{"id":73271,"date":"2023-11-10T14:29:09","date_gmt":"2023-11-10T06:29:09","guid":{"rendered":"https:\/\/version-2.com\/?p=73271"},"modified":"2023-11-01T17:39:47","modified_gmt":"2023-11-01T09:39:47","slug":"nordlayer-services-in-review-device-posture-security","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2023\/11\/nordlayer-services-in-review-device-posture-security\/","title":{"rendered":"NordLayer services in review: Device Posture Security"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"73271\" class=\"elementor elementor-73271\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/2VhJy1FTFU1AvN0shzK38E\/d1ce3dd1c002f65a1bc500a3c7767332\/NordLayer_features_in_review__Device_Posture_Security_cover_web_1400x800__1_.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"828\" height=\"473\" \/><\/p><article class=\"RichText_root__1_CNu BlogPostContent_richText__rG0U1\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Mobility and device versatility make business digital possibilities nearly endless. However, overcoming one technical or security challenge means another will soon emerge. Just like enabling secure remote user access to the company network raises another issue for IT administrators \u2014 <b>how to ensure only compliant devices enter the network?\u00a0<\/b><\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Customized internal policies must be synced with the organization\u2019s business model and sensitive data levels. Specific rules define how identities are managed to access the company network; on another security level, they are redistributed to access unrestricted resources.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">In this process, the absent layer of security guarantees <b>entering devices match the set organization&#8217;s security criteria to prevent potential security breaches<\/b>. Companies can address this challenge by adopting Zero Trust Network Access-based endpoint controls.<\/p><p data-testid=\"text\"><img decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/6prnmDDn9HdyLvyW1BXwvz\/5b272c56a1fdcbc3c230ac7dfe2b11ef\/Screenshot_2023-09-04_at_09.29.56.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"828\" height=\"465\" \/><\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">A service like <b>Device Posture Security provides a comprehensive solution for organizations looking to bolster their security<\/b>. By monitoring \u2013 and, if required, blocking \u2013 devices that connect to the company network, organizations can mitigate risk levels of exposing sensitive information to dangerous scenarios.<\/p><h2 id=\"device-posture-security-using-nordlayer\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">Device Posture Security using NordLayer<\/h2><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">NordLayer&#8217;s Device Posture Security service is based on the <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/en\/learn\/zero-trust\/what-is-ztna\/\">ZTNA<\/a> security model, meaning that all devices are treated as untrusted until they can prove trustworthy.<\/p><p data-testid=\"text\"><img decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/5NGSj0upYp2FxrT57rksfc\/e3e41e5f49300952e06bf67f657a784c\/Screenshot_2023-09-04_at_09.56.10.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"828\" height=\"462\" \/><\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">This approach ensures that organizations have complete visibility and control over the devices connecting to their network.<\/p><div class=\"Quote_root__31D_c\"><blockquote class=\"Quote_blockquote__n7q70\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">The Device Posture Security functionality helps monitor who connects to the company network according to predefined rules and enables non-compliant device blocking capability to meet ZTNA requirements.<\/p><\/blockquote><p><a class=\"Link_stillDarkBlue__cqlBe Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 TwitterShareButton_root__YFyZU Quote_twitterShareButton__sglFW\" href=\"https:\/\/twitter.com\/intent\/tweet?text=The%20Device%20Posture%20Security%20functionality%20helps%20monitor%20who%20connects%20to%20the%20company%20network%20according%20to%20predefined%20rules%20and%20enables%20non-compliant%20device%20blocking%20capability%20to%20meet%20ZTNA%20requirements.%20&amp;url=https%3A%2F%2Fnordlayer.com%2Fblog%2Fnordlayer-services-in-review-device-posture-security\" target=\"_blank\" rel=\"noopener\" aria-label=\"Share on Twitter\"><span class=\"Quote_tweetText__hNFS5\">Click to tweet<\/span><\/a><\/p><\/div><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Primarily, NordLayer-introduced Device Posture Security service allowed monitoring network-entering devices. Now the technology is <b>enhanced with blocking functionality that enables network administrators to take action once a non-compliant device is detected<\/b>.<\/p><h2 id=\"how-does-nordlayers-device-posture-security-service-work\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">How does NordLayer\u2019s Device Posture Security service work?<\/h2><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">The cloud-based service monitors all devices with an installed\/running NordLayer application.