Index Engines CyberSense Version 8.6 Update

Event: Security Field Day 11

Appearance: Index Engines Presents at Security Field Day 11

Company: Index Engines

Video Links:

Personnel: Geoff Barrall, Jim McGann

CyberSense 8.6 supports smarter recovery from ransomware attacks, introduces customizable threshold alerts and broadens platform and workload compatibility. Also highlighted is support for new platforms and applications.


Introduction to Index Engines CyberSense AI-Powered Data Analysis

Event: Security Field Day 11

Appearance: Index Engines Presents at Security Field Day 11

Company: Index Engines

Video Links:

Personnel: Geoff Barrall, Jim McGann

Distinguishing itself as the only data integrity software, harnessing over 200 content-based analytics indicative of ransomware corruption, CyberSense employs robust AI-based machine learning models to generate alerts with 99.5% accuracy when corruption is detected. Furthermore, CyberSense’s post-attack reports furnish the intelligence necessary for expedited recovery with minimal data loss.


Index Engines Understanding the Ransomware Challenge

Event: Security Field Day 11

Appearance: Index Engines Presents at Security Field Day 11

Company: Index Engines

Video Links:

Personnel: Geoff Barrall, Jim McGann

Cyber criminals are getting more sophisticated, deploying ransomware variants that are harder to detect with thresholds, metadata-level scanning or entropy changes alone. Cyber criminals are using AI and slow encryption to corrupt data without detection. The results have been devastating for organizations worldwide. Why is it critical to winning the war against ransomware? Data integrity is the key to managing cyber liability and ensuring your organization is truly cyber resilient. Discover the benefits of implementing a data integrity strategy and how to ensure you can be confident in your data and ability to recover from a ransomware attack.


Introduction to Index Engines with Geoff Barrall

Event: Security Field Day 11

Appearance: Index Engines Presents at Security Field Day 11

Company: Index Engines

Video Links:

Personnel: Geoff Barrall, Jim McGann

For over 20 years Index Engines has provided purpose-built enterprise software. Discover how they’re developing the last line of defense against ransomware attacks, and the first line of recovery with CyberSense. Today we will be discussing how to recover smarter by harnessing AI to recover from ransomware.


Revolutionizing Cloud Data Security – A Palo Alto Prisma Cloud DSPM Demo

Event: Security Field Day 11

Appearance: Palo Alto Networks Presents at Security Field Day 11

Company: Palo Alto Networks

Video Links:

Personnel: Vinayak Shastri

Vinayak Shastri, Product Line Manager for Prisma Cloud DSPM at Palo Alto Networks, provides an in-depth walkthrough of the Prisma Cloud DSPM platform, featuring diverse use cases. In this session, participants will gain insights into addressing the top questions posed by CISOs:

What data resides across our multi-cloud environments?
Who has access to our most sensitive data assets?
How can we prevent unauthorized exfiltration of sensitive data?


Revolutionizing Cloud Data Security with Palo Alto DSPM and DDR

Event: Security Field Day 11

Appearance: Palo Alto Networks Presents at Security Field Day 11

Company: Palo Alto Networks

Video Links:

Personnel: Mohit Bhasin, Vinayak Shastri

Are you thinking about data security in 2024?

Growing data volumes and increased regulation make it difficult for organizations to understand which sensitive data they hold, who can access it and where it’s exposed. To regain visibility and control, organizations are exploring data security posture management with data detection and response.

In this session you’ll learn:

The security and compliance risks that stem from unprotected data and AI infrastructure in the cloud.
An introduction to DSPM and getting started with data discovery and classification.
Monitoring data and responding to incidents in near-real time.
How to stay one step ahead of data risk in 2024 to prevent costly breaches and compliance violations.


Zerto Cyber Resilience Vault Deep Dive

Event: Security Field Day 11

Appearance: Zerto Presents at Security Field Day 11

Company: Zerto

Video Links:

Personnel: Matt Bernhardt

Dive into the Zerto cyber resilience vault headfirst and learn how the only journal based cyber vault and clean room combined, can keep your data protected and recover over 99% faster compared to other solutions.


Isolate and Lock Ransomware Attacks with Zerto

Event: Security Field Day 11

Appearance: Zerto Presents at Security Field Day 11

Company: Zerto

Video Links:

Personnel: Chris Rogers

94% of ransomware attacks attempted to compromise backup data. Learn how to properly isolate and lock your data to ensure it is not compromised during an attack. The discussion includes an overview of immutable journaling, object locks, and clean room recovery.


Zerto Continuous Data Protection – Replicate and Detect

Event: Security Field Day 11

Appearance: Zerto Presents at Security Field Day 11

Company: Zerto

Video Links:

Personnel: Chris Rogers

Learn how Zerto’s unique Continuous data protection enables RPOs of seconds with the earliest warning sign an attack maybe occurring in your environment. This presentation also discusses journaling of changes to ensure proper recovery is easy and secure. The presentation also includes a demo of the system detecting ransomware infections.


