Define scope, connect your environment, generate an audit-ready evidence pack, and confirm the safest path from insight to governed action.
The POC starts with a fast baseline setup using an ISO image, followed by integration with your existing firewalls via API and syslog.
Install the Manager and Collector components using the provided ISO image.
Establish API connectivity to your firewall platforms for configuration and policy visibility.
Configure syslog forwarding from firewalls to the Collector to unlock usage and activity insights.
Validate data ingestion and produce the first baseline snapshot to kick off detailed testing.