{"id":63522,"date":"2023-02-21T11:52:00","date_gmt":"2023-02-21T03:52:00","guid":{"rendered":"https:\/\/version-2.com\/?p=63522"},"modified":"2024-09-13T16:31:27","modified_gmt":"2024-09-13T08:31:27","slug":"nordlayer-features-in-review-dpi-lite","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2023\/02\/nordlayer-features-in-review-dpi-lite\/","title":{"rendered":"NordLayer features in review: DPI Lite"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"63522\" class=\"elementor elementor-63522\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/djrN83aQqZdt8HtRi9QFd\/f7ec79b773aa277ccd05957089d959de\/NordLayer_features_in_review__DPI_Lite_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\" width=\"1400\" height=\"800\" \/><\/p><div class=\"nord-col lg:col-8 lg:offset-1 break-words mt-5 text-grey-shuttle\"><article><p class=\"my-4 blog-paragraph text-still-dark-blue\">The lines are blurred in the modern business lifestyle. There\u2019re no boundaries between employees working from the office or anywhere in the world. And technological privilege enables linking personal devices to work applications for user and organization convenience.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">This flexibility and ability to be mobile also mean that <strong>business matters simultaneously mix with personal activities online<\/strong>. And mobility is not alone to blame \u2014 the internet is often a necessary tool to perform job tasks and operate in different organization layers. Uncontrolled access to the i<strong>nternet provides vast resources incompatible with the work environment<\/strong>. How to manage what employees can do online without imposing risks on the company?<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Deep Packet Inspection (DPI) is one of the most straightforward tools that limit free roaming online while connected to the company network<\/strong>. Establishing a set of restrictions helps create a secure perimeter for online activities within the company network.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">It\u2019s an important<strong> feature that supports performance and security efforts<\/strong>. Non-work-related activities can distract and reduce productivity. Moreover, entering various websites and apps can lure employees into malicious activities, so DPI is a choice for IT administrators to get a grip on the company\u2019s traffic flow.<\/p><h2 id=\"dpi-solution-using-nordlayer\" class=\"Heading Heading-h2 text-dark-blue\">DPI solution using NordLayer<\/h2><p class=\"my-4 blog-paragraph text-still-dark-blue\">NordLayer solution offers a DPI Lite feature that allows IT administrators to control what user-requested data goes through or gets blocked from entering the company\u2019s network.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\"><i>The DPI Lite technology at NordLayer works on nDPI open-source protocol classification engine. It offers the most popular and acknowledged services\u00a0 (ports and protocols) that are used by websites and network apps to operate on the internet.<\/i><\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">With NordLayer, admins choose specific ports and protocols they want to include in the custom-defined block list. <strong>The policy applies only when a user is connected to the organization\u2019s virtual private gateway<\/strong>. Thus, employees who work on job-related projects can\u2019t simultaneously use blocklisted online resources and network applications with restricted access.<\/p><h2 id=\"how-does-nordlayers-dpi-lite-feature-work\" class=\"Heading Heading-h2 text-dark-blue\">How does NordLayer\u2019s DPI Lite feature work?<\/h2><p class=\"my-4 blog-paragraph text-still-dark-blue\">The cloud-based feature is available only with a virtual private gateway configuration. It\u2019s set to active within 24 hours upon request. IT admins can add or remove specific ports and protocols open to access through the company\u2019s network. They can do it by submitting an inquiry via NordLayer\u2019s Control Panel.