We know how hard it can be to drive your customers to invest in new disruptive technologies. So we invested for you. In unique, multi-vendor virtual demo labs – the first and only multi-vendor, multi-solution facility in distribution. You are their trusted advisors. Now you can prove it.
You can now see and show how our best-of-breed solutions work to safeguard your customers in all their use cases.
Our virtual demo labs let you and your customers road test combined multi-vendor security solutions in specific use cases. Practical experience of high-performance solutions in a secure, supervised environment.
- Save time and money when test driving multi-vendor security solutions
- Try out combined use cases in a flexible and reliable cloud lab
- Test drive from the safe environment of your home office or workplace
3D Lab Solution Offerings
AttackIQ CrowdStrike 3D lab
Showcase the value of the AttackIQ Breach and Attack Simulation platform in validating CrowdStrike EDR. Experience the CrowdStrike Falcon Recommended Policy Template provided by AttackIQ to measure efficiency of your configured prevention policies on CrowdStrike EDR. This assessment validates that the selected assets are protected by CrowdStrike Falcon, that CrowdStrike Falcon is generating alerts and validates your detection and response workflow by triggering alerts in CrowdStrike Falcon.
CrowdStrike 3D lab
This lab is built for system administrators desiring a deeper dive into the Falcon End Point Protection Platform. Anyone who is responsible for deploying or maintaining the Falcon EPP and EDR solutions. Lab Modules : Understand the Falcon Console Sensor Deployment Ransomware Detection Browser based Exploit Lateral Movement Scenario Workflow creation
CrowdStrike Identity Protection 3D lab
In this lab, you will learn, discover and execute modern attacks against Active Directory. You will understand how important it is to secure your enterprise identity solutions like Windows Active Directory in order to prevent cyber-attacks like ransomware or data theft. You will discover how CrowdStrike Identity Protection's powerful tools deliver deep visibility into your identity store and how you can detect and prevent your environment from cyber threats and adversaries like Access Brokers. Finally, you will execute some Active Directory attacks like kerb roasting, pass-the-hash and privilege escalation.
Palo Alto Networks Cortex XDR 3D lab
The Cortex XDR 3D Lab is built to give a detailed view over the Cortex XDR platform’s capabilities. How to fine-tune configuration to stop and understand different kinds of malware and exploits and how to run response scripts on infected endpoints. See how Cortex XDR stitches together alerts into one incident.
Vectra and AttackIQ 3D lab
The Vectra - AttackIQ lab will allow customers and partners to validate the efficacy of the Vectra AI platform by utilizing AttackIQ's PCAP replay and related network scenarios to find and fix coverage gaps throughout their security infrastructure before adversaries exploit them." Lab modules : Prepare the Lab Check the Lab environment Trigger events. Run nmap. Run attacks using AttackIQ Test DNS Tunnel with the Data Exfiltration tool from Infoblox Run your own tests using Kali
Vectra - CrowdStrike - Zscaler - AttackIQ 3D lab
Showcase AttackIQ's attack simulation to validate the efficacy of the Vectra AI platform and pivot to CrowdStrike EDR to reduce time to respond. Showcase Zscaler for users accessing business-critical internal applications and monitor/detect malicious intent with Vectra.
Secure Access with Zscaler (ZIA/ZPA) and Okta 3D lab
This 3D lab will allow you to showcase Okta MFA for Secure Access to internal applications with Zscaler ZPA and apply Okta MFA for Zscaler ZIA based on user’s network context and location. You will learn how to prevent access to the Okta App based on user location and test the real time ZIA adaptative security policy after change of user context.
Zero Trust Zscaler and CrowdStrike 3D lab (Light)
The Zscaler ZPA – CrowdStrike ZTA lab will allow partners or customers to configure the Zscaler Private Access solution to provide access to internal applications with the best of breed Zero Trust Network Access solution. Additionally, it will showcase how the combined Zscaler and CrowdStrike offering can secure access to applications by providing conditional access based on the health score for each device as a continuous stream of posture assessments.
Zero Trust with Zscaler and CrowdStrike 3D lab (Full)
This 3D lab with Zscaler ZPA and CrowdStrike ZTA will allow partners or customers to configure the Zscaler Private Access solution to provide access to internal applications with the best of breed Zero Trust Network Access solution. Additionally, it will showcase how the combined Zscaler and CrowdStrike offering can secure access to applications by providing conditional access based on the health score for each device as a continuous stream of posture assessments.
Zero Trust 3D lab with Okta, Zscaler and CrowdStrike
This 3D lab will allow you to configure Okta MFA to Secure Access to internal applications with Zscaler ZPA and apply Okta MFA for Zscaler ZIA based on user’s network context and location. Also, you will be preventing Access to the Okta App based on user location and configure real Time ZIA Adaptative security policy after change of user context and test how Zscaler will prevent the data leak automatically based on the new user context. Additionally, the CrowdStrike ZTA Device Posture score will be used to qualify secure access to Zscaler ZIA and/or ZPA.
What to expect when you book?
Start date must be at least 24 hours after request based on lab availability
· Once registered, you’ll receive a free lab guide
· Your demo co-ordinator will prepare and spin up the lab instance
· Lab is available for 48 hours over a period of 1 week
· Lab is automatically ended at end of the pre-defined period