Gluware Automating Public Cloud IaaS

Event: Tech Field Day Exclusive at Cisco Live Global 2021

Appearance: Gluware Presents at Tech Field Day Exclusive at Cisco Live Global 2021

Company: Gluware

Video Links:

Personnel: Michael Haugh, Olivier Huynh Van

This use-case demonstration will highlight how Gluware leverages the integrated Terraform engine and AWS Provider to automate IaaS. Gluware Config Modeling simplifies and abstracts Terraform TF files into easier to use constructs for Network Operations to automate event complex IaaS designs and VNFs within.


Gluware Introduction and Product Overview Demo

Event: Tech Field Day Exclusive at Cisco Live Global 2021

Appearance: Gluware Presents at Tech Field Day Exclusive at Cisco Live Global 2021

Company: Gluware

Video Links:

Personnel: Michael Haugh

This introduction section shows how Gluware brings an intelligent platform with pre-packaged applications and new integrations with API-based systems including a short demo of how customer use Gluware to automate their enterprise networks.


VMware Level Up Threat Prevention Inside the Data Center

Event: Security Field Day 5

Appearance: VMware NSX Presents at Security Field Day 5

Company: VMware by Broadcom

Video Links:

Personnel: Chad Skipper, Stijn Vanveerdeghem

With the acquisition of Lastline, VMware further extended its capabilities for NSX Firewall to deliver VMware NSX Advanced Threat Prevention (ATP). This solution includes capabilities consisting of VMware NSX Distributed IDS/IPS and Network Sandboxing and Network Traffic Analysis (NTA/NDR). NSX Advanced Threat Prevention allows security teams to stop the spread of attacks that breach the perimeter. The IDS/IPS can detect network threats by combining industry-leading signature sets and protocol decoders, the network sandbox provides complete malware analysis of artifacts traversing your data center and network traffic analysis detects lateral threats and anomalies in the traffic flow between hops.


VMware Segmentation Made Easy: A Practical Demo

Event: Security Field Day 5

Appearance: VMware NSX Presents at Security Field Day 5

Company: VMware by Broadcom

Video Links:

Personnel: Brian Heili

This session will walk you through a real-world example of how you can secure VMware vSphere workloads with NSX Firewall. This allows you to implement segmentation in your network with just a few simple steps, in a matter of minutes, and without making any changes to your existing environment. Don’t believe us? Watch the demo and finally achieve your goal of segmenting applications and prevent lateral movement within the data center.


VMware Operationalizing East – West Security at Scale with NSX Firewall

Event: Security Field Day 5

Appearance: VMware NSX Presents at Security Field Day 5

Company: VMware by Broadcom

Video Links:

Personnel: Dhruv Jain

VMware’s software-defined firewalling approach allows enterprises to easily operationalizing East-West security at scale and ensure threats are not able to spread laterally through the network. Enterprises can now buy and deploy VMware NSX Firewall as a standalone security product. No longer do you need to be an existing NSX customer to take advantage of our innovative software-based approach. There are no more excuses for why you can’t modernize your security strategy today.


VMware Secure Access Demo

Event: Security Field Day 5

Appearance: VMware SASE Presents at Security Field Day 5

Company: VMware by Broadcom

Video Links:

Personnel: Vinod Kumar Balasubramanyam

In this session we will demonstrate the advantages of deploying VMware Secure Access to connect remote users to their applications. We will step through a use case to illustrate the value.


VMware Secure Access Use Cases with Craig Connors

Event: Security Field Day 5

Appearance: VMware SASE Presents at Security Field Day 5

Company: VMware by Broadcom

Video Links:

Personnel: Craig Connors

VMware Secure Access enables anywhere workforce to access enterprise applications while eliminating the scale challenges of on-prem VPN Gateways. In this session we will highlight how VMware Secure Access is delivered as a service of VMware.


VMware Secure Access Service Edge (SASE) Overview

Event: Security Field Day 5

Appearance: VMware SASE Presents at Security Field Day 5

Company: VMware by Broadcom

Video Links:

Personnel: Craig Connors

VMware #SASE is a cloud hosted platform built to deliver multiple services like Networking, Secure Access, and Security to ensure users located anywhere get secure, reliable and efficient access to cloud applications. In this session we will cover the building blocks and the advantages of VMware SASE architecture.


HashiCorp Boundary – Human-to-Machine Access

Event: Security Field Day 5

Appearance: HashiCorp Presents at Security Field Day 5

Company: HashiCorp

Video Links:

Personnel: Rosemary Wang

In this demo, learn how HashiCorp Boundary protects the interaction between devices and servers and users that consume them. See how Boundary continues the integrations with other HashiCorp offerings to ensure Zero Trust access to all critical services.