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">The IT administrators can navigate and choose from a wide range of alphabetically arranged services (no slot restriction) that cover dual-use online resources, potentially harmful to business operations:<\/p><ol class=\"list\"><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">Apple services<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">Domain Name System<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">E-commerce<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">Email client protocol\/Email services<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">File sharing<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">Gaming<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">Google services<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">Hypertext Transfer Protocol<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">Identity<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">Infrastructure\/Networking<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">IP tunneling protocol<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">Messaging protocol\/services<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">Microsoft services<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">Monitoring\/SCIM<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">Music streaming services<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">News services<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">Peer-to-peer file sharing<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">Remote Access<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">Social media<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">Software Development<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">Streaming services<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">VoIP protocol<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">VPN services<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">Other (miscellaneous)<\/p><\/li><\/ol><p class=\"my-4 blog-paragraph text-still-dark-blue\">Our internal data shows the tendency to stop services primarily related to unapproved <i>Peer-to-peer file sharing<\/i>, <i>Social media<\/i>, and <i>Gaming<\/i> categories. It comes as no surprise that customers are particularly interested in limiting access to non-work-related services that impose the biggest risks to company assets and staff performance.<\/p><div class=\"gatsby-image-wrapper\" data-gatsby-image-wrapper=\"\"><p><picture><source srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/1Mg0hkJIHzMjLF6RLaBcv2\/e12583fc5105c41ea7714d0dc4988de4\/Infographic_1400x553.png?w=750&amp;h=313&amp;q=50&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/1Mg0hkJIHzMjLF6RLaBcv2\/e12583fc5105c41ea7714d0dc4988de4\/Infographic_1400x553.png?w=1080&amp;h=451&amp;q=50&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/1Mg0hkJIHzMjLF6RLaBcv2\/e12583fc5105c41ea7714d0dc4988de4\/Infographic_1400x553.png?w=1366&amp;h=571&amp;q=50&amp;fm=webp 1366w, https:\/\/images.ctfassets.net\/5natoedl294r\/1Mg0hkJIHzMjLF6RLaBcv2\/e12583fc5105c41ea7714d0dc4988de4\/Infographic_1400x553.png?w=1400&amp;h=585&amp;q=50&amp;fm=webp 1400w\" type=\"image\/webp\" sizes=\"100vw\" \/><img decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/1Mg0hkJIHzMjLF6RLaBcv2\/e12583fc5105c41ea7714d0dc4988de4\/Infographic_1400x553.png?w=1400&amp;h=585&amp;q=50&amp;fm=webp\" width=\"1400\" height=\"585\" \/><\/picture><picture><img decoding=\"async\" style=\"object-fit: cover; opacity: 0;\" title=\"Infographic for employee access\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/1Mg0hkJIHzMjLF6RLaBcv2\/e12583fc5105c41ea7714d0dc4988de4\/Infographic_1400x553.png?w=1400&amp;h=585&amp;q=50&amp;fm=png\" sizes=\"100vw\" srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/1Mg0hkJIHzMjLF6RLaBcv2\/e12583fc5105c41ea7714d0dc4988de4\/Infographic_1400x553.png?w=750&amp;h=313&amp;q=50&amp;fm=png 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/1Mg0hkJIHzMjLF6RLaBcv2\/e12583fc5105c41ea7714d0dc4988de4\/Infographic_1400x553.png?w=1080&amp;h=451&amp;q=50&amp;fm=png 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/1Mg0hkJIHzMjLF6RLaBcv2\/e12583fc5105c41ea7714d0dc4988de4\/Infographic_1400x553.png?w=1366&amp;h=571&amp;q=50&amp;fm=png 1366w, https:\/\/images.ctfassets.net\/5natoedl294r\/1Mg0hkJIHzMjLF6RLaBcv2\/e12583fc5105c41ea7714d0dc4988de4\/Infographic_1400x553.png?w=1400&amp;h=585&amp;q=50&amp;fm=png 1400w\" alt=\"Infographic for employee access\" width=\"1\" height=\"0.41785714285714287\" data-main-image=\"\" \/>However, if an employee needs access to company-level blocked sources, for example, a Social Media Manager working on Facebook and LinkedIn, IT administrators can purchase a separate dedicated Virtual Private Gateway for such employees and configure it with fewer restrictions.