Achieving Ransomware Resilience with Zerto

Event: Security Field Day 11

Appearance: Zerto Presents at Security Field Day 11

Company: Zerto

Video Links:

Personnel: Chris Rogers

Explore and learn how Zerto can help Organizations successfully detect and recover from even the worst ransomware attacks. In this high-level session see how Zerto can help you address your security posture and see highlights of the cost of ransomware attacks if left undefended.


Aryaka Demo – Unified SASE as a Service

Event: Security Field Day 11

Appearance: Aryaka Presents at Security Field Day 11

Company: Aryaka

Video Links:

Personnel: Anu Chettur

This presentation is a hands-on Demo of Aryaka Unified SASE as a Service via the MyAryaka customer portal covering following co-management capabilities:

  • Introduction
  • Onboarding – Enable SD-WAN
  • Provisioning – Enable Security Services
  • Scaling – Consistent security policies for multiple sites
  • Managing changes – Add/Modify/Delete
  • Monitoring – Service status
  • Troubleshooting – Connectivity and security
  • Service Summary


Deep Dive Into the Aryaka Platform and Architecture

Event: Security Field Day 11

Appearance: Aryaka Presents at Security Field Day 11

Company: Aryaka

Video Links:

Personnel: Renuka Nadkarni

A deep dive into the design principles of the Aryaka Platform and its OnePass Architecture, Zero Trust WAN, Network, Security and Observability services, and flexible delivery options. We explain the how and why Aryaka Unified SASE as a Service delivers performance, agility, simplicity and security without tradeoffs.


Aryaka Overview – Unified SASE as a Service

Event: Security Field Day 11

Appearance: Aryaka Presents at Security Field Day 11

Company: Aryaka

Video Links:

Personnel: Natraj Iyer

This video features an Aryaka company overview and introduction of the four elements of Aryaka Unified SASE as a Service. This solution tackles the challenges faced by organizations in a hybrid workforce and hybrid app deployment to ensure global secure network access.


Nile Live Demo – Closed Loop Automation with Nile AI for Software Issues and Software Upgrades

Event: Networking Field Day 34

Appearance: Nile Presents at Networking Field Day 34

Company: Nile

Video Links:

Personnel: Dipen Vardhe, Karthik Nathillvar

In this live demonstration, Karthik and Dipen from team Nile showcase how, within the Nile Access Service, software bugs within network elements and corresponding software upgrades can be
fully automated without time consuming IT support workflows. Thanks to closed loop automation powered by AI, Nile Access Service significantly reduces the manual labor and time required to maintain an enterprise network at its best state.


Nile Live Demo – Closed Loop Automation with Nile AI for External Wireless Coverage and Wired Link Issues

Event: Networking Field Day 34

Appearance: Nile Presents at Networking Field Day 34

Company: Nile

Video Links:

Personnel: Dipen Vardhe, Karthik Nathillvar

In this live demonstration, Dipen and Karthik from team Nile showcase how, within the Nile Access Service, wireless coverage issues due to external factors and wired link errors due to poor cabling can be automatically detected and resolved without any manual troubleshooting required. Thanks to closed loop automation powered by AI, Nile Access Service significantly reduces the manual labor and time required to maintain an enterprise network at its best state.


A Closer Look at the Technology Architecture Behind the Nile Access Service

Event: Networking Field Day 34

Appearance: Nile Presents at Networking Field Day 34

Company: Nile

Video Links:

Personnel: Ozer Dondurmacioglu, Suresh Katukam

Suresh and Ozer from team Nile review the key components of the Nile Access Service: Nile Service Blocks, Nile Services Cloud and Nile AI Applications. Nile Service Blocks bring principles of cloud delivery to the campus and branch, Nile Services Cloud enables real-time observability and continuous optimization of the edge wired and wireless network, and Nile AI Apps deliver personalized visibility and control to the enterprise network.


Quantum Myriad All-Flash File and Object Software Demonstration

Event:

Appearance: Quantum Tech Field Day Showcase

Company: Quantum

Video Links:

Personnel: Nick Elvester

In this presentation, Nick Elvester, General Manager of Primary Storage at Quantum, provides a comprehensive demonstration of the Myriad all-flash file and object storage software. He begins with an overview of the dashboard, highlighting features such as effective capacity, data reduction ratios, system health, and performance metrics including throughput and IOPS. Elvester explains the multi-file system capabilities of Myriad, allowing for efficient data management and storage optimization through features like snapshots, clones, and elastic file systems. The discussion also covers security concerns, particularly around protecting against insider threats, and outlines future plans for multi-factor authentication for critical administrative actions.
The architecture of the Myriad system includes Kubernetes for managing microservices and integrates load balancers for efficient network traffic handling. The nodes are optimized to evenly distribute data across NVMe devices to avoid hotspots and ensure longevity. Questions from the audience touch on NFS v4, API support, Kubernetes integration, and data protection strategies, including replication and backup solutions.
Overall, Quantum’s Myriad provides a scalable, efficient, and secure all-flash storage solution emphasizing flexibility, performance, and a future roadmap for expanded protocol support and enhanced security features.


