VMware NSX: Secure and Flexible Network Virtualization
Why do you need VMware NSX?
Standing still is not an option. If you want to achieve the required security, you have to break new ground. The new generation of mobile workers wants flexibility. They use multiple mobile devices to work anytime and anywhere. This of course, implies many additional security issues. Hackers are lurking around the corner. And we must admit, it has become a very lucrative business, just think of ransomware. Companies are paying large sums to avoid image damage. Brand protection is of utmost importance. One breach can destroy your good name forever.
Therefore, the road from your source to your devices must be highly secure. End-to-end security is crucial, but higher security often compromises flexibility. The more security, the harder to adapt things. We all know that making changes in your physical datacenter or on your network takes some time… If you want flexibility and agility on your network without compromising your security: think VMware NSX!
What is VMware NSX?
VMware NSX is the network virtualization platform that enables the implementation of virtual networks on your physical network and within your virtual server infrastructure. It delivers the operational model of a virtual machine for the network. NSX can be categorized as a Software-Defined Networking (SDN) solution that allows network administrators to programmatically initialize, control, change, and manage network and security behavior dynamically.
Similar to virtual machines for compute, virtual networks are programmatically provisioned and managed independent of the underlying hardware. This is very cost effective because you do not need to make changes in your physical network. All updates and adaptations can be performed remotely and much quicker and in an automated way.
NSX reproduces the entire network model in software, enabling any network topology—from simple to complex multi-tier networks—to be created and provisioned in seconds. It enables a library of logical networking elements and services, such as logical switches, routers, firewalls, load balancers, VPN, and workload security. Users can create isolated virtual networks through custom combinations of these capabilities.