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Device Posture Security allows organization admins to perform several actions for more accurate and extensive network supervision:<\/p><ul class=\"RichText_ul__Ajzbe\"><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">The service qualifies admins to get notified about new devices entering the network and lets to identify them<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Inspect if the compatible operating system (OS) of every entering device is used, and check its version against the supported OSs\u2019 list<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Verify the newest NordLayer application version is utilized<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Scan organization-enlisted devices to see if they contain an admin-installed file that allows determining corporate devices from personal ones<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Browse a History tab with the logged activity of all connected devices for investigation and auditing network activity<\/p><\/li><\/ul><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">More in-depth information allows for following the internal procedures to enforce OS or application updates to ensure the most recent patches and bug fixes are in place.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">The Device Posture Security service helps close potential security gaps by checking if the device is not jailbroken\/rooted or doesn\u2019t miss an organization-enrolled file. If the device doesn\u2019t comply, admins can disconnect it from the network to protect it.<\/p><h2 id=\"how-nordlayers-device-posture-security-is-different\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">How NordLayer\u2019s Device Posture Security is different?<\/h2><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">NordLayer\u2019s Device Security Posture contains two capabilities. Until the latest service upgrade, it was dedicated only to device posture monitoring. <b>The full composition of the service now offers monitoring and device account-blocking capability functions<\/b>.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/75nOA8YM6ItPdHxyOpB8hW\/bd13da828132db0b88fc3c3e9a1ccc70\/Screenshot_2023-09-04_at_08.47.27.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"828\" height=\"461\" \/><img loading=\"lazy\" decoding=\"async\" class=\"Image_autoHeight__eDTAt Image_autoWidth__spy21 RichText_image__z9xEG\" style=\"color: transparent;\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/75nOA8YM6ItPdHxyOpB8hW\/bd13da828132db0b88fc3c3e9a1ccc70\/Screenshot_2023-09-04_at_08.47.27.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp\" sizes=\"(max-width: 1280px) 100vw, 50vw\" srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/75nOA8YM6ItPdHxyOpB8hW\/bd13da828132db0b88fc3c3e9a1ccc70\/Screenshot_2023-09-04_at_08.47.27.png?w=384&amp;q=75&amp;fit=fill&amp;fm=webp 384w, https:\/\/images.ctfassets.net\/5natoedl294r\/75nOA8YM6ItPdHxyOpB8hW\/bd13da828132db0b88fc3c3e9a1ccc70\/Screenshot_2023-09-04_at_08.47.27.png?w=600&amp;q=75&amp;fit=fill&amp;fm=webp 600w, https:\/\/images.ctfassets.net\/5natoedl294r\/75nOA8YM6ItPdHxyOpB8hW\/bd13da828132db0b88fc3c3e9a1ccc70\/Screenshot_2023-09-04_at_08.47.27.png?w=640&amp;q=75&amp;fit=fill&amp;fm=webp 640w, https:\/\/images.ctfassets.net\/5natoedl294r\/75nOA8YM6ItPdHxyOpB8hW\/bd13da828132db0b88fc3c3e9a1ccc70\/Screenshot_2023-09-04_at_08.47.27.png?w=750&amp;q=75&amp;fit=fill&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/75nOA8YM6ItPdHxyOpB8hW\/bd13da828132db0b88fc3c3e9a1ccc70\/Screenshot_2023-09-04_at_08.47.27.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp 828w, https:\/\/images.ctfassets.net\/5natoedl294r\/75nOA8YM6ItPdHxyOpB8hW\/bd13da828132db0b88fc3c3e9a1ccc70\/Screenshot_2023-09-04_at_08.47.27.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/75nOA8YM6ItPdHxyOpB8hW\/bd13da828132db0b88fc3c3e9a1ccc70\/Screenshot_2023-09-04_at_08.47.27.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp 1280w\" alt=\"DPS\" width=\"0\" height=\"0\" data-nimg=\"future\" \/><\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>The<\/b> <b>ability to monitor and allow only trusted devices to access digital company resources helps adopt the ZTNA approach<\/b>, allowing organizations to enjoy peace of mind knowing that all devices connecting to their network meet their security standards.<\/p><ul class=\"RichText_ul__Ajzbe\"><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Only trusted devices are permitted. <\/b>Device Posture Security enables organization administrators to verify every device within the network separately, whether it&#8217;s a known endpoint. If the device is unrecognized, an alert is triggered for the admin to review if it complies with company security policy requirements.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Use of allowlisted operating systems.<\/b> The NordLayer application is available on Windows, macOS, and Linux operating systems. However, a company can only settle to work with one OS, like macOS. Thus, the service will notify the system if a user tries to use a device with any other but enabled OS.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Ensuring utilized OS versions are up-to-date.<\/b> Due to security patching requirements, companies can define a threshold by which OS versions comply with internal policies. Therefore, if the system detects an outdated operating system version that deviates from set rules, it informs the administrator to take relevant action.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Establishing the use of the latest NordLayer app version.<\/b> Following NordLayer\u2019s <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"https:\/\/help.nordlayer.com\/docs\/release-notes\" target=\"_blank\" rel=\"noopener\">Release Notes<\/a>, IT managers can see the latest information about new and essential feature launches that apply to the most recent application version.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Existing File check. <\/b>Administrators can store a specific file that labels the device as approved to log and recognize corporate devices. This action distinguishes corporate-approved devices from personal ones, even if they consist of the same operating system and version.<\/p><\/li><\/ul><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">To ensure organization members use the latest app version, the admin must create a Device Posture Security profile with the desired NordLayer version to determine who should update the app.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">NordLayer\u2019s Device Posture Security offering builds a practical, security-by-design-based approach to business network protection. Thus, the service allows close supervision of endpoints within the network if they are up-to-date as required. Automated device inspection helps prevent overlooked security gaps whether the organization has only a dozen or a few hundred users.<\/p><h2 id=\"benefits-of-device-posture-security\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">Benefits of Device Posture Security<\/h2><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Regular check-ups of in-network operating devices establish a threat prevention-based approach to internal compliance management. The service enables organization network admins to act more centrally, define the scope of the rules, and maintain high security levels without spending long hours or hiring a squad to carry out such tasks.<\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">Enforcing rules centrally<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Created security policies can be enforced in a matter of moments for the full-scale organization within a few mouse clicks.<\/p><p data-testid=\"text\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/5IXaNf9akfen2JP2aYA9sG\/f8b364822f24283842e6169c7a4e011e\/NordLayer_features_in_review__Device_Posture_Security_1400x800.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"828\" height=\"473\" \/><\/p><\/article><article class=\"RichText_root__1_CNu BlogPostContent_richText__rG0U1\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">The Control Panel allows administrators to see what teams fall under the security requirements and must follow the rules.<\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">Increasing device visibility to the admin<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">The larger the company, the bigger the endpoint network to supervise. Especially when users practice having a few devices per member, multiplying the work scope for the administrators.<\/p><p data-testid=\"text\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/S1FrUv1KJNZg7d64xHzkj\/177643ace4e8e25afbb06fdb23aa1322\/Screenshot_2023-09-04_at_08.49.28.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"828\" height=\"457\" \/><\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Device Posture Security reveals and registers every endpoint within the company network, collecting information in the History tab and limiting the possibility of slipping for unauthorized or faulty devices at a given time.<\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">Understanding whether the device is compliant and up-to-date<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">The service allows network admins to see more in-depth information on whether the endpoints comply with organization security requirements.<\/p><p data-testid=\"text\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/74pTQ2bkxpLhTYJdIb5uzx\/af6f5210c8b6b6256fd57620fb2abe74\/Screenshot_2023-09-04_at_08.47.46.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"828\" height=\"461\" \/><\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Tracking what operating system and which version and NordLayer application edition is used creates a more action-based cybersecurity strategy for the organization.<\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">Giving access to block untrusted devices<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Device Posture Security allows network administrators to reject untrustworthy devices from the company network.<\/p><p data-testid=\"text\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/185rp5PKF4hyvmR5ZIDkHe\/99dc455ac897c41e392693c6934bfc2a\/Screenshot_2023-09-04_at_08.51.44.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"828\" height=\"466\" \/><\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">If the admin sees that the device is jailbroken or rooted, lacks a specific organization-deployed file, or needs an update\u2014they can enforce action to be performed outside the organization and confirm device entrance to access resources only when the endpoint can be trusted.<\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">Preventing non-compliant devices from accessing your network<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">The NordLayer service gives the option to see any deviating devices in the network that were infected or outdated while being there.<\/p><p data-testid=\"text\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/mDcqtRl3XozTEFOj4lIPF\/2dc44067e50c6b5278f76a85c63317af\/Screenshot_2023-09-04_at_08.52.54.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"828\" height=\"463\" \/><\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">However, taking action at an entry level is as important. Blocking a non-compliant device beforehand helps avoid any back peddling with uncertain consequences if such a device is detected after entering the network.