2025 TVS Logo

2025 Technology Vendor Summit

Thursday, April 10th, 2025 | Old National Events Plaza - Evansville, IN

The Technology Vendor Summit is a FREE full day dedicated to connecting technology professionals with the latest solutions, services, and strategies to help them make their businesses better.

Solutions

Discuss projects and get answers to questions directly from the experts.

Connect

Network, connect, and problem solve with other local technical teams.

Strategies

Hear the latest from our team and our partners during breakout sessions.

Giving Back

Every TVS features a way for you to help us make a positive impact.

What is the TVS?

With each Technology Vendor Summit (TVS), Keller Schroeder collaborates with key vendor partners from the industry’s leading technology companies to bring knowledge, networking, and new ideas. The event features the largest gathering of both tech pros and solution providers in the Evansville area.

During the TVS, attendees have the opportunity to connect with like-minded IT employees from a wide range of companies from across Indiana, Kentucky, Illinois, and Tennessee – small start-ups to enterprise-level, global organizations in every industry. Breakout sessions and networking booths allow attendees to learn and ask questions directly from our participating partners and Keller Schroeder’s subject matter experts.

Not All Business

The TVS isn’t all business – you can count on delicious food, swag, fun prizes, and a Happy Hour celebration to close out the event. Several years ago, we also started incorporating a non-technology-oriented keynote speaker. These are nationally recognized speakers sharing their unique perspective on connection, collaboration, and professional development.

In addition, nearly every Keller Schroeder event offers attendees the opportunity to help us give back to our community. The TVS is no exception and will feature a unique way to partner with us to make a positive impact.

Technology Pros
0 +
Companies in
Attendance in 2024
0 +
Technical Attendees
0 %
Breakout Sessions
0 +
Attending Partners in 2024
0

Why Should You Attend?

The TVS was developed with Keller Schroeder’s clients in mind. We saw a need for a technology event of this caliber LOCALLY. Tri-State area IT pros must travel over two ours to gain access to this many partners and solutions in a single setting, on a single day.

Did we also mention it’s completely FREE for attendees? This is a no-cost event. Tickets to similar events typically cost between $400 and $1000.

  • Largest Gathering of Technology Providers
  • Dozens of Learning Sessions
  • No Long Travel Days or Expenses
  • NO COST for Attendees

Meet Our 2025 Keynote Speaker

Brought to you in partnership with

NetApp-Partner-IN-KY-TN
Kate-Swanborg-Dreamworks-Animation-2025-TVS-Keynote-Speaker-IN-KY-TN

Kate Swanborg

SVP of Technology Communications and Strategic Alliances for DreamWorks Animation

“Unleashing Imagination With Data”
DreamWorks Animation has created animated films for 30 years and has entertained global audiences with stories about dreams and the heroic journeys that make them come true. Kate will take the audience behind the scenes of their most recent movie to talk about what goes into the making of a full-length animated feature film.

She’ll review the creative stages behind animation, discuss the tremendous amount of data generated in the process, how data is managed and why technology is so critical to the success of the project. Kate will discuss why technology innovation and partnering with leading-edge technology companies is at the forefront for DreamWorks, and how this allows the studio to push the boundaries of creativity.

In order for DreamWorks’ artists to focus on creating the dynamic characters and worlds in their stories, they need to constantly access data in a reliable and secure way. Technology acts as a paintbrush at DreamWorks, that enables their artists to focus on creativity without worrying about where that data resides, whether it’s on-premises or in a hybrid cloud environment.

Learn More About Kate

Kate Swanborg is SVP of Technology Communications and Strategic Alliances for DreamWorks Animation. She is responsible for setting the strategic direction of the studio’s worldwide technology communications and business-to-business alliance efforts on behalf of the studio’s technology partners.

In her role, Kate promotes DreamWorks’ dedication to leveraging innovative technologies that enable the studio’s filmmakers and artists and provide the foundation for new technology business initiatives. She is responsible for identifying and managing technology alliances and integrated co-marketing and branding campaigns with the studio’s technology partners. Collaborating closely with the studio and strategic alliance partner executive leadership teams, Kate ensures that DreamWorks delivers consistent and compelling technology messages through a variety of mediums including presentations, press collateral and studio showcases. A practiced public speaker, Kate is frequently requested to provide keynote addresses to further DreamWorks’ business messaging.

Prior to her current role, Kate served as the studio’s Technology Production Manager where she helped develop strategies and action plans for producing animated feature films. She also managed the integration of major production technology solutions, such as stereoscopic 3D and a full re-architecture of the studio’s proprietary tool sets.

