Before you begin
Before you start setting up Nexthink, read the following prerequisites.
Understand the Nexthink architecture
The Nexthink Infinity Platform employs a unique architecture to facilitate automation and remediation across all IT environments.
See the Nexthink Infinity Platform page for a high-level description of this architecture. For more detailed information about the components, visit the Infinity Specifications page.
Review Security and Legal policies
Security considerations
Nexthink takes information security seriously, as shown by the following key highlights of the Platform:
Nexthink uses dedicated services and databases to ensure data segmentation for single-tenant components.
Application services use cloud-native techniques to segment tenant data in dedicated services and database tables.
Service mesh traffic is automatically encrypted with mutual endpoint authentication using mTLS protocol.
Nexthink ensures fine-grained role-based access control at the application layer.
Nexthink has also invested significant resources in obtaining several cybersecurity certifications. To learn about these certifications, visit the Security Portal.
Legal policies
See the following documentations to learn about Nexthink's legal policies:
Technical requirements
Verify that your system meets the following technical requirements before installing Nexthink Collector:
Last updated
Was this helpful?