Using Itential to Orchestrate Your Network Automations

Event: Networking Field Day 36

Appearance: Itential Presents at Networking Field Day 36

Company: Itential

Video Links:

Personnel: Rich Martin

Most network teams leverage some sort of domain-specific automation, whether through open-source tools or controller-based software to implement network changes more efficiently. While automating individual tasks may suffice in certain cases, scaling infrastructure as a product for broader consumption requires standardized processes. Orchestration unifies tools, services, and automations across your ecosystem, streamlining each step for greater efficiency and enabling the flexibility to combine automations into new, composable products.

In this session, Rich Martin, Director of Technical Marketing will demonstrate how to connect different automations and systems to orchestrate the provisioning of a new product. You’ll see how Itential integrates with everything from change management tools to documentation processes, so every automation step — from pre-checks to notifications — happens smoothly and consistently.


Operationalize Your Network Automations with Itential

Event: Networking Field Day 36

Appearance: Itential Presents at Networking Field Day 36

Company: Itential

Video Links:

Personnel: Wyatt Sullivan

You’ve built a library of useful automations to automate tedious, time-consuming tasks. But as your efforts scale, so do your headaches. You’ve got different scripts for different tasks, written in different languages, with varying levels of access. And when your network starts to grow (along with the complexity of what you need to automate), things start to get messy. Fast.

In this session, Wyatt Sullivan, Technical Marketing Engineer, will showcase Itential’s new Automation-as-a-Service offering and how NetDevOps engineers can standardize automation execution across Ansible Playbooks, Python Scripts and OpenTofu plans and how to enable secure authorization and role-based access control, turning automations into self-service products that teams can access and execute independently.


Itential and The Evolution of Network Automation

Event: Networking Field Day 36

Appearance: Itential Presents at Networking Field Day 36

Company: Itential

Video Links:

Personnel: Peter Sprygada

Network automation is going through an evolution right now. Most network engineers have built awesome scripts or playbooks that solve some problems but you’re nowhere near deploying like AWS. For most, automation likely saves you some time and reduces human error but isn’t the sort of thing you can package up into a product and enable the rest of the organization to consume, let alone be delivered as a self-serve product for app dev teams to utilize.

In this session, Peter Sprygada, VP of Product Management will dive into making sense of the evolution of network automation and how network teams can become producers and evolve from building network automations to offering infrastructure products with Itential.


Elisity Microsegmentation Platform Demo – Clinical Healthcare Use Cases

Event: Networking Field Day 36

Appearance: Elisity Presents at Networking Field Day 36

Company: Elisity

Video Links:

Personnel: Dana Yanch, Piotr Kupisiewicz

This Elisity presentation at Network Field Day 36 focuses on includes the Elisity Microsegmentation Platform Demo: Securing Clinical Healthcare Networks with Identity-based microsegmentation platform that accelerates an organizations Zero Trust maturity.

Watch this comprehensive demo of how Elisity’s cloud-native microsegmentation platform transforms security for clinical healthcare environments. In this video, we showcase how leading healthcare organizations are using Elisity to protect critical medical devices, EHR systems, and sensitive patient data across complex networks.

The demo highlights the revolutionary Elisity IdentityGraph devices, from IoMT devices to clinical workstations. technology, which provides unprecedented visibility into all users, workloads

You’ll see how our solution:

  • Automatically discovers and classifies medical devices, creating a complete asset inventory that integrates with existing IoMT security platforms
  • Visualizes real-time traffic patterns between clinical systems, helping security teams spot potential threats
  • Implements identity-based policies that follow assets anywhere on the network, ensuring consistent security even as devices move between departments
  • Transforms existing network switches into policy enforcement points without requiring new hardware

We’ll demonstrate practical use cases, including:

  • Segmenting clinical networks from administrative systems
  • Protecting connected medical devices with automated policy enforcement
  • Ensuring HIPAA compliance through granular access controls
  • Managing secure access for visiting clinicians and medical device vendors

Featured in Forrester Wave Microsegmentation, Q3 2024 as a Strong Performer, Elisity is trusted by leading healthcare organizations including GSK, Main Line Health, and BUPA to secure their most critical assets.

Whether you’re looking to implement HHS 405(d) guidelines or strengthen your overall security posture, this demo shows how Elisity’s cloud-delivered microsegmentation platform can help you achieve zero trust security with minimal disruption to clinical operations.


How to Optimize a Microsegmentation Architecture with Elisity

Event: Networking Field Day 36

Appearance: Elisity Presents at Networking Field Day 36

Company: Elisity

Video Links:

Personnel: Dana Yanch, Piotr Kupisiewicz

This Elisity presentation at Network Field Day 36 focuses on how Elisity’s microsegmentation architecture leverages a cloud-native distributed control plane that separates policy management from enforcement. At its core, the system utilizes a centralized policy management platform that integrates with existing identity providers and maintains the Elisity IdentityGraph—a comprehensive mapping of all network assets, their relationships, and behavior patterns. This identity-centric approach moves beyond traditional IP-based controls to enable context-aware policy enforcement at the network edge.