<\/p><h2 id=\"entering-nordlayers-device-posture-security\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">Entering NordLayer\u2019s Device Posture Security<\/h2><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Device Posture Security makes your organization more robust to digital threats and brings it one step closer to implementing the ZTNA model approach to the cybersecurity strategy. The Device Posture Security service setup and deployment are made straightforward to achieve it effectively.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">NordLayer provides information about devices on the Control Panel. Device security check logs contain information such as timestamps when the last check was done or device deviation detected, endpoint identification information, and its status. The device status is based on admin-defined rules the organization must comply with.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">For comprehensive tracking, organization-allowed devices can fall under the category of a fully compliant device or initiate an alert whether the device is unknown, operated by a forbidden OS, if the version needs an update, or device doesn&#8217;t contain a specific file required per internal security policy. As predefined by a set of rules, any deviation prevents the device from accessing company resources.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Device posture security checks are performed regularly. If a device becomes not compliant, an alert is triggered, and the user is disconnected from Virtual Private Gateway\u2014such action was unavailable utilizing the Device Posture Monitoring service. With device account blocking, the Device Posture Security provides extra protection for company data without additional labor and resources.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/en\/contact-sales\/\">Let&#8217;s discuss<\/a> the NordLayer solution for your business network access security now.<\/p><\/article>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cf03edf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cf03edf\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b576c6d\" data-id=\"b576c6d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bfd91ca elementor-widget elementor-widget-shortcode\" data-id=\"bfd91ca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"63561\" class=\"elementor elementor-63561\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1b6aa2c4 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"1b6aa2c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1b283ee5\" data-id=\"1b283ee5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4e466f1a elementor-widget elementor-widget-text-editor\" data-id=\"4e466f1a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About NordLayer<br \/><\/strong>NordLayer is an adaptive network access security solution for modern businesses \u2013 from the world\u2019s most trusted cybersecurity brand, Nord Security.<\/p><p>The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Mobility and device versatility make business digital p [&hellip;]<\/p>","protected":false},"author":149011790,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[973,1075,1130,61],"tags":[1132,974,1076],"class_list":["post-73271","post","type-post","status-publish","format-standard","hentry","category-nord-security","category-year2023","category-nordlayer","category-press-release","tag-nordlayer","tag-nord-security","tag-1076"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>NordLayer services in review: Device Posture Security - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nordlayer.com\/blog\/nordlayer-services-in-review-device-posture-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NordLayer services in review: Device Posture Security - Version 2\" \/>\n<meta property=\"og:description\" content=\"Mobility and device versatility make business digital p [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nordlayer.com\/blog\/nordlayer-services-in-review-device-posture-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-10T06:29:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/images.ctfassets.net\/5natoedl294r\/2VhJy1FTFU1AvN0shzK38E\/d1ce3dd1c002f65a1bc500a3c7767332\/NordLayer_features_in_review__Device_Posture_Security_cover_web_1400x800__1_.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/nordlayer-services-in-review-device-posture-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/11\\\/nordlayer-services-in-review-device-posture-security\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"NordLayer services in review: Device Posture Security\",\"datePublished\":\"2023-11-10T06:29:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/11\\\/nordlayer-services-in-review-device-posture-security\\\/\"},\"wordCount\":1425,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/nordlayer-services-in-review-device-posture-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/2VhJy1FTFU1AvN0shzK38E\\\/d1ce3dd1c002f65a1bc500a3c7767332\\\/NordLayer_features_in_review__Device_Posture_Security_cover_web_1400x800__1_.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\",\"keywords\":[\"NordLayer\",\"Nord Security\",\"2023\"],\"articleSection\":[\"Nord Security\",\"2023\",\"NordLayer\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/11\\\/nordlayer-services-in-review-device-posture-security\\\/\",\"url\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/nordlayer-services-in-review-device-posture-security\\\/\",\"name\":\"NordLayer services in review: Device Posture Security - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/nordlayer-services-in-review-device-posture-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/nordlayer-services-in-review-device-posture-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/2VhJy1FTFU1AvN0shzK38E\\\/d1ce3dd1c002f65a1bc500a3c7767332\\\/NordLayer_features_in_review__Device_Posture_Security_cover_web_1400x800__1_.