Kate earned a MFA from the University of California, San Diego and a BA from Western
Michigan University.

Dreamworks-Animation-Logo-Kate-Swanborg-2025-TVS-Keynote-Speaker-IN-KY-TN
Learn More About Kate

Kate Swanborg is SVP of Technology Communications and Strategic Alliances for DreamWorks Animation. She is responsible for setting the strategic direction of the studio’s worldwide technology communications and business-to-business alliance efforts on behalf of the studio’s technology partners.

In her role, Kate promotes DreamWorks’ dedication to leveraging innovative technologies that enable the studio’s filmmakers and artists and provide the foundation for new technology business initiatives. She is responsible for identifying and managing technology alliances and integrated co-marketing and branding campaigns with the studio’s technology partners. Collaborating closely with the studio and strategic alliance partner executive leadership teams, Kate ensures that DreamWorks delivers consistent and compelling technology messages through a variety of mediums including presentations, press collateral and studio showcases. A practiced public speaker, Kate is frequently requested to provide keynote addresses to further DreamWorks’ business messaging.

Prior to her current role, Kate served as the studio’s Technology Production Manager where she helped develop strategies and action plans for producing animated feature films. She also managed the integration of major production technology solutions, such as stereoscopic 3D and a full re-architecture of the studio’s proprietary tool sets.

Kate earned a MFA from the University of California, San Diego and a BA from Western
Michigan University.

2025 Participating Sponsors

Keller Schroeder’s Technology Vendor Summit is the perfect event for technology professionals looking to stay ahead of the curve. Come learn firsthand from top technology experts, discover the latest trends in tech, discuss best practices for leveraging new technologies, find innovative solutions to fit your business needs. Don’t miss out on this amazing opportunity!

TITLE

Cisco-Partner-IN-KY-TN

KEYNOTE

NetApp-Partner-IN-KY-TN

PLATINUM

Hewlett-Packard-Enterprise-Keller-Schroeder-Partner
Arctic-Wolf-Partner-TN-IN-KY
Baramundi-Partner-IN-KY-TN
Object-First-Partner-IN-KY-TN
Microsoft-Solutions-Partner-IN-KY-TN
Veeam-Partner-IN-KY-TN
Dune-Partner-IN-KY-TN
Tricerat-Partner-IN-KY-TN
Knowbe4-Partner-IN-KY-TN
Mimecast-Partner-IN-KY-TN
AWS-Partner-IN-KY-TN
PaloAlto-Partner-IN-KY-TN

GOLD

Microsoft-TDS-Keller-Schroeder-Partner
Mimecast-Keller-Schroeder-Partner
NetApp-Keller-Schroeder-Partner
Arctic-Wolf-Keller-Schroeder-Partner
Eaton-Keller-Schroeder-Partner
Egress-Keller-Schroeder-Partner
Exagrid-Keller-Schroeder-Partner
Fortinet-Keller-Schroeder-Partner
Qualys-Keller-Schroeder-Partner
Veeam-24-Keller-Schroeder-Partner

SILVER

Data-Link-Partner-IN-KY-TN
Eaton-Partner-IN-KY-TN
Kalleo-Partner-IN-KY-TN
Qualys-Partner-IN-KY-TN
SentinelOne-Partner-IN-KY-TN
Proofpoint-Partner-IN-KY-TN

HAPPY HOUR PARTNERS

TD-SYNNEX-Partner-IN-KY-TN
Cisco-Partner-IN-KY-TN
Data-Link-Partner-IN-KY-TN

BREAKFAST PARTNER

Dune-Partner-IN-KY-TN

2025 Breakout Session Topics

Our team is working diligently with our participating partners to solidify the most timely, relevant, and valuable breakout sessions. We’ll be adding details to this section daily as we confirm. Check back often! In the meantime, you can take a look at what the Keller Schroeder technical teams have in store this year. Our attendee app will also be available very soon! 

partner sessions

Arctic Wolf

Mastering Incident Response with Arctic Wolf
Key Plays for Swift & Effective Action to help prepare for the inevitable. With cyber attack frequency hitting new highs, the continued evolution of threat actor tactics, techniques and procedures (TTPs), and the rapid digitization of organizations across industries, it’s become common to say that it’s not a matter of if, but when you’ll experience a cyber incident.

Baramundi

From Repetitive Tasks to Strategic impact: The power of baramundi IT Automation
IT teams spend countless hours on routine tasks like patch management, software deployment, and system monitoring—time that could be better spent on strategic initiatives. This session explores how baramundi empowers IT admins with powerful automation, reducing manual effort, minimizing risks, and freeing up valuable resources. Discover how automation transforms daily IT operations, enhances security, and allows your team to focus on what truly matters.

