Fortinet’s Secure WLAN Vision for 2024

Event: Mobility Field Day 11

Appearance: Fortinet Presents at Mobility Field Day 11

Company: Fortinet

Video Links:

Personnel: Chris Hinsz

Fortinet is much more than a firewall company, we offer a full suite of cybersecurity and networking products that span all the pieces that IT and Security professionals need to build a stable and secure wired and wireless network.


Security Field Day Roundtable: The Escalating Costs of Cyber Insurance

Event: Security Field Day 11

Appearance: Security Field Day 11 Delegate Roundtable

Company: Tech Field Day

Video Links:

Personnel: Tom Hollingsworth

The Security Field Day delegates open up about the state of the insurance market when it comes to cybersecurity. They talk about how the beginning of the market was very unstructured and the resulting payouts caused the insurers to tighten the belt. Also introduced is the need for regulatory requirements and how cyber insurance firms are driving adoption of new technologies.


Index Engines CyberSense Demo with Jim McGann

Event: Security Field Day 11

Appearance: Index Engines Presents at Security Field Day 11

Company: Index Engines

Video Links:

Personnel: Geoff Barrall, Jim McGann

In this demo, See how CyberSense from Index Engines empowers smarter recovery from ransomware with AI and an intuitive user interface.


Index Engines CyberSense Version 8.6 Update

Event: Security Field Day 11

Appearance: Index Engines Presents at Security Field Day 11

Company: Index Engines

Video Links:

Personnel: Geoff Barrall, Jim McGann

CyberSense 8.6 supports smarter recovery from ransomware attacks, introduces customizable threshold alerts and broadens platform and workload compatibility. Also highlighted is support for new platforms and applications.


Introduction to Index Engines CyberSense AI-Powered Data Analysis

Event: Security Field Day 11

Appearance: Index Engines Presents at Security Field Day 11

Company: Index Engines

Video Links:

Personnel: Geoff Barrall, Jim McGann

Distinguishing itself as the only data integrity software, harnessing over 200 content-based analytics indicative of ransomware corruption, CyberSense employs robust AI-based machine learning models to generate alerts with 99.5% accuracy when corruption is detected. Furthermore, CyberSense’s post-attack reports furnish the intelligence necessary for expedited recovery with minimal data loss.


Index Engines Understanding the Ransomware Challenge

Event: Security Field Day 11

Appearance: Index Engines Presents at Security Field Day 11

Company: Index Engines

Video Links:

Personnel: Geoff Barrall, Jim McGann

Cyber criminals are getting more sophisticated, deploying ransomware variants that are harder to detect with thresholds, metadata-level scanning or entropy changes alone. Cyber criminals are using AI and slow encryption to corrupt data without detection. The results have been devastating for organizations worldwide. Why is it critical to winning the war against ransomware? Data integrity is the key to managing cyber liability and ensuring your organization is truly cyber resilient. Discover the benefits of implementing a data integrity strategy and how to ensure you can be confident in your data and ability to recover from a ransomware attack.


Introduction to Index Engines with Geoff Barrall

Event: Security Field Day 11

Appearance: Index Engines Presents at Security Field Day 11

Company: Index Engines

Video Links:

Personnel: Geoff Barrall, Jim McGann

For over 20 years Index Engines has provided purpose-built enterprise software. Discover how they’re developing the last line of defense against ransomware attacks, and the first line of recovery with CyberSense. Today we will be discussing how to recover smarter by harnessing AI to recover from ransomware.


Revolutionizing Cloud Data Security – A Palo Alto Prisma Cloud DSPM Demo

Event: Security Field Day 11

Appearance: Palo Alto Networks Presents at Security Field Day 11

Company: Palo Alto Networks

Video Links:

Personnel: Vinayak Shastri

Vinayak Shastri, Product Line Manager for Prisma Cloud DSPM at Palo Alto Networks, provides an in-depth walkthrough of the Prisma Cloud DSPM platform, featuring diverse use cases. In this session, participants will gain insights into addressing the top questions posed by CISOs:

What data resides across our multi-cloud environments?
Who has access to our most sensitive data assets?
How can we prevent unauthorized exfiltration of sensitive data?


Revolutionizing Cloud Data Security with Palo Alto DSPM and DDR

Event: Security Field Day 11

Appearance: Palo Alto Networks Presents at Security Field Day 11

Company: Palo Alto Networks

Video Links:

Personnel: Mohit Bhasin, Vinayak Shastri

Are you thinking about data security in 2024?

Growing data volumes and increased regulation make it difficult for organizations to understand which sensitive data they hold, who can access it and where it’s exposed. To regain visibility and control, organizations are exploring data security posture management with data detection and response.

In this session you’ll learn:

The security and compliance risks that stem from unprotected data and AI infrastructure in the cloud.
An introduction to DSPM and getting started with data discovery and classification.
Monitoring data and responding to incidents in near-real time.
How to stay one step ahead of data risk in 2024 to prevent costly breaches and compliance violations.


Zerto Cyber Resilience Vault Deep Dive

Event: Security Field Day 11

Appearance: Zerto Presents at Security Field Day 11

Company: Zerto

Video Links:

Personnel: Matt Bernhardt

Dive into the Zerto cyber resilience vault headfirst and learn how the only journal based cyber vault and clean room combined, can keep your data protected and recover over 99% faster compared to other solutions.


Isolate and Lock Ransomware Attacks with Zerto

Event: Security Field Day 11

Appearance: Zerto Presents at Security Field Day 11

Company: Zerto

Video Links:

Personnel: Chris Rogers

94% of ransomware attacks attempted to compromise backup data. Learn how to properly isolate and lock your data to ensure it is not compromised during an attack. The discussion includes an overview of immutable journaling, object locks, and clean room recovery.


