Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

NordLayer Releases Device Posture Monitoring – an Easier Way to Check Device Compliance

NordLayer has released a new feature called Device Posture Monitoring. It allows companies to determine whether a device is compliant with existing cybersecurity policies and can be trusted to access company resources, which significantly  increases network security.

Device Posture Monitoring (DPM) is a part of the zero trust network access (ZTNA) technology.

The feature determines a device’s compliance with the company’s security rules no matter where the device is located,  increasing  the security of the company’s network. With a set of  predefined rules, an IT admin can monitor access to company resources and conduct regular virtual checks for updates of the already approved devices.

Recommended AI: How is Artificial Intelligence (AI) Changing the Future of Architecture?

Related Posts
1 of 40,318

Main features of Device Posture Monitoring

  • Alerts for any devices unknown to the network
    If the company policy requires use of only trusted/known devices, DPM enables verification of each device separately, and if an unknown device is used in the network, an alert is activated.
  • OS-based limitations
    If a company is using, for example, Windows devices only, the IT admin can create an alert for using any other device  (Linux or macOS). The same goes for an OS version if the admin has imposed version-based limitations.

Andrius Buinovskis, a product manager at NordLayer, says, “DPM is a tool to collect information about whether devices that meet certain requirements are being used to connect to the network. Factors  taken into account include whether these are devices known to administrators, whether the device is configured properly, and whether the expected operating system is used. In the case of mobile devices, it  checks if the device has been jailbroken (iOS) or rooted (Android). Having this monitoring tool is important because based on mentioned triggers and alerts, it will then be possible to block access when the device fails to comply with predefined rules.”

Recommended AI: AMD Expands Data Center Solutions Capabilities with Acquisition of Pensando

[To share your insights with us, please write to sghosh@martechseries.com]

Comments are closed.