Cisco

Cisco Collaboration: How Hybrid Models and AI are Transforming Experiences
This session will be focused on how Cisco collaboration technology is leveraging the power of hybrid work and AI to transform employee and customer experiences. Learn about Cisco’s latest advancements in meetings, devices, calling, and contact center, and how leveraging technology like Cisco Spaces creates a cohesive workplace environment.

Securing the Future: A Modern Approach to User Protection and Zero Trust
In today’s world of digital transformation and hybrid work environments, secure and seamless application access from any location is crucial. Join us for a session on Cisco’s innovative security solutions, which combine continuous identity visibility with zero trust management to tackle these challenges. Learn about the unique advantages of Cisco’s offerings, designed to surpass traditional solutions and set a new standard in user protection.

Unleashing AI Potential: The Power of Cisco AI PODs
Join us for an insightful session on Cisco AI PODs, purpose-built infrastructure solutions designed to help organizations quickly harness the potential of artificial intelligence. This presentation will cover:

– AI Adoption and Challenges: Explore the growing adoption of AI across industries and the common challenges organizations face.
– Cisco’s AI Infrastructure: Learn about Cisco’s robust infrastructure designed to support AI workloads efficiently.
– AI PODs Features: Discover how Cisco AI PODs provide pre-designed full stack architecture bundles for targeted AI use cases, enabling rapid
deployment and scalability.
– Support Services: Understand the MINT program and other partner support services that facilitate seamless AI integration.

This session is ideal for businesses looking to leverage AI to drive innovation and improve operational efficiency

Dune Security

Beyond One-Size-Fits-All: User Adaptive Risk Management
Traditional security awareness programs take a blanket approach, treating all employees the same—regardless of their role, risk level, or behavior. But in today’s evolving threat landscape, organizations need smarter, adaptive security strategies that focus resources where they matter most.

Join us for an insightful session on User Adaptive Risk Management, where we’ll explore how AI-driven risk quantification, automated remediation, and personalized security interventions can reduce real organizational risk without disrupting productivity. Learn how leading companies are moving beyond outdated, one-size-fits-all training models to implement dynamic, risk-based security strategies that identify, measure, and proactively mitigate threats at the individual level.

Key Takeaways:
– Why traditional phishing simulations and training fail to reduce risk
– How to quantify employee risk and automate targeted interventions
– Best practices for integrating security awareness with IAM, EDR, and DLP tools
– Real-world examples of adaptive risk management in action

Whether you’re a security leader looking to enhance your defense strategy or an IT professional aiming to streamline risk management, this session will provide actionable insights to help you future-proof your security program.

HPE

Is Broadcom’s VMware all that there is? What’s in your virtualization roadmap?
An examination of the virtualization ecosystem landscape as it exists today and a possible alternative from HPE

Ensure smooth enterprise IT infrastructure operations with proactive and predictive automation from data center to edge
Overview of HPE’s edge to cloud enterprise IT infrastructure hybrid cloud based tools and resources to ensure smooth operations from “Day 0” forward.

KnowBe4
KnowBe4 – The Future of Human Risk Management
Cybersecurity threats grow more sophisticated by the day. Amid this constant change, one truth remains: people are simultaneously our greatest security vulnerability and our strongest line of defense. Learn how to empower your people with a new approach that minimizes human risk and maximizes protection.

In this session, you will learn more about HRM+, KnowBe4’s groundbreaking human risk management platform and how it creates an adaptive defense layer against the latest cybersecurity threats. We’ll dive into the various modules of the platform, including awareness and compliance training, cloud email security, real-time coaching, crowdsourced anti-phishing and AI Defense Agents (AIDA).

As the only global security platform of its kind, KnowBe4 transforms your largest attack surface – your workforce – into your biggest asset, actively protecting your organization against cybersecurity threats.
Microsoft - Coming Soon!

Details coming soon!

NetApp

NetApp: VMware & Alternatives – Should I Stay or Should I Go?
Is the VMware subscription model getting too costly for your virtualized environment? During this session, we’ll discuss what options you have available, what some NetApp customers are doing, and provide you with a plan to consider for bringing your VMware environment under control.

Defend, Detect, and Recover: NetApp ONTAP’s Advanced Data Protection
NetApp is committed to providing secure storage solutions that align with the National Institiute of Standards and Technology (NIST) cybersecurity framework, to protect data integrity and business continuity in the face of constantly evolving cyber threats. Learn about the most recent NetApp OnTap enhancements and capabilities, including Autonomous Ransomware Protection, WORM, “two person integrity” with MultiAdmin Verify, and the rest of the feature payload dedicated to protecting your data across hybrid and multicloud environments.

