Our security program consists of a risk-based approach that includes administrative, technical and physical safeguards reasonably designed to protect the confidentiality, integrity and availability of Nutanix classified, customer, and partner data. Nutanix's information security program is aligned to the ISF Standard of Good Practice, ISO 27001/2, ISO 27017, ISO 27018, and includes key controls from SOC2.
Learn more about Nutanix capabilities, industry best practices, and techniques to incorporate into your cybersecurity defense strategies for preventing and recovering from ransomware when using a private cloud built on Nutanix.
Nutanix Vulnerability Disclosure Program
At Nutanix, we take the security, integrity and privacy of our products seriously. We are committed to supporting the valuable work that researchers and partners provide to help improve the security of our products and our environments.If you think that you may have found a security vulnerability that affects Nutanix or our customers, we encourage you to learn about our Vulnerability Disclosure Program and submit your findings at hackerone.com/nutanix
How to contact Nutanix about other security related issues
Please send a GPG encrypted email using the public key below to the Nutanix Security Engineering team at email@example.com. All non-security related correspondence (using the GPG key below?) will be discarded. If any of the encryption keys used for firstname.lastname@example.org happen to be revoked, there will be a revocation notice along with relevant information about the new keys on this page.
Fingerprint: 991B AB35 18CF 64E3 ABF5 6AF7 30C5 0EA4 9AA0 DAB7