It’s never been easier to switch to a full-fledged Secure Access Service Edge framework to increase your network’s security. We’ve come up with this short guide to help you get started with the NordLayer — from configurations to setting it up on your user’s devices.
Become a NordLayer power user and boost your productivity squeezing everything that the suite has to offer.
Let’s get into it.
1. Familiarize yourself with the Control Panel
Control Panel is the central hub where you’ll find everything you need to manage your network. You can manage your users, security features, and payment details from one place.
Easy to start — it takes up to 10 minutes for an admin to set it up.
Hardware-free and works on top of your existing infrastructure.
Access account information, payment history, and methods in the billing information.
Upgrade or downgrade your current plan on demand.
Available plans:
Lite — $96 billed annually or $10 billed monthly per user
Core — $132 billed annually or $14 billed monthly per user
Premium — $168 billed annually or $18 billed monthly per user
2. Add new users
All it takes to set up a NordLayer account is an email. Your colleagues will only have to open an email and accept an invitation, which will allow you to further customize your internal network. Take full control of your network’s user base.
Head to the member’s section, type in their contact details, and send the invitation.
Track the invitation’s status as each recipient is accepting it:
Invited — the invitation was sent to the user but it hasn’t accepted it yet
Active — user has accepted the invitation and created its account
Inactive — the subscription for the user has expired but it can be renewed
Suspended — the user was active but no longer has an active license and it can’t be renewed
3. Create new teams
Your pool of users can be segmented into separate Teams. Not only does this help to manage each team’s resources but it also provides better team network management.
Create new teams from the Team tab
Manage their access permissions and assign users to it
4. Setting up gateways and dedicated servers
Each Team can be assigned a server (provided that the organization purchased dedicated servers). That way each user can be accessing only what’s relevant for its job functions. In addition, it keeps the server load lower by distributing it across multiple servers.
Create new private gateways adding teams and designate particular servers to them.
Once the team’s IP address is allowlisted in the organization’s system, only the Team will be able to access the server.
Shared gateways — allow changing your public IP on-demand and access geo-blocked websites.
Monitor server load and connections made to each dedicated server or shared gateway.
View the activity log in the activity section.
Compatible with all major OSes.
5. Implementing security features
In the settings section, you can centrally implement security features for all teams. Whether it’s login methods or security configurations, you’ll be able to align NordLayer with your overall IT business security standards.
2FA — request additional confirmation before allowing users to log in to NordLayer
SSO — enable or disable a unified set of security credentials across multiple cloud applications like Entra ID (Azure AD), Google SSO, Okta, OneLogin, and Salesforce
Biometric authentication — achieve higher security through face recognition and fingerprint scanning
Network segmentation — set user permissions to limit access to specific resources
Jailbroken device detection — deny vulnerable devices accessing your internal network
Andrius Buinovskis
Head of Product
Andrius Buinovskis, Head of Product at NordLayer, began his IT journey in the early ’90s when he exclusively experienced the thrill of technology by accidentally deleting and then reinstalling Windows on his own PC. Since then, his passion for IT has grown, leading him to specialise in developing IT services across diverse industries, including banking, telco, aviation, and cyber defence. At NordLayer, Andrius is now deeply involved in strategising and leading the product development agenda, further trailing his mark in cybersecurity.