FAQ


About nodeProtect

What is nodeProtect?

nodeProtect is a Windows Endpoint Firewall Manager that makes Software Defined Segmentation of your network easy. nodeProtect is built, managed and run by Addlevel in Sweden. Addlevel is a Information Security and Software Development company. Addlevel´s customers are large authorities and banks as well as other reputable companies and is a part of TrueSec Group.

With native tools configuration and maintenance of Windows firewalls takes time and enforcement is hard to follow up. Traditional boundary firewall solutions has no effect when the attacker is on the inside and there is no easy way of keeping track of configuration changes over time and identify who made the change.

  • Modern and intuitive web-based interface.
  • Full history change tracking of all administrative actions.
  • Software-defined segmentation.
  • Grouping of resources and configurations for ease of administration.

What is the big deal with micro-segmentation?

Segmentation is an essential technique to maintain a good “network hygiene”, i.e. prevent network disruptions and increase its efficiency and reliability. It consists in grouping together servers and workstations into logical units (segments) and controlling the traffic between the units. Micro-segmentation goes one step further in treating each server (node) as its own segment and applying specific rules controlling all communications to and from the server.

Obviously, micro-segmentation requires creating and maintaining firewall rules on each individual server, which is great for maximum control and protection, but it is a security measure that quickly becomes extremely time-consuming and impractical when applied to 100, 1000 or 10,000 servers!

This is where nodeProtect comes into play and turns an insanely difficult task into an enjoyable project: you simply have to deploy the nodeProtect agent to every node on your network (through Group Policy, for example) and to configure firewall rules for groups of nodes through the nodeProtect portal. The portal allows you also to monitor all your nodes and take action if any adjustment needs to be made.

Technical details

What are nodeProtect’s minimum system requirements?

The nodeProtect agent itself has an extremely low impact on server performance thanks to its very small RAM footprint (approx. 20-30 MBs on average) and extremely low bandwidth.

In addition, customers opting for an on-premises installation will need a dedicated server with the following:

  • Operating system: Windows Server 2012 R2 or higher

  • RAM: At least 4 GB RAM

  • CPU: At least a dual-core CPU

  • Server applications:

    • SQL Server Express

    • .NET core hosting bundle

    • IIS

  • Webserver certificate from a trusted Certificate Authority

Does nodeProtect replace Windows Firewall?

No, it allows you instead to take full control over Windows Firewall by providing the ideal interface to easily manage hundreds or thousands of firewalls. nodeProtect removes all default and locally-defined firewall rules and deploys all the rules that you have defined for a specific node or group of nodes.

How many firewalls can I control with nodeProtect?

As many as you need! nodeProtect has been successfully deployed on larger networks with thousands of nodes and it has been running smoothly and efficiently for many years.

What happens if a local administrator changes firewall rules on a particular node?

The agent will revert the changes automatically as soon as it has compared the current firewall configuration with the one specified in nodeProtect.

In what environment is nodeProtect running?

nodeProtect is deployed in Microsoft Azure and thus takes advantage of a very secure and reliable cloud infrastructure.

How does nodeProtect service communicate with the agent?

The nodeProtect agent sends HTTPS (port 443) Get requests to the server at fixed intervals to retrieve its current configuration.

What PKI can be used with nodeProtect?

When using nodeProtect on premises, you can roll your own PKI solution with public keys and digital certificates. When using our cloud service we handle this for you.

What are nodeProtect’s upcoming features?

Some of the upcoming features include:

  • in-depth traffic analysis;
  • the ability to remotely enable a firewall that has been disabled;
  • scheduled configuration;
  • client OS support.

Software security

What data is encrypted and what encryption algorithms are used?

All user information including passwords and financial information is encrypted with RSA and AES algorithms. Connections between the nodeProtect servers and agents are encrypted with TLS 1.3.

How are passwords stored and protected?

nodeProtect takes advantage of Microsoft’s ASP.NET Core Identity framework in order to hash and salt passwords, which are then stored in an encrypted database in Azure. On-premises installations use the same techniques but locally, of course.

