Intel How Ethical Facial Recognition Can Identify Security Threats in Real Time

Event: Security Field Day 6

Appearance: Intel Presents at Security Field Day 6

Company: Intel

Video Links:

Personnel: Mark Sadler, Ziv Tsarfati

Facial recognition offers tremendous benefits to businesses and society when used effectively and responsibly. It’s a convenient way to unlock your phone or enter your office space, but it’s becoming more controversial. As with any new technology, valid questions have been raised and concerns voiced about facial recognition’s application and shortcomings.

In this session, AnyVision will showcase its ground-breaking technology and demonstrate how ethical facial recognition is being used today by modern enterprises for watchlist alerting — identifying security threats and VIPs in real-time by comparing pictures from live video streams against a defined list of “”persons of interest.”” This same technology is also fueling a revolution in touchless access control to open guarded points of entry with biometric-based, friction-free authorization. AnyVision is working closely with Intel utilizing Intel® Distribution of OpenVINO™ toolkit to unlock advanced vision capabilities and ease budgetary strains for enterprise customers.


Confidential Computing with Intel & Fortanix

Event: Security Field Day 6

Appearance: Intel Presents at Security Field Day 6

Company: Intel

Video Links:

Personnel: Ambuj Kumar, Jesse Schrater

The intersection of data transformation and emerging cybersecurity threats is driving a massive up-tick in regulations and the need for real protections for maintaining the confidentiality and integrity of data. Confidential Computing addresses this next frontier by protecting code and data while being processed in memory, especially applicable for sensitive workloads and Multi-party Compute scenarios across Healthcare, Financial Services, Government, Public Cloud. Enabled by hardware and optimized by software, Intel and Fortanix are leading the way with proven and deployed solutions. For more information, visit http://www.intel.lv/Intel-Fortanix


Cisco Innovations in Industrial Switching and Security

Event: Security Field Day 6

Appearance: Cisco Presents at Security Field Day 6

Company: Cisco

Video Links:

Personnel: Dan Behrens

Visibility is imperative to enable organizations to define and deploy security policies in industrial environments. In this session, Cisco dives into how they are developing innovations to provide rich industrial visibility and enable the ability to effectively deploy Enterprise Security solutions.


Cisco Security: Zero Trust and Secure Access Service Edge (SASE)

Event: Security Field Day 6

Appearance: Cisco Presents at Security Field Day 6

Company: Cisco

Video Links:

Personnel: Brian Verenkoff, Jamey Heary

This session explores some of the new offerings, advancements, and strategy of Cisco SASE and Zero Trust. You will be the first to see a demo of the advancements Cisco has made in ZTNA, passwordless, and you’ll see a demo of their brand new single segmentation policy engine.


Cisco Treasure Hunt: An Exploration of Threat Hunting

Event: Security Field Day 6

Appearance: Cisco Presents at Security Field Day 6

Company: Cisco

Video Links:

Personnel: Eric Hulse

Threat hunting has become quite mainstream over the past several years, but what is it and should your organization be doing it? In this session, Cisco dives into threat hunting as a concept, explores real world findings and the concepts of threat hunting. You’ll also see a few lessons learned from building a global platform, hunting across thousands of Cisco customers.


Cisco SecureX vs. the Acronyms

Event: Security Field Day 6

Appearance: Cisco Presents at Security Field Day 6

Company: Cisco

Video Links:

Personnel: Ben Greenbaum

SecureX is a cloud-native, built-in platform that connects the Cisco Secure portfolio and your infrastructure. It allows you to radically reduce dwell time and human-powered tasks. In this session, you’ll learn how and why SecureX compares to the hot topic of the moment.


Defending OT Environments with the Juniper Converged Industrial Edge

Event: Security Field Day 6

Appearance: Juniper Networks Presents at Security Field Day 6

Company: Juniper Networks

Video Links:

Personnel: Mike Spanbauer, Robert Tafoya

If anything has become clear from the cyberattacks this past year, it’s that critical infrastructure must be better protected. The Converged Industrial Edge automates and protects these environments from targeted attacks while maintaining uptime in trifecta of reliable connectivity, threat intelligence, and precision enforcement.


DDoS plus C2 Protection with Juniper MX + Corero & SecIntel

Event: Security Field Day 6

Appearance: Juniper Networks Presents at Security Field Day 6

Company: Juniper Networks

Video Links:

Personnel: Irene Zhang, Laurent Paumelle

Juniper doesn’t believe in routers as “dumb pipes” but instead that they can be used to detect and stop attacks. Find out how Juniper’s most widely-deployed MX Series router can stop volumetric DDoS attacks and block command-and-control communications to & from malicious servers.


Cover Your Apps with Juniper Cloud Workload Protection

Event: Security Field Day 6

Appearance: Juniper Networks Presents at Security Field Day 6

Company: Juniper Networks

Video Links:

Personnel: Krystle Portocarrero, Laurent Paumelle

No application is invulnerable to attack, and all applications could use a safety net to help keep them secure, especially in production. Juniper Cloud Workload Protection does exactly that and integrates with the rest of your Zero Trust data center.


Managing the Transition to SASE with Juniper Security Director Cloud

Event: Security Field Day 6

Appearance: Juniper Networks Presents at Security Field Day 6

Company: Juniper Networks

Video Links:

Personnel: Madhura Kumar, Sandeep Rajan P

Manage your security deployments, whether they’re on-premises, in the cloud, or delivered from the cloud as you make your journey towards a SASE architecture.


