Trend Micro™ Network VirusWall™ Enforcer 1500i (CR100 Series) Installation and Deployment Guide
3-16
Conducting a Pilot Deployment
Trend Micro recommends conducting a pilot deployment in a controlled environment
to help you understand how the device features work. A pilot deployment also helps you
determine how the device can be used to accomplish your security goals and the level of
support you will likely need after a full deployment.
Perform the following tasks to conduct a pilot deployment:
•
Choose a pilot site.
•
Create a contingency plan.
•
Deploy and evaluate your pilot.
Choosing a Pilot Site
Choose a pilot site that matches your planned deployment. Look at other devices on
your network, such as switches or firewalls, and other software installations, such as
OfficeScan
™
and
Control Manager™. Try to simulate the type of topology that would
serve as an adequate representation of your production environment.
Creating a Contingency Plan
Trend Micro recommends creating a contingency plan in case there are issues with the
installation, operation, or upgrade of the device. Consider your network’s vulnerabilities
and how you can retain a minimum level of security if issues arise.
Deploying and Evaluating your Pilot
Deploy and evaluate the pilot based on expectations regarding both security
enforcement and network performance. Create a list of items that meet or do not meet
the expected results during the pilot process.
Redefining Your Deployment Strategy
Identify the potential pitfalls and plan accordingly for a successful deployment. Consider
especially how the device performed with the security installations on your network.
This pilot evaluation can be rolled into the overall production and deployment plan.