Network Security protects servers and endpoints with virtual patching backed by
advanced threat research from the world's leading vulnerability research team. You
can see this virtual patching in action by trying out a free interactive demo.
Use our AWS account to launch Network Security to learn how to assess your security
posture and protect your environment from emerging threats. This demo does not
require any changes to your existing environment.
Demo prerequisites include:
- A Trend Micro Cloud One account. Create one for free here.
- Familiarity with AWS networking models and VPC ingress routing.
- This demo is only available to users who have not already deployed Network Security.
Follow the steps below to launch the interactive demo:
Procedure
- Sign up for a Trend Micro Cloud One Account if you do not have one already. Verify that you can log in to the Trend Micro Cloud One web portal and navigate to the Network Security section.
- Click on the Launch an interactive demo button to navigate to the demo page.
- Click on the Start interactive demo button.
Note
The demo environment takes up to five minutes to launch and is available for two hours. Expect to spend about 30 minutes exploring Network Security.The diagram below outlines the architecture of the environment.
Emerging threat protection
Once the interactive demo spins up, you can walk through the easy to use Log4j
protection checklist to learn how to protect a mock AWS environment from the
Log4j vulnerability. By completing this task, you will learn how to initiate,
configure and verify protection against emerging threats such as Log4j.
Once you have successfully protected assets in the demo environment from Log4j
and verified asset protection status, click Finish Demo to exit the
demo. Your demo environment is automatically reset after two hours.
Next Steps
Now that you have had a chance to experience Network Security's inbound and
outbound protection, take the next steps to protect your cloud
infrastructure.
Use the Get Started wizard in the Network Security management interface to
begin deployment. This generates a CloudFormation template that deploys Edge
protection in your network using information obtained from your cloud
account.
If Edge deployment is not right for your environment, learn more about other available Network Security deployment
options.