Flow Network Security

Enterprise Network Security for Multicloud Apps and Data

Security is complex, but protecting critical assets shouldn't be. Flow Network Security creates software-based firewalls for your critical apps and data without the management overhead.

Simplify, automate, and harden critical data against cyber threats

Threat actors are relentless, are your security tools? The Nutanix platform establishes a defense-in-depth foundation to help you create a rock-solid foundation for an ever-changing threat landscape.

graphic to represent App-Centric Policies

App-Centric Policies

Focus on application business intent. Abstracting the policy config from the network layer

graphic to represent Granular Control

Granular Control

Granular control over traffic between applications, limiting the spread of threats.

graphic to represent Dynamic Policy Enforcement

Dynamic Policy Enforcement​

Policies can be dynamically enforced as applications move, ensuring continuous protection.

Turnkey cybersecurity for end-users

Understand application communication

Visually map new or existing application workflows at a port level to better control access or application communications. Leverage this visibility to define and validate least-privilege policies, enabling rapid detection of unexpected flows and potential security anomalies.

User-centric identity and malware protection

Enhance end-user security by leveraging identity to control network access to workloads and data (directory-based) while blocking the spread of malware and ransomware with microsegmentation. Reduce lateral movement risk by eliminating reliance on rigid network constructs that cannot adapt to modern workload mobility.

Ensure access compliance

Easily segment application and data access without physically managing and building compliant networks using ring fencing and audits. Deploy standardized, repeatable policies across environments while generating comprehensive audit evidence with minimal manual intervention.

Enterprise-grade defense-in-depth for apps and data

Software-defined firewalls for apps and data

Easily create Zero Trust-focused tagged firewalls to segment and protect your users, apps, and data from cyber threats without disrupting your current infrastructure.

Visibility to help comply and discover

Gain policy-driven visibility into application communications and security posture from a single dashboard.

Network threat protection

Enforce network-level segmentation between application tiers using ports and protocols, with optional Layer 7 inspection via Flow Network Security partner integrations.

graphic to represent Application process

Increase your defense-in-depth strategy with partner integrations

How it works

graphic to represent Flow Network Security

Flow Network Security: Securing Your Databases

Learn how Nutanix Flow Network Security makes it simple to secure access to your database servers.

graphic to represent Securing Your Databases

Real-World Use Cases for Flow Network Security

Use Case 1: Virtual Desktop Infrastructure (VDI) Security

Challenge: Prevent virtual desktops from infecting each other when users download malware
Solution: Microsegmentation isolates each desktop, limiting the blast radius of infections
Outcome: [Customer metric - e.g., "Reduced security incidents by 75%"]

Use Case 2: Environment Isolation (Dev/Test/Prod)

Challenge: Separate Test/Dev from Production without dedicated hardware
Solution: VPCs provide logical network isolation with policy enforcement
Outcome: [Customer metric - e.g., "Eliminated need for separate network infrastructure"]

Use Case 3: Ransomware Mitigation

Challenge: Limit lateral movement during ransomware attacks
Solution: Zero trust model with default deny policies prevents unauthorized traffic
Outcome: [Industry stat - e.g., "Stops 95% of ransomware lateral movement attempts"]

Use Case 4: Multi-Tenant Service Provider

Challenge: Isolate customer workloads while sharing physical infrastructure
Solution: VPCs with overlapping IP address support enable true multi-tenancy
Outcome: [Service provider quote about tenant density improvements]

Use Case 5: Hybrid Cloud Migration

Challenge: Seamlessly connect on-premises VMs with cloud workloads
Solution: Flow Virtual Networking with VPN connects to NC2 on AWS/Azure
Outcome: [Migration time reduction metric]

