Arista CloudVision Telemetry Demo

Event: Networking Field Day 30

Appearance: Arista Presents at Networking Field Day 30

Company: Arista

Video Links:

Personnel: Paul Druce

Tune in to see a demonstration of the how CloudVision’s state-streaming visibility is useful across a series of use-case examples.


Arista CloudVision Telemetry Architecture

Event: Networking Field Day 30

Appearance: Arista Presents at Networking Field Day 30

Company: Arista

Video Links:

Personnel: Ryan Madsen

In this video, watch an in-depth session on how CloudVision’s unique state-streaming telemetry architecture brings granular visibility consistently to multi-domain use-cases.


Arista NetDL Evolution with Ken Duda

Event: Networking Field Day 30

Appearance: Arista Presents at Networking Field Day 30

Company: Arista

Video Links:

Personnel: Ken Duda

A look at how Arista’s state-based software architecture has evolved from a single device view to a broader network-wide data lake perspective.


What’s New at Arista in 2023

Event: Networking Field Day 30

Appearance: Arista Presents at Networking Field Day 30

Company: Arista

Video Links:

Personnel: Jeff Raymond

Join us for a quick recap of recent product execution and highlights for Arista’s solution-at-large.


Anuta Networks ATOM Demo – Service Lifecycle Automation with Active Assurance

Event: Networking Field Day 30

Appearance: Anuta Networks Presents at Networking Field Day 30

Company: Anuta Networks

Video Links:

Personnel: Sumit Shukla

Sumit Shukla, Sr. TME with Anuta Networks, demonstrates the L3 VPN service automation, an integrated process involving pre-checks, service orchestration, post-checks, active service assurance via synthetic traffic, and closed- loop remediation to delete an offending QoS policy.


Anuta Networks ATOM Active Service Assurance – A 360-degree Monitoring and Assurance Solution

Event: Networking Field Day 30

Appearance: Anuta Networks Presents at Networking Field Day 30

Company: Anuta Networks

Video Links:

Personnel: Sahil Katira

Sahil Katira, TME with Anuta Networks, introduces the latest ATOM Service Assurance(ASA) feature, benefits, and advantages. The session covers deploying ATOM probes to generate L2-L7 synthetic traffic and interpreting test results. The session concludes with a live demonstration of PING and TWAMP tests.


Anuta Networks ATOM Introduction and Deployments

Event: Networking Field Day 30

Appearance: Anuta Networks Presents at Networking Field Day 30

Company: Anuta Networks

Video Links:

Personnel: Kiran Sirupa

Kiran Sirupa, VP of Anuta Networks, introduces Anuta ATOM features, use cases, and customer deployments. The session highlights Anuta ATOM’s end-to- end process for service orchestration and assurance.


What Differentiates a SASE Solution

Event:

Appearance: SASE and SD-WAN Landscape from VMware

Company: VMware

Video Links:

Personnel: Scott Calvet

SASE has emerged as the preferred connectivity for the post-pandemic hybrid workforce. But there is confusion abounds about its true meaning. In this Showcase presented by VMware, Scott Calvet, Director of Technical Marketing of Secure Edge BU, demystifies SASE as he walks the viewers through the building blocks of the framework, and debunks the common myths. Watch Calvet peel back the layers and offer a clear look at the architecture. Learn what’s in it for organizations to adopt SASE. Hear how VMware thinks of SASE and how it’s completely unique and removed from the foggy and clichéd outlooks of other providers in this space.


Demonstrating Cribl Search with Cory Wallace

Event: Security Field Day 8

Appearance: Cribl Presents at Security Field Day 8

Company: Cribl

Video Links:

Personnel: Cory Wallace

This demonstration of Cribl Search explores how to search data at the edge, without needing to move it to a centralized repository, and how to search data at rest in object stores, without needing to index it or store data in a proprietary format.


Introducing Cribl Search with Nick Heudecker

Event: Security Field Day 8

Appearance: Cribl Presents at Security Field Day 8

Company: Cribl

Video Links:

Personnel: Nick Heudecker

Cribl Search turns the traditional search process on its head, allowing users to search data in place. No longer must data be collected and moved to storage before being examined, now administrators can search data at the edge, moving through an observability pipeline, stored in a data lake, or even stored in their existing solutions like TSDBs or log stores.


Exploring Cribl Stream and Cribl Edge

Event: Security Field Day 8

Appearance: Cribl Presents at Security Field Day 8

Company: Cribl

Video Links:

Personnel: Cory Wallace

This demonstration explores Cribl Stream and Cribl Edge. Cribl Stream is a vendor-agnostic observability pipeline that gives you the flexibility to collect, reduce, enrich, normalize, and route data from any source to any destination within your existing data infrastructure. You’ll finally achieve full control of your data, empowering you to choose how to treat your data to best support your business goals. Cribl Edge provides an intelligent, highly scalable edge-based data collection system for logs, metrics, and application data.


