Try our new research platform with insights from 80,000+ expert users
Architect at Computacenter
Real User
NSX offers agility and provides mature microsegmentation
Pros and Cons
  • "The initial setup was straightforward. You just have to click it and follow the manuals."
  • "The next release of NSX should try to make Kubernetes and container integration a little easier than it is now. It's quite a complicated process."

What is our primary use case?

Our primary use cases of this solution are hybrid, cloud, private cloud, and automation.

How has it helped my organization?

VMware NSX has improved our customers' organizations through its automation of security policies, delivery of policy by intent, rapid provisioning, and removing security as being a blocker.

What is most valuable?

Microsegmentation and automation are two features we have found to be the most valuable. 
The microsegmentation feature is a mature feature used in NSX-V and NSX-T.

We are trialing Layer 4 and 7 load balancing with this solution, as it's very new.

What needs improvement?

The next release of NSX should try to make Kubernetes and container integration a little easier than it is now. It's quite a complicated process.

I would rate this solution an eight because it doesn't have Kubernetes integrations yet, and it isn't multi-federated. Those are some of the things that need to be added to the product. 

Buyer's Guide
VMware NSX
December 2024
Learn what your peers think about VMware NSX. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
831,265 professionals have used our research since 2012.

What do I think about the stability of the solution?

This solution is stable and robust. We've done failover testing and it kept working. 

What do I think about the scalability of the solution?

I have found this solution to be scalable, more so now with NSX-T than NSX-V.

How are customer service and support?

Their technical support team is firm. It's mature, and they've got a good support team.

Which solution did I use previously and why did I switch?

Business is demanding more agility and capability than ever before. NSX offers solutions to those business-level problems.

How was the initial setup?

The initial setup was straightforward. You just have to click it and follow the manuals. Deploying the infrastructure code can be more complex.

Which other solutions did I evaluate?

We looked at Nuage and Cisco. We decided to go with NSX because they have a good understanding and a strong VMware stack.

What other advice do I have?

I would advise a colleague at another company who is researching NSX to know how the technology can answer their customer's business use cases. For those who say NSX is complex, I would agree that it can be complex but you can abstract that complexity through automation and Service Catalogs to make it easier for end-users to consume.

Disclosure: My company has a business relationship with this vendor other than being a customer: Partner.
PeerSpot user
PeerSpot user
VMware NSX Engineer at a tech services company with 201-500 employees
Video Review
Real User
Enables us to put our network onto any network there is, we just spin something up whenever we need to
Pros and Cons
  • "NSX gives us the ability to put our network, NSX, onto any network there is, which allows us not to have to go to the network team to create networks our VLANs for networks."
  • "It still needs to grow. There are still some features that it doesn't do, like it doesn't do multicasting."

What is most valuable?

NSX gives us the ability to put our network, NSX, onto any network there is, which allows us not to have to go to the network team to create networks our VLANs for networks. We can just create all our networks right from the start. Whenever we want to spin something up, we just spin it up.

What needs improvement?

So far, what I've seen here at VMworld, it seems to be improving just the same line as everything else. It's going to expand, grow and grow and grow. It's going everywhere. It's not just going into "I'm using the V version of NSX," but it's going out to every environment. It's going out to all the clouds so that even if you have the V, you can also use the cloud part and put it into there, so it seems to be growing where it needs to go.

It still needs to grow. There are still some features that it doesn't do, like it doesn't do multicasting. It does do some multicasting, but it's within their own infrastructure, but multicasting in general, it doesn't do.

What do I think about the stability of the solution?

So far, it's been very stable. I've used it since the very beginning and it's been very stable in the beginning, and as they've added more and more features, it's become more and more stable in the environment; that is, better in the environment because we're able to use more and more features within it.

What do I think about the scalability of the solution?

So far it's been very scalable, and with the new versions that are coming out, it's even more and more scalable. They've added more and more features of routing that they didn't have in the first versions, which allow it to be more scalable. It's become better than the actual infrastructure, the original network infrastructure that's there, because we can lay it on anything and it will scale to any part of the network that we want.

How is customer service and technical support?

So far, I've had very good tech support. A lot of the guys we talk to are very knowledgeable, and if they don't know it, they're able to talk to others within their group that will know it. So I've gotten very good results from them.

How was the initial setup?

The installation is very straightforward. The part that gets complex is how you do your routing, how you do your ESGs, how you set up the actual network itself within it. But once it's set up, you just create virtual switches and put any network you want on it. It becomes almost seamless.

What other advice do I have?

In terms of criteria for selecting a vendor, it's a little of everything. It's the reputation that they have, but it's also more of the tech support, as well as the documentation that they have, because not everybody in their environment, as well as your own environment, knows everything. So you have to be able to look up stuff and have that knowledge to be able to do it, as well as allow them to do it.

They have a lot of good KB articles on what's going on, so if you need a problem solved, you look at that first and you'll be able to find it pretty easily.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
VMware NSX
December 2024
Learn what your peers think about VMware NSX. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
831,265 professionals have used our research since 2012.
PeerSpot user
Owner at David Strom Inc.
Writer
ExpertTop 20
A better way to do breach detection using advanced sandboxing methods

What is most valuable?

The Internet is a nasty place, and getting nastier. Current breach detection products using traditional anti-malware sandbox technologies can’t keep up with advanced persistent and hyper-evasive threats that pummel enterprise networks on an hourly basis. Malware authors encode their exploits with a number of operational vectors, so in case one entry point doesn’t work they can still find a way into your network to do their dirty work. And as more businesses hire more outsourced consultants, part-time workers, and employ mobile devices, they open up additional mechanisms for malware to enter their corporate networks.

Some traditional AV and endpoint protection vendors have responded to these threats by adding features to their security products to do a better job of anticipating badly behaving packets coming through their detectors. They make use of limited virtual machines or operating system emulators to view how a piece of malware operates. That is great, but it isn’t enough. Many malware authors can detect when these simulated environments are active and can evade detection accordingly. For example, some exploits such as W32.DelfInj can literally go to sleep for several days to avoid any detector that will just scan an infected system for the first several minutes.

1aWhat is needed is a next-generation sandbox that can correlate a series of particular breach events add IP and object based reputation analysis and do this in near real-time. This is what the Lastline Breach Detection Platform does. What makes them unique is their range of discovery, the way they can effectively mimic actual PC or smartphone endpoints to examine malware behavior.

Download my full review of their system here.

How has it helped my organization?

Lastline has four major components:

  • Network sensors. Lots of security tools have sensors, and certainly this is the cornerstone of any modern security tool. What makes Lastline more interesting is that it combines IP and domain reputation analysis with malware fingerprinting techniques. 
  • Advanced sandbox screening tool. Suspicious objects that are suspected to be zero-day threats are collected from the sensors and analyzed with the Lastline next-generation sandbox, which emulates a complete endpoint system (OS, memory, and peripherals). Other sandboxing tools leave small in-guest code stubs that can reveal they aren’t “real” endpoints; Lastline doesn’t have these clues for malware to key into and looks just like regular computers. 
  • Reporting and threat analysis tool. Low-level event data is then collected and correlated into a particular security incident, which then updates an online threat database. For example, just by clicking on a few different menu items, we can see how often the same infection was downloaded by a particular endpoint, or why a particular event led to other activities across our network, or how a piece of malware was attached to a series of different email messages.
  • Rich threat intelligence of advanced threats.Known exploits and IP based systems associatedwith advanced malware are highly dynamic and traditional signature-based knowledge bases are ill equipped to keep up. Lastline threat intelligence draws on its global collection of next-generation sandboxes.

What needs improvement?

They just announced added Mac OS X support, which I didn't get to test. 

What was my experience with deployment of the solution?

It is a bit tricky to install the various components and to get it set up properly. But once you do, you can take full advantage of its features. 

What do I think about the stability of the solution?

No.

What do I think about the scalability of the solution?

No, indeed this is one of its main benefits. You can scale it up to handle very large networks with their modular and SaaS-based tools. 

To add flexibility to its system, both the next-generation sandbox and reporting tool can be either hosted or installed on-premises.

Which solution did I use previously and why did I switch?

