top of page
Introduction > Create Virtual Network > View Device Inventory > Detect Vulnerabilities > Deploy Security Fixes > Verify Fixes
Your NPA Journey
This concludes Part 1 of your NPA journey. In Part 1, we took a predefined virtual network and demonstrated how to apply security fixes. It safe, easy and fast. Just what you need to adapt to emerging threats
​
In Part 2, we will let you create your own virtual network, that reflects what you have in your business and apply security fixes.
Next steps in your NPA journey
Go to Part 2
bottom of page