Solving Security’s Data Problem with Cribl

Event: Security Field Day 8

Appearance: Cribl Presents at Security Field Day 8

Company: Cribl

Video Links:

Personnel: Jackie McGuire

Security has a data problem. Despite managing dozens of tools and working closely with IT and external service providers, teams are still struggling to build a sustainable architecture and . We’ll show you how effective use of data pipelines reduces volume, amplifies signal to noise ratio, saves countless hours and dollars, and may even save the planet.


Introduction to Cribl with Nick Heudecker

Event: Security Field Day 8

Appearance: Cribl Presents at Security Field Day 8

Company: Cribl

Video Links:

Personnel: Nick Heudecker

Cribl’s mission is to unlock the value of all observability data – the logs, events, metrics, and traces comprising your monitoring and security environment. This session provides an introduction to Cribl’s approach to restore choice and control over observability data with Cribl Stream, its leading observability pipeline. We’ll also explore Cribl Edge and the newly announced Cribl Search. Finally, we’ll wrap up with a look at Cribl’s freely available certification programs.


Swimlane Good (SecOps) Defense is Having a Good Offense

Event: Security Field Day 8

Appearance: Swimlane Presents at Security Field Day 8

Company: Swimlane

Video Links:

Personnel: Bryon Page, Cody Cornell

Every security organization, team, and individual is trying to get ahead of everything on their plate but seldom do we have the time to do everything we need to get to everything. Many teams have immense backlogs of processes, activities, and programs that, given enough manpower, would help reduce the risk to their organization. In this section, we will demonstrate how organizations can move beyond reactionary and become proactive in protecting their organization and how that doesn’t have to be relegated to only SOC teams.


Doing Security Incident Response in Your Sleep with Swimlane

Event: Security Field Day 8

Appearance: Swimlane Presents at Security Field Day 8

Company: Swimlane

Video Links:

Personnel: Bryon Page, Cody Cornell

As we all know, security operations is an around-the-clock job, but building automation response systems is a way to drastically reduce the impact of a potential breach, as well as human error and much of the fatigue that teams are plagued with daily. In this section, we will show you how to measure your readiness for automated response and how to leverage it now that you have a solid SecOps automation foundation in place.


Building a SecOps Automation Foundation with Swimlane

Event: Security Field Day 8

Appearance: Swimlane Presents at Security Field Day 8

Company: Swimlane

Video Links:

Personnel: Bryon Page, Cody Cornell

The SecOps Automation Maturity Model is a framework for helping organizations better understand where they are on the security automation maturity spectrum. In this section, we will discuss and demonstrate what both a foundational and enriched SecOps automation state should look like and how to better measure and prepare your team for an automation journey.


Single Pane of Glass Can’t Fix Security Tools

Event: Security Field Day 8

Appearance: Securing the Future of IT Delegate Roundtable

Company: Tech Field Day

Video Links:

Personnel: Tom Hollingsworth

Security tools are so numerous it’s hard to keep track of them. So many, in fact, that no one solution can even manage them all. Is Single Pane of Glass really the best way to stay on top of the burgeoning dearth of solutions? Or should you be looking elsewhere? In this roundtable discussion featuring the Security Field Day delegates, learn how you may need to lower your expectations and find a few more windows to enjoy.


Insider Threats Are The Biggest Infosec Problem

Event: Security Field Day 8

Appearance: Securing the Future of IT Delegate Roundtable

Company: Tech Field Day

Video Links:

Personnel: Tom Hollingsworth

The biggest threat to your organization is working inside of it. The growing number of disgruntled employees selling access to internal resources is climbing higher than you can imagine. What are some good steps to take to prevent this from opening you up to attack? How can you spot potential insider issues before they spiral out of control? Learn more in this roundtable featuring the Security Field Day delegates.


Will We Be Forced to Live with Ransomware?

Event: Security Field Day 8

Appearance: Securing the Future of IT Delegate Roundtable

Company: Tech Field Day

Video Links:

Personnel: Tom Hollingsworth

Ransomware is a constant threat that is only growing larger. The shift to making it a criminal enterprise is only making the job of the security team harder. In this roundtable discussion, the Security Field Day delegates discuss the motivations of attackers and steps you can take to protect yourself from them. Even if we’re forced to live with ransomware that doesn’t mean we must be impacted by it.


HashiCorp Boundary Deep Dive

Event: Security Field Day 8

Appearance: HashiCorp Presents at Security Field Day 8

Company: HashiCorp

Video Links:

Personnel: Rob Barnes

HashiCorp Boundary is a secure remote access solution that provides an easy way to allow access to applications and critical systems with fine-grained authorizations based on trusted identities. In this presentation, Rob Barnes will demo how HashiCorp Boundary secures access to applications and critical systems with fine-grained authorizations that don’t require managing credentials or exposing your entire network.