I currently use Nutanix Flow Network Security to design a disaster recovery plan.
My company has been leveraging Nutanix Flow Network Security's capabilities to create a non-routed VPC or virtual private cloud that we can use in a routed, but no internet instance of a VPC so that we can deal with failover of our primary data center and secondary data center while maintaining the address space in terms of IP addresses using overlay networks in our DR facility. The VMs in our company wouldn't have to change their IP addresses or DNS centers, which would allow for a seamless failover to another area. Using Nutanix Flow Network Security, we can route all of our traffic from the cores in our main data center to the cores in our secondary data center, which would be invisible to the user and our product offerings.
The most valuable feature of the solution is virtual networking.
The documentation offered by the product is an area with certain shortcomings where improvements are required. Nutanix does have a documentation issue. Nutanix offers a lot of documentation, but none of them are relevant, pertinent, or easy to understand. The documentation does not cater to the needs of what most people expect. Nutanix needs better scenario-based documentation.
I have been using Nutanix Flow Network Security for five to six months.
It is a very stable solution. Stability-wise, I rate the solution a ten out of ten.
The scalability can be described as an area that is better than average, but I don't know if it would get better. Scalability-wise, I rate the solution an eight out of ten.
The solution's technical support is amazing. I rate the technical support a ten out of ten.
I have experience with Guardicore and VMware NSX.
The product's initial setup phase was easy.
The solution is deployed on an on-premises model.
The product is available for free use.
I did not evaluate other options against Nutanix Flow Network Security.
My company is still determining how the product has improved network visibility. My organization is still actively developing the product. There are many things my company is doing in the background to make sure that our VMs come up. My company deals with Nutanix Cross Hypervisor Disaster Recovery, so we are moving from an ESXi or VMware to Nutanix AHV, meaning that my company is crossing over from hypervisor technologies and leveraging Nutanix to maintain the networks at our DR facility.
The most valuable feature of the product in enhancing the security posture stems from the micro-segmentation provided by the product, but I think that it is a functionality in its early stages. The product's micro-segmentation features are being developed to be made robust against technologies such as NSX from VMware and other hypervisor-dependent technologies such as Guardicore. I can't say that the product has given my company any additional features yet, but we hope that the tool will provide us with additional functionalities in the future.
The product's micro-segmentation features seem to be on par with the other technologies in the market when it comes to its ability to isolate workloads.
I haven't noticed any improvements in my company due to the automation capabilities of the product, especially since everything is done manually in our organization because we know the application very well, and we also know how we want to protect it. I am sure the product has automatic features, but we haven't used them in our company.
There has been a positive impact due to the integration capabilities of the product with the other solutions in our company's IT infrastructure.
I recommend the product to those who plan to use it, especially those who use Nutanix AHV as a hypervisor.
It would be a good choice to work with the account rep in your company so that you can get a system engineer to help you walk through the majority of the deployment and setup phases since the documentation has certain shortcomings.
I rate the overall tool a ten out of ten.