Skip to main content

We know how hard it can be to drive your customers to invest in new disruptive technologies. So we invested for you. In unique, multi-vendor virtual demo labs – the first and only multi-vendor, multi-solution facility in distribution. You are their trusted advisors. Now you can prove it.

You can now see and show how our best-of-breed solutions work to safeguard your customers in all their use cases.


Our virtual demo labs let you and your customers road test combined multi-vendor security solutions in specific use cases. Practical experience of high-performance solutions in a secure, supervised environment.

  • Save time and money when test driving multi-vendor security solutions
  • Try out combined use cases in a flexible and reliable cloud lab
  • Test drive from the safe environment of your home office or workplace

3D Lab Solution Offerings

AttackIQ CrowdStrike 3D lab

Showcase the value of the AttackIQ Breach and Attack Simulation platform in validating CrowdStrike EDR. Experience the CrowdStrike Falcon Recommended Policy Template provided by AttackIQ to measure efficiency of your configured prevention policies on CrowdStrike EDR. This assessment validates that the selected assets are protected by CrowdStrike Falcon, that CrowdStrike Falcon is generating alerts and validates your detection and response workflow by triggering alerts in CrowdStrike Falcon.

BOOK NOW

CrowdStrike 3D lab

This lab is built for system administrators desiring a deeper dive into the Falcon End Point Protection Platform. Anyone who is responsible for deploying or maintaining the Falcon EPP and EDR solutions. Lab Modules : Understand the Falcon Console Sensor Deployment Ransomware Detection Browser based Exploit Lateral Movement Scenario Workflow creation

BOOK NOW

CrowdStrike Identity Protection 3D lab

In this lab, you will learn, discover and execute modern attacks against Active Directory. You will understand how important it is to secure your enterprise identity solutions like Windows Active Directory in order to prevent cyber-attacks like ransomware or data theft. You will discover how CrowdStrike Identity Protection's powerful tools deliver deep visibility into your identity store and how you can detect and prevent your environment from cyber threats and adversaries like Access Brokers. Finally, you will execute some Active Directory attacks like kerb roasting, pass-the-hash and privilege escalation.

BOOK NOW

CrowdStrike and Okta Identity Protection 3D lab

In this 3D lab, you will be able to simulate modern identity attacks against simulated Active Directory and how to detect and stop them using Falcon Identity Protection. You will able to extend protection to Okta through native integrations that help you get complete visibility into user behaviours to extend protection to Okta managed cloud apps from cloud lateral movements. Extending Okta MFA to on-prem services that uses Active directory as identity store is also covered in this 3D lab.

BOOK NOW

EfficientIP-Extreme Networks integration 3D lab

This multivendor integration 3D lab with EfficientIP and Extreme Networks allows partners to showcase how EfficientIP IPAM can benefit from the metadata gathered by the Extreme NAC solution and showcase how ExtremeControl NAC quarantines malicious clients in a remediation network at the very edge of the network. This is done based on the detection of malicious DNS activities by Efficient IP Guardian and helps to prevent threats from spreading within the network.

 

 

BOOK NOW

F5 NGINX

The F5 NGINX lab will allow you to experience the NGINX Plus solution including proxying/routing HTTP requests, load balancing, logging, health checks, caching and encrypted web traffic.

 

 

 

 

 

BOOK NOW

F5 Distributed Cloud Services 3D lab

This F5 3D lab allows partners to showcase how F5 Distributed Cloud Services (XC) will secure applications with minimal effort making use of automation and AI/ML. Next to the F5 XC use case in multi-cloud modern architectures with API’s and microservices, this lab will demonstrate that it can be also used to protect traditional applications. This lab will showcase deploying applications, discovering APIs and protecting them.

 

 

 

 

BOOK NOW

Noname Security 3D lab

The Noname Security lab will allow you to go through the Noname Security API platform to experience the main functionality of their API security product and how to configure it.

BOOK NOW

Palo Alto Networks Cortex XDR 3D lab

The Cortex XDR 3D Lab is built to give a detailed view over the Cortex XDR platform’s capabilities. How to fine-tune configuration to stop and understand different kinds of malware and exploits and how to run response scripts on infected endpoints. See how Cortex XDR stitches together alerts into one incident.

BOOK NOW

Proofpoint Aegis Threat Protection Platform 3D lab

This 3D lab allows you to discover the Proofpoint Aegis Threat Protection Platform and showcase how it handles social engineering attacks like Zero-Day Phishing using Targeted Attack Protection (TAP) URL Defense, Threat Response Auto Pull (TRAP) to remove malicious mails and Phish Alarm to create a closed loop e-mail auto response. You will also discover how Proofpoint can stop known and unknown malicious content from emails using TAP Attachment Defense, how it can stop Business Email Compromise (BEC) and how TAP can integrate with Wildfire, the Palo Alto Networks Sandbox, to detect unknow malicious content. Explore Proofpoint's URL isolation capabilities and how it can help against targeted attacks to secure company assets.

