2021-10-26T19:25:51Z

What do you like most about Nutanix Flow?

Miriam Tover - PeerSpot reviewer
  • 0
  • 6
PeerSpot user
7

7 Answers

Lipaz Hessel - PeerSpot reviewer
Real User
Top 5Leaderboard
2024-02-21T12:51:58Z
Feb 21, 2024

Nutanix Flow Network Security is a simple solution that is usable, easy to understand, and easy to deploy.

Search for a product comparison
JT
MSP
Top 5Leaderboard
2023-05-08T16:50:06Z
May 8, 2023

The network view was excellent as it allowed us to expand the server view and visualize all connections it made within the environment.

This was particularly useful in identifying the path of our data and not just its location within the data center.

SuchitPatel - PeerSpot reviewer
Real User
Top 20
2023-02-28T12:34:22Z
Feb 28, 2023

Flow Network Security's most valuable features are user-friendliness, the console, and policy creation.

Infraprojman677 - PeerSpot reviewer
Real User
Top 5Leaderboard
2022-08-10T12:36:48Z
Aug 10, 2022

We appreciate the fact that this solution allows us to segregate two virtual machines that are in the same cluster.

Eduardo-Penedos - PeerSpot reviewer
Real User
Top 5Leaderboard
2022-04-10T10:59:44Z
Apr 10, 2022

Nutanix Flow is straightforward to install. You only need to select a checkmark that you want to enable Nutanix Flow.

JV
Real User
Top 20
2021-12-14T05:16:00Z
Dec 14, 2021

It allows for policies that enable complete visibility and traffic control.

Find out what your peers are saying about Nutanix, VMware, Cisco and others in Microsegmentation Software. Updated: March 2024.
765,234 professionals have used our research since 2012.
Hamada Farag - PeerSpot reviewer
Real User
Top 10
2021-10-26T19:25:51Z
Oct 26, 2021

Nutanix Flow has a lot of data protection features. It's also valuable for operations and management. It's a big solution that works well with different solutions and is suitable for most business cases.

Microsegmentation Software
What is microsegmentation? Microsegmentation is the latest current trend in security to protect data and reduce threat risk in operating systems and cloud environments. It is a security solution process that has been created to intuitively compartmentalize the data by workload within an organization’s operating systems. Security architects can develop protocols to define how all traffic moves throughout your ecosystem - north-south and east-west. It will also limit which devices can...
Download Microsegmentation Software ReportRead more