NordLayer Description

Network access security that scales with your business — NordLayer secures your organization’s traffic and data to provide your colleagues with safe, reliable, remote access.

Pricing

Pricing Starts At:
$8 per user per month

Integrations

Reviews

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Company Details

Company:
NordLayer
Year Founded:
2019
Headquarters:
United States
Website:
nordlayer.com
Update This Listing

Media

Recommended Products
Data-Driven Innovation: The CDP Playbook for Eng Teams Icon
Data-Driven Innovation: The CDP Playbook for Eng Teams

Why your engineering team needs a CDP

In this playbook, you’ll learn…
- How engineering teams use real-time customer data to achieve business goals.
- How to elevate your business to a new level of engineering efficiency with AI.
- Strategies used by engineering teams at Instacart, Staples Canada, Televisa Univision, CrossFit, and ClearScore to improve KPIs and drive efficiencies.

Product Details

Platforms
Windows
Mac
Linux
iPhone
iPad
Android
Type of Training
Documentation
Customer Support
Online

NordLayer Features and Options

Network Security Software

Access Control
Analytics / Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Network Access Control (NAC) Software

Authentication
Authorization
Automated Hotfix / Updates
Centralized Policy Management
Dashboard
Device Auto-Provisioning
Device Self-Registration
Posture Assessment
Quarantine / Remediation
Secure Guest Access

Endpoint Protection Software

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

VPN Service

Anonymous Browsing
DNS Leak Protection
For Digital Security
For Financial Security
For Gaming
For Streaming
Kill Switch
Multi-Language
Multi-Protocol
Peer-to-Peer
Policy Management
Remote Access
Web Inspection
White Label

Cybersecurity Software

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Remote Work Software

Collaboration
Credential Management
Electronic Signature
Employee Monitoring
Live Chat
Meeting Management
Project Management
Remote Access
Remote Support
Screen Sharing
Softphone
Task Management
Time Zone Tracking
Video Chat
Web Conferencing

DDoS Protection Service

DNS Amplification Protection
DNS Reflection Protection
High Network Capacity
Illegitimate Traffic Recognition
Infrastructure Protection (Layer 3/Layer 4)
Post Attack Analysis
Traffic Monitoring
Website Protection (Layer 7)

NordLayer Lists