We know how hard it can be to drive your customers to invest in new disruptive technologies. So we invested for you. In unique, multi-vendor virtual demo labs – the first and only multi-vendor, multi-solution facility in distribution. You are their trusted advisors. Now you can prove it.
Westcon 3D Lab
Multi-vendor, multi-solution virtual demo labs
You can now see and show how our best-of-breed solutions work to safeguard your customers in all their use cases.
Our virtual demo labs let you and your customers road test combined multi-vendor security solutions in specific use cases. Practical experience of high-performance solutions in a secure, supervised environment.
- Save time and money when test driving multi-vendor security solutions
- Try out combined use cases in a flexible and reliable cloud lab
- Test drive from the safe environment of your home office or workplace
3D Lab Solution Offerings
AttackIQ CrowdStrike 3D lab
Showcase the value of the AttackIQ Breach and Attack Simulation platform in validating CrowdStrike EDR. Experience the CrowdStrike Falcon Recommended Policy Template provided by AttackIQ to measure efficiency of your configured prevention policies on CrowdStrike EDR. This assessment validates that the selected assets are protected by CrowdStrike Falcon, that CrowdStrike Falcon is generating alerts and validates your detection and response workflow by triggering alerts in CrowdStrike Falcon.BOOK NOW
CrowdStrike 3D lab
This lab is built for system administrators desiring a deeper dive into the Falcon End Point Protection Platform. Anyone who is responsible for deploying or maintaining the Falcon EPP and EDR solutions. Lab Modules : Understand the Falcon Console Sensor Deployment Ransomware Detection Browser based Exploit Lateral Movement Scenario Workflow creationBOOK NOW
CrowdStrike Identity Protection 3D lab
In this lab, you will learn, discover and execute modern attacks against Active Directory. You will understand how important it is to secure your enterprise identity solutions like Windows Active Directory in order to prevent cyber-attacks like ransomware or data theft. You will discover how CrowdStrike Identity Protection's powerful tools deliver deep visibility into your identity store and how you can detect and prevent your environment from cyber threats and adversaries like Access Brokers. Finally, you will execute some Active Directory attacks like kerb roasting, pass-the-hash and privilege escalation.BOOK NOW
CrowdStrike and Okta Identity Protection 3D lab
In this 3D lab, you will be able to simulate modern identity attacks against simulated Active Directory and how to detect and stop them using Falcon Identity Protection. You will able to extend protection to Okta through native integrations that help you get complete visibility into user behaviours to extend protection to Okta managed cloud apps from cloud lateral movements. Extending Okta MFA to on-prem services that uses Active directory as identity store is also covered in this 3D lab.BOOK NOW
EfficientIP-Extreme Networks integration 3D lab
This multivendor integration 3D lab with EfficientIP and Extreme Networks allows partners to showcase how EfficientIP IPAM can benefit from the metadata gathered by the Extreme NAC solution and showcase how ExtremeControl NAC quarantines malicious clients in a remediation network at the very edge of the network. This is done based on the detection of malicious DNS activities by Efficient IP Guardian and helps to prevent threats from spreading within the network.
The F5 NGINX lab will allow you to experience the NGINX Plus solution including proxying/routing HTTP requests, load balancing, logging, health checks, caching and encrypted web traffic.
F5 Distributed Cloud Services 3D lab
This F5 3D lab allows partners to showcase how F5 Distributed Cloud Services (XC) will secure applications with minimal effort making use of automation and AI/ML. Next to the F5 XC use case in multi-cloud modern architectures with API’s and microservices, this lab will demonstrate that it can be also used to protect traditional applications. This lab will showcase deploying applications, discovering APIs and protecting them.
