SlideShare a Scribd company logo
© 2015 VMware Inc. All rights reserved.
NSX Core Cases
Secure & Scale Beyond the Network.
Today’s Network / Security Paradigm.
Why Are We Still at Risk?
Little or no lateral controls inside perimeter
Low priority systems are
targeted first.
Attackers can move freely
around the data center.
10110100110
101001010000010
1001110010100
Attackers then gather and
exfiltrate data over weeks
or even months.
Internet
Data Center
Perimeter
Today’s Network / Security Paradigm.
It’s Not Just Servers, but Users and the Controls.
…and controls make it even harder to manage.
VDI to VDI
Desktop-to-desktop
hacking inside the DC
VDI to VM
Desktop-to-server
hacking inside the
DC
Bringing desktops into the data center opens up new risks
for attack.
And a matrix of policies is needed on centralized, choke-point
firewalls for the correct security posture.
Finance
HR
Engineering
Security.
Secure holistically from the Datacenter, to the VM, to the Network and beyond.
1. Datacenter Security1
Data Center
Perimeter
Internet
DMZ
• Micro-segmentation allows each
machine to retain it’s own
hypervisor level firewall.
• Attackers can no longer move freely
once access is gained to the
datacenter.
• Virtual machines retain their firewall
security as the migrate to ensure
portability and security retention.
• The firewall is outside the scope of
the VM, ensuring attackers are
unable to compromise from the VM
Security.
Secure holistically from the Datacenter, to the VM, to the Network and beyond.
1. Virtual Machine Security2 • Firewall and filter traffic for VMs
based upon logical groupings, or
based upon provisioning for VDI
• Threats to the datacenter from user
interaction are eliminated through
micro-segmentation
• Service-chaining with AV and
NGFW partners deliver automated,
policy integrated AV/malware
protection, IPS/IDS, etc.
FinanceMarketing HREngineering
• The attack surface increases when
all machines are consolidated into a
single infrastructure
• VDI deployments increase
complexity for security due to user
interaction and internal access of
trusted resources.
Security.
Secure holistically from the Datacenter, to the VM, to the Network and beyond.
1. Mobile Device Security3 • Mobile devices gain access to
infrastructure resources through
mobile applications
• Users cannot discern which data
they’re interacting with, and
datacenter controls cannot
programmatically manage control
• Administration can granularly
control which data streams are
secured
• Control can be applied per device,
per user/group or based upon
business case or point of access,
etc.
• NSX and AirWatch together can
address the issue of
"overprovisioning," in which users
get access to more apps and data
that they need to do their jobs
Scale & Elasticity.
Create the ability to scale and shrink as needed, while not compromising security.
1. IT Automation4
IT automating IT
• Faster project on boarding
Elastic Services
• Streamline Security Enforcement
• Mergers & Acquisition
Developer cloud
• Leverage vSphere investment
• Faster application development
• Brings power of cloud on-prem
Multi-tenant infrastructure
• Robust security to isolate each
tenant organization
• Multi-tenancy for legacy apps
Switching
Routing
Load
Balancing
Connectivity to
Physical Networks
Firewalling
VPN
Data Security
Activity
Monitoring
Scale & Elasticity.
Create the ability to scale and shrink as needed, while not compromising security.
1. Developer Clouds5 • NSX can be used in a DevOps
model, setting up developer
environments through APIs quickly.
• Using libnetwork, containers can
leverage strong, granular security in
real time.
• libnetwork is a community
supported framework that enables
Docker plugin models and has been
endorsed by the networking
community
• Containers all share the same
kernel. If a contained application is
hijacked with a privilege escalation
vulnerability, all running containers
and the host are compromised.
• Since containers are effectively
managed by the kernel, a kernel-
level exploit has the opportunity of
compromising the applications
running inside containers
Scale & Elasticity.
Create the ability to scale and shrink as needed, while not compromising security.
1. MultiTenant Infrastructure • NSX provides isolation between
different groups within an
organization, or different tenants
• Some companies need isolation but
may also want overlapping IP
addresses for multitenancy, or for
going from development and testing
into production, and NSX can
provide this
• NSX integrates directly into
VMware’s vRealize Automation
platform, allowing for self service
creation of secure, scalable
networks across tenants and
platforms
6
1. Disaster Recovery7 • NSX plays a big role in disaster
recovery scenarios, ensuring that
networking and security
configurations are kept in place
when a failure occurs and
workloads have to be moved across
data centers
• NSX can also ensure that firewalls
and networking constructs are
protected to provide ease of
recovery and solidity of business
continuity
Security.
Secure holistically from the Datacenter, to the VM, to the Network and beyond.
vCenter B / SRM B
Prod_Web_V130
Prod_Web_V130
Prod_Web_V120
Prod_Web_V120
Prod_Web_V110
Prod_Web_V110
Universal Logical Switch
vCenter A / SRM A
Implicit Mapping
Implicit Mapping
Implicit Mapping
Primary
Secondary
Data Center 2Data Center 1
SRM-based Disaster Recovery
Scale & Elasticity.
Create the ability to scale and shrink as needed, while not compromising security.
1. Hybrid Networking Services8 • NSX is a key enabling technology
for moving workloads between
different clouds
• NSX is also part of VMware's
"cross-cloud vMotion" technology,
which allows running virtual
machines to be moved from a
private cloud to a public cloud.
L2 Extensions
Scale & Elasticity.
Create the ability to scale and shrink as needed, while not compromising security.
1. Metro Pooling9 • NSX makes it possible for
customers to run virtual data
centers in which compute, storage
and networking are all driven
through the hypervisor. Admins can
use NSX to create pools of
resources, each with their own
distinct service level agreements
and quality of service rules, which is
core to the cloud computing model.
• NSX lets customers run an app in
multiple data centers with Layer 2
stretched across them