<\/picture><\/p><\/div><p class=\"my-4 blog-paragraph text-still-dark-blue\">The categories expand to a <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/help.nordlayer.com\/docs\/deep-packet-inspection-dpi-lite\/\" target=\"_blank\" rel=\"noopener\">complete list<\/a> of 250 available ports and protocols. You can choose only certain types of services, like blocking all messaging services except Slack, used for organizational communication.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">NordLayer\u2019s DPI Lite feature is managed only by the IT administrator and doesn\u2019t have an ON\/OFF function on the user side. The feature operates on the Application layer (<i>OSI model Level 7<\/i>) and Browser layer (<i>OSI model Level 3<\/i>). It means DPI inspects incoming data on the web and within network apps.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">Enabled DPI Lite runs when the user, connected to the company\u2019s virtual private network (or VPN), sends a request to access online resources or uses network-dependent applications. Once disconnected from the organizational network, the DPI policy isn\u2019t active. Thus, it\u2019s crucial to permit access to internal resources and applications only when they are connected to the network.<\/p><div class=\"gatsby-image-wrapper\" data-gatsby-image-wrapper=\"\"><p><picture><source srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/1KqQOxADSF10llmoXiIg0s\/fda5514c92e0b079c72d4bae15f21352\/Scheme_1400x1050.png?w=750&amp;h=563&amp;q=50&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/1KqQOxADSF10llmoXiIg0s\/fda5514c92e0b079c72d4bae15f21352\/Scheme_1400x1050.png?w=1080&amp;h=810&amp;q=50&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/1KqQOxADSF10llmoXiIg0s\/fda5514c92e0b079c72d4bae15f21352\/Scheme_1400x1050.png?w=1366&amp;h=1025&amp;q=50&amp;fm=webp 1366w, https:\/\/images.ctfassets.net\/5natoedl294r\/1KqQOxADSF10llmoXiIg0s\/fda5514c92e0b079c72d4bae15f21352\/Scheme_1400x1050.png?w=1400&amp;h=1050&amp;q=50&amp;fm=webp 1400w\" type=\"image\/webp\" sizes=\"100vw\" \/><img decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/1KqQOxADSF10llmoXiIg0s\/fda5514c92e0b079c72d4bae15f21352\/Scheme_1400x1050.png?w=1400&amp;h=1050&amp;q=50&amp;fm=webp\" width=\"1400\" height=\"1050\" \/><\/picture><picture><img decoding=\"async\" style=\"object-fit: cover; opacity: 0;\" title=\"deep packet inspection scheme\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/1KqQOxADSF10llmoXiIg0s\/fda5514c92e0b079c72d4bae15f21352\/Scheme_1400x1050.png?w=1400&amp;h=1050&amp;q=50&amp;fm=png\" sizes=\"100vw\" srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/1KqQOxADSF10llmoXiIg0s\/fda5514c92e0b079c72d4bae15f21352\/Scheme_1400x1050.png?w=750&amp;h=563&amp;q=50&amp;fm=png 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/1KqQOxADSF10llmoXiIg0s\/fda5514c92e0b079c72d4bae15f21352\/Scheme_1400x1050.png?w=1080&amp;h=810&amp;q=50&amp;fm=png 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/1KqQOxADSF10llmoXiIg0s\/fda5514c92e0b079c72d4bae15f21352\/Scheme_1400x1050.png?w=1366&amp;h=1025&amp;q=50&amp;fm=png 1366w, https:\/\/images.ctfassets.net\/5natoedl294r\/1KqQOxADSF10llmoXiIg0s\/fda5514c92e0b079c72d4bae15f21352\/Scheme_1400x1050.png?w=1400&amp;h=1050&amp;q=50&amp;fm=png 1400w\" alt=\"deep packet inspection scheme\" width=\"1\" height=\"0.75\" data-main-image=\"\" \/><\/picture><noscript><picture><source type=\"image\/webp\" srcSet=\"https:\/\/images.ctfassets.net\/5natoedl294r\/1KqQOxADSF10llmoXiIg0s\/fda5514c92e0b079c72d4bae15f21352\/Scheme_1400x1050.png?w=750&amp;h=563&amp;q=50&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/1KqQOxADSF10llmoXiIg0s\/fda5514c92e0b079c72d4bae15f21352\/Scheme_1400x1050.png?w=1080&amp;h=810&amp;q=50&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/1KqQOxADSF10llmoXiIg0s\/fda5514c92e0b079c72d4bae15f21352\/Scheme_1400x1050.png?w=1366&amp;h=1025&amp;q=50&amp;fm=webp 1366w, https:\/\/images.ctfassets.net\/5natoedl294r\/1KqQOxADSF10llmoXiIg0s\/fda5514c92e0b079c72d4bae15f21352\/Scheme_1400x1050.png?w=1400&amp;h=1050&amp;q=50&amp;fm=webp 1400w\" sizes=\"100vw\"\/><img title=\"deep packet inspection scheme\" width=\"1\" height=\"0.75\" data-main-image=\"\" style=\"object-fit:cover;opacity:0\" sizes=\"auto, 100vw\" decoding=\"async\" loading=\"lazy\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/1KqQOxADSF10llmoXiIg0s\/fda5514c92e0b079c72d4bae15f21352\/Scheme_1400x1050.png?w=1400&amp;h=1050&amp;q=50&amp;fm=png\" srcSet=\"https:\/\/images.ctfassets.net\/5natoedl294r\/1KqQOxADSF10llmoXiIg0s\/fda5514c92e0b079c72d4bae15f21352\/Scheme_1400x1050.png?w=750&amp;h=563&amp;q=50&amp;fm=png 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/1KqQOxADSF10llmoXiIg0s\/fda5514c92e0b079c72d4bae15f21352\/Scheme_1400x1050.png?w=1080&amp;h=810&amp;q=50&amp;fm=png 