Press release content from PR Newswire. The AP news staff was not involved in its creation.

NordLayer releases Device Posture Monitoring - an easier way to check device compliance

PRESS RELEASE: Paid content from PR Newswire
Press release content from PR Newswire. The AP news staff was not involved in its creation.
December 20, 2022 GMT

LONDON, Dec. 20, 2022 /PRNewswire/ -- NordLayer has released a new feature called Device Posture Monitoring. It allows companies to determine whether a device is compliant with existing cybersecurity policies and can be trusted to access company resources, which significantly increases network security.

Making an IT admin’s life easier

Device Posture Monitoring (DPM) is a part of the zero trust network access (ZTNA) technology.

The feature determines a device’s compliance with the company’s security rules no matter where the device is located, increasing the security of the company’s network. With a set of predefined rules, an IT admin can monitor access to company resources and conduct regular virtual checks for updates of the already approved devices.

Main features of Device Posture Monitoring

  • Alerts for any devices unknown to the network
    If the company policy requires use of only trusted/known devices, DPM enables verification of each device separately, and if an unknown device is used in the network, an alert is activated.
  • OS-based limitations
    If a company is using, for example, Windows devices only, the IT admin can create an alert for using any other device (Linux or macOS). The same goes for an OS version if the admin has imposed version-based limitations.


How it works
Andrius Buinovskis, a product manager at NordLayer, says, “DPM is a tool to collect information about whether devices that meet certain requirements are being used to connect to the network. Factors taken into account include whether these are devices known to administrators, whether the device is configured properly, and whether the expected operating system is used. In the case of mobile devices, it checks if the device has been jailbroken (iOS) or rooted (Android). Having this monitoring tool is important because based on mentioned triggers and alerts, it will then be possible to block access when the device fails to comply with predefined rules.”

NordLayer is an adaptive network-access security solution for businesses. More information:

View original content: