HashiCorp Consul Deep Dive

Event: Security Field Day 8

Appearance: HashiCorp Presents at Security Field Day 8

Company: HashiCorp

Video Links:

Personnel: Rob Barnes

HashiCorp Consul enforces authentication between applications by ensuring only the right machines are talking to each other. Consul codifies authorization and traffic rules with encrypted traffic while automating identity-based access for maximum scale, efficiency, and security. With Consul, organizations can discover services, automate network configurations, and enable secure connectivity across any cloud or runtime using service mesh. Rob Barnes, Developer Advocate at HashiCorp will demo how Consul enables machine-to-machine access as a key pillar of zero trust security.


HashiCorp Vault Deep Dive

Event: Security Field Day 8

Appearance: HashiCorp Presents at Security Field Day 8

Company: HashiCorp

Video Links:

Personnel: Rob Barnes

HashiCorp Vault provides the foundation for modern multi-cloud security. It was purpose-built in the cloud era to authenticate and access different clouds, systems, and endpoints, and centrally store, access, and deploy secrets (API keys, credentials, etc.). It also provides a simple workflow to encrypt data in flight and at rest. In this presentation HashiCorp Developer Advocate, Rob Barnes will demonstrate how Vault’s machine authentication and authorization capabilities are a key pillar of zero trust security.


HashiCorp Zero Trust Security Overview

Event: Security Field Day 8

Appearance: HashiCorp Presents at Security Field Day 8

Company: HashiCorp

Video Links:

Personnel: Megan LaFlamme

HashiCorp provides infrastructure automation software for multi-cloud environments, enabling enterprises to unlock a common cloud operating model to provision, secure, connect, and run any application on any infrastructure. In this presentation, Megan LaFlamme, Director, Product Marketing, will introduce HashiCorp’s approach to zero trust security with identity-based access and authorization.


Micron Secure Device Configuration Demo using Triathlon Platform

Event: Security Field Day 8

Appearance: Micron Presents at Security Field Day 8

Company: Micron

Video Links:

Personnel: Ari Singer

One of the Achilles’ heels of the cybersecurity industry is that the establishing of trust has always been expensive, complex, and untimely. Semiconductors have a fragmentation problem, creating challenges for embedded security experts. Meanwhile, cloud platforms want to speak a single API language that is hardware agnostic. But there has been no strong ecosystem force to unify the two species. We are thus left with a DIY approach for the vast majority of products and services today. Enter the Authenta Triathlon platform. We will demonstrate how this platform enables standard JEDEC memories to unite to speak the same security language for any cloud platform, greatly simplifying and securing the device lifecycle from design to deployment of services.


Micron Device Identities on ICAM – IT Meets OT

Event: Security Field Day 8

Appearance: Micron Presents at Security Field Day 8

Company: Micron

Video Links:

Personnel: Chuck White

Identity, Credential and Access Management is a foundational component of building trust. Building trust starts with determining identity, and, from there, continuing to build trust with authentication and authorization. In the supply chain it also starts with identification, authentication, and authorization. Considering how products come to  market, the ability to securely communicate is based on the same principles. By having control of identity, provisioning, governance, and authorization, ICAM, as a practice, becomes the baseline for zero trust, network micro-segmentation, and data protection. This identity-based approach is already pervasive in our IT world, and will be key to enabling trusted services in the OT world.


Micron Authenta Customer Blueprints

Event: Security Field Day 8

Appearance: Micron Presents at Security Field Day 8

Company: Micron

Video Links:

Personnel: Ari Singer

Authenta Cloud Platform customers are some of the industry’s most pioneering companies pushing forward the next generation of connected products and services at the edge. This ranges from the data centers lowering operation costs and deploying innovative business models, like Bare-Metal-as-a-Service, to the auto OEMs supporting Mobility-as-a-Service trends. All of these use cases require foundational trust layers for the secure assembly and manufacturing of final products and systems. We will walk through these customer blueprints, or use cases, and explore how customers are leveraging Authenta Cloud Platform with their solutions’ architectures to secure the edge.


Micron Silicon Trust in the Subscription Economy

Event: Security Field Day 8

Appearance: Micron Presents at Security Field Day 8

Company: Micron

Video Links:

Personnel: Luis Ancajas

Customers are no longer satisfied with static product ownership as we lean into the subscription economy. The digital transformation is forcing every industry to build products that can evolve, giving them access to dynamic revenue streams, but this introduces new manufacturing and cybersecurity gaps that are hard for most companies to deal with. Micron has built Authenta, the silicon-to-cloud trust platform that can scale across industries, cloud platforms and hardware systems — transforming the cybersecurity risks into revenue for modern brands.


