Aporeto Use Cases with Arif Huq

Event: Security Field Day 1

Appearance: Aporeto Presents at Security Field Day 1

Company: Aporeto

Video Links:

Personnel: Arif Huq

Learn how Aporeto is applying their unique authentication technology to cloud workloads to secure hybrid cloud, Kubernetes, and SSH user access controls.


Aporeto Technology Overview with Dimitri Stiliadis

Event: Security Field Day 1

Appearance: Aporeto Presents at Security Field Day 1

Company: Aporeto

Video Links:

Personnel: Dimitri Stiliadis

Cloud computing has changed the way we look at networking and security. Learn how Aporeto uses public-key encryption and authentication to secure cloud workloads and protect users.


Aruba Beyond the Hype of Machine Learning

Event: Security Field Day 1

Appearance: Aruba Presents at Security Field Day 1

Company: HPE Aruba Networking

Video Links:

Personnel: Marc Ibanez, Viswesh Ananthakrishnan

Discover how Aruba is using machine learning design and details to impact security usability, operations and results for enterprise networks as well as detecting anomalous behavior before it can become a security threat.


Aruba Network Layer Defense in Depth

Event: Security Field Day 1

Appearance: Aruba Presents at Security Field Day 1

Company: HPE Aruba Networking

Video Links:

Personnel: Jon Green

Stop pen testers and attackers in their tracks by hardening networks to stop attacks before they start


Aruba Secure the Network Edge Using Aruba Dynamic Segmentation

Event: Security Field Day 1

Appearance: Aruba Presents at Security Field Day 1

Company: HPE Aruba Networking

Video Links:

Personnel: Madani Adjali, Tim Cappalli

Aruba shows how using Layer 7 visibility and enforcement to secure the network edge for wired, wireless and VPN can lead to a holistic defense-in-depth strategy for enterprise networks.


Aruba WPA3: The New Standard for Wi Fi Security

Event: Security Field Day 1

Appearance: Aruba Presents at Security Field Day 1

Company: HPE Aruba Networking

Video Links:

Personnel: Dan Harkins

Explore how 2 innovative new standards fix WPA2 flaws and provide robust security for next gen Wi-Fi. Also included is a demonstration of how WPA3 can encrypted sessions from the start of the association process and secure user data before it can be exposed.


Aruba Executive Welcome

Event: Security Field Day 1

Appearance: Aruba Presents at Security Field Day 1

Company: HPE Aruba Networking

Video Links:

Personnel: Keerti Melkote

Aruba is a well-known wireless company, but their visibility at the edge of the network gives them a great perspective on security as well. Learn why Aruba is focused on security the enterprise edge.


VMware AppDefense

Event: Security Field Day 1

Appearance: VMware Presents at Security Field Day 1

Company: VMware by Broadcom

Video Links:

Personnel: Chris Corde

Chris Corde, Senior Director, Product Management, VMware

An introduction to the AppDefense product, including an overview of the challenges that AppDefense solves, the product’s architecture, and a demo.


VMware NSX for Security Demo

Event: Security Field Day 1

Appearance: VMware Presents at Security Field Day 1

Company: VMware by Broadcom

Video Links:

Personnel: Geoff Wilmington

Geoff Wilmington, Senior Technical Product Manager, VMware

The demo will showcase NSX enabling Micro-segmentation of a hybrid cloud application that has components hosted on premises and in the public cloud.


VMware NSX for Security

Event: Security Field Day 1

Appearance: VMware Presents at Security Field Day 1

Company: VMware by Broadcom

Video Links:

Personnel: Geoff Wilmington

Geoff Wilmington, Senior Technical Product Manager, VMware

Introduction to VMware NSX Data Center and NSX Cloud
Security with VMware NSX – Micro-segmentation
Operationalizing Micro-segmentation for VMware NSX


VMware – VMware’s Security Vision

Event: Security Field Day 1

Appearance: VMware Presents at Security Field Day 1

Company: VMware by Broadcom

Video Links:

Personnel: Tom Corn

Tom Corn, Senior Vice President, Security Products, VMware presents on VMware’s security vision.


