TechNet Augusta 2022 Sponsorship and Branding Opportunities


AFCEA has developed an enhanced sponsorship program that will offer maximum visibility to those who participate! What better way to make sure you stand out and increase your exposure at this foremost event in which industry leaders can learn about military requirements and connect with decision makers and operators, where senior military and government officials can gain feedback, and where industry thought leaders will discuss and demonstrate solutions. Sponsorship opportunities are offered at several investment levels, ensuring your ability to participate.

Browse available options below, or jump to specific categories: Patron Packages, Individual Sponsorships, Branding Opportunities.

The deadline to be included in sponsor signage is Wednesday, July 20th.

Solution Review: Visibility Fabric Architecture for Directing Data to Central Analytics Platform

  • Room: Innovation Theater
Thursday, August 18, 2022: 11:30 AM - 11:50 AM
/ CEU Credits:NaN

Speaker(s)

Speaker (confirmed)
Craig Reynolds
Government Solutions
Keysight Technologies

Description

To combat security threats in the operational environment, cyber operations teams and cyber protection teams rely on a wide variety of security solutions to protect networks from cyber-attacks and traffic anomalies. These tools require a variety of data sources including logs, but an ongoing critical need is the packet data itself. To enable access of critical packet data to a central platform, the program will need to deploy an intelligent high availability security visibility architecture that supports both inline and out-of-band packet processing across a distributed infrastructure. Keysight recommends implementing the following best practices to create maximum data capture, data analysis, and network survivability during normal operations but more importantly under cyber-attack: Create a passive out-of-band visibility architecture to enable high speed packet capture and continuous monitoring; Access and direct the data from physical, virtual and cloud environments; Aggregate the signals for a unified feed to the data analysis platform, tools, and personnel; Replication of signals allows for one-to-many distribution of the data everywhere it is required; Traffic can be tagged to identify source origination; Perform protocol inspection, SSL decryption, and analysis for intelligent filtering and tool optimization.


Tracks: