video Links:

Personnel: Avishag Daniely, Dave Klein

This session provides a deep dive and demonstration of the Guardicore Centra Security Platform and how it simplifies practical segmentation use cases. Use cases to covered include:

– Visualization and microsegmentation of a critical application
– Global policy creation for unsecure protocols
– User identity-based policies
– Fully qualified domain name policies
– Breach detection and immediate response


Guardicore Solution and Technical Overview

Event: Security Field Day 2

Appearance: Guardicore Presents at Security Field Day 2

Company: Guardicore

Video Links:

Personnel: Avishag Daniely

This session will cover fundamental approaches in the design of the Centra Security Platform and technical details of critical capabilities to address segmentation issues in the hybrid data center.


Guardicore Company Overview

Event: Security Field Day 2

Appearance: Guardicore Presents at Security Field Day 2

Company: Guardicore

Video Links:

Personnel: Dave Burton

Guardicore was founded in Tel Aviv, Israel in 2013 to focus on gaps in the security posture of modern data centers and clouds. Guardicore protects critical assets using flexible, quickly deployed, and east-to-understand microsegmentation controls.


ExtraHop Product Demo: Live Attack Scenario

Event: Security Field Day 2

Appearance: ExtraHop Networks Presents at Security Field Day 2

Company: ExtraHop Networks

Video Links:

Personnel: Jeff Costlow

In this session, Jeff will simulate a Red vs Blue exercise using Reveal(x) from ExtraHop to hunt a threat actor through the attack lifecycle. Based on over 20 years of experience as a coder, architect, and leader of multiple security domain teams, Jeff will showcase the Reveal(x) product by playing through a threat detection scenario using details of real-life exercises and attacks.

During the session, Jeff Costlow took viewers through a meticulously crafted live attack simulation designed by his threat research team. Wearing the metaphorical ‘red hat,’ he simulated a realistic external attack involving reconnaissance and exploitation of a web application server running vulnerable Drupal software. The attacker successfully gained remote code execution access by exploiting CVE-2018-7600 and uploaded a PHP web shell followed by deploying Metasploit’s Meterpreter agent. As the exercise progressed, he used tools such as Nmap for internal network discovery and a brute-force attack to gain access to Windows workstations. This ultimately led to domain privilege escalation with BloodHound and credential compromise via a simulated DC Sync.

Switching to the ‘blue hat,’ Jeff demonstrated how Reveal(x) detects and visualizes these malicious actions in real-time. The product’s capabilities included identifying the Drupal exploit, detecting reconnaissance behavior with its live activity “donut” maps, and alerting on lateral movement and tools like PowerShell and PsExec. Reveal(x) leveraged integrations with ticketing systems like ServiceNow, threat intel feeds to flag adversarial IPs, and provided deep drilldowns into packet captures for forensic purposes. Though not positioned for direct active defense (being out-of-band), the platform supports REST API calls to integrate with SOAR platforms such as Phantom or Demisto for automated mitigation actions. Additionally, Reveal(x) supports importing threat intelligence in formats like STIX and allows flexible deployment and visibility strategies across physical, virtual, and hybrid environments.

Toward the conclusion, Jeff emphasized the educational value of visually mapping out the full attack lifecycle—ending with a beachhead establishment, ransomware installation, coin mining (via XMRig), and data exfiltration. Reveal(x)’s tagging of each event by attack phase enabled security teams to follow the kill chain progression, although he noted they do not directly use the Lockheed Martin kill chain model. Responding to audience questions, Jeff and team highlighted the design priorities around user friendliness, adaptable deployment models across networks including cloud and containers, and support for extensibility through scripting and community bundles. This real-world red-blue simulation effectively illustrated how Reveal(x) can deliver advanced detection, investigation, and forensic capabilities to empower modern security teams.