Object First & Veeam

Veeam and Object First’s Approach to Ransomware Protection and Recovery
Discover how Veeam and Object First uses the fundamentals of NIST Zero Trust Architecture to protect your backup data from ransomware and facilitates cyber recovery.

Palo Alto

Prisma Access Browser
Palo Alto Networks’ Prisma Access Browser is a cloud-delivered security service that provides secure access to web applications and internet traffic. It offers comprehensive protection by securing browsing activities, safeguarding against cyber threats, and ensuring privacy while accessing online resources. Prisma Access Browser helps organizations manage security policies, prevent data breaches, and optimize user experience, all while maintaining visibility and control over the browsing environment, regardless of the user’s location or device.

keller schroeder sessions

Keller Schroeder | Applications Solutions
IBMi, AS/400:  Products, Services, Solutions to Your Problems
IBMi, AS/400, iSeries – Whatever you choose to call it, and regardless of the issues you’re facing, chances are quite good that Keller Schroeder has seen it before.  Whether the challenges involve hardware support or upgrades, systems software patching and administration, application development and support, or some combination of these, we have a long history of solving problems involving the IBM midrange platform, as well as helping our clients leverage its legendary reliability, security, scalability, versatility, and low total cost of ownership to competitive advantage.  Combined with our 40+ years of experience as an IBM Business Partner, it’s likely that no other single platform or product has equaled its impact on our evolution and diversification into additional product and service offerings.
 
Join veteran midrange consultants Kyle Creasey and Ray Pritchett for an overview of the range of products and services we provide, as well as some practical examples of ways we’ve engaged with clients over the years.  In addition to allocating time for your questions and answers during the session, we welcome an opportunity to discuss your challenges individually.
 
Transformation Heroes: The X-Factor in Your Digital Transformation

What makes a Digital Transformation more likely to succeed? An experienced leader? A talented tech team? Competent vendors? Active stakeholder involvement? Yes, plus what we consider to be the x-factor of Digital Transformation. Often lost in the mix of build vs buy decisions, the technology stack, the budget, and the timeline is the importance of involving a highly-engaged front-line workforce in your transformation initiatives. Join us as we share tips and case studies of how engaged front-line heroes ensured the success of Digital Transformation initiatives.

You’ll leave this session with:

  • An understanding of what Digital Transformation means to your organization and industry
  • Tips on engaging transformational champions in your organization
  • Real-world examples of companies who prioritize front-line engagement to see smoother implementations and better results

Transformation Superpowers: The Laser Eyes of Improvement
In a successful Digital Transformation, focusing your attention on the right improvements at the right time is paramount. Our Digital Transformation Framework can help. Our transformation tenets provide a lens through which to identify areas for improvement and our included tools will help you assign business value and prioritize them.

You’ll leave this session with:

  • A guide for improving Efficiency, Innovation, and User Experience in your organization
  • A deeper understanding of the tenets we suggest for Digital Transformation
  • Tools to identify and prioritize transformational initiatives

This team will also share a Custom Web Application Case Study – More info coming soon!
Keller Schroeder | Data Strategy Group
Your AI Journey:  Unlocking Success, Part 1
What does it take to build an AI chatbot that delivers value? We’ll start by exploring how poor data management leads to frustrating, unreliable AI. Then, step by step, we’ll show how the proper data management can transform messy information into a solid foundation. Watch as we go from a chatbot that misses the mark to one that provides accurate, relevant responses—powered by well-managed data.

Accelerating Manufacturing Insights with Business Laboratory & the Data Strategy Group
How can data-driven insights revolutionize manufacturing? In this session, we’ll explore how Business Laboratory’s advanced modeling uncovers hidden value and how DSG turns those insights into scalable, real-world solutions. Learn what makes our partnership so powerful and how we help manufacturers optimize operations, reduce costs, and drive innovation. See how we take a use case from concept to full-scale implementation—delivering measurable impact.
 
Worry-Free Database Management with DBA Services
Managing databases can be overwhelming—downtime, disaster recovery, and performance issues are constant concerns. What if you didn’t have to worry about any of it? In this session, we’ll explore how our DBA Services provide expert management, ensuring high availability, security, and performance.