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/1KqQOxADSF10llmoXiIg0s\/fda5514c92e0b079c72d4bae15f21352\/Scheme_1400x1050.png?w=1366&amp;h=1025&amp;q=50&amp;fm=png 1366w, https:\/\/images.ctfassets.net\/5natoedl294r\/1KqQOxADSF10llmoXiIg0s\/fda5514c92e0b079c72d4bae15f21352\/Scheme_1400x1050.png?w=1400&amp;h=1050&amp;q=50&amp;fm=png 1400w\" alt=\"deep packet inspection scheme\"\/><\/picture><\/noscript><\/p><\/div><p class=\"my-4 blog-paragraph text-still-dark-blue\">The incoming data is screened and filtered using the nDPI engine against the DPI Policy defined by the company\u2019s IT administrator. The user is connected to a requested website if traveling data packets don\u2019t include blocked services.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">However, the connection to the requested online resource is restricted if there is a match between the data packet and the DPI block list policy.<\/p><h2 id=\"how-nordlayers-dpi-lite-is-different\" class=\"Heading Heading-h2 text-dark-blue\">How NordLayer\u2019s DPI Lite is different?<\/h2><p class=\"my-4 blog-paragraph text-still-dark-blue\">Some solutions allow DPI to incorporate extensive categories and be customizable for every client\u2019s preferences to restrict content online. However, a more complex approach may lead to excessive expenses. It may also require challenging configuration and become limiting to the company\u2019s disadvantage.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">Extensive data processing defined with all types of possible keywords can disrupt the connection flow and block access to online resources that initially weren\u2019t intended to be restricted. On the other hand, if the company is set for hardware infrastructure and decides to continue with the same type of DPI technology, it will need to know how to configure and perform in-house maintenance. All these additional steps create an unnecessary workload for IT administrators.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">To streamline the DPI implementation to the company infrastructure, NordLayer incorporates an easy-to-launch and control DPI Lite feature. It is cloud-native and easy to add or remove without investing in excessive resources. Its activation takes short notice and can be managed centrally, enabling flexibility and focus to the teams and operations:<\/p><ul class=\"list\"><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Keep productivity on point<\/strong>. NordLayer\u2019s DPI Lite feature encloses the company network with work-only online resources within employees\u2019 reach. Leave no space for distractions, so teams are less likely to spend time on their personal activities and decrease the chances of human error.<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Establish security levels<\/strong>. Entering unsecured websites or downloading data to work-linked endpoints can become a freeway for malicious actors accessing internal data and resources. DPI Lite can help filter out hidden remote computer access and control software planted by cybercriminals.<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Quick implementation and adoption<\/strong>. DPI Lite, like all the other NordLayer features, is entirely cloud-based and thus simple to integrate into existing infrastructure. Besides short enablement time, it is compatible with other data processing features like DNS filtering by category, constructing a more robust organization security posture.<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Easy to adhere to business needs<\/strong>. The categories or services of DPI Lite are simple to manage. A complete list or a few exceptions can be added or removed from the DPI Policy as required to suit the company\u2019s service scope.<\/p><\/li><\/ul><p class=\"my-4 blog-paragraph text-still-dark-blue\">NordLayer offers a packet inspection solution that doesn\u2019t overwhelm network security strategy and focuses on the most common business pain points. A well-sifted service list doesn\u2019t leave space to overthink data to block or spend time researching what online resources to consider, so no openings are left. Overall, DPI Lite helps organizations handle their teams\u2019 efficiency and activity while at work.<\/p><h2 id=\"benefits-of-dpi-lite\" class=\"Heading Heading-h2 text-dark-blue\">Benefits of DPI Lite<\/h2><p class=\"my-4 blog-paragraph text-still-dark-blue\">Establishing limits for online activity while working is like a reminder to focus on your tasks. But it\u2019s not just about preventing employees from distractions using company gateways.