Zerto Continuous Data Protection – Replicate and Detect

Event: Security Field Day 11

Appearance: Zerto Presents at Security Field Day 11

Company: Zerto

Video Links:

Personnel: Chris Rogers

Learn how Zerto’s unique Continuous data protection enables RPOs of seconds with the earliest warning sign an attack maybe occurring in your environment. This presentation also discusses journaling of changes to ensure proper recovery is easy and secure. The presentation also includes a demo of the system detecting ransomware infections.


Achieving Ransomware Resilience with Zerto

Event: Security Field Day 11

Appearance: Zerto Presents at Security Field Day 11

Company: Zerto

Video Links:

Personnel: Chris Rogers

Explore and learn how Zerto can help Organizations successfully detect and recover from even the worst ransomware attacks. In this high-level session see how Zerto can help you address your security posture and see highlights of the cost of ransomware attacks if left undefended.


Aryaka Demo – Unified SASE as a Service

Event: Security Field Day 11

Appearance: Aryaka Presents at Security Field Day 11

Company: Aryaka

Video Links:

Personnel: Anu Chettur

This presentation is a hands-on Demo of Aryaka Unified SASE as a Service via the MyAryaka customer portal covering following co-management capabilities:

  • Introduction
  • Onboarding – Enable SD-WAN
  • Provisioning – Enable Security Services
  • Scaling – Consistent security policies for multiple sites
  • Managing changes – Add/Modify/Delete
  • Monitoring – Service status
  • Troubleshooting – Connectivity and security
  • Service Summary


Deep Dive Into the Aryaka Platform and Architecture

Event: Security Field Day 11

Appearance: Aryaka Presents at Security Field Day 11

Company: Aryaka

Video Links:

Personnel: Renuka Nadkarni

A deep dive into the design principles of the Aryaka Platform and its OnePass Architecture, Zero Trust WAN, Network, Security and Observability services, and flexible delivery options. We explain the how and why Aryaka Unified SASE as a Service delivers performance, agility, simplicity and security without tradeoffs.


Aryaka Overview – Unified SASE as a Service

Event: Security Field Day 11

Appearance: Aryaka Presents at Security Field Day 11

Company: Aryaka

Video Links:

Personnel: Natraj Iyer

This video features an Aryaka company overview and introduction of the four elements of Aryaka Unified SASE as a Service. This solution tackles the challenges faced by organizations in a hybrid workforce and hybrid app deployment to ensure global secure network access.


Nile Live Demo – Closed Loop Automation with Nile AI for Software Issues and Software Upgrades

Event: Networking Field Day 34

Appearance: Nile Presents at Networking Field Day 34

Company: Nile

Video Links:

Personnel: Dipen Vardhe, Karthik Nathillvar

In this live demonstration, Karthik and Dipen from team Nile showcase how, within the Nile Access Service, software bugs within network elements and corresponding software upgrades can be
fully automated without time consuming IT support workflows. Thanks to closed loop automation powered by AI, Nile Access Service significantly reduces the manual labor and time required to maintain an enterprise network at its best state.


Nile Live Demo – Closed Loop Automation with Nile AI for External Wireless Coverage and Wired Link Issues

Event: Networking Field Day 34

Appearance: Nile Presents at Networking Field Day 34

Company: Nile

Video Links:

Personnel: Dipen Vardhe, Karthik Nathillvar

In this live demonstration, Dipen and Karthik from team Nile showcase how, within the Nile Access Service, wireless coverage issues due to external factors and wired link errors due to poor cabling can be automatically detected and resolved without any manual troubleshooting required. Thanks to closed loop automation powered by AI, Nile Access Service significantly reduces the manual labor and time required to maintain an enterprise network at its best state.


A Closer Look at the Technology Architecture Behind the Nile Access Service

Event: Networking Field Day 34

Appearance: Nile Presents at Networking Field Day 34

Company: Nile

Video Links:

Personnel: Ozer Dondurmacioglu, Suresh Katukam

Suresh and Ozer from team Nile review the key components of the Nile Access Service: Nile Service Blocks, Nile Services Cloud and Nile AI Applications. Nile Service Blocks bring principles of cloud delivery to the campus and branch, Nile Services Cloud enables real-time observability and continuous optimization of the edge wired and wireless network, and Nile AI Apps deliver personalized visibility and control to the enterprise network.


Quantum Myriad All-Flash File and Object Software Demonstration

Event:

Appearance: Quantum Tech Field Day Showcase

Company: Quantum

Video Links:

Personnel: Nick Elvester

In this presentation, Nick Elvester, General Manager of Primary Storage at Quantum, provides a comprehensive demonstration of the Myriad all-flash file and object storage software. He begins with an overview of the dashboard, highlighting features such as effective capacity, data reduction ratios, system health, and performance metrics including throughput and IOPS. Elvester explains the multi-file system capabilities of Myriad, allowing for efficient data management and storage optimization through features like snapshots, clones, and elastic file systems. The discussion also covers security concerns, particularly around protecting against insider threats, and outlines future plans for multi-factor authentication for critical administrative actions.
The architecture of the Myriad system includes Kubernetes for managing microservices and integrates load balancers for efficient network traffic handling. The nodes are optimized to evenly distribute data across NVMe devices to avoid hotspots and ensure longevity. Questions from the audience touch on NFS v4, API support, Kubernetes integration, and data protection strategies, including replication and backup solutions.
Overall, Quantum’s Myriad provides a scalable, efficient, and secure all-flash storage solution emphasizing flexibility, performance, and a future roadmap for expanded protocol support and enhanced security features.