Your AI Journey:  Unlocking Insights with Microsoft Power BI
How do you turn data into real business impact? In this session, we’ll explore how to define a strong use case, identify the right audience, and ensure your Power BI reports drive actionable insights. Then, we’ll dive into the latest AI-powered features in Power BI and show you how to use them effectively. See firsthand how AI can enhance your reports, uncover deeper insights, and make data-driven decisions easier than ever.
Keller Schroeder | Hybrid Cloud Data Center
Hosting Network File Shares with NetApp ONTAP: Secure, Scalable, and Simplified
Unlock the full potential of NetApp ONTAP for hosting network file shares with a seamless, high-availability solution—without the burden of Windows OS management. This session explores how autonomous ransomware protection, efficient storage snapshots, and array-based replication enhance security and disaster recovery. Discover the power of Azure NetApp Files and Cloud Volumes ONTAP as SaaS-based solutions, enabling drag-and-drop file restores, DFS membership, and AD-based permissions for effortless management. Join us for a live demo showcasing real-time file access, backup, and recovery capabilities, and see how NetApp simplifies enterprise file storage while maximizing resilience and efficiency.
 

Microsoft Exchange 2016/2019 End Of Life:  Microsoft Exchange SE, Risks, Impacts and Strategic Recommendations

As Microsoft Exchange Server 2016 and 2019 approach their end-of-support on October 14, 2025, organizations face critical decisions to ensure the security and efficiency of their email infrastructures. This session will delve into the implications of continuing with unsupported Exchange versions, including heightened security vulnerabilities, compliance challenges, and operational risks. We’ll explore viable migration paths such as transitioning to Exchange Online or upgrading to the forthcoming Exchange Server Subscription Edition (SE), set to release in early Q3 2025. Additionally, we’ll clarify licensing requirements, review plan features, and discuss the end-of-life timelines for related Microsoft products, including Windows, Office, Outlook, and Skype, also reaching end-of-support in October 2025. Join us to gain strategic insights and actionable recommendations to navigate this transition effectively and maintain a robust, secure communication environment.

Keller Schroeder | Information Security

Beyond the Breach: Strengthening Your Business Resilience Strategy
Cyber threats and unexpected disruptions are not a matter of “if” but “when.” Is your organization prepared? Join Keller Schroeder’s Information Security team as David Boarman breaks down the essential pillars of Business Resilience—Incident Response, Business Continuity, and Disaster Recovery Planning.

This session will provide clear, actionable insights into:

  • The unique purpose and critical role of each plan
  • Key components and best practices for building a solid strategy
  • Common pitfalls to avoid when developing and maintaining resilience plans

Leave with a roadmap to protect, adapt, and recover—ensuring your business can withstand and thrive beyond any crisis. Don’t wait for disaster to strike—be ready.

Think Fast: Testing Your Team’s Readiness with Tabletop Exercises
Testing your plans before disaster strikes is the key to resilience. Join Keller Schroeder’s Information Security team as Tyler & David guide you through the power of Tabletop Exercises (TTEs)—an essential tool for sharpening your organization’s ability to handle security incidents, operational disruptions, and emergencies.

In this interactive session, you’ll learn:

  • Why TTEs matter—how they expose gaps and strengthen your response strategy
  • How to develop effective exercises tailored to your business needs
  • Who should be involved to ensure a well-rounded, real-world response
  • Examples of impactful scenarios to prepare for cyberattacks, system failures, and beyond

Then, put your knowledge to the test! We’ll walk through a fast-paced tabletop exercise together, giving you a firsthand look at how to apply these strategies in real time.

Keller Schroeder | Network Solutions
Introducing vNetAdmin: Partner-Enabled Network Monitoring and Management

Managing a complex network requires the right tools and expertise. Join Ty Nixon in this session as he introduces Keller Schroeder’s vNetAdmin (Virtual Network Administrator) service, a comprehensive solution for network administration, monitoring, and optimization. Whether you need full-service management, proactive monitoring, or a self-managed platform, the vNetAdmin offering adapts to your needs. You’ll learn how our certified professionals assist with configuration, troubleshooting, and security to keep your network efficient and available. You’ll also see how vNetAdmin simplifies operations, reduces IT workload, and improves reliability.

This is team will also present on Cloud Enabled Calling, with the goal of helping you navigate calling options in a cloud-based world. Details coming soon!

Directions, Travel, & Other Info

Venue

Old National Events Plaza
715 Locust Street
Evansville, IN 47708

Parking is free and located at the corner of Locust and 9th Streets. The main parking lot offers 1100 spaces adjacent to the venue with ADA accessible parking located along 9th Street. A few ADA accessible parking spots are located along Locust Street.

Tips for Parking from Old National Events Plaza

Access to our 2025 TVS app will be provided to event pre-registrants prior to and to attendees at the event.