Continuous Compliance & Security

You are here:
< All Topics

NP-Live enables organizations to adopt a culture of continuous compliance and security.  By combing the below features, NP-Live can monitor your network devices 24 x 7 x 365, alerting individuals or ticketing systems when security or compliance vulnerabilities are identified.


NP-Connect facilitates the configuration of connectors to poll devices on a schedule importing the latest configurations for analysis.

Policy management

Risk and Warnings are generated based on policy requirements that automatically run on network device configuration files imported into the workspace. Each requirement has its own checking logic that can run on either:

  • the device configurations
  • the access rules
  • the path analysis
  • the output logs of the device parsers

Requirements are organized into policies which can be assigned to specific devices. NP-Live includes a set of default policies that are read-only. Policies can be deactivated and assigned to specific devices but not deleted.

Administrators and Standard Users can create new policies and new requirements with custom checking logic. Once created, a custom policies can be edited/saved, assigned to specific devices, enabled/disabled, tested or deleted.


Notification manager allows users to setup rules based on multiple criteria and to have those notifications delivered to multiple services on a schedule. Notifications can be setup by one or more of the following:

  • Workspace
  • Activity type (Risks, Warnings, Errors, Comments and Changes)
  • Activity status (New, Confirmed, Resolved, Fixed, False Positive, Will Not Fix)
  • Severity (Low, Medium, High)
  • Keyword match

Notifications can be sent to the services configured by the Administrator and can include (e-mail, ticketing systems, syslog, taxii).

Change tracking

Change tracking provides the user with the ability to review changes made to the system and review the potential impact of the changes. Changes can also be setup as notifications as described above.

Table of Contents