How Nutanix Flow Network Security Compares to Alternatives

CapabilityNutanix FlowVMware NSXStandalone Microsegmentation Tools
Deployment TimeHours (point-and-click)Weeks (complex setup)Days to weeks
Management InterfaceUnified (Prism Central)Separate NSX ManagerSeparate console
Licensing ModelIncluded with NCI Pro/UltimatePer-CPU or per-VM licensingPer-VM or per-host fees
Hypervisor DependencyIntegrated with AHVRequires vSphereAgent-based (multi-hypervisor)
Learning CurveLow (familiar interface)High (new skillset required)Medium to high
Hardware RequirementsNone (software-defined)Controller VMs requiredAppliances may be needed
VPC Support✓ Native✓ Via NSX-T✗ Not applicable
Service Chaining✓ Supported✓ SupportedVaries by vendor

Nutanix is trusted by 25,000+ customers

Try Flow Network Security free in your environment!

Click here to enable your free 60-day evaluation.

FAQs

Flow Network Security (FNS) applies application‑centric microsegmentation using dynamic categories instead of static IP addresses. As workloads move or scale, security policies automatically follow them. FNS provides:

  • Visualization of network flows to enable application dependency mapping
  • Granular port and protocol‑based segmentation for east‑west traffic
  • Identity‑aware dynamic security policy based on Active Directory  group membership
  • Integration with partner Layer‑7 security engines
  • Centralized policy management, compliance reporting, and continuous monitoring

This approach simplifies cloud microsegmentation, reduces operational overhead, and supports Zero Trust security models.

Traditional hardware firewalls focus on perimeter security and rely on static IP‑based rules. FNS provides software‑defined microsegmentation that:

  • Applies application‑context and identity‑based policies
  • Decouples security policy from network design or complex VLAN segmentation
  • Simplifies ongoing operations with automation
  • Scales seamlessly across virtualized and multicloud environments

This results in faster microsegmentation, reduced complexity, and fewer manual errors.

FNS stands out among microsegmentation platforms because it offers:

  • Operational simplicity: Managed from familiar Prism Central interface.
  • Rapid deployment: microsegmentation in minutes, not weeks
  • App and identity‑aware segmentation: tied to business intent
  • Multicloud and Kubernetes‑ready architecture: for hybrid workloads

This makes FNS ideal for organizations seeking Zero Trust microsegmentation without infrastructure complexity.

FNS aligns with widely adopted cybersecurity frameworks used to guide microsegmentation and Zero Trust architectures, including:

  • Zero Trust Network Access (ZTNA)
  • NIST SP 800‑207 Zero Trust
  • CIS Benchmarks for workload isolation
  • PCI‑DSS, HIPAA, and SOX segmentation controls
  • MITRE ATT&CK lateral movement mitigation techniques

 

Yes. FNS uses microsegmentation and identity‑aware controls to reduce east‑west lateral movement. Even if ransomware compromises a workload, segmentation boundaries restrict access to other systems, significantly reducing the blast radius across the data center or cloud.

Absolutely. FNS is designed for multicloud microsegmentation with consistent security enforcement across:

  • On‑prem Nutanix environments
  • Public clouds (AWS, Azure, GCP) via Nutanix Cloud Clusters (NC2)
  • Kubernetes environments running on Nutanix Kubernetes Platform (NKP)

Policies follow the application regardless of where it runs.

FNS is tightly integrated with Nutanix AHV for optimal automation and visibility.

Most organizations begin deploying microsegmentation policies the same day thanks to:

  • Detailed visualization of network traffic
  • Policy impact monitoring prior to enforcement
  • No physical or network redesign
  • Category‑based, intent‑driven policies
  • Native integration with Prism

Traditional microsegmentation tools may require weeks or months- FNS makes it fast and accessible.

Yes. FNS supports service insertion for integrating third‑party L7 firewalls, IDS/IPS, and threat detection platforms. This allows customers to combine microsegmentation with deeper inspection from best‑of‑breed partners.

Nutanix Flow Network Security is a software-defined networking (SDN) and security solution natively integrated into the Nutanix Cloud Platform (AHV hypervisor and Prism management). It eliminates the complexity of traditional hardware-based networking by abstracting network services into software, allowing them to travel with workloads wherever they reside.