Before you begin

Before you start setting up Nexthink, read the following prerequisites.

Understand the Nexthink architecture

The Nexthink Infinity Platform employs a unique architecture to facilitate automation and remediation across all IT environments.

See the Nexthink Infinity Platform page for a high-level description of this architecture. For more detailed information about the components, visit the Infinity Specificationsarrow-up-right page.

Security considerations

Nexthink takes information security seriously, as shown by the following key highlights of the Platform:

  • Nexthink uses dedicated services and databases to ensure data segmentation for single-tenant components.

  • Application services use cloud-native techniques to segment tenant data in dedicated services and database tables.

  • Service mesh traffic is automatically encrypted with mutual endpoint authentication using mTLS protocol.

  • Nexthink ensures fine-grained role-based access control at the application layer.

Nexthink has also invested significant resources in obtaining several cybersecurity certifications. To learn about these certifications, visit the Security Portalarrow-up-right.

See the following documentations to learn about Nexthink's legal policies:

Technical requirements

Verify that your system meets the following technical requirements before installing Nexthink Collector:

Last updated

Was this helpful?