NordLayer

NordLayer

Nord Security
+
+

Related Products

  • UTunnel VPN and ZTNA
    118 Ratings
    Visit Website
  • Cloudflare
    1,995 Ratings
    Visit Website
  • ThreatLocker
    681 Ratings
    Visit Website
  • Cloudbrink
    28 Ratings
    Visit Website
  • Bitdefender Ultimate Small Business Security
    3 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,699 Ratings
    Visit Website
  • DriveLock
    1 Rating
    Visit Website
  • Keeper Security
    1,755 Ratings
    Visit Website
  • Control D
    183 Ratings
    Visit Website
  • Guardz
    117 Ratings
    Visit Website

About

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. We help organizations of all sizes to fulfill scaling and integration challenges when building a modern secure remote access solution within an ever-evolving SASE framework. Quick and easy to integrate with existing infrastructure, hardware-free, and designed with ease of scale in mind, NordLayer meets the varying growth pace and ad-hoc cybersecurity requirements of agile businesses and distributed workforces today

About

The way we work has changed. People now work from anywhere, not just from an office. Applications are based in the cloud, not just on-premise. And the company network perimeter is now spread across the internet. Using a traditional, network-centric VPN for remote access is not only outdated and difficult to maintain, but exposes businesses to security breaches. VPN infrastructure is costly and time-consuming to procure, deploy, and maintain. Inability to secure access at the app level means hacks can expose whole networks. Twingate enables organizations to rapidly implement a modern Zero Trust network that is more secure and maintainable than VPNs. Delivered as a cloud-based service, Twingate empowers IT teams to easily configure a software-defined perimeter without changing infrastructure, and centrally manage user access to internal apps, whether they are on-prem or in the cloud.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Companies looking for a network access security solution for modern workforces

Audience

Businesses looking for a secure remote access for distributed workforces

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

$8 per user per month
Free Version
Free Trial

Pricing

$10 per user per month
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Nord Security
Founded: 2012
nordlayer.com

Company Information

Twingate
United States
www.twingate.com

Alternatives

UTunnel VPN and ZTNA

UTunnel VPN and ZTNA

Secubytes LLC

Alternatives

UTunnel VPN and ZTNA

UTunnel VPN and ZTNA

Secubytes LLC
Perimeter 81

Perimeter 81

Check Point Software Technologies
Perimeter 81

Perimeter 81

Check Point Software Technologies

Categories

Categories

Network Security Features

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

VPN Features

Anonymous Browsing
DNS Leak Protection
For Digital Security
For Financial Security
For Gaming
For Streaming
Kill Switch
Multi-Language
Multi-Protocol
Peer-to-Peer
Policy Management
Remote Access
Web Inspection
White Label

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Endpoint Protection Features

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

Network Access Control (NAC) Features

Authentication
Authorization
Automated Hotfix / Updates
Centralized Policy Management
Dashboard
Device Auto-Provisioning
Device Self-Registration
Posture Assessment
Quarantine / Remediation
Secure Guest Access

Remote Work Features

Collaboration
Credential Management
Electronic Signature
Employee Monitoring
Live Chat
Meeting Management
Project Management
Remote Access
Remote Support
Screen Sharing
Softphone
Task Management
Time Zone Tracking
Video Chat
Web Conferencing

Integrations

Daylight
Entitle
Indent
NordPass Business
NordVPN
Truto
daydream

Integrations

Daylight
Entitle
Indent
NordPass Business
NordVPN
Truto
daydream
Claim NordLayer and update features and information
Claim NordLayer and update features and information
Claim Twingate and update features and information
Claim Twingate and update features and information