How to Use FortiCNP, Fortinet’s Cloud-Native Application Protection Platform, to Help Manage Cloud Risk

Event: Security Field Day 8

Appearance: Fortinet Presents at Security Field Day 8

Company: Fortinet

Video Links:

Personnel: Louie Aberra, Maristelle Bagis Hosaka

FortiCNP is Fortinet’s cloud-native application protection platform (CNAPP) that simplifies cloud security operations through native integrations with Cloud Service Providers’ security services and Fortinet Security Fabric solutions to provide unified and contextualized risk visibility across cloud resources and cloud environments.  FortiCNP provides resource risk prioritization and scalable workflows to help security teams prioritize risk management activities.


How to use FortiDeceptor – Fortinet’s Deception Technology, to Help Protect OT and IT Networks

Event: Security Field Day 8

Appearance: Fortinet Presents at Security Field Day 8

Company: Fortinet

Video Links:

Personnel: Moshe Ben Simon

FortiDeceptor, Fortinet’s innovative, non-intrusive, agentless OT/IT/IoT deception solution is a force multiplier to current security defenses, providing early detection and response to active in-network threats. The FortiDeceptor decoys generate high-fidelity, intelligence-based alerts that result in an automated incident response to help stop zero-day attacks. In this session, VP Product Management, FortiDeceptor, Moshe Ben Simon, provides valuable tips and insights on how to use deception for early breach detection and protection against cyber threats across the IT/OT environment.


How to use FortiRecon – Fortinet’s Digital Risk Protection service, to Help Detect, Prevent, and Respond to External Threats

Event: Security Field Day 8

Appearance: Fortinet Presents at Security Field Day 8

Company: Fortinet

Video Links:

Personnel: Carl Windsor

FortiRecon provides organization-specific, expert-curated and actionable External Attack Surface (EASM) intelligence, identifies threat actors’ activity and brand infringement, and monitors ransomware data leaks, to proactively help remediate and execute takedowns or purchase the stolen data on an organization’s behalf. In this session, SVP Product Technology & Solutions, Carl Windsor, introduces FortiRecon, Fortinet’ Digital Risk Protection (DRP) service, using key case studies and real-life business scenarios.


Does Hardware Matter in the Cloud?

Event:

Appearance: Intel Tech Field Day Showcase

Company: Intel

Video Links:

Personnel: Alastair Cooke

The narrative that hardware does not matter in the cloud is driven chiefly by the growing importance of software. In this Tech Field Day Showcase, presented to you by Intel, Alastair Cooke, cloud provider course teacher and co-author of Digital Infrastructure at Datacenter Scale zooms into this perception to provide an understanding of what created it in the first place and the truth of it. Asking what’s more important – the hardware or the software – is like the chicken or egg paradox. But the reality is, software that occupies the centerstage needs the hardware to exist. Without hardware, innovation at software level is not possible.


The Perfect Configuration

Event:

Appearance: Intel Tech Field Day Showcase

Company: Intel

Video Links:

Personnel: Ather Beg

The fastest processors do not necessarily guarantee the highest performance in a datacenter. In this Tech Field Day Showcase presented to you by Intel, Solutions Architect and co-author of Digital Infrastructure at Datacenter Scale, Ather Beg highlights a section of the whitepaper he wrote – The Perfect Configuration, where he debunks the hype around processors. Ather argues that a processor alone cannot deliver ultimate levels of performance without the support of other components. In fact, the secret to unlocking high levels of performance is getting the configuration right, and the perfect configuration is one in which all the components in the server are equally optimized.


Intel & CXL – The Future of Server Architecture

Event:

Appearance: Intel Tech Field Day Showcase

Company: Intel

Video Links:

Personnel: Craig Rodgers

Despite CPUs gaining more cores than ever, there is a lingering bandwidth shortage which is nudging us in the direction of a new disaggregated server architecture – one that uses CXL. In this Tech Field Day Showcase presented to you by Intel, Solutions Architect and co-author of Digital Infrastructure at Datacenter Scale, Craig Rodgers showcases the whitepaper. In the Showcase, Rodgers digs deeper into the shifts that are currently ongoing in the industry, and talks about CXL as the server architecture of the future. Watch the video to learn how CXL is poised to bring it all together with a fully composable server design that will enable us to unlock the full potential of our memory devices at no cost to application performance.


ZPE Demonstrates Network Automation Blueprint to Recover a Failed FortiGate Upgrade

Event: Tech Field Day 26

Appearance: ZPE Systems Presents at Tech Field Day 26

Company: ZPE Systems

Video Links:

Personnel: Rene Neumann

Rene Neumann demonstrates how ZPE Systems Netbox Network Automation Blueprint can help recover a failed FortiGate firewall upgrade. After introducing the environment for the demo, Rene shows how Netbox can be used as a source of truth to easily keep data current, update Nodegrid details, and update device details using a console connection. He then uses edge native automation to stage a firmware update, test the results and implement automatic recovery.

