Skip to main content
TrustRadius
NordLayer

NordLayer
Formerly NordVPN Teams

Overview

What is NordLayer?

NordLayer provides cybersecurity tools for businesses of any size or work model developed by the standard of NordVPN. NordLayer helps organizations secure networks and enhance internet security and modernizes network and resource access with technical improvements aligning with the best…

Read more
Recent Reviews

TrustRadius Insights

NordLayer has been utilized by users to create a static IP address, allowing whitelisted access into their customer environments. This …
Continue reading
Read all reviews

Reviewer Pros & Cons

View all pros & cons
Return to navigation

Pricing

View all pricing

Lite

$8

Cloud
per month if Yearly plan per user

Core

$11

Cloud
per month if Yearly plan per user

Premium

$14

Cloud
per month if Yearly plan per user

Entry-level set up fee?

  • No setup fee
For the latest information on pricing, visithttps://nordlayer.com/pricing

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services
Return to navigation

Product Details

What is NordLayer?

NordLayer provides cybersecurity tools for businesses of any size or work model developed by the standard of NordVPN.


NordLayer helps organizations secure networks and enhance internet security and modernizes network and resource access with technical improvements aligning with the best regulatory compliance standards. Helping organizations to adopt FWaaS, ZTNA, and SWG principles, NordLayer is focused on the Security Service Edge of cybersecurity services.


Designed to be easy to integrate with existing infrastructure, hardware-free, and with ease of scale in mind, NordLayer aims to meet the varying growth pace and ad-hoc cybersecurity requirements of agile businesses and distributed workforces today.

NordLayer Features

  • Supported: Next-gen site-to-site tunneling — secure access to company resources
  • Supported: AES 256-bit traffic encryption — protecting data
  • Supported: Network Access Control (IP Whitelisting) — set access permissions across the network
  • Supported: Biometric authentication — for an added layer of security
  • Supported: Smart Access — create a virtual LAN between company devices & servers
  • Supported: Dedicated servers / Static IP functionality — virtual locations
  • Supported: Custom private gateway creation — for network segmentation
  • Supported: Single Sign-On (SSO) with Azure AD, OneLogin, Okta & G Suite — meaning no additional credentials are needed
  • Supported: Two-factor authentication (2FA) — for additional layered security
  • Supported: Jailbroken / rooted device detection — alerting admin to vulnerable devices on the network
  • Supported: Threat-block malware protection (including DNS filtering) — mitigating the risk of malicious threats
  • Supported: Control Panel — for network management control & visibility
  • Supported: Centralized billing and automated user management — cutting administrative workload
  • Supported: Unlimited number of users — highly scalable
  • Supported: License transferability between users — giving you the flexibility to up and downscale
  • Supported: Integration with multiple network vendors simultaneously — reducing network admin
  • Supported: Shared servers in over 30 countries globally
  • Supported: Cloud Firewall (FWaaS)

NordLayer Screenshots

Screenshot of

NordLayer Video

NordLayer - Cybersecurity for Business

NordLayer Technical Details

Deployment TypesOn-premise, Software as a Service (SaaS), Cloud, or Web-Based
Operating SystemsWindows, Linux, Mac
Mobile ApplicationApple iOS, Android, Windows Phone
Supported LanguagesEnglish
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(22)

Community Insights

TrustRadius Insights are summaries of user sentiment data from TrustRadius reviews and, when necessary, 3rd-party data sources. Have feedback on this content? Let us know!

NordLayer has been utilized by users to create a static IP address, allowing whitelisted access into their customer environments. This feature ensures secure connections and meets the requirements of clients who only allow access from IPs within the same region. Additionally, NordLayer has been implemented as a zero trust network solution, providing affordable reassurance for digital security. It has successfully replaced Microsoft Remote Apps, offering complete network access to team members and improving company security. The software has proven beneficial for overseas employees, preventing lockouts from programs and systems due to being perceived as threats. For engineers working remotely and abroad, NordLayer provides a safe work environment even on untrusted connections or open/public WiFi networks. Collaborators have also found peace of mind when browsing the internet on public WiFi networks with the help of NordLayer's secure connection. Overall, NordLayer is highly praised for its ease of setup, deployment, management, and security features. It is reliable, fast, and compatible with multiple platforms, making it cost-effective for remote workers and organizations aiming to enhance their security and enable secure connections worldwide.

Based on user reviews, NordLayer has received the following common recommendations:

  1. Users recommend trying NordLayer as it is a great solution and cost-effective. They find it effective in providing VPN services at an affordable price.

  2. Users suggest using NordLayer for managing teams with different regions/locations. It offers seamless management of multiple locations.

  3. Users advise purchasing the additional option to have your own gateway, especially for smaller companies. This allows for better control and security over network traffic.

It is important to note that while many users speak highly of NordLayer and recommend it for its features and affordability, there were also some negative experiences mentioned regarding poor customer service and issues during the transition from NordVPN to NordLayer.

