Introducing G2.ai, the future of software buying.Try now
SecureW2 JoinNow
Sponsored
SecureW2 JoinNow
Visit Website
Product Avatar Image
Nutanix Flow Virtual Networking

By Nutanix

Unclaimed Profile

Claim your company’s G2 profile

Claiming this profile confirms that you work at Nutanix Flow Virtual Networking and allows you to manage how it appears on G2.

    Once approved, you can:

  • Update your company and product details

  • Boost your brand's visibility on G2, search and LLMs

  • Access insights on visitors and competitors

  • Respond to customer reviews

  • We’ll verify your work email before granting access.

Claim Now
3.5 out of 5 stars
5 star
0%
3 star
0%
2 star
0%
1 star
0%

How would you rate your experience with Nutanix Flow Virtual Networking?

SecureW2 JoinNow
Sponsored
SecureW2 JoinNow
Visit Website
It's been two months since this profile received a new review
Leave a Review

Nutanix Flow Virtual Networking Reviews & Product Details

Product Avatar Image

Have you used Nutanix Flow Virtual Networking before?

Answer a few questions to help the Nutanix Flow Virtual Networking community

Nutanix Flow Virtual Networking Reviews (2)

Reviews

Nutanix Flow Virtual Networking Reviews (2)

3.5
2 reviews

Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Amitoj W.
AW
Associate Consultant
Mid-Market (51-1000 emp.)
"Flow Virtual Networking Review"
What do you like best about Nutanix Flow Virtual Networking?

Virtual private clouds (VPC) and other cutting-edge virtual networking constructs are combined in Flow Networking for AHV virtualization to bridge conventional and cloud-native network models. By using a software-defined approach, the infrastructure is made simpler and doesn't require pricey hardware segmentation solutions or more intricate and static physical network topologies. Review collected by and hosted on G2.com.

What do you dislike about Nutanix Flow Virtual Networking?

Not every port receives a data transfer through this. However, Flow Virtual Networking has various drawbacks, one of which is bandwidth waste, which results in the waste of resources from blocked ports. The second is that if a chosen link fails, no other link is chosen, unlike the link connected to a blocked port, as a blocked port is not capable of sending data. Review collected by and hosted on G2.com.

Verified User in Media Production
UM
Mid-Market (51-1000 emp.)
"Competent and Reliable"
What do you like best about Nutanix Flow Virtual Networking?

Very streamlined and helpful when working with our Corporate Entity with their own various networks Review collected by and hosted on G2.com.

What do you dislike about Nutanix Flow Virtual Networking?

Could do with a visual upgrade to the UI Review collected by and hosted on G2.com.

There are not enough reviews of Nutanix Flow Virtual Networking for G2 to provide buying insight. Below are some alternatives with more reviews:

1
AlgoSec Logo
AlgoSec
4.5
(196)
AlgoSec is a business-driven security management solution.
2
Check Point CloudGuard Network Security Logo
Check Point CloudGuard Network Security
4.5
(153)
Check Point CloudGuard Network Security for private and public cloud platforms is designed to protect assets in the cloud against the most sophisticated threats.
3
Faddom Logo
Faddom
4.5
(106)
With Faddom, you gain granular visibility of your entire IT environment, mapping your applications, networks and dependencies in real-time. Uniquely, Faddom works without credentials, firewalls or agents. Faddom is completely platform-agnostic and has limitless use-cases from cloud migration to cost optimization.
4
Tufin Orchestration Suite Logo
Tufin Orchestration Suite
4.4
(95)
Tufin Network Security Policy Management (NSPM) e automates and accelerates network configuration changes while maintaining security and compliance.
5
SecureW2 JoinNow Logo
SecureW2 JoinNow
4.7
(91)
The full JoinNow Suite contains everything you need to transition to secure passwordless authentication. It includes an intuitive managed PKI for certificate creation and management, as well as best-in-class certificate delivery solutions such as a dissolvable self-service configuration client for unmanaged devices and automatic enrollment gateways for managed devices. The platform also offers a Cloud RADIUS server, designed from the ground up for passwordless security and works seamlessly with Cloud Identity Providers.
6
Foxpass by Splashtop Logo
Foxpass by Splashtop
4.8
(41)
Advanced access control for servers and WiFi. Foxpass increases your organization's server and network security by ensuring employee accounts have access only to what they need.
7
Zscaler Zero Trust Cloud Logo
Zscaler Zero Trust Cloud
4.5
(41)
Zscaler global cloud delivers the entire gateway security stack as a service. By securely connecting users to their applications, regardless of device, location, or network, Zscaler is transforming enterprise security.
8
Opinnate Logo
Opinnate
4.8
(33)
Opinnate offers an innovative automation technology that tackles policy management holistically. Designed by security experts that have decades long executive and hands-on experience, Opinnate platform not only addresses security policy management, policy analysis, policy optimization and policy change operations under the same roof but also handles approval processes to offer an end-to-end customer experience. Opinnate stands out by removing dependencies to external tools and costly prior work.
9
Illumio Logo
Illumio
4.6
(19)
Illumio reduces risk and increases cyber resiliency for modern organizations by providing visibility and protection of critical applications and data. As the only proven segmentation platform that is purpose-built for the Zero Trust security model, Illumio allows organizations to see their risk, isolate breaches, and better protect their data.​ The world’s leading organizations across the industries rely on Illumio's Zero Trust segmentation.
10
Cisco Identity Services Engine Logo
Cisco Identity Services Engine
4.2
(10)
Cisco Identity Services Engine is a comprehensive network access control solution that serves as the policy decision point in a zero-trust architecture. It integrates intelligence from across the security stack to authenticate users and devices, enforce policies, and automatically contain threats. By providing centralized control over network access, ISE ensures that only trusted users and devices can connect to network resources, thereby enhancing security resilience and operational flexibility. Key Features and Functionality: - Centralized Network Access Control: ISE allows administrators to define and enforce access policies from a single interface, simplifying management and ensuring consistent security across the network. - Comprehensive Visibility: The system offers detailed insights into all endpoints and users connected to the network, including device types, locations, and access methods, facilitating informed decision-making and rapid response to potential threats. - Automated Threat Containment: ISE integrates with various security solutions to detect and respond to threats in real-time, automatically isolating compromised devices to prevent the spread of malware or unauthorized access. - Device Profiling and Posture Assessment: The platform continuously monitors device compliance with security policies, ensuring that only devices meeting organizational standards are granted access. - Flexible Deployment Options: ISE supports deployment across multiple environments, including on-premises and various cloud platforms, providing organizations with the flexibility to choose the best fit for their infrastructure. Primary Value and Problem Solved: Cisco ISE addresses the critical need for secure and efficient network access control in today's complex IT environments. By implementing a zero-trust model, it ensures that access to network resources is granted based on strict identity verification and compliance with security policies. This approach mitigates risks associated with unauthorized access, insider threats, and the proliferation of unmanaged devices. Additionally, ISE's centralized management and automation capabilities reduce administrative overhead, enhance operational efficiency, and support business continuity by maintaining a robust security posture.
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
Nutanix Flow Virtual Networking
View Alternatives