NordLayer feature release: Always On VPN

Always On VPN announcement cover web 1400x800

NordLayer introduces a new addition to the security stack of the solution — Always On VPN. Our most recent feature will provide a VPN-only connection to digital organization resources and online browsing. It’ll also ensure IP masking and encryption endure despite where and when the user accesses internal and public information.

Always On VPN provides a peripheral security layer for a robust and reactive approach to protecting company assets and users in a continuously evolving technological landscape.

Feature characteristics: what to expect

  • Available for all subscription plans.

  • Central implementation & configuration via Control Panel; Individual configuration level via application settings.

  • Compatible with desktop platforms: Windows; macOS (side-loaded version only).

Problem to solve: ensure continuous and secure internet access by disabling unencrypted user connections.

How does it work?

Always On VPN enforces mandatory connection to a company gateway to use the internet. As the feature name implies, user connectivity to the network could resume only with VPN turned on.

Users with the enabled feature are relieved from connecting to the VPN manually. Automation doesn’t require remembering to turn on the encrypted connection while working, which otherwise imposes risks to company data security.

Always On VPN is deployed and starts functioning on an organization member device from the moment the user signs in to their endpoint with the enforced feature on the NordLayer Application.

Primarily enforced security policy ensures organization members follow company security requirements and follow internal rules.

IT administrators activate security configuration via Control Panel. The On/Off toggle for the Always On VPN is under the Settings category, Security configurations tab. It allows admins to manage the policy centrally and distribute it to the entire organization.

Employees can enable and disable the feature on the NordLayer application settings as long as the admin doesn’t activate it. Thus, if the IT administrator wants to ensure everyone in the organization has Always On VPN enforced, end users won’t be able to disable it once configured centrally via Control Panel.

What problem does it solve?

IT managers must be sure that organization members use cybersecurity tools according to internal security procedures. Skilled IT staff and resource limitations require maximum efficiency from deployed cybersecurity strategy with consolidated access controls.

The feature of Always On VPN helps admins ensure all company members' online activities are within organizational security policies. In the meantime, organizations benefit from a tighter approach to prevent data leaks and breaches.

Always On VPN objectives include:

  1. Enforcement of connection encryption for a remote workforce.

  2. Protection of teams on the move (covers business trips, frequent exposure to public wifi).

  3. Enhancement of data leak prevention for increased-risk companies.

With the Always On VPN feature running, organizations can expect higher reliability to remote connections outside the office network perimeter.

Security by design

The Always On VPN interconnects with other NordLayer features. It is an additional security layer for protecting user internet access while connected to the company network. Always On VPN ensures encrypted user traffic is isolated from untrusted network threats once a secure connection is lost.

The feature syncs with NordLayer’s Device Posture Monitoring for providing information about organization-linked endpoint health and activity. ThreatBlock feature helps filter out potentially malicious websites users might enter while connected to the company gateway. Also, Always On VPN ensures that DNS Filtering and Deep Packet Inspection features operate per applied settings.

Combined features enforce security through user endpoints and don’t affect employee productivity. And don’t expose your business to online risks within seconds after IT admins enforce it centrally despite their location, distance, and distribution.

Share article


Copy failed

Protect your business with cybersecurity news that matters

Join our expert community and get tips, news, and special offers delivered to you monthly.

Free advice. No spam. No commitment.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.