Opinnate

Edit Template

Validate Opinnate
in 2–4 weeks

Define scope, connect your environment, generate an audit-ready evidence pack, and confirm the safest path from insight to governed action.

Setup & integration (first 2 hours)

The POC starts with a fast baseline setup using an ISO image, followed by integration with your existing firewalls via API and syslog.

Deploy from ISO

Install the Manager and Collector components using the provided ISO image.

Connect to your environment

Establish API connectivity to your firewall platforms for configuration and policy visibility.

Enable syslog collection

Configure syslog forwarding from firewalls to the Collector to unlock usage and activity insights.

Confirm baseline readiness

Validate data ingestion and produce the first baseline snapshot to kick off detailed testing.

What happens next
After the initial setup, the POC continues with customer-specific test scenarios and deep-dive validations based on your requirements.
Inputs needed
To run an efficient POC, we align on vendors, access scope, and the right stakeholders from day one.

Vendors & environment

  • Firewall vendor(s) and deployment model (on-prem / cloud / hybrid)
  • Target scope: which devices / domains / policy sets are included in the POC

Access & connectivity

  • Required API access (preferably read-only for initial validation; elevated access only if you want to test actions)
  • Network connectivity between Manager/Collector and firewall management endpoints

Logs (for usage insights)

  • Syslog forwarding from in-scope firewalls to the Collector
  • Agreed log window depending on the use case

Stakeholders (recommended)

  • Network/Firewall Owner (technical lead for access + validation)
  • Security / GRC Owner (compliance, risk, reporting needs)
  • Optional: ITSM/Operations owner (if approvals/tickets are part of the flow)