Quantum Myriad All-Flash Scale-Out Architecture

Event:

Appearance: Quantum Tech Field Day Showcase

Company: Quantum

Video Links:

Personnel: Ben Jarvis

Ben Jarvis, Lead Storage Architect, discusses the innovative architecture of the Quantum Myriad all-flash scale-out storage system. Myriad was designed from the ground up to handle high-performance video and HPC workloads, leveraging large scale-out internet-facing service paradigms. It utilizes a microservices container-based system running on Kubernetes, deployed on white box commodity hardware, and is optimized for NVMe flash storage and high-performance RDMA Ethernet networks.
The system is designed to invert traditional storage models by optimizing software to fully utilize the hardware’s capabilities, focusing on memory bandwidth and minimizing context switches. Myriad’s architecture supports inline data protection, data reduction through compression and deduplication, and presents a self-contained cluster to customers.
Jarvis explains the integration with Kubernetes for state management and the system’s approach to handling physical storage on nodes. Myriad operates on a transactional key-value store basis, supporting transactions necessary for a POSIX-compliant file system. It employs a redirected write system with data protection through mirroring and erasure encoding, optimizing for low-latency, high-concurrency operations. The system’s design avoids performance bottlenecks common in traditional storage systems by adopting a work-at-risk approach for managing transactions. This method allows for independent operations with synchronization only at the end, significantly reducing the probability of conflicts and enabling the system to scale efficiently. Myriad is optimized for workloads that do not involve simultaneous writes to the same file by multiple nodes, steering clear of legacy HPC workloads that do not align with its architectural advantages.


Quantum End to End Data Lifecycle Solutions Overview

Event:

Appearance: Quantum Tech Field Day Showcase

Company: Quantum

Video Links:

Personnel: Jordan Winkelman

Jordan Winkelman, Field Solutions CTO at Quantum, presents an overview of Quantum’s evolution, services, and introduction to their new product, Myriad. Quantum, with a 44-year history in storage solutions, focuses on providing end-to-end solutions for AI, unstructured data, and media and entertainment, managing over 84 exabytes of data globally for more than 10,000 customers, including major broadcasters, media companies, and public institutions. The company’s products support various sectors, including video surveillance, healthcare, and cloud storage, with a significant presence in hyperscale tape archives.
Winkelman highlights Quantum’s recent acquisitions and innovations, such as the ActiveScale object store, Squarebox Software’s CatDV media asset management system, and Pivot3’s hyperconverged storage, showcasing Quantum’s shift towards AI and data analytics. This presentation is focused on Myriad, Quantum’s new all-flash file and object storage platform, designed to enhance performance and manageability for diverse storage needs.
Quantum’s portfolio includes a range of storage solutions from high-speed, performance-oriented platforms to cost-effective, secure tape storage, underpinned by AI operations and cloud-based analytics for comprehensive monitoring and support. This holistic approach aims to provide customers with seamless, integrated storage workflows, leveraging AI to enrich data and offer competitive advantages in content creation and management.


Running Full Stack AI Operations at Scale with VAST Data and Run:ai

Event:

Appearance: VAST Data Tech Field Day Showcase

Company: Run:ai, VAST Data

Video Links:

Personnel: Neeloy Bhattacharyya, Sandeep Brahmarouthu

In this discussion, Neeloy Bhattacharyya from VAST Data and Sandeep Brahmarouthu from Run:ai explore the complexities of deploying AI for high-value use cases at scale, focusing on the movement and management of data throughout the AI pipeline. They identify a common challenge in organizations where the processes of data preparation and model training and inference are often separated, leading to inefficiencies. They emphasize the importance of understanding data provenance and lineage to leverage AI effectively, especially for innovative use cases.

VAST Data’s approach involves simplifying the AI data pipeline by integrating data capture, preparation, training, and model serving processes more closely, highlighting the inefficiencies of traditional data storage and processing methods. Bhattacharyya introduces the concept of “data adjacency,” where certain functions are more efficiently run closer to where the data is stored to improve processing times and outcomes.

Brahmarouthu discusses Run:ai’s role in managing GPU resources for AI workloads, addressing the challenge of efficiently scheduling and utilizing GPUs across different teams and projects within an organization. He highlights the importance of Kubernetes in managing these resources, despite its limitations for AI-specific workloads, and how Run:ai enhances Kubernetes to better serve AI applications.

The conversation also touches on the operational challenges of deploying AI within enterprises, including the need for a DevOps model that accommodates the experimental nature of AI. They discuss the importance of infrastructure and technology partnerships, like the one between VAST Data and Run:ai, in creating efficient, scalable AI deployment strategies.