Reviews

(1-5 of 5)
Companies can't remove reviews or game the system. Here's why
Score 10 out of 10
Vetted Review
Verified User
Incentivized
our org uses NordLayer as our VPN provider, enforcing VPN usage to access company files and shared drives. The scope is entire org with a few exceptions, and it runs well and relatively problem free. Recently the app updates have not required elevation so our users have been able to update their own apps.
  • SSO Set-up process is well laid out and simple
  • Speeds when connected to a physically nearby server are great
  • The ability to force always-on through the admin center is invaluable
  • Responsive customer service
  • The browser plugin needs some work, or some research about what browser/OS restrictions may limit its functionality. Ours does not work at all even after contacting support so we do not use it
  • Toast/Windows notifications scheduled or deployed through admin center would be amazing. The ability to remind a user who has been disconnected for X hours would be a great feature
NordLayer has become an invaluable resource for our security posture and day-to-day activity. The primary use case is preventing staff members from accessing sensitive resources on an unencrypted connection, applying NordLayer and conditional access policies in congruency. The ability to create teams and assigned them to specific dedicated servers is also helpful and allows for further security segmentation.
  • Satisfied security requirements to maintain company contracts. Difficult to put a number down but the loss of a contract could imply the loss of a large sum
  • HIPAA Compliance, further contract maintenance
In terms of functionality, features, security and device management, NordLayer beats all other competitors we tested by a longshot. The backend of NordLayer is user friendly and simple. The new Cloud Firewall feature is great and allows for an added layer on top of our device firewalls, many other VPNs have no such feature
February 09, 2024

Five Stars

Score 8 out of 10
Vetted Review
Verified User
Incentivized
I used NordLayer to provide secure and private access to the internet for our related work and remote colleagues. I used NordLayer to address several business problems. For example, NordLayer provides our colleagues with a way to secure access to our resources, applications, and data from a remote location or anywhere.
  • Easy to use
  • Simple user interface desgin
  • Support many VPN protocol
  • Fast and reliable connection
  • Expand Server Network
  • Upgrade to an attrative GUI
  • Hard to find IP address
Bypassed Geo-Restricted Access
  • Improved sercurity
  • Incresed productivity
  • Performance impact
I selected NordLayer against other VPN services based on commonly evaluated criteria. There are security features, a server network, speed and performance, user interface and experience, and customer support. For example, NordLayer provides a vast network of servers in various countries around the world, providing users with a wide range of server locations.
Sumeet Srivastava | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
NordLayer is used as a secure VPN connection to use the office infrastructure to carry out day to day tasks. It offers a seamless secured connection and very easy to install. It has also reduced our Opex Cost using NordLayer
  • Seamless connectivity
  • Easy configuration
  • Brilliant Tech support and Sales Incharge
  • Set up of servers can be a bit more ease for end users
Connectivity to your secured network from anywhere.
Helps reduce cost on infrastructure
  • Reduced cost by more than 50%
  • Easy interface for users to login
easy configuration and use case
Score 9 out of 10
Vetted Review
Verified User
My organization is a 100% work from home force with quite a bit of travel. We had experienced serious phishing and spoofing due to the public facing nature of our business. Deploying NordLayer within our workforce has provided an extra layer of security especially when traveling and using public or unsecured networks. The tool was easy to configure and deploy with very few issues with our remote users. the few issues we had with Nord having difficulties with some of our exiting platforms were address quickly and effectively by our support team. For example we use RingDNA, some users were experiencing dropped calls while connected to our dedicated gateway, but adjustments by the Nord support staff corrected the issues within 1 day.
  • Easy to deploy
  • Easy to configure
  • user friendly for non technical staff
  • Perhaps support closer to USA for time difference
Nord is perfect for our remote based traveling workforce. We do not have our own network equipment or datacenter and rely on cloud based or SaaS based partnerships.
  • Dedicated Gateways
  • Threat Block
  • Multiple protocols
  • We will measure our ROI after the tool has been deployed for 6-12 months. we are new users but happy so far
Abhisek Shrestha | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
We have been using NordLayer VPN for a long time. When our staffs are working from the office abroad, home, public places such as airports or coffee shops, it acts as a reliable shield, encrypting our connections and ensuring a secure passage for our data. It's not just a tool; it's the linchpin of our cybersecurity strategy, seamlessly addressing the evolving landscape of cyber threats and allowing us to navigate the digital realm with confidence.
  • Easy user management with admin console
  • Threat Management
  • Site-to-Site Dedicated Gateways
  • More server locations
  • Split-tuneling
  • Network Kill Switch
I'd 100% say it is best for Non Governmental Organizations where funding is low and budget seems to be a problem.
  • Auto connect
  • Threat Block
  • AES 256-bit encryption
  • Productivity through seamless remote work capabilities, and strengthened client trust due to robust data protection measures.
  • The negative impact is minimal compared to the invaluable security it provides.
  • Ensuring business continuity, and mitigating the potential costs of falling victim to cyber threats
Return to navigation