The implementation relies on Elisity Virtual Edge controller(s) that transform existing access-layer switches into policy enforcement points. These controllers communicate with the Elisity Cloud Control center via secure channels, enabling real-time policy updates without requiring dedicated hardware. For manufacturing environments, this architecture enables granular control over industrial control systems and OT devices while maintaining IEC 62443 compliance. In healthcare settings, it facilitates 405(d) HICP compliance while protecting sensitive medical devices and clinical systems.

Key technical components include the Elisity identity-based Dynamic Policy Engine that leverages machine learning for asset discovery and classification, graphical policy visualization matrices for traffic flow analysis, and virtual edge nodes that enforce policies using native switch functionality. The system continuously monitors east-west and north-south traffic patterns, providing real-time telemetry data for behavior analysis and policy refinement.

This architecture enables security teams to implement zero trust principles at scale, with the ability to microsegment networks down to individual workloads while maintaining the performance requirements of critical manufacturing and healthcare operations. The platform’s ability to learn from traffic patterns and automatically adjust policies based on identity and context makes it particularly effective in environments where traditional agent-based solutions are impractical.


Elisity Top Microsegmentation Challenges and Goals Across the Manufacturing Pharmaceutical and Healthcare Industries

Event: Networking Field Day 36

Appearance: Elisity Presents at Networking Field Day 36

Company: Elisity

Video Links:

Personnel: Dana Yanch, Piotr Kupisiewicz

This Elisity presentation at Network Field Day 36 focuses on how the convergence of IT and OT networks has created unique cybersecurity challenges across manufacturing, pharmaceutical, and healthcare sectors, where legacy systems, unmanaged devices, and critical operations intersect. This technical talk explores how microsegmentation addresses the distinct security requirements of these regulated industries.

In manufacturing environments, the primary challenge lies in securing industrial control systems that often run on legacy operating systems and utilize proprietary protocols. Organizations must maintain IEC 62443 compliance while enabling secure communication between production zones, enterprise IT systems, and remote access points. Critical goals include protecting intellectual property in manufacturing execution systems (MES) while ensuring zero operational downtime.

Pharmaceutical companies face the additional complexity of FDA-regulated environments where Good Manufacturing Practice (GMP) systems require both rigorous access controls and detailed audit trails. These organizations need microsegmentation solutions that can isolate quality control systems, laboratory information management systems (LIMS), and research data while maintaining strict regulatory compliance. Healthcare institutions struggle with an explosion of IoMT (Internet of Medical Things) devices that can’t support traditional security agents.

Meeting 405(d) HICP guidelines requires organizations to implement microsegmentation without disrupting critical care devices or patient monitoring systems. The challenge intensifies with the need to segment clinical networks from billing systems while maintaining HIPAA compliance.

Learn how modern microsegmentation architectures and platforms like Elisity address these challenges. You’ll see how Elisity’s Identity-based microsegmentation platform enables policy enforcement at the network edge, leveraging existing switch infrastructure for policy enforcement.

Learn why success requires continuous asset discovery, automated policy recommendations based on learned traffic patterns, and the ability to enforce segmentation policies without requiring hardware refresh or network redesign.


Elisity Microsegmentation Platform Origin Story

Event: Networking Field Day 36

Appearance: Elisity Presents at Networking Field Day 36

Company: Elisity

Video Links:

Personnel: Dana Yanch, Piotr Kupisiewicz

This Elisity presentation at Network Field Day 36 includes an overview of the Elisity origin story. Elisity was founded in 2019 and has was built to be a leap forward in network segmentation architecture and today Elisity is leading the enterprise effort to achieve Zero Trust maturity, proactively prevent security risks, and reduce network complexity. Designed to be implemented rapidly, without downtime, upon implementation, the platform instantly discovers every device on an enterprise network and correlates comprehensive device insights into the Elisity IdentityGraph .

This empowers teams with the context needed to automate classification and apply dynamic security policies to any device wherever and whenever it appears on the network. These granular, identity-based microsegmentation security policies are managed in the cloud and enforced using your existing network switching infrastructure in real-time, even on ephemeral IT/IoT/OT devices. Founded in 2019, Elisity has a global employee footprint and a growing number of customers in the Fortune 500.

In 2024 The Forrester Wave : Microsegmentation Solutions, Q3 2024 was published. In this evaluation, Elisity was cited as a Strong Performer in Microsegmentation Solutions. Elisity was one of 11 vendors evaluated for the Forrester Wave based on 23 criteria that examined a vendor’s current offering, strategy, and market presence. In its first appearance in a Forrester Wave, Elisity received the highest score possible in the vision, roadmap, network-based enforcement, and OT, healthcare, and IoT criteria.


