Product updates

NordLayer Dashboard: Close to real-time data to strengthen your network security


Product announcement_ Dashboards_cover

Summary: NordLayer's updated Dashboard offers close to real-time insights into 2FA adoption, OS types, and application versions graphs. This tool helps admins improve security and performance.

At NordLayer, we’re dedicated to empowering organizations to improve their network security. We’re excited to introduce our revamped Dashboard feature, now offering four new graphs that give admins a comprehensive view of network activity.

From monitoring 2FA adoption to analyzing the distribution of operating systems, these Dashboard graphs deliver critical data. With enhanced transparency and data-driven metrics, you can make informed decisions and optimize your company’s security strategies. Note that this feature was previously known as “Server Usage Analytics,” reflecting our commitment to improving your experience.

All NordLayer dashboards

Feature characteristics: What to expect

Here’s what’s new in this release of the Dashboard and how this update can benefit your organization:

1. Percentage of organization members who have 2FA enabled

Two-factor authentication (2FA) is essential for safeguarding user accounts and your company’s network. The new chart tracks the percentage of members within your organization who have completed the 2FA setup, whether enabled by an admin or by users themselves. With this data, admins can promote broader adoption of this security layer and take specific actions to reduce vulnerabilities.

2FA adoption dashboard

2. Distribution of devices OS types

Knowing the distribution of OS types across your organization helps optimize IT resources, plan for compatibility with future updates, and identify potential security vulnerabilities specific to certain OS types. The OS Types Distribution Graph provides clear data to strengthen your network security practices and support proactive system management.

OS distribution dashboard

3. Distribution of NordLayer application versions

Regularly monitoring the NordLayer Application Versions Graph helps ensure that all devices run the latest version of Nordlayer. By tracking version distribution, you can quickly spot any devices that need updates, helping maintain optimal performance and security across your organization.

Client versions dashboards

4. Browser types distribution (for NordLayer Browser Extension)

The Browser Types Distribution Graph tracks which browsers are being used with the NordLayer Browser Extension across your organization. This information is helpful for optimizing web applications, ensuring compatibility, and improving the overall user experience.

Browser distribution dashboard

How it works: Dashboard in action

NordLayer’s Dashboard provides a detailed view of user connections, network devices, and your network's server performance. Depending on your plan—Lite, Core, Premium, or Enterprise—certain charts and key metrics are available in near real-time, allowing IT admins to monitor and manage network security and service efficiently.

For example, the 2FA Chart can show that only 60% of your team has enabled two-factor authentication. With this information, you can run an internal campaign to encourage more team members to enable 2FA, thereby strengthening your overall network security.

Similarly, if the Application Versions Graph reveals that a significant number of users are running outdated versions of the NordLayer app, you can quickly address these security gaps by encouraging updates, ensuring that everyone has access to the most recent features and fixes.

Avoiding potential vulnerabilities

Let’s say you’re an IT admin of a growing company. You've recently onboarded several new employees, and you noticed a few inconsistencies in how different teams are using security protocols. With the new Dashboard, you can quickly assess the situation:

  • The 2FA Chart shows a low adoption rate of two-factor authentication
  • The OS Types Graph reveals that some teams are still using outdated operating systems
  • The App Versions Graph highlights that several employees haven’t updated their NordLayer application in months

By gathering this data in close to real-time, you can make strategic decisions to improve your company’s security posture—whether it’s launching an internal security campaign or scheduling updates across devices.

Why do dashboards matter?

Dashboards are essential tools for organizations looking to maintain strong network security and service usage and streamline decision-making. By providing clear, real-time data into key metrics, they help IT admins monitor, manage, and optimize their security strategies effectively. Here’s why dashboards are crucial in general:

  • Stronger network visibility: Dashboards offer a comprehensive view of your service and the network's usage, security, and performance. Whether you’re tracking operating systems, 2FA usage, or app versions, these insights give you the clarity you need to secure your organization.
  • Easier decision-making: The data provided by the Dashboard allows admins to make informed decisions quickly, improving security strategies and keeping the network running smoothly.
  • Data-driven security: Close to real-time data directly impacts your organization's security posture by making it easier to identify vulnerabilities and mitigate them before they become problems.

Conclusion

With these updates, NordLayer's Dashboard provides the data for the clear insights you need to protect your organization—no matter its size. By providing close to real-time data on essential security and usage metrics, the Dashboard helps admins take action where it matters most, ensuring a safer, more efficient network for everyone.

Ready to optimize your network security and monitor NordLayer’s service usage? Check out the new Dashboard feature today and start making data-driven decisions that safeguard your organization.


Senior Creative Copywriter


Share this post

Stay in the know

Subscribe to our blog updates for in-depth perspectives on cybersecurity.