We performed a comparison between Cisco Secure Workload and Nutanix Flow Network Security based on real PeerSpot user reviews.
Find out in this report how the two Microsegmentation Software solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The solution offers 100% telemetry coverage. The telemetry you collect is not sampled, it's not intermittent. It's complete. You see everything in it, including full visibility of all activities on your endpoints and in your network."
"The most valuable feature is micro-segmentation, which is the most important with respect to visibility."
"The most valuable feature of the solution is that we don't have to do packet captures on the network."
"Secure Workload's best feature is that it's an end-to-end offering from Cisco."
"By using Tetration insight, we are able to get the latency on our level accounts and we can determine whatever the issue is with the application latency itself."
"A complete and powerful micro-segmentation solution."
"The product provides multiple-device integration."
"The most valuable feature of this solution is security."
"We appreciate the fact that this solution allows us to segregate two virtual machines that are in the same cluster."
"Nutanix Flow Network Security is a simple solution that is usable, easy to understand, and easy to deploy."
"It is a very stable solution. Stability-wise, I rate the solution a ten out of ten."
"Nutanix Flow is straightforward to install. You only need to select a checkmark that you want to enable Nutanix Flow."
"The network view was excellent as it allowed us to expand the server view and visualize all connections it made within the environment. This was particularly useful in identifying the path of our data and not just its location within the data center."
"It allows for policies that enable complete visibility and traffic control."
"Flow Network Security's most valuable features are user-friendliness, the console, and policy creation."
"Nutanix Flow has a lot of data protection features. It's also valuable for operations and management. It's a big solution that works well with different solutions and is suitable for most business cases."
"Secure Workload is a little complicated to use, and the dashboard isn't intuitive, so it takes a while to learn how to use it."
"The interface is really helpful for technical people, but it is not user-friendly."
"It is not so easy to use and configure. It needs a bunch of further resources to work, which is mainly the biggest downside of it. The deployment is huge."
"The integration could be better, especially with different types of solutions."
"They should scale down the hardware a bit. The initial hardware investment is two million dollars so it's a price point problem. The issue with the price comes from the fact that you have to have it with enormous storage and enormous computes."
"There was a controversy when Cisco reduced the amount of data they kept, and the solution became quite cost-intensive, which made its adoption challenging….Although they have modified it now, I preferred the previous version, and I wish all the functionality were back under the same product."
"I'd like to see better documentation for advanced features. The documentation is fairly basic. I would also like to see better integration with other applications."
"The multi-tenancy, redundancy, backup and restore functionalities, as well as the monitoring aspects of the solution, need improvement. The solution offers virtually no enterprise-grade possibility for monitoring."
"Nutanix Flow's networking features could use some improvement. Also, I don't know if it's currently supporting load balancing or not."
"The solution’s pricing could be improved."
"We would like the reporting functionality of this solution to be improved."
"The most difficult part is the configuration of the initial blueprints."
"I would rate Flow Network Security's stability seven out of ten - it could be improved."
"For customers who are running Nutanix Flow and AHV, the largest area for improvement is in the disaster recovery environments. To automate the populate of rules from one side to the other side in case of disaster you report everything on the disaster recovery site, and you have all the rules automatically applied. This was something that was being built when I left Nutanix. It might already be available. Additionally, the usability of the rules editor could improve."
"While the graphical interface of Nutanix Flow Network Security could have been improved, and some of the reporting features needed extra work, the product's features were similar to VMware's NSX. The difference lay more in the presentation and user interface."
"The documentation offered by the product is an area with certain shortcomings where improvements are required."
More Nutanix Flow Network Security Pricing and Cost Advice →
Cisco Secure Workload is ranked 5th in Microsegmentation Software with 13 reviews while Nutanix Flow Network Security is ranked 4th in Microsegmentation Software with 8 reviews. Cisco Secure Workload is rated 8.4, while Nutanix Flow Network Security is rated 9.4. The top reviewer of Cisco Secure Workload writes "A solution that provides good technical support but its high cost makes it challenging for users to adopt it". On the other hand, the top reviewer of Nutanix Flow Network Security writes "Offers great integration capabilities and helps design a disaster recovery plan". Cisco Secure Workload is most compared with Illumio, VMware NSX, Akamai Guardicore Segmentation, Prisma Cloud by Palo Alto Networks and Cisco Secure Endpoint, whereas Nutanix Flow Network Security is most compared with VMware NSX, Meraki SD-WAN, Akamai Guardicore Segmentation and Illumio. See our Cisco Secure Workload vs. Nutanix Flow Network Security report.
See our list of best Microsegmentation Software vendors.
We monitor all Microsegmentation Software reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.