How are your office and data center premises protected against external threats?

Microsoft Azure servers benefit from the industry’s highest security standards when it comes to the protection of hardware and software. Our offices are housed in high security facilities that are monitored 247.

Where are the data centers located?

nodeProtect is hosted on Microsoft Azure servers in the West Europe region, with the Azure server in the North Europe region as a fallback solution should any problem occur.

How are your systems protected against insider and external threats?

Since we have clients who require high security clearances, all our employees have to go through thorough background checks on a regular basis. And because we are a tight-knit team of dedicated experts who never hesitate to help each other or ask for help, work ethics and morale at Addlevel is extremely high, which considerably reduces the risks of an insider threat.

Read more about Addlevel’s information security work under our Security Center.

How can I be sure that nodeProtect does not open any backdoor or introduce a vulnerability on my network?

Not only has our team of developers several decades of experience developing software for extremely sensitive environments but security lies at the very core of our business. We are strong supporters of the idea that the most effective way of writing secure code is to put extra efforts in the earlier stages of the process and to never let our guard down until the end of the project.

Moreover, Addlevel and its sister companies have been building a rock solid reputation helping the private and public sectors cope with the constantly-evolving security challenges posed by information technology.

Accounts

What subscription plans are available?

Three plans are currently available:

  • a free plan that provides a full-featured version of nodeProtect for up to 5 nodes;
  • a business plan that offers nodeProtect as a cloud-based solution for any number of nodes and multiple system administrators;
  • an enterprise plan, which offers tailored solutions for organizations that require an on-premises installation.

What if I need to upgrade my subscription plan or close my account?

The easiest way is to reach us at contact@nodeprotect.com and we will take care of it.

What forms of payment are accepted?

We currently accept payments through invoice and bank transfer.

What happens to my information once I close my account?

All data related to free accounts is immediately erased. For paid accounts, all user information is erased except what we are required to keep for accounting purposes in accordance with Swedish tax law. Please note that no data can be recovered once your account is closed. Before contacting us, make sure to export any data that you would like to save.

Privacy

What information is collected in nodeProtect?

Free plan users only have to provide their name as well as an email address, while users on the business plan have to provide their name, company, postal address, telephone number and email address in addition to basic payment information. As long as you are using nodeProtect, we collect only as much information as needed to provide you with a secure and reliable solution. Should you ever wish to close your account, all your data will be permanently deleted.

How is the information used?

Contact information is used to manage payments and to communicate with you about nodeProtect and your account. All configuration data about your nodes, such as IP adresses, rules and policies, is only used within nodeProtect and remains strictly confidential.

Is any information shared with a third party?

No.

How is my information protected?

Read all about this under Security.

How can I export my data?

This is an upcoming feature. Stay tuned!

What happens to my data once I close my account?

All data related to free accounts is immediately erased. For paid accounts, all user information is erased except what we are required to keep for accounting purposes in accordance with Swedish tax law. Please note that no data can be recovered once your account is closed. Before contacting us, make sure to export any data that you would like to save.

How is nodeProtect GDPR-compliant?

nodeProtect does not contain any personally identifiable information other than basic information about a contact person at each organization that is using our product.

Read more:

Personnel

Does your staff go through background checks?

Since we have clients who require high security clearances, all our employees have to go through thorough background checks on a regular basis.

How do you handle staff termination?

Different processes are in place depending on the type of termination. In case of immediate termination, the employee has all of his/her authorizations revoked without delay and s/he is escorted off the premises. An investigation is then launched in the employee’s activities while his/her devices are scanned to make sure that no security breach has occurred.

How do you make sure that your staff handles my data securely?

In addition to regular background checks, all our employees are required to follow a usage compliance policy that describes very precisely how user data must be handled. We also have a very strict role-based access control, which only gives employees involved with nodeProtect access to data on a “need-to-know” basis.

Business continuity and disaster recovery

Does your company have a business continuity/disaster recovery plan?

Yes, we have! That means that we are prepared in case an incident occurs.