Presented by Rene Neumann, Director of Solution Engineering, ZPE Systems.


Where Do We Draw the Line Between Storage Infrastructure and Data – Storage Field Day Roundtable

Event: Storage Field Day 24

Appearance: Storage Field Day 24 Delegate Roundtable

Company: Tech Field Day

Video Links:

Personnel: Stephen Foskett

Infrastructure is no longer the focus of enterprise IT, with the value of data and applications rising in prominence. Although infrastructure software and services are critical areas of consideration, the individual components that underly these systems are no longer as important. Most compute, memory, storage, and networking components function and perform similarly, so it takes a truly exceptional device to rise above the abstraction of datacenter and cloud platforms. Even when we do talk about IT infrastructure we are often referring to infrastructure as a service (cloud) or infrastructure as code not individual devices.

This roundtable discussion is moderated by Stephen Foskett of Gestalt IT and features commentary by Ray Lucchesi, Enrico Signoretti, Richard Kenyan, Andy Banta, Glenn Dekhayser, Frederic Van Haren, Gina Rosenthal, and Max Mortillaro.


Managing the Blast Radius as System Components Get Bigger – Storage Field Day Roundtable

Event: Storage Field Day 24

Appearance: Storage Field Day 24 Delegate Roundtable

Company: Tech Field Day

Video Links:

Personnel: Stephen Foskett

As every component of IT infrastructure gets bigger, we need to consider the impact of component faults. The so-called blast radius due to a failure has always been a consideration, and was taken into account with RAID, replication, high-availability architecture, and more. Even a small server has over a dozen cores, a terabyte of memory, and many terabytes of storage. We must also consider the inflation of data, adjusting for the size of applications and data sets, when comparing the impact versus historic systems. The reason components have become so large has more to do with economics of production and sale than with customer demands, and the ratio of storage capacity to data throughput has fallen, making the blast radius a real concern.

The conversation is moderated by Stephen Foskett of Gestalt IT and features David Klee, Enrico Signoretti, Glenn Dekhayser, Andy Banta, Ray Lucchesi, Frederic Van Haren, Richard Kenyan, Gina Rosenthal, and Jim Czuprynski.


Expanding the QLC Opportunity with 4th Generation Solidigm QLC SSDs

Event: Storage Field Day 24

Appearance: Solidigm Presents at Storage Field Day 24

Company: Solidigm

Video Links:

Personnel: Yuyang Sun

As data sets grow, the need for more efficient and higher capacity storage is imperative. Learn how Solidigm is planning to address higher capacity, higher performance and greater overall efficiency with the current and future QLC SSDs.

Presented by Yuyang Sun, Senior Product Marketing Manager, QLC Products, Solidigm.


Solidigm QLC SSD Customer Value Stories​

Event: Storage Field Day 24

Appearance: Solidigm Presents at Storage Field Day 24

Company: Solidigm

Video Links:

Personnel: Charles Anyimi

QLC NAND SSDs are being adopted in both cloud and enterprise across a range of workloads.  Get an overview of how to Solidigm customers are solving today’s biggest storage challenges with QLC SSDs. Learn about in-depth case studies spanning workloads in both storage and compute.

Presented by Charles Anyimi, VP, Customer Technical Excellence, Solidigm.


Solidigm Introduction and Perspectives on Top Storage Challenges

Event: Storage Field Day 24

Appearance: Solidigm Presents at Storage Field Day 24

Company: Solidigm

Video Links:

Personnel: Roger Corell

Solidigm’s perspective on storage is unique in the enterprise IT industry. Learn how Solidigm came to be and the perspectives on today’s top storage challenges.

Presented by Roger Corell, Director of Datacenter Messaging and Content, Solidigm.


Anytime Storage Upgrades with Pure1

Event: Storage Field Day 24

Appearance: Pure Storage Presents at Storage Field Day 24

Company: Pure Storage

Video Links:

Personnel: Matt Bradford, Stan Yanitskiy

Pure customers love upgrading their storage. When you offer white glove service it’s easy to see why. Now, we’re offering even more flexibility with self-service upgrades so you can perform the same safe and simple upgrades whenever it’s convenient for you with Pure1. Join us as we walk you through the all new self-service upgrade process.

Presented by Stan Yanitskiy, Sr. Product Manager, and Matt Bradford, Director of Technical Marketing, Pure Storage.