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\",\"datePublished\":\"2023-11-10T06:29:09+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/nordlayer-services-in-review-device-posture-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nordlayer.com\\\/blog\\\/nordlayer-services-in-review-device-posture-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/nordlayer-services-in-review-device-posture-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/2VhJy1FTFU1AvN0shzK38E\\\/d1ce3dd1c002f65a1bc500a3c7767332\\\/NordLayer_features_in_review__Device_Posture_Security_cover_web_1400x800__1_.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\",\"contentUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/2VhJy1FTFU1AvN0shzK38E\\\/d1ce3dd1c002f65a1bc500a3c7767332\\\/NordLayer_features_in_review__Device_Posture_Security_cover_web_1400x800__1_.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/nordlayer-services-in-review-device-posture-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NordLayer services in review: Device Posture Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NordLayer services in review: Device Posture Security - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nordlayer.com\/blog\/nordlayer-services-in-review-device-posture-security\/","og_locale":"en_US","og_type":"article","og_title":"NordLayer services in review: Device Posture Security - Version 2","og_description":"Mobility and device versatility make business digital p [&hellip;]","og_url":"https:\/\/nordlayer.com\/blog\/nordlayer-services-in-review-device-posture-security\/","og_site_name":"Version 2","article_published_time":"2023-11-10T06:29:09+00:00","og_image":[{"url":"https:\/\/images.ctfassets.net\/5natoedl294r\/2VhJy1FTFU1AvN0shzK38E\/d1ce3dd1c002f65a1bc500a3c7767332\/NordLayer_features_in_review__Device_Posture_Security_cover_web_1400x800__1_.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"Written by":"tracylamv2","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nordlayer.com\/blog\/nordlayer-services-in-review-device-posture-security\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2023\/11\/nordlayer-services-in-review-device-posture-security\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"NordLayer services in review: Device Posture Security","datePublished":"2023-11-10T06:29:09+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2023\/11\/nordlayer-services-in-review-device-posture-security\/"},"wordCount":1425,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/nordlayer.com\/blog\/nordlayer-services-in-review-device-posture-security\/#primaryimage"},"thumbnailUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/2VhJy1FTFU1AvN0shzK38E\/d1ce3dd1c002f65a1bc500a3c7767332\/NordLayer_features_in_review__Device_Posture_Security_cover_web_1400x800__1_.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp","keywords":["NordLayer","Nord Security","2023"],"articleSection":["Nord Security","2023","NordLayer","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2023\/11\/nordlayer-services-in-review-device-posture-security\/","url":"https:\/\/nordlayer.com\/blog\/nordlayer-services-in-review-device-posture-security\/","name":"NordLayer services in review: Device Posture Security - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nordlayer.com\/blog\/nordlayer-services-in-review-device-posture-security\/#primaryimage"},"image":{"@id":"https:\/\/nordlayer.com\/blog\/nordlayer-services-in-review-device-posture-security\/#primaryimage"},"thumbnailUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/2VhJy1FTFU1AvN0shzK38E\/d1ce3dd1c002f65a1bc500a3c7767332\/NordLayer_features_in_review__Device_Posture_Security_cover_web_1400x800__1_.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp","datePublished":"2023-11-10T06:29:09+00:00","breadcrumb":{"@id":"https:\/\/nordlayer.com\/blog\/nordlayer-services-in-review-device-posture-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nordlayer.com\/blog\/nordlayer-services-in-review-device-posture-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nordlayer.com\/blog\/nordlayer-services-in-review-device-posture-security\/#primaryimage","url":"https:\/\/images.ctfassets.net\/5natoedl294r\/2VhJy1FTFU1AvN0shzK38E\/d1ce3dd1c002f65a1bc500a3c7767332\/NordLayer_features_in_review__Device_Posture_Security_cover_web_1400x800__1_.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp","contentUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/2VhJy1FTFU1AvN0shzK38E\/d1ce3dd1c002f65a1bc500a3c7767332\/NordLayer_features_in_review__Device_Posture_Security_cover_web_1400x800__1_.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp"},{"@type":"BreadcrumbList","@id":"https:\/\/nordlayer.com\/blog\/nordlayer-services-in-review-device-posture-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"NordLayer services in review: Device Posture Security"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/en\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-j3N","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/73271","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=73271"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/73271\/revisions"}],"predecessor-version":[{"id":73275,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/73271\/revisions\/73275"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=73271"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=73271"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=73271"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}