NSX

VMware NSX Network
Virtualisation and Security Platform

NSX enables the creation of entire networks in software and embeds them in the hypervisor layer, abstracted from the underlying physical hardware. All network components can be provisioned in minutes, without the need to modify the application.

NSX is now also availble as a service: VMware NSX Cloud delivers consistent networking and security for cloud-native applications. The service improves operational scalability, control, and visibility – with lower OpEx – across native public clouds such as AWS. Visit the new NSX Cloud page for more information.

The Smart Way to Protect Apps

Get accurate threat detection and response for application endpoints, integrated with NSX.

Discover VMware AppDefense »

VMware Cloud on AWS

We've integrated vSphere, vSAN and NSX into an on-demand service that brings your VMware SDDC to the AWS cloud.

Get the Details »

Security

NSX embeds security functions right into the hypervisor. It delivers micro-segmentation and granular security to the individual workload, enabling a fundamentally more secure data center. Security policies travel with the workloads, independent of where workloads are in the network topology.

Application Continuity

NSX abstracts networking from the underlying hardware and attaches networking and security policies to their associated workloads. Applications and data can reside and be accessible anywhere. Move workloads from one data center to another, or deploy them into a hybrid cloud environment.

Automation

NSX lets you treat your physical network as a pool of transport capacity, with network and security services attached to workloads using a policy-driven approach. This automates networking operations and eliminates bottlenecks associated with hardware-based networks.
 

Compliance

NSX enables micro-segmentation and granular security of workloads in virtualised networks, isolating sensitive systems and reducing both risk and scope of compliance. Use NSX to help ensure and demonstrate compliant operations with many regulations such as PCI DSS, HIPAA, FedRAMP, SOC, CJIS, DISA STIG, and more.


Getting Started


RESOURCES