Noname Security 3D lab
The Noname Security lab will allow you to go through the Noname Security API platform to experience the main functionality of their API security product and how to configure it.BOOK NOW
Palo Alto Networks Cortex XDR 3D lab
The Cortex XDR 3D Lab is built to give a detailed view over the Cortex XDR platform’s capabilities. How to fine-tune configuration to stop and understand different kinds of malware and exploits and how to run response scripts on infected endpoints. See how Cortex XDR stitches together alerts into one incident.BOOK NOW
Proofpoint Aegis Threat Protection Platform 3D lab
This 3D lab allows you to discover the Proofpoint Aegis Threat Protection Platform and showcase how it handles social engineering attacks like Zero-Day Phishing using Targeted Attack Protection (TAP) URL Defense, Threat Response Auto Pull (TRAP) to remove malicious mails and Phish Alarm to create a closed loop e-mail auto response. You will also discover how Proofpoint can stop known and unknown malicious content from emails using TAP Attachment Defense, how it can stop Business Email Compromise (BEC) and how TAP can integrate with Wildfire, the Palo Alto Networks Sandbox, to detect unknow malicious content. Explore Proofpoint's URL isolation capabilities and how it can help against targeted attacks to secure company assets.BOOK NOW
Proofpoint Insider Threat Management 3D Lab
This 3D Lab allows you to explore Proofpoint's Insider Threat Management (ITM) solution. It provides a people-centric approach to reduce insider threat risk, accelerate alert response and optimise security teams resources. With ITM and Endpoint Data Loss Prevention (DLP) SaaS solutions, you choose how you want to monitor different users. You can monitor low-risk users for data exfiltration signals and high-risk users for all activity, providing additional context.
You will be able to discover initial configuration and deployment of ITM agents, create detection and prevention rules and test them in your personal environment.BOOK NOW
Vectra and AttackIQ 3D lab
The Vectra - AttackIQ lab will allow customers and partners to validate the efficacy of the Vectra AI platform by utilizing AttackIQ's PCAP replay and related network scenarios to find and fix coverage gaps throughout their security infrastructure before adversaries exploit them." Lab modules : Prepare the Lab Check the Lab environment Trigger events. Run nmap. Run attacks using AttackIQ Test DNS Tunnel with the Data Exfiltration tool from Infoblox Run your own tests using KaliBOOK NOW
Vectra - CrowdStrike - Zscaler - AttackIQ 3D lab
Showcase AttackIQ's attack simulation to validate the efficacy of the Vectra AI platform and pivot to CrowdStrike EDR to reduce time to respond. Showcase Zscaler for users accessing business-critical internal applications and monitor/detect malicious intent with Vectra.BOOK NOW
Secure Access with Zscaler (ZIA/ZPA) and Okta 3D lab
This 3D lab will allow you to showcase Okta MFA for Secure Access to internal applications with Zscaler ZPA and apply Okta MFA for Zscaler ZIA based on user’s network context and location. You will learn how to prevent access to the Okta App based on user location and test the real time ZIA adaptative security policy after change of user context.
Zero Trust Zscaler and CrowdStrike 3D lab (Light)
The Zscaler ZPA – CrowdStrike ZTA lab will allow partners or customers to configure the Zscaler Private Access solution to provide access to internal applications with the best of breed Zero Trust Network Access solution. Additionally, it will showcase how the combined Zscaler and CrowdStrike offering can secure access to applications by providing conditional access based on the health score for each device as a continuous stream of posture assessments.BOOK NOW
Zero Trust with Zscaler and CrowdStrike 3D lab (Full)
This 3D lab with Zscaler ZPA and CrowdStrike ZTA will allow partners or customers to configure the Zscaler Private Access solution to provide access to internal applications with the best of breed Zero Trust Network Access solution. Additionally, it will showcase how the combined Zscaler and CrowdStrike offering can secure access to applications by providing conditional access based on the health score for each device as a continuous stream of posture assessments.BOOK NOW
Zero Trust 3D lab with Okta, Zscaler and CrowdStrike
This 3D lab will allow you to configure Okta MFA to Secure Access to internal applications with Zscaler ZPA and apply Okta MFA for Zscaler ZIA based on user’s network context and location. Also, you will be preventing Access to the Okta App based on user location and configure real Time ZIA Adaptative security policy after change of user context and test how Zscaler will prevent the data leak automatically based on the new user context. Additionally, the CrowdStrike ZTA Device Posture score will be used to qualify secure access to Zscaler ZIA and/or ZPA.BOOK NOW
Zscaler Internet Access Practice 3D lab
Westcon, as an Authorized Distributor for Zscaler, offers a unique opportunity with this practice lab. It enables your engineers to gain practical experience with Zscaler ZIA while working in a safe environment.
What to expect when you book?
Start date must be at least 24 hours after request based on lab availability
· Once registered, you’ll receive a free lab guide
· Your demo co-ordinator will prepare and spin up the lab instance
· Lab is available for 48 hours over a period of 1 week
· Lab is automatically ended at end of the pre-defined period