Their core idea is to run a piece of suspected malware in such a way as to provide the ultimate examination of its operations. Suspected code is extracted from the network traffic flow, analyzed andcorrelated with other network-level events to provide a full picture of what happened. It has one of the most throughout analysis sandbox engines. But what is more important is how they are able to provide actionable intelligence to a wide variety of leading security vendors’ intrusion prevention and unified threat management platforms from WatchGuard, Barracuda, TippingPoint, Juniper, Tripwire and others. Through a combination of application programming interfaces, Lastline can send and receive firewall blocking rules and breach event data to/from the appropriate systems that you have already purchased, so that these threats can be quickly stopped.

Yes, there are other sandboxing securing tools out there, but they aren't as thorough as what Lastline does.

What about the implementation team?

Vendor team was first rate.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Shubham Chandra - PeerSpot reviewer
Solution Architect at HCL Technologies
Real User
Excellent support, reliable, and beneficial micro-segmentation
Pros and Cons
  • "The solution is very good at micro-segmentation."
  • "VMware NSX provides a lot of automation capabilities, but there is still room for improvement."

What is our primary use case?

VMware NSX can be used for micro-segmentation in the network space.

What is most valuable?

The solution is very good at micro-segmentation.

What needs improvement?

VMware NSX provides a lot of automation capabilities, but there is still room for improvement.

For how long have I used the solution?

I have been using VMware NSX for approximately 14 years.

What do I think about the stability of the solution?

The stability of VMware NSX is good.

VMware has been the market leader for stability. If you look at the competitors,  I would rate that it's one of the top five solutions which I have worked on in this space.

How are customer service and support?

VMware NSX provides excellent support.

What other advice do I have?

If you are a new user and are looking for overall automation skills, then VMware vRealize Automation fits the purpose.

If the new user is looking for micro-segmentation in the network space, then  VMware NSX is the best solution. It has a very good capability in terms of micro-segmentation. Although, there are certain capabilities of the Layer 7 functionality, which other solutions have available, specifically from the Cisco stack. However, VMware NSX is an overall good solution when it comes to virtualization and Automation.

I rate VMware NSX a nine out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
reviewer1039620 - PeerSpot reviewer
Head of Business Development and Partners Management at a comms service provider with 1,001-5,000 employees
Real User
Great management platform, good dashboard, and easily integrates with other VMware solutions
Pros and Cons
  • "I really like the management dashboard, the tailor-made assurance, the telemetry, and the ease of integration with all other solutions of VMware, such as vSphere."
  • "They have to work more and more on the integration for public cloud services and have cyber security platform integration."

What is our primary use case?

This product is a software-defined data center with a cloud-native approach. We mainly use it for application migration of some of the architecture to containerized solutions.

What is most valuable?

The management platform is great. I really like the management dashboard, the tailor-made assurance, the telemetry, and the ease of integration with all other solutions of VMware, such as vSphere. They also integrate well with other third-party security platforms. It's very easy to give an integration of the cloud tenant of NSX. It's very easy to build and migrate a cloud project.

What needs improvement?

It's very complex. However, I don't work directly with it typically.

We had started two projects for integration with OpenShift and OpenStack with NSX. It was declared by VMware that this is possible, however, the process is very tricky. The full integration was delayed to wait for a new official release. I don't know the actual stage, as this is something that happened more than a year or two ago. It was the beginning of the pandemic. In any case, the integration with OpenShift, the open-source cloud platform, at the time was in need of work and was (and remains) something required from our customers. 

They have to work more and more on the integration for public cloud services and have cyber security platform integration.

For how long have I used the solution?

I've been using the solution for about five years. 

What do I think about the stability of the solution?

The solution is stable. There are no bugs or glitches. It doesn't crash or freeze.

What do I think about the scalability of the solution?

It seems to scale. However, we don't have enough data in order to say how much clients scale out or the performance when a company is trying to scale out an NSX-T environment. We are not a cloud provider. We don't have a cloud environment to test it.

In terms of who is using it on our side, we have about five to seven people who have the operational capability on NSX-T. 

In our organization, we use only a small NSX-T cluster. We have a bigger one for our lab. I can't speak to the usage of our customers where we deployed it.

How are customer service and support?