BOOK NOW

Proofpoint Insider Threat Management 3D Lab

This 3D Lab allows you to explore Proofpoint's Insider Threat Management (ITM) solution. It provides a people-centric approach to reduce insider threat risk, accelerate alert response and optimise security teams resources. With ITM and Endpoint Data Loss Prevention (DLP) SaaS solutions, you choose how you want to monitor different users. You can monitor low-risk users for data exfiltration signals and high-risk users for all activity, providing additional context.

You will be able to discover initial configuration and deployment of ITM agents, create detection and prevention rules and test them in your personal environment.

BOOK NOW

Vectra and AttackIQ 3D lab  

The Vectra - AttackIQ lab will allow customers and partners to validate the efficacy of the Vectra AI platform by utilizing AttackIQ's PCAP replay and related network scenarios to find and fix coverage gaps throughout their security infrastructure before adversaries exploit them." Lab modules : Prepare the Lab Check the Lab environment Trigger events. Run nmap. Run attacks using AttackIQ Test DNS Tunnel with the Data Exfiltration tool from Infoblox Run your own tests using Kali

BOOK NOW

Vectra - CrowdStrike - Zscaler - AttackIQ 3D lab  

Showcase AttackIQ's attack simulation to validate the efficacy of the Vectra AI platform and pivot to CrowdStrike EDR to reduce time to respond. Showcase Zscaler for users accessing business-critical internal applications and monitor/detect malicious intent with Vectra.

BOOK NOW

Secure Access with Zscaler (ZIA/ZPA) and Okta 3D lab

This 3D lab will allow you to showcase Okta MFA for Secure Access to internal applications with Zscaler ZPA and apply Okta MFA for Zscaler ZIA based on user’s network context and location. You will learn how to prevent access to the Okta App based on user location and test the real time ZIA adaptative security policy after change of user context.

BOOK NOW

Zero Trust Zscaler and CrowdStrike 3D lab (Light)

The Zscaler ZPA – CrowdStrike ZTA lab will allow partners or customers to configure the Zscaler Private Access solution to provide access to internal applications with the best of breed Zero Trust Network Access solution. Additionally, it will showcase how the combined Zscaler and CrowdStrike offering can secure access to applications by providing conditional access based on the health score for each device as a continuous stream of posture assessments. 

BOOK NOW

Zero Trust with Zscaler and CrowdStrike 3D lab (Full)

This 3D lab with Zscaler ZPA and CrowdStrike ZTA will allow partners or customers to configure the Zscaler Private Access solution to provide access to internal applications with the best of breed Zero Trust Network Access solution. Additionally, it will showcase how the combined Zscaler and CrowdStrike offering can secure access to applications by providing conditional access based on the health score for each device as a continuous stream of posture assessments. 

BOOK NOW

Zero Trust 3D lab with Okta, Zscaler and CrowdStrike

This 3D lab will allow you to configure Okta MFA to Secure Access to internal applications with Zscaler ZPA and apply Okta MFA for Zscaler ZIA based on user’s network context and location. Also, you will be preventing Access to the Okta App based on user location and configure real Time ZIA Adaptative security policy after change of user context and test how Zscaler will prevent the data leak automatically based on the new user context. Additionally, the CrowdStrike ZTA Device Posture score will be used to qualify secure access to Zscaler ZIA and/or ZPA.

BOOK NOW

Zscaler Internet Access Practice 3D lab

Westcon, as an Authorized Distributor for Zscaler, offers a unique opportunity with this practice lab. It enables your engineers to gain practical experience with Zscaler ZIA while working in a safe environment.

 

 

 

BOOK NOW

Zscaler ZIA and CrowdStrike Falcon integration 3D Lab

The Zscaler Internet Access and CrowdStrike 3D Lab will allow partners or customers to learn, understand and get hands on experience on integrations between ZIA and CrowdStrike using different uses cases. Additionally, it will showcase how the combined Zscaler and CrowdStrike offering can secure access to internet and SaaS applications by providing conditional access based on the health score for each device as a continuous stream of posture assessments provided by CrowdStrike ZTA. You will be able to understand how Zscaler Internet Access Sandbox can share threat data for unknown files with CrowdStrike EDR to get end to end visibility on new and unknown threats.

 

 

BOOK NOW