NordLayer Device Posture Monitoring checks device compliance - Help Net Security

1 year ago 37

NordLayer’s Device Posture Monitoring allows companies to find whether a instrumentality is compliant with existing cybersecurity policies and tin beryllium trusted to entree institution resources, which increases web security.

Making an IT admin’s beingness easier

Device Posture Monitoring (DPM) is simply a portion of the zero spot web entree (ZTNA) technology.

The diagnostic determines a device’s compliance with the company’s information rules nary substance wherever the instrumentality is located, expanding the information of the company’s network. With a acceptable of predefined rules, an IT admin tin show entree to institution resources and behaviour regular virtual checks for updates of the already approved devices.

Main features of Device Posture Monitoring

  • Alerts for immoderate devices chartless to the network

    If the institution argumentation requires usage of lone trusted/known devices, DPM enables verification of each instrumentality separately, and if an chartless instrumentality is utilized successful the network, an alert is activated.

  • OS-based limitations

    If a institution is using, for example, Windows devices only, the IT admin tin make an alert for utilizing immoderate different instrumentality (Linux oregon macOS). The aforesaid goes for an OS mentation if the admin has imposed version-based limitations.

Andrius Buinovskis, a merchandise manager astatine NordLayer, says, “DPM is simply a instrumentality to cod accusation astir whether devices that conscionable definite requirements are being utilized to link to the network. Factors taken into relationship see whether these are devices known to administrators, whether the instrumentality is configured properly, and whether the expected operating strategy is used.”

“In the lawsuit of mobile devices, it checks if the instrumentality has been jailbroken (iOS) oregon rooted (Android). Having this monitoring instrumentality is important due to the fact that based connected mentioned triggers and alerts, it volition past beryllium imaginable to artifact entree erstwhile the instrumentality fails to comply with predefined rules,” Buinovskis concluded.

Read Entire Article