We're pretty satisfied with technical support.

Which solution did I use previously and why did I switch?

We previously used OpenShift together with OpenStack. It's a different platform. One is open-source and the other is a commercial platform with vendor support and established customers.

How was the initial setup?

The initial setup is very simple. It's not overly complex.

All the VMware platforms are really easy to implement. They require knowledge, of course. However, if you follow the procedure, the output is good.

The deployment itself doesn't take more than two or three days. 

That said, we have knowledgeable workers that have done NSX and the previous release (not the NSX-T). They have done deployments several times. That's why, each time, it's really easy to do. If you have to do that in a customer production environment, it will take say no more than one week including both the deployment in production and the training for the customer.

We have three people that can handle deployment and maintenance tasks. 

What about the implementation team?

I can handle the implementation myself. We also have trained people inside our organization. We don't need the assistance of integrators or consultants.

What's my experience with pricing, setup cost, and licensing?

I can't speak to the exact licensing costs of the solution.

What other advice do I have?

Most deployments are on-premises or via a private cloud in the case of enterprise clients.

We started several deployments with NSX-T version 3. I can't speak to which version we are on currently.

It works and it is powerful in terms of governance, telemetry, ease of use, and ease of deployment. The operation is very simple. Of course, you have to train someone in order to use it effectively. It's very easy to find training. For us, it's good to have a third party with enough experience in order to support other projects where we don't have enough people in order to do that.

I'd rate the solution at an eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
PeerSpot user
Manager at a computer software company with 10,001+ employees
Real User
Easy to set up, with good features for automation and software-defined networking
Pros and Cons
  • "This is the most scalable product of its type."
  • "The training costs a minimum of $3,000, which is expensive and should be reduced."

What is our primary use case?

We use this product for micro-segmentation and network function virtualization.

What is most valuable?

This is the most scalable product of its type.

It is very good for automation and software-defined networking.

What needs improvement?

I would like to see improvements made to the certification process. As it is now, you have to do the training with VMware itself, and you have to spend a lot of money doing it, which is very discouraging. 

If you compare other certifications especially from the cloud providers, you can get trained from your choice of training providers and not very expensive or learn on your own at your pace, prepare for exams and pass and your certificate will be issued. In contrast, you have to register under VMware to get training done at minimum of $3000 before your certificate is issued to you. The training costs a minimum of $3,000, which is expensive and should be reduced. 

For how long have I used the solution?

I have been using this product for more than a year.

What do I think about the scalability of the solution?

Outside of the cloud infrastructure, it is the most scalable network product that I have worked with. It is used in a server farm that contains about 2,000 servers.

How are customer service and technical support?

We have not needed to contact technical support.

Which solution did I use previously and why did I switch?

We did not use another network function virtualization product prior to this one.

How was the initial setup?

The initial setup is very straightforward. Our deployment took three months, end to end.

What about the implementation team?

We had a consultant to assist us with the deployment.

We have two or three in-house staff who manage and maintain the solution.

What's my experience with pricing, setup cost, and licensing?

The licensing fees are expensive and we pay on a yearly basis. However, we were able to leverage some of the licenses that we had for an affiliated product, ESXi. There are no costs in addition to the standard licensing fees.

Which other solutions did I evaluate?

We chose VMware NSX-T because it was the most scalable.

What other advice do I have?

This is a good product and one that I recommend for anybody who does not want to change their existing infrastructure. The problem is that they have to compete with the likes of AWS and cloud providers.

I would rate this solution an eight out of ten.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer1164561 - PeerSpot reviewer
Senior Cloud Consultant with 201-500 employees
Reseller
Good security with improved scalability and allows for the creation of virtual access networks
Pros and Cons
  • "One of the big improvements between the NSX-V and NSX-T is that in NSX-T you are no longer dependent on V-Center anymore."
  • "Some configuration maximums are limiting to the user, especially when it comes to the deployment of very, very large environments."

What is our primary use case?

I work with two different companies with different large cloud environments. 

This product is a software-defined network, and that allows you to create virtual access networks and managing security to allow for different workloads.

What is most valuable?

