Average Ratings 1 Rating

Total
ease
features
design
support

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Achieve flexible resource management through the implementation of automation guided by standardized policies for data center operations. By ensuring consistent policy administration across various on-premises and cloud environments, you can enhance security, governance, and compliance. This approach guarantees business continuity, effective disaster recovery, and secure networking under a zero-trust security framework. Moreover, it transforms Day 2 operations into a proactive model that automates troubleshooting, root-cause analysis, and remediation tasks. This not only optimizes performance but also allows for single-click access to facilitate automation and centralized control. Extend your on-premises ACI networks seamlessly to remote sites, bare-metal clouds, and colocation facilities without the need for additional hardware. Cisco's Multi-Site Orchestrator plays a crucial role by offering provisioning, health monitoring, and management of Cisco ACI networking policies, among other functionalities. This comprehensive solution streamlines network connectivity, maintains uniform policy management, and simplifies operations across various multicloud settings, ultimately enhancing operational efficiency and scalability for enterprises.

Description

Experience comprehensive Full-Stack Network and Security Virtualization through VMware NSX, enabling your virtual cloud network to safeguard and connect applications across diverse environments such as data centers, multi-cloud setups, bare metal, and container infrastructures. VMware NSX Data Center presents a robust L2-L7 networking and security virtualization solution that allows for centralized management of the entire network from a unified interface. Streamline your networking and security services with one-click provisioning, which offers remarkable flexibility, agility, and scalability by executing a complete L2-L7 stack in software, independent of physical hardware constraints. Achieve consistent networking and security policies across both private and public clouds from a singular vantage point, irrespective of whether your applications are running on virtual machines, containers, or bare metal servers. Furthermore, enhance the security of your applications with granular micro-segmentation, providing tailored protection down to the individual workload level, ensuring optimal security across your infrastructure. This holistic approach not only simplifies management but also significantly improves operational efficiency.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

DX Virtual Network Assurance
Medigate
Acceptto Zero Trust Identity (CIAM)
Altair Knowledge Hub
AspenPLUS
Cisco SD-Access
CloudVision
Comarch Master Data Management
Comarch Social Mining
IBM Datacap
Juniper Apstra
MindSafe
Network Critical
OpenText Core MDR
RapidScale Identity as a Service
Splunk AppDynamics
Splunk User Behavior Analytics
Terraform
TeskaLabs SIEM
ThreatSync

Integrations

DX Virtual Network Assurance
Medigate
Acceptto Zero Trust Identity (CIAM)
Altair Knowledge Hub
AspenPLUS
Cisco SD-Access
CloudVision
Comarch Master Data Management
Comarch Social Mining
IBM Datacap
Juniper Apstra
MindSafe
Network Critical
OpenText Core MDR
RapidScale Identity as a Service
Splunk AppDynamics
Splunk User Behavior Analytics
Terraform
TeskaLabs SIEM
ThreatSync

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

$4,250
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Cisco

Founded

1984

Country

United States

Website

www.cisco.com/c/en/us/solutions/data-center-virtualization/application-centric-infrastructure/index.html

Vendor Details

Company Name

Broadcom

Founded

1991

Country

United States

Website

www.vmware.com/products/cloud-infrastructure/nsx

Product Features

Network Automation

Compliance Monitoring
Configuration Backup
Configuration Changes
Network Orchestration
Performance Monitoring
Tool Access Control
Vulnerability Assessments

Product Features

Network Automation

Compliance Monitoring
Configuration Backup
Configuration Changes
Network Orchestration
Performance Monitoring
Tool Access Control
Vulnerability Assessments

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Virtualization

Archiving & Retention
Capacity Monitoring
Data Mobility
Desktop Virtualization
Disaster Recovery
Namespace Management
Performance Management
Version Control
Virtual Machine Monitoring

Alternatives

Alternatives

Cisco ACI Reviews

Cisco ACI

Cisco
VMware NSX Reviews

VMware NSX

Broadcom
Contrail Networking Reviews

Contrail Networking

Juniper Networks