With native tools, configuration and maintenance of host firewalls takes time and compliance is hard to follow up.
Traditional boundary firewall solutions has no effect when the attacker is on the inside
There is no easy way to keep track of configuration changes over time and identify who made the change.
Cost-effectively implement end-point protection to segment your environment into more secure, isolated logical networks based on policy rather than network topology.
Uses the built-in technologies that are readily available in modern operating systems. This removes the need to make potentially disruptive changes to your network topology, existing applications, or requiring costly hardware upgrades.
Offers you the flexibility to logically isolate an entire managed network, and/or protect specific applications servers, data and clients. For example, you can use nodeProtect to better protect your managed environment from threats originating from unmanaged or rogue computers.
Do even more with less, by adding additional value to your existing infrastructure investments through the following benefits: Requires no additional investments in hardware and removes the need for potentially disruptive changes to network topology, applications, or costly infrastructure upgrades.
Limit network communications to trusted, managed computers to help mitigate the risk of a rogue or unmanaged computer exploiting vulnerabilities, spreading malware or launching DoS attacks.
Add these policy-driven safeguards at the network layer and enhance the network access control benefits of host firewalls while complementing other host- and network-based security.
GDPR does not describe what technical implementations and organizational measures are required. This allows organizations to pursue a risk-based approach like ISO27001. NodeProtect maps to several ISO requirements and to the following GDPR articles:
Article 18 – Right to restriction of processing
Article 24 – Responsibility of the controller
Article 25 – Data protection by design and by default
Article 32 – Security of processing
Article 35 – Data protection impact assessment
NodeProtect addresses network security issues through software defined segmentation, also known as micro-segmentation. Micro-segmentation reduces the risk of network security threats by minimizing lateral movement. NodeProtect uses the built-in firewall in the operating system and no third party firewall is installed. As the security is configured at host level the protection follows the system regardless of virtualization plattform, cloud provider or if it's a physical server. Strategies built on micro-segmentation can be used to support least privilege and privacy by design to safeguard sensitive data and intellectual property.
Why some of Sweden's largest authorities, banks and reputable companies use nodeProtect
The keys to micro segmentation are the same as for any data network strategy, such as understanding traffic flow. NodeProtect enables us to see what needs to be done, where the security is lacking and then quickly remediate.
The policy-based nature of micro segmentation adds additional considerations for a manageable deployment. NodeProtect enables us to protect server infrastructure through segmenting the different environments to minimize network exposure.
Co-Founder and CEOCISSP certified Cyber Security Advisor
Co-Founder and Board MemberWorld-renowned Cyber Security Expert
Co-Founder and CTONodeProtect Architect
Local Firewall Details
Up to 5 end nodes
No credit card needed
Includes all from Free +
Unlimited end nodes
Multi Factor Authentication
Includes all from Business +
IPSec Domain Isolation
IPSec Server Isolation
Odengatan 81, 113 22 Stockholm