Cisco DUO: Beyond Security

Event: Security Field Day 1

Appearance: Cisco Presents at Security Field Day 1

Company: Cisco

Video Links:

Personnel: Sean Frazier

Technology evolves and security needs to evolve with it. we’ll take a brief tour of why it’s more important than ever to have “agile security”.


Cisco Journey to Cloud Security

Event: Security Field Day 1

Appearance: Cisco Presents at Security Field Day 1

Company: Cisco

Video Links:

Personnel: David Pollak

The way that we build apps for the cloud has gotten way easier. Cloud-based applications introduce new opportunities for security and vulnerabilities. Let’s take a journey through application development and associated changes in security.


Cisco Threat Response

Event: Security Field Day 1

Appearance: Cisco Presents at Security Field Day 1

Company: Cisco

Video Links:

Personnel: Ben Greenbaum

Cisco has been working on integrations across our portfolio for some time. In this demo, we will show the first public face of that new integrated architecture; a tool called simply Cisco Threat Response that brings the most commonly needed features and information from multiple products into one console to enable rapid threat response and containment.


CyberArk Leveraging CyberArk for Traditional and Ephemeral Application Secrets Management

Event: Security Field Day 1

Appearance: CyberArk Presents at Security Field Day 1

Company: CyberArk

Video Links:

Personnel: Brandon Traffanstedt

From J2EE-based application servers, to RPA and automation tools, to microservices running on containers– robots are being given more privilege and access than ever before. This is also changing the threat surface; especially as public code repositories are being used with greater frequency. This section will discuss several different models of application security and end with a demonstration of securing an on-premises application as well one that exists in a containerized state.


CyberArk Vaulting, Rotation, and Native Access Control Demonstration

Event: Security Field Day 1

Appearance: CyberArk Presents at Security Field Day 1

Company: CyberArk

Video Links:

Personnel: Brandon Traffanstedt

This session will dive into a demonstration of the CyberArk core components (vaulting, rotation, isolation, monitoring, and strong privileged access analytics) of the solution as well as look at how native access is done in CyberArk to fuel user adoption.


CyberArk Vaulting, Rotation, and Native Access Control Overview

Event: Security Field Day 1

Appearance: CyberArk Presents at Security Field Day 1

Company: CyberArk

Video Links:

Personnel: Brandon Traffanstedt

This portion will dive into credential vaulting/isolation as well as the security and distributed nature of the CyberArk platform. We’ll then look at how the exodus to Cloud-centric workflows has changed the breach process and altered our approach.


CyberArk Company Introduction

Event: Security Field Day 1

Appearance: CyberArk Presents at Security Field Day 1

Company: CyberArk

Video Links:

Personnel: Brandon Traffanstedt

This session will focus on a brief history of CyberArk, and our view of the cyber attack chain. Here, we’ll perform an overview of the CyberArk Privileged Access Security Solution and R&D priorities, while introducing key concepts associated with prioritizing risk and preventing irreversible network takeover.


Cisco Wireless Innovations with Ankur Bhasin

Event: Networking Field Day 19

Appearance: Cisco Presents at Networking Field Day 19

Company: Cisco

Video Links:

Personnel: Ankur Bhasin

Cisco is reinventing the wireless controller with the new Cisco Catalyst 9800 series IOS-based controller software. Watch to learn how this new architecture will increase standards-based interoperability and enable more rapid software developer for wireless architects and administrators.


Cisco SD-WAN and Security

Event: Networking Field Day 19

Appearance: Cisco Presents at Networking Field Day 19

Company: Cisco

Video Links:

Personnel: Kureli Sankar

Managing a large SD-WAN deployment can seem like a daunting task. Learn how Cisco is leveraging secure technologies to ease the burden of keeping users and data secure across the enterprise data center and cloud environment.