Before you begin

Before you start setting up Nexthink, read the following prerequisites.

Understand the Nexthink architecture

The Nexthink Infinity Platform employs a unique architecture to facilitate automation and remediation across all IT environments.

See the Nexthink Infinity Platform page for a high-level description of this architecture. For more detailed information about the components, visit the Infinity Specifications page.

Security considerations

Nexthink takes information security seriously, as shown by the following key highlights of the Platform:

  • Nexthink uses dedicated services and databases to ensure data segmentation for single-tenant components.

  • Application services use cloud-native techniques to segment tenant data in dedicated services and database tables.

  • Service mesh traffic is automatically encrypted with mutual endpoint authentication using mTLS protocol.

  • Nexthink ensures fine-grained role-based access control at the application layer.

Nexthink has also invested significant resources in obtaining several cybersecurity certifications. To learn about these certifications, visit the Security Portal.

See the following documentations to learn about Nexthink's legal policies:

Technical requirements

Verify that your system meets the following technical requirements before installing Nexthink Collector:

Last updated

Was this helpful?