Empower network and application security teams to deliver granular security and segmentation posture, simplify policy compliance analysis, and streamline security operations with VMware NSX Intelligence, a distributed analytics engine built and managed natively within NSX.
Close Data to Insights Gap with NSX Intelligence
Learn how NSX Intelligence delivers continuous data center-wide visibility and radically simplifies network and micro-segmentation.
Struggling to Implement Network and Micro-segmentation?
See how NSX Intelligence can help overcome the common barriers to network and micro-segmentation.
Visualize and gain deep insights into all flows across the entire data center with stateful layer 7 inspection and complete workload context, eliminating security blind spots and accelerating incident remediation.
Slash tool sprawl and ramp up collaboration between infrastructure and security teams by embedding security operations consoles, firewall policy recommendations, and management within the NSX UI.
Eliminate the network overhead of duplicating packets — and the complexity of managing large centralized appliances — with an analytics engine that’s built right into the hypervisor.
Simplify operationalizing segmentation with a seamless user experience that combines automated firewall policy recommendations, iterative policy workflows, and real-time visualization of application dependencies and security policies.
Rely on a complete record of every flow, from every workload, with continuous analysis. Overlay policies against actual flows to highlight misconfigurations, policy exceptions, and non-compliant flows between workloads or security scopes.
Get detailed drill-down topology visualization within the NSX console with complete inventory and meta-data of every workload, continuous layer 7 analysis of every flow without sampling, eliminating any blind-spots in security visibility.
Proactively detect anomalous behavior in network traffic patterns with built-in detection for classic attack techniques such as network scans, exfiltration over alternate protocols, mismatched application layer protocols, etc.