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">Adding DPI Lite as an additional security measure fortifies network security and advances business performance in different ways.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">Prevent data leaking<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">Whether intentional or accidental, data leaks are damaging to businesses. DPI Lite adds to security measures by restricting the download of data-leaking apps or the usage of data-sharing and emailing services. Suppose employees try to send files from the company network via Dropbox or Google Drive. In that case, DPI Lite will recognize data packets containing related ports, protocols, and headers and will stop the action from completing the request.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">Eliminate traffic overload<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">Online activities create traffic on network gateways: the more requests, the more overloaded infrastructure, ultimately resulting in performance issues. DPI Lite implementation to the virtual private gateways helps limit created traffic as users cannot access online resources. Online streaming and seeding services or visual-heavy social media increase network usage a few folds. Hence, with DPI blocking, fewer data packets must be inspected and unclog the network. Out of user sight, out of admin mind.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">Protect static IP addresses<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">Unrestricted internet usage could create convenient conditions for employees to hide behind company IP addresses to perform illegal activities. For example, using torrents on a work network can result in copyright holders initiating blocked IP addresses or even legal prosecution for piracy on the organizational level.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">With open internet access, scam attempts have a free pass. If law enforcement authorities identify IP during their investigation of a crime done by your employee from the company\u2019s IP address, it might lead to the company\u2019s liability and even hardware confiscation. Hence, whether the network is managed internally or via a vendor like Internet Service Provider (ISP), deep packet inspection as an additional security measure can help establish internal online activity limits to prevent any illicit acts from happening under the company name.<\/p><h2 id=\"entering-nordlayers-dpi-lite\" class=\"Heading Heading-h2 text-dark-blue\">Entering NordLayer\u2019s DPI Lite<\/h2><p class=\"my-4 blog-paragraph text-still-dark-blue\">Organization-first mindset while at work or dealing with company-related content can be seen as restricting user activity. Although it\u2019s a strong push toward cybersecurity strategy implementation, preventing possible gaps and openings.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">Deep packet inspection is part of the bigger picture when combined with other NordLayer security features like DNS filtering by category, ThreatBlock, and Jailbroken\/rooted device detection. Enforcing our remote network access solution into your company infrastructure and activating the DPI Lite feature is a matter of a couple of days or less. Organization administrators need to access NordLayer Control Panel, navigate to Servers or Gateways under the Network tab, and configure it by selecting Deep Packet Inspection (Lite) categories as required.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">Utilizing simple and affordable tools like NordLayer\u2019s DPI Lite doesn\u2019t overcomplicate the existing cybersecurity strategy and upgrades team productivity, network performance, and company security for better business performance.<\/p><\/article><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"63561\" class=\"elementor elementor-63561\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1b6aa2c4 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"1b6aa2c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1b283ee5\" data-id=\"1b283ee5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4e466f1a elementor-widget elementor-widget-text-editor\" data-id=\"4e466f1a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About NordLayer<br \/><\/strong>NordLayer is an adaptive network access security solution for modern businesses \u2013 from the world\u2019s most trusted cybersecurity brand, Nord Security.