More Related Content

PPTX
20150311 NSX update 301
PDF
VMworld 2013: Virtualized Network Services Model with VMware NSX
PPTX
VMworld 2016 Recap
PDF
An Introduction to VMware NSX
PPTX
VMUGbe 21 Filip Verloy
PPTX
Nsx security deep dive
PDF
The Future of Cloud Networking is VMware NSX
PDF
Network Virtualization with VMware NSX
20150311 NSX update 301
VMworld 2013: Virtualized Network Services Model with VMware NSX
VMworld 2016 Recap
An Introduction to VMware NSX
VMUGbe 21 Filip Verloy
Nsx security deep dive
The Future of Cloud Networking is VMware NSX
Network Virtualization with VMware NSX

What's hot (20)

PDF
Business Agility and Security with VMware
PPTX
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
PDF
VMworld 2014: Virtualize your Network with VMware NSX
PDF
VMworld 2013: Advanced VMware NSX Architecture
PDF
Software Defined Networking (SDN) with VMware NSX
PPTX
VMware vRealize Network Insight 3.5 - Whats New
PPTX
VMworld 2016: How to Deploy VMware NSX with Cisco Infrastructure
PDF
VMworld 2015: The Future of Network Virtualization with VMware NSX
PDF
Scaling Your SDDC Network: Building a Highly Scalable SDDC Infrastructure wit...
PDF
Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...
PDF
VMworld 2014: Introduction to NSX
PDF
VMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - Segmentation
PDF
VMworld 2013: Operational Best Practices for NSX in VMware Environments
PDF
VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...
PDF
NSX: La Virtualizzazione di Rete e il Futuro della Sicurezza
PDF
Running and Managing Your Network Just Got Easier
PDF
VMworld 2013: VMware NSX Extensibility: Network and Security Services from 3r...
PDF
VMware NSX for vSphere - Intro and use cases
PDF
VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...
PPTX
VMworld 2016: Advanced Network Services with NSX
Business Agility and Security with VMware
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2014: Virtualize your Network with VMware NSX
VMworld 2013: Advanced VMware NSX Architecture
Software Defined Networking (SDN) with VMware NSX
VMware vRealize Network Insight 3.5 - Whats New
VMworld 2016: How to Deploy VMware NSX with Cisco Infrastructure
VMworld 2015: The Future of Network Virtualization with VMware NSX
Scaling Your SDDC Network: Building a Highly Scalable SDDC Infrastructure wit...
Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...
VMworld 2014: Introduction to NSX
VMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - Segmentation
VMworld 2013: Operational Best Practices for NSX in VMware Environments
VMworld 2013: Technical Deep Dive: Build a Collapsed DMZ Architecture for Opt...
NSX: La Virtualizzazione di Rete e il Futuro della Sicurezza
Running and Managing Your Network Just Got Easier
VMworld 2013: VMware NSX Extensibility: Network and Security Services from 3r...
VMware NSX for vSphere - Intro and use cases
VMworld 2014: VMware NSX and vCloud Automation Center Integration Technical D...
VMworld 2016: Advanced Network Services with NSX
Ad

Viewers also liked (8)

PDF
GAMO VMware vCloud Air
PPTX
Self service it with v realizeautomation and nsx
PDF
Moving Forward with Network Virtualization (VMware NSX)
PDF
VMware NSX - Lessons Learned from real project
PPTX
VMworld 2015: VMware NSX Deep Dive
PDF
The Vision for the Future of Network Virtualization with VMware NSX (Q2 2016)
PDF
Modern Security for the Modern Data Center
PPTX
vRealize Network Insight 3.3
GAMO VMware vCloud Air
Self service it with v realizeautomation and nsx
Moving Forward with Network Virtualization (VMware NSX)
VMware NSX - Lessons Learned from real project
VMworld 2015: VMware NSX Deep Dive
The Vision for the Future of Network Virtualization with VMware NSX (Q2 2016)
Modern Security for the Modern Data Center
vRealize Network Insight 3.3
Ad

Similar to NSX 9 Core Use Cases (20)

PPTX
Rik Ferguson
PDF
OneCloud-VMwareNSX
PPTX
Security As A Service In Cloud(SECaaS)
PDF
Is it an internal affair
PPTX
Datacenter 2014: Trend Micro - Bill MCGee
PPTX
Integration of pola alto and v mware nsx to protect virtual and cloud environ...
PPTX
Cloud.pptx
PDF
Securing Your Network
PPTX
18CSE442 Cloud Security Introduction SRM.pptx
PDF
Data Center Server security
PDF
NSX on VMware Data Center
PPT
Why Security Teams should care about VMware
PPTX
week 3 cloud computing northumbria foudation
PDF
The Role of Network Virtualization in Achieving True Network Agility
PPTX
#PCMVision: VMware NSX - Transforming Security
 
PDF
Cloud security risks
PDF
Cloud security risks
PPTX
VMware overview presentation by alamgir hossain
PDF
Cybersecurity | Meta Networks: Software defined perimeter platform
PPTX
Cloud Architect Company in India
Rik Ferguson
OneCloud-VMwareNSX
Security As A Service In Cloud(SECaaS)
Is it an internal affair
Datacenter 2014: Trend Micro - Bill MCGee
Integration of pola alto and v mware nsx to protect virtual and cloud environ...
Cloud.pptx
Securing Your Network
18CSE442 Cloud Security