Engineered Differently
By Jason Burns and Eric Walters
Blog Series: “Engineered Differently” is a deep-dive blog series exploring the architectural and technical innovations that set Nutanix Cloud Platform apart—highlighting how its design uniquely enables simplicity, scalability, and resilience across hybrid multicloud environments.
So far in 2025, enterprises have faced a surge in sophisticated cyberattacks — with ransomware, data breaches, and social engineering attacks dominating the threat landscape. AI is playing an increasing role in attacks. Almost 9 in 10 global organizations (87%) faced an AI-powered cyber attack in the last year. Recent cuts in funding for the Cybersecurity and Infrastructure Security Agency (CISA) may add to the cyber risks that enterprises face.
With this as a backdrop, enterprises are looking for ways they can shore up security and increase cyber-resilience. However, the landscape of security and resilience solutions is complex, and some IT vendors still treat security as an add-on rather than building it into their solutions.
At Nutanix, security is built in, not bolted on. By designing in security at every level—platform, data, network, and application—Nutanix Cloud Platform lets you protect your apps and data against cyber attacks and data loss.
Nutanix helps you provide security everywhere while minimizing the complexity of security operations. In a recent survey of Nutanix customers, IDC found that switching to Nutanix Cloud Platform made IT security teams 32% more efficient.
At Nutanix, it’s all about providing layers of protection, starting with hardened infrastructure, adding in virtual networks, VPCs and microsegmentation—all complemented with advanced data protection and rapid recovery. The sections that follow detail how Nutanix goes above and beyond to deliver security at the platform, data, network, and application layers.
When it comes to platform security, enterprises need infrastructure that’s secure out of the box. If your team has to take extra manual steps to ensure security every time you deploy a new server, that’s a disaster waiting to happen. Nutanix relies on a number of built-in technologies to protect its platform:
With traditional infrastructure, staff would spend about 50% of their time on management. Thanks to Nutanix, the same team now saves 3–4 hours per month each, especially due to easier software upgrade processes.
The video below discusses many of the Nutanix platform security features and other features described in this blog.
To help protect data security and data resilience, encryption combined with business continuity and disaster recovery (BCDR) features have become essential. Nutanix differentiates itself from the competition with solutions that deliver this functionality while making these features easy to use.
Nutanix provides strong protection across all RPO and RTO levels, and you don’t need to purchase additional tooling to do site recovery, including recovery to the cloud. By using Nutanix capabilities in place of third-party or application-specific capabilities, you can provide data protection and online DR for the applications in your portfolio with ease and cost efficiency.
Understanding access to our data is very important for us to ensure data is secure, safe, and being used properly. Tools like Data Lens give us the insights we need to understand who is accessing our data, if it’s appropriate access, or if there is an attempt to misuse or attack our data. The forensics and the new permissions and access risk views are important tools to keep our data safe from malicious users, or from threats such as ransomware.
To learn more about Data Lens, watch the following video:
Network security is arguably the hardest part of the security stack to get right. Nutanix differentiates itself with centralized management, seamless hybrid multicloud support, and simple deployment.
Centralized monitoring and management: The Security Central solution, part of the Nutanix Cloud Manager (NCM) suite, is a cloud-based SaaS platform providing centralized security monitoring and compliance support for hybrid multicloud environments. It offers real-time visibility into security posture, identifying vulnerabilities, misconfigurations, and threats across Nutanix clusters, VMs, and public clouds like AWS, Azure, and Google Cloud. Security Central provides valuable information for environments subject to compliance audits, aligning with standards like NIST and PCI-DSS, and delivers actionable insights through a unified dashboard. The software integrates with Flow Network Security for microsegmentation and policy enforcement.
At Nutanix, we believe the keys to achieving application-level security are consistent deployments and upgrades combined with deep packet inspection, and we’ve developed innovative tools to help you deliver that.
Ensuring high levels of security is a key requirement for government implementations, and GDIT is able to provide first-class support for air-gapped environments to its military clients via NKP.
Read the case study.
Before we close, it’s worth considering how Nutanix security stacks up to VMware offerings:
In our next post, we’ll explore how Nutanix delivers zero-touch provisioning, configuration management, and software updates at massive scale.
Have questions or insights? Feel free to reach out—we’d love to hear how your team is tackling hybrid multicloud complexity.
Explore the IDC study to see how Nutanix customers are cutting costs and boosting efficiency. Or discover how Nutanix can simplify and de-risk your migration with a free Test Drive. See firsthand how your workloads run on our platform and plan your move with less complexity and more confidence.
In case you missed it, view the first blog of the Engineered Differently series, “Nutanix Delivers a Uniform Experience Across Datacenter, Edge and Cloud.”
©2025 Nutanix, Inc. All rights reserved. Nutanix, the Nutanix logo and all Nutanix product and service names mentioned are registered trademarks or trademarks of Nutanix, Inc. in the United States and other countries. Nutanix, Inc. is not affiliated with VMware by Broadcom or Broadcom. VMware and the VMware product names recited herein are registered or unregistered trademarks of Broadcom in the United States and/or other countries. All other brand names mentioned are for identification purposes only and may be the trademarks of their respective holder(s). Customer statements on results, benefits, savings or other outcomes depend on a variety of factors including their use case, individual requirements, and operating environments, and should not be construed to be a promise or obligation to deliver specific outcomes