The solution offers a very good software-defined network that allows you to create virtual access networks. It's very helpful at allowing you to manage security to allow for different workloads. 

One of the big improvements between the NSX-V and NSX-T is that in NSX-T you are no longer dependent on V-Center anymore. That was a huge improvement due to the fact that it allows you to take into account new cases, and have better scalability, among other improvements.

What needs improvement?

There is always room for improvement, in any solution. 

In some cases, this product is very technical. 

Some configuration maximums are limiting to the user, especially when it comes to the deployment of very, very large environments. There are limits to the number of firewall rules, security groups, et cetera. With the number of security groups, you can nest all these limits, however, somehow limiting the use cases may be restrictive for the free design of different use cases.

For how long have I used the solution?

I've been working with the solution for a while at this point. It's been at least a couple of years.

What do I think about the scalability of the solution?

The scalability capabilities have improved in NSX-T. It is much better than when the NSX-V version was out.

I work with two different clients, both of which are quite sizeable. They have thousands of machines and thousands of security groups.

Which solution did I use previously and why did I switch?

I didn't work with another solution per se, however, the previous triggered cloud tool that we had was by VMware. It was not really, at least at the very beginning, a tool for a software-defined network, however, there were some elements that allowed you to create customer networks practically on the fly. There were also some other network visualization techniques, which allowed you actually to encapsulate the traffic and to create networks on the fly. You had some security constructs, including tenents constructs, that you can find somehow in the VRA today. The tenant concept is also present in NSX.

What's my experience with pricing, setup cost, and licensing?

Our customers can use the solution for free, however, this comes with restrictions.

What other advice do I have?

We are consultants and integrators. We have a business relationship with VMware.

I am working with both NSX-V and NSX-T. The latest one is actually NSX-T.

On a scale from one to ten, I would rate it at an eight.

Disclosure: My company has a business relationship with this vendor other than being a customer: reseller
PeerSpot user
Solution2aa6 - PeerSpot reviewer
Solutions Architect at a retailer with 10,001+ employees
Real User
Allows us to create very specific segments for each part of the company and the microsegmentation feature is easy to use
Pros and Cons
  • "You can easily integrate this with other VMware products. It is a robust solution."
  • "If you're worried that NSX is too complex, I would tell you to take another look. If you compare NSX to a similar solution you might find it to be a bit more complex. Usually, the guy that comes in to implement NSX isn't the network guy and will lack the knowledge for the program. He can lack the knowledge for this program and will therefore think it's complex. You need somebody with network experience."

What is our primary use case?

We use this solution for extended on-premise capabilities. We've been using it for five years.

How has it helped my organization?

I use the cloud now but in the past, we were able to create very specific segments for each part of the company. 

What is most valuable?

We like that we can split networks. Layers 4 and 7 are nice. We like that load balancing is easy for the person running it and certain features like the web bouncers F5. 

We like that the microsegmentation feature is easy to use. It is easy to segment the network.

What needs improvement?

At the moment it hasn't helped us prolong our hardware refresh.

For how long have I used the solution?

Three to five years.

What do I think about the stability of the solution?

You can easily integrate this with other VMware products. It is a robust solution.

What do I think about the scalability of the solution?

The scalability is good. 

How are customer service and technical support?

I never had to use their technical support. 

Which solution did I use previously and why did I switch?

We were trying to save money and trying to use a more flexible solution so we decided to go with NSX as opposed to another hardware or solution.

How was the initial setup?

I found that it was easy to install. In fact, I installed it myself.

What was our ROI?

We saw ROI within the first year and a half. 

What's my experience with pricing, setup cost, and licensing?

It has helped us save CapEx but I'm not sure exactly how much. 

What other advice do I have?

I rated this solution a nine because it's easy to use. It has a lot of capabilities, like microsegmentation, which is very good.

If you're worried that NSX is too complex, I would tell you to take another look. If you compare NSX to a similar solution you might find it to be a bit more complex. Usually, the guy that comes in to implement NSX isn't the network guy and will lack the knowledge for the program. He can lack the knowledge for this program and will therefore think it's complex. You need somebody with network experience. 

Disclosure: My company has a business relationship with this vendor other than being a customer: Partner.
PeerSpot user