Flow

Protect Your Data and Apps From Cyber Threats

Security starts with a “Zero Trust” philosophy. Nutanix AHV with Flow delivers advanced networking, application-centric visibility and enterprise-grade microsegmentation for protection from network threats.

Test Drive Flow Download Solution Brief

Why Customers Choose Flow

Application Visibility and Discovery

Policy starts with visibility and insight into the complex communications and dependencies of all your applications and services.

Application Security and Data Protection

Easily create network or application tier segmentation to protect your users, apps, and data from cyber threats.

Malware Protection

Through network micosegmentation, block the spread of malware, ransomware, and hackers inside your datacenter.

Posture and Compliance

Monitor security posture and regulatory compliance along with remediation insights and security planning from one central hub.

Native Network Microsegmentation in AHV

Nutanix Flow is built into AHV virtualization and is enabled with just a few clicks in Prism Central. Flow works at the hypervisor level which means it works with your network, no new equipment or configuration changes required.


With nothing additional to install or manage, you can add network microsegmentation to your AHV environment in minutes.

Try it free for 60 days!

Deploy Flow For

Network Segmentation

Keep networking simple and lower costs by leveraging software-defined security policies.  Segment networks, operating environments, or workloads regulated by PCI, HIPAA, or GDPR.

Learn about Flow Network Segmentation

Application Microsegmentation

Prevent malware spread and reduce attack surfaces by limiting applications to only needed network communications.

Learn about Application Security

Threat Intelligence and Detection

Enhance security functions through Nutanix Ready partner integrations. Nutanix allows you to enhance your network security by inserting advanced security functions into the virtual network environment.

See Our Security Partners

Identity-Based Security

Enhance the security of EUC and VDI environments by using the user’s identity to control network access to applications and services. Easily govern policy based on identity and directory service details.

Learn about Flow for EUC and VDI

Security Compliance, Audit, and Planning

Get visibility into security configurations and compliance goals for your Nutanix environments. Use that context and visibility to create and manage network security policy.

Learn about Flow Security Central

Ready to Secure Your Applications?

Nutanix Tech TopX

Nutanix Tech TopXGet a quick overview of the architecture and see how simple it is to start securing your applications with Flow.

Nutanix University: Security and Governance

In this course, you’ll learn how our security capabilities work with Nutanix HCI to create a powerful security and governance solution.

Security Ecosystem Partners

Whether it’s advanced threat detection, layer 7 deep packet inspection, or next-generation firewall for virtual applications, Nutanix has you covered with integration and support from the leading security vendors. WIth service insertion functions from Flow, it is easy to augment your virtual environment with security functions from our AHV Ready partners.

See All AHV Ready Security Partners

Learn More

Nutanix Flow Solution Brief

Flow allows organizations to quickly deploy a powerful software-defined security solution without additional complexity or management overhead.

Application-Centric Security Ebook

An application-centric approach delivers the protection you need with more agility, more flexibility, and above all, better security

Securing Citrix Virtual Apps and Desktops with Nutanix Flow

Deploying Citrix VDI on Nutanix? Make sure you’re following our security best practices.

Application Centric Security with Nutanix Flow

Learn how Flow works. Our Technote contains details on the Architecture, VM categorization, and Policy Enforcement Types.

Best Practices for AHV

Optimize your network design for AHV and Flow. The AHV Networking Best Practice Guide covers availability, bonding, traffic segmentation and more.

Try Flow Free in Your Environment!

Using Nutanix and AHV, click here to enable your free 60-day Flow evaluation

Ready for a Demo?

See how adding Flow can deliver enhanced security, prevent data breaches, and simplify virtual networking.