Accelerate Zero Trust Maturity Through Enterprise-Wide Microsegmentation with Elisity

Event: Networking Field Day 36

Appearance: Elisity Presents at Networking Field Day 36

Company: Elisity

Video Links:

Personnel: Dana Yanch, Piotr Kupisiewicz

Elisity empowers enterprises to rapidly improve their security posture and accelerate Zero Trust maturity across their entire digital ecosystem. Our revolutionary approach to microsegmentation delivers comprehensive protection for all users and devices—across IT and IoT/OT—without disruption or complexity.

The Elisity IdentityGraph automatically discovers and correlates your complete network landscape, providing the contextual intelligence needed to automate security policy creation and enforcement. We’ll show how leading enterprises implement Elisity in weeks, not years, achieving immediate risk reduction while advancing their Zero Trust journey.

Elisity is a leap forward in network segmentation architecture and is leading the enterprise effort to achieve Zero Trust maturity, proactively prevent security risks, and reduce network complexity. Designed to be implemented in days, without downtime, upon implementation, the platform rapidly discovers every device on an enterprise network and correlates comprehensive device insights into the Elisity IdentityGraph . This empowers teams with the context needed to automate classification and apply dynamic security policies to any device wherever and whenever it appears on the network. These granular, identity-based microsegmentation security policies are managed in the cloud and enforced using your existing network switching infrastructure in real-time, even on ephemeral IT/IoT/OT devices. Founded in 2019, Elisity has a global employee footprint and a growing number of customers in the Fortune 500.


Arista Multi-Domain Segmentation (MSS)

Event: Networking Field Day 36

Appearance: Arista Presents at Networking Field Day 36

Company: Arista

Video Links:

Personnel: Alessandro Barbieri

Enterprise-wide zero trust networking across multiple network domains requires a flexible identity-based microsegmentation service enforced in the distributed network. CloudVision delivers multi-domain orchestration and monitoring services of zero trust policies based on microperimeters, with dedicated, easy to use security dashboards to manage the end-to-end microsegmentation lifecycle across the enterprise.


Arista CloudVision 360 Network Observability

Event: Networking Field Day 36

Appearance: Arista Presents at Networking Field Day 36

Company: Arista

Video Links:

Personnel: Praful Bhaidasna

Also Part of the CloudVision Update, Praful will share a demo of the latest CloudVision capabilities for the Data Center. Arista’s CloudVision dramatically simplifies operations with automation, observability and zero trust security capabilities across all enterprise networking domains, from campus to data center, WAN, and cloud.


Arista CloudVision Campus Demo with Paul Druce

Event: Networking Field Day 36

Appearance: Arista Presents at Networking Field Day 36

Company: Arista

Video Links:

Personnel: Paul Druce

As part of the CloudVision Update, Paul will share a demo of the latest CloudVision capabilities for the Enterprise campus networks. This uniform approach helps enterprises save operational expenses by removing traditional network operational silos while delivering reliable and resilient networks.


Arista CloudVision for the Multi-Domain Enterprise

Event: Networking Field Day 36

Appearance: Arista Presents at Networking Field Day 36

Company: Arista

Video Links:

Personnel: Andre Pech

Arista’s CloudVision dramatically simplifies operations with automation, observability and zero trust security capabilities across all enterprise networking domains, from campus to data center, WAN, and cloud. This uniform approach helps enterprises save operational expenses by removing traditional network operational silos while delivering reliable and resilient networks. This CloudVision Update session will be a retrospective on where the product has been and where it is going.


What’s New with Arista in 2024

Event: Networking Field Day 36

Appearance: Arista Presents at Networking Field Day 36

Company: Arista

Video Links:

Personnel: Jeff Raymond

In this video, get an update from Jeff Raymond about the state of Arista in 2024. Hear about expanded use cases for observability, network segmentation, AI platforms, and multi-domain operations. Learn how Arista takes a software-first approach to development and uses their expertise in development to inform everything they do in the networking industry.


Interlock Market Opportunity and Use Cases

Event:

Appearance: Interlock Technology Tech Field Day Showcase

Company: Interlock Technology

Video Links:

Personnel: Noemi Greyzdorf

In this presentation, Noemi Greyzdorf, VP of Operations at Interlock Technology, illustrates how the company’s data migration solutions provide a unique value proposition by simplifying the process, accelerating time to completion, and ensuring compliance and data integrity. Greisdorf highlights two key offerings: DF Classic, a fully managed data migration service where experts handle the entire process, and DATAFORGE, a self-service software designed to automate and expedite data migrations for professionals. This presentation also features a successful case study of a cloud migration for a customer, demonstrating Interlock’s capability to efficiently migrate large volumes of data.


Interlock Architecture and DATAFORGE Demo

Event:

Appearance: Interlock Technology Tech Field Day Showcase

Company: Interlock Technology

Video Links:

Personnel: Massimo Yezzi

In this presentation, Massimo Yezzi, CTO at Interlock Technology, demonstrates the deployment of Interlock technology for optimal operational efficiency and effectiveness. He showcases the DATAFORGE platform, a comprehensive data migration tool designed to facilitate the seamless transfer of large volumes of data across various platforms and storage systems. DATAFORGE offers features such as real-time monitoring of resource usage, a performance scheduler to minimize impact during data transfers, and application-aware transformations that ensure metadata integrity.


Introduction to Interlock

Event:

Appearance: Interlock Technology Tech Field Day Showcase

Company: Interlock Technology

Video Links:

Personnel: Noemi Greyzdorf

In this presentation, Noemi Greyzdorf, VP of Operations at Interlock Technology, introduces Interlock’s data migration solutions. Designed for large-scale data movement, Interlock enables seamless migrations across various storage protocols while maintaining application compatibility. With over 1,000 complex migrations completed, Interlock ensures smooth transitions between protocols such as NAS, SMB, S3, and REST. Their DATAFORGE software facilitates flexible, high-performance migrations across on-premises, cloud, and hybrid environments, bypassing application data paths for minimal disruption.


Ignite Security Field Day – Rethinking Biometrics with Mitch Ashley

Event: Security Field Day 12

Appearance: Ignite Talks at Security Field Day 12

Company: Ignite

Video Links:

Personnel: Mitch Ashley

In this Ignite talk, Mitch Ashley talks about how our public information is creating a biometric digital twin of our experiences. All of the things we buy and the places we go are tracked and integrated with our digital identity and this creates security implications that must be understood.


Ignite Security Field Day – How I Learned to Stop Worrying and Love Automation

Event: Security Field Day 12

Appearance: Ignite Talks at Security Field Day 12

Company: Ignite

Video Links:

Personnel: Alastair Cooke

In this Ignite talk, Alastair Cooke discusses the rise of automation and the role it plays in design as well as security for DevOps. Also discussed are tips and solutions for streamlining your development environment and ensuring that it is fluid with the current state of advancement.


Ignite Security Field Day – Oh No, IO! The Death of a TLD

Event: Security Field Day 12

Appearance: Ignite Talks at Security Field Day 12

Company: Ignite

Video Links:

Personnel: Tom Hollingsworth

What happens when a ccTLD disappears from the Internet? What if it’s one of the most popular TLDs for new startups? In this Ignite talk, Tom Hollingsworth looks at the pending removal of .io and the impact it could have on the Internet. He also discusses what has happened in the past when the process has failed and how modern innovation could prevent this from happening again.


Own Your Career – Career Management for the Modern Technologist with Jack Poller

Event: Cloud Field Day 21

Appearance: Ignite Talks at Cloud Field Day 21

Company: Ignite

Video Links:

Personnel: Jack Poller

Jack Poller’s talk at Cloud Field Day 21 focuses on the importance of actively managing one’s career, particularly in the technology field. He shares his own career journey, which spans from engineering to marketing, consulting, and eventually becoming an industry analyst. Poller emphasizes that career success is not just about technical skills but also about understanding how to make a company more successful, either by increasing revenue or reducing costs. He highlights the importance of being adaptable and willing to take on new roles, as he did when he transitioned from engineering to marketing. Poller also stresses that in any role, the ultimate goal should be to contribute to the company’s success, and this requires understanding the business’s needs and how your work impacts the bottom line.

Poller also discusses the importance of influence and politics in the workplace, especially as one moves up the career ladder. He acknowledges that many technologists view office politics negatively, but he argues that it is a necessary part of getting things done, particularly in leadership roles. He uses examples from his own career, such as managing a crisis after a theft at a startup, to illustrate how sometimes difficult decisions must be made quickly, even if they are not popular. Poller also references the TV show *The Wire* as a great example of how politics, both formal and informal, play out in different organizations, from drug cartels to police departments. He encourages technologists to embrace the reality of workplace politics and learn how to build coalitions and influence others to achieve their goals.

Finally, Poller emphasizes the importance of networking and personal relationships in career advancement. He points out that while technology has made it easier to apply for jobs, it has also created barriers, such as AI-driven applicant tracking systems that may filter out qualified candidates. Therefore, building a strong professional network is crucial, as most job opportunities come through personal connections rather than resumes. Poller advises technologists to be proactive in seeking out mentors and building trust with colleagues, as trust is a key factor in career success. He concludes by encouraging the audience to take ownership of their careers, set clear goals, and continuously work toward them, rather than passively waiting for promotions or opportunities to come their way.