HashiCorp Consul – Machine-to-Machine Access

Event: Security Field Day 5

Appearance: HashiCorp Presents at Security Field Day 5

Company: HashiCorp

Video Links:

Personnel: Rosemary Wang

In this demo, learn how HashiCorp Consul can help secure communications between devices and ensure that machine-to-machine traffic stays secure and prevents lateral movement by potential attackers.


HashiCorp Vault – Machine Authentication & Authorization

Event: Security Field Day 5

Appearance: HashiCorp Presents at Security Field Day 5

Company: HashiCorp

Video Links:

Personnel: Rosemary Wang

In this demo, HashiCorp shows how their Vault solution can simplify machine authentication for applications and devices and ensure proper authorization of users for zero trust networking access to resources.


Intro to HashiCorp & Zero Trust Framework

Event: Security Field Day 5

Appearance: HashiCorp Presents at Security Field Day 5

Company: HashiCorp

Video Links:

Personnel: Chris Kent

In today’s presentation we’ll take a guided tour of how service mesh, identity-based access management, and secrets management can help implement Zero Trust without increasing development friction. By combining HashiCorp Boundary, Consul, and Vault, we’ll evaluate how these new workflows affect the development process, and how we’ve secured the architecture.


Kemp Field Day Wrap-Up with Jason Dover

Event: Security Field Day 5

Appearance: Kemp Presents at Security Field Day 5

Company: Kemp

Video Links:

Personnel: Jason Dover

In this wrap up session, Kemp discusses the key takeaways from their presentation and how to test this approach in your environment with a free network assessment.


Kemp Demo Ransomware Detection & Response

Event: Security Field Day 5

Appearance: Kemp Presents at Security Field Day 5

Company: Kemp

Video Links:

Personnel: Pavel Minarik

A complex network compromise scenario evolving from initial exploitation through lateral movement, data hoarding and exfiltration over an alternative protocol followed by the final impact through data encryption. Detection of individual indicators of compromise within the network traffic flows as the attack is progressing allows the security operator to respond properly and on time.


Kemp Demo User Account Compromise

Event: Security Field Day 5

Appearance: Kemp Presents at Security Field Day 5

Company: Kemp

Video Links:

Personnel: Pavel Minarik

In-depth walkthrough of the system capabilities on a single use case. Detection of a user account compromise and event evidence ranging from aggregated network telemetry through signature-based detection and full packet data with built-in out-of-the-box packet analysis.


Kemp Flowmon Technical Architecture

Event: Security Field Day 5

Appearance: Kemp Presents at Security Field Day 5

Company: Kemp

Video Links:

Personnel: Pavel Minarik

Kemp’s Flowmon network detection & response architecture, components, input data, detection techniques, algorithms and alignment with MITRE ATT&CK framework. Response to threats and further integration to cyber security technology stack.


Kemp Principals & Approaches for Network Threat Detection

Event: Security Field Day 5

Appearance: Kemp Presents at Security Field Day 5

Company: Kemp

Video Links:

Personnel: Jason Dover

Successful threat detection is a multi-layered approach that requires the right tools, methods and approaches. There’s no single magic bullet but with the right building blocks (including a scalable NDR solution), organizations can be successful in detecting and preventing exploits by extracting the insights from the network.


Kemp Company Overview with Jason Dover

Event: Security Field Day 5

Appearance: Kemp Presents at Security Field Day 5

Company: Kemp

Video Links:

Personnel: Jason Dover

Kemp powers the always-on application experience that enterprises and service providers need to succeed. Kemp has redefined load balancing and network visibility simplified deployment options, flexible licensing, and top-rated technical support. Kemp has more than 100,000 deployments in 138 countries.

Kemp’s product portfolio is centered on helping customers deliver the best possible application experience by addressing the requirements of modern application load balancers, network visibility, and response to emerging security threats in the network. The core components of this portfolio are the LoadMaster ADC & WAF, Flowmon NPMD and Flowmon ADS.


Juniper Threat Labs with Mounir Hahad

Event: Security Field Day 5

Appearance: Juniper Networks Presents at Security Field Day 5

Company: Juniper Networks

Video Links:

Personnel: Mounir Hahad

What good is threat research unless you can actually do something with it? Juniper Threat Labs does the research, experiments with new detection techniques, and puts all that knowledge back into Juniper’s security products and services.


Juniper Networks Security Director Insights

Event: Security Field Day 5

Appearance: Juniper Networks Presents at Security Field Day 5

Company: Juniper Networks

Video Links:

Personnel: Madhura Kumar

If the network plays a key role in security, then network telemetry plays a key role in attack analytics and orchestration. Security Director Insights correlates threat detections and network anomalies and maps them to MITRE.