Juniper Connected Security Overview with Kate Adam

Event: Security Field Day 6

Appearance: Juniper Networks Presents at Security Field Day 6

Company: Juniper Networks

Video Links:

Personnel: Kate Adam

in this video, get introductions to the Juniper team and why Juniper’s Connected Security strategy seeks to make defending the network easier by extending security services to all points of connection from client to workload.


Intel Private Networks Beyond Industrials

Event:

Appearance: Intel Private Networks Tech Field Day Showcase

Company: Intel

Video Links:

Personnel: Bhupesh Agrawal

This Tech Field Day Showcase is presented by Bhupesh Agrawal, Director of Private Networks & Edge Computing at Intel.

Key Insights: Private networks enable IT organizations to obtain coverage, control, and capacity in their network operations. Such capabilities are key for industrial applications, but prove useful outside these cases as well.

For more information on Intel Private 5G Networks, visit http://www.intel.lv/PrivateNetworks


Intel Private Networks Overview and Ecosystem

Event:

Appearance: Intel Private Networks Tech Field Day Showcase

Company: Intel

Video Links:

Personnel: Bhupesh Agrawal

Join Bhupesh Agrawal, Director of Private Networks & Edge Computing at Intel, as he describes how Intel serves as the backbone of today’s private network implementations in this Tech Field Day showcase by Gestalt IT.

For more information on Intel Private 5G Networks, visit http://www.Intel.lv/5GPrivateNetworks


Bamboo Systems Group: Helping to Grow the ARM Ecosystem

Event:

Appearance: Bamboo Systems Enterprise ARM Tech Field Day Showcase

Company: Bamboo Systems

Video Links:

Personnel: James Peck, Tony Craythorne

This Tech Field Day Showcase is sponsored by Bamboo Systems, and presented by their CEO, Tony Craythorne, and Senior Technical Consultant, James Peck.

Key Insight: Bamboo Systems’ Enterprise ARM Compute offering puts them in the driver’s seat to revolutionize the modern data center, as shown by these customer stories.


Bamboo Systems Group: The Enterprise ARM Computer Company’s Journey So Far

Event:

Appearance: Bamboo Systems Enterprise ARM Tech Field Day Showcase

Company: Bamboo Systems

Video Links:

Personnel: Mark Wade, Tony Craythorne

Bamboo Systems feels they’re uniquely positioned to skipper this data center upheaval with their enterprise-specific ARM offering. Listen as Bamboo’s CEO, Tony Craythorne, and Head of Product Management, Mark Wade, share with our delegates their journey as the Enterprise ARM Compute Company in this Tech Field Day Video Showcase by Gestalt IT.


Pure Storage Introduces Portworx Data Services

Event: Tech Field Day 24

Appearance: Pure Storage Presents at Tech Field Day 24

Company: Pure Storage

Video Links:

Personnel: Goutham Rao

In this video, Pure Storage introduces their new Portworx Data Services offering, which enables database-as-a-service (DBaaS) with management, data protection, and automation. PDS 1.0 can deploy Cassandra, PostgreSQL, Couchbase, ZooKeeper, Consul, Redis, DataStax, MongoDB, ElasticSearch, Kafka, MySQL, or Microsoft SQL Server simply and quickly. Presented by Goutham Rao, CTO of Portworx.


Adaptive Cloud Fabric and BGP/EVPN Demo with Pluribus Networks

Event:

Appearance: Pluribus Networks BGP EVPN Tech Field Day Showcase

Company: Pluribus Networks

Video Links:

Personnel: Raghu Karinthi

Learn how Pluribus Networks supports the building and automation of fabric networks using BGP EVPN in this technical demo.


Using BGP EVPN to Build and Manage Data Center Network Fabrics with Pluribus Networks

Event:

Appearance: Pluribus Networks BGP EVPN Tech Field Day Showcase

Company: Pluribus Networks

Video Links:

Personnel: Alessandro Barbieri

As IT organizations seek to expand the reach of their network to accommodate for their decentralized environments, many consider adopting fabric models supported by BGP EVPN. At these scales, however, organizations need to be able to automate processes in the network to avoid logging long hours of manual management tasks.


PathSolutions TotalView Demo with Tim Titus

Event: Networking Field Day 26

Appearance: PathSolutions Presents at Networking Field Day 26

Company: PathSolutions

Video Links:

Personnel: Tim Titus

In this demo, Tim Titus shows an overview of TotalView and how it can be used to help troubleshoot networking issues and provide a root-cause analysis to stakeholders and IT professionals alike.


PathSolutions Solution Overview with Tim Titus

Event: Networking Field Day 26

Appearance: PathSolutions Presents at Networking Field Day 26

Company: PathSolutions

Video Links:

Personnel: Tim Titus

Network troubleshooting usually involves setting your NMS to collect certain data elements, then aligning the clues to the timeframe when the event occurred, and then interpreting the elements to determine what happened. This research is time-consuming and typically requires expert-level understanding of the network. What’s needed is automation of collection, interpretation, and analysis of the situation to arrive at the root-cause, and have the answers spelled out in plain-English. That’s what TotalView is designed to do: Automatically analyze your entire network and tell you what your equipment knows so you can know. You can be proactive, possibly for the first time in your career because you have a deeper and broader understanding of your networking environment.