<\/p><p>The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The lines are blurred in the modern business lifestyle. [&hellip;]<\/p>\n","protected":false},"author":148637484,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1130,973,1075,61],"tags":[1076,1132,974],"class_list":["post-63522","post","type-post","status-publish","format-standard","hentry","category-nordlayer","category-nord-security","category-year2023","category-press-release","tag-1076","tag-nordlayer","tag-nord-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>NordLayer features in review: DPI Lite - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nordlayer.com\/blog\/nordlayer-features-in-review-dpi-lite\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NordLayer features in review: DPI Lite - Version 2\" \/>\n<meta property=\"og:description\" content=\"The lines are blurred in the modern business lifestyle. [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nordlayer.com\/blog\/nordlayer-features-in-review-dpi-lite\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-21T03:52:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-13T08:31:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/images.ctfassets.net\/5natoedl294r\/djrN83aQqZdt8HtRi9QFd\/f7ec79b773aa277ccd05957089d959de\/NordLayer_features_in_review__DPI_Lite_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\" \/>\n<meta name=\"author\" content=\"versionpan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"versionpan\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/nordlayer-features-in-review-dpi-lite\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/02\\\/nordlayer-features-in-review-dpi-lite\\\/\"},\"author\":{\"name\":\"versionpan\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/103ffe36f7fd34a1cc126a30431b94d8\"},\"headline\":\"NordLayer features in review: DPI Lite\",\"datePublished\":\"2023-02-21T03:52:00+00:00\",\"dateModified\":\"2024-09-13T08:31:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/02\\\/nordlayer-features-in-review-dpi-lite\\\/\"},\"wordCount\":1663,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/nordlayer-features-in-review-dpi-lite\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/djrN83aQqZdt8HtRi9QFd\\\/f7ec79b773aa277ccd05957089d959de\\\/NordLayer_features_in_review__DPI_Lite_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\",\"keywords\":[\"2023\",\"NordLayer\",\"Nord Security\"],\"articleSection\":[\"NordLayer\",\"Nord Security\",\"2023\",\"Press Release\"],\"inLanguage\":\"zh-HK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/02\\\/nordlayer-features-in-review-dpi-lite\\\/\",\"url\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/nordlayer-features-in-review-dpi-lite\\\/\",\"name\":\"NordLayer features in review: DPI Lite - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/nordlayer-features-in-review-dpi-lite\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/nordlayer-features-in-review-dpi-lite\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/djrN83aQqZdt8HtRi9QFd\\\/f7ec79b773aa277ccd05957089d959de\\\/NordLayer_features_in_review__DPI_Lite_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\",\"datePublished\":\"2023-02-21T03:52:00+00:00\",\"dateModified\":\"2024-09-13T08:31:27+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/nordlayer-features-in-review-dpi-lite\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nordlayer.com\\\/blog\\\/nordlayer-features-in-review-dpi-lite\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/nordlayer-features-in-review-dpi-lite\\\/#primaryimage\",\"url\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/djrN83aQqZdt8HtRi9QFd\\\/f7ec79b773aa277ccd05957089d959de\\\/NordLayer_features_in_review__DPI_Lite_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\",\"contentUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/djrN83aQqZdt8HtRi9QFd\\\/f7ec79b773aa277ccd05957089d959de\\\/NordLayer_features_in_review__DPI_Lite_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/nordlayer-features-in-review-dpi-lite\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NordLayer features in review: DPI Lite\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/103ffe36f7fd34a1cc126a30431b94d8\",\"name\":\"versionpan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g\",\"caption\":\"versionpan\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/versionpan\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NordLayer features in review: DPI Lite - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nordlayer.com\/blog\/nordlayer-features-in-review-dpi-lite\/","og_locale":"zh_HK","og_type":"article","og_title":"NordLayer features in review: DPI Lite - Version 2","og_description":"The lines are blurred in the modern business lifestyle. [&hellip;]","og_url":"https:\/\/nordlayer.com\/blog\/nordlayer-features-in-review-dpi-lite\/","og_site_name":"Version 2","article_published_time":"2023-02-21T03:52:00+00:00","article_modified_time":"2024-09-13T08:31:27+00:00","og_image":[{"url":"https:\/\/images.ctfassets.net\/5natoedl294r\/djrN83aQqZdt8HtRi9QFd\/f7ec79b773aa277ccd05957089d959de\/NordLayer_features_in_review__DPI_Lite_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp","type":"","width":"","height":""}],"author":"versionpan","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"versionpan","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"10 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nordlayer.com\/blog\/nordlayer-features-in-review-dpi-lite\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2023\/02\/nordlayer-features-in-review-dpi-lite\/"},"author":{"name":"versionpan","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/103ffe36f7fd34a1cc126a30431b94d8"},"headline":"NordLayer features in review: DPI Lite","datePublished":"2023-02-21T03:52:00+00:00","dateModified":"2024-09-13T08:31:27+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2023\/02\/nordlayer-features-in-review-dpi-lite\/"},"wordCount":1663,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/nordlayer.com\/blog\/nordlayer-features-in-review-dpi-lite\/#primaryimage"},"thumbnailUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/djrN83aQqZdt8HtRi9QFd\/f7ec79b773aa277ccd05957089d959de\/NordLayer_features_in_review__DPI_Lite_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp","keywords":["2023","NordLayer","Nord Security"],"articleSection":["NordLayer","Nord Security","2023","Press Release"],"inLanguage":"zh-HK"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2023\/02\/nordlayer-features-in-review-dpi-lite\/","url":"https:\/\/nordlayer.com\/blog\/nordlayer-features-in-review-dpi-lite\/","name":"NordLayer features in review: DPI Lite - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nordlayer.com\/blog\/nordlayer-features-in-review-dpi-lite\/#primaryimage"},"image":{"@id":"https:\/\/nordlayer.com\/blog\/nordlayer-features-in-review-dpi-lite\/#primaryimage"},"thumbnailUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/djrN83aQqZdt8HtRi9QFd\/f7ec79b773aa277ccd05957089d959de\/NordLayer_features_in_review__DPI_Lite_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp","datePublished":"2023-02-21T03:52:00+00:00","dateModified":"2024-09-13T08:31:27+00:00","breadcrumb":{"@id":"https:\/\/nordlayer.com\/blog\/nordlayer-features-in-review-dpi-lite\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nordlayer.com\/blog\/nordlayer-features-in-review-dpi-lite\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/nordlayer.com\/blog\/nordlayer-features-in-review-dpi-lite\/#primaryimage","url":"https:\/\/images.ctfassets.net\/5natoedl294r\/djrN83aQqZdt8HtRi9QFd\/f7ec79b773aa277ccd05957089d959de\/NordLayer_features_in_review__DPI_Lite_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp","contentUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/djrN83aQqZdt8HtRi9QFd\/f7ec79b773aa277ccd05957089d959de\/NordLayer_features_in_review__DPI_Lite_cover_web_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp"},{"@type":"BreadcrumbList","@id":"https:\/\/nordlayer.com\/blog\/nordlayer-features-in-review-dpi-lite\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"NordLayer features in review: DPI Lite"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/103ffe36f7fd34a1cc126a30431b94d8","name":"versionpan","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g","caption":"versionpan"},"url":"https:\/\/version-2.com\/zh\/author\/versionpan\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-gwy","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/63522","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/148637484"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=63522"}],"version-history":[{"count":12,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/63522\/revisions"}],"predecessor-version":[{"id":63582,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/63522\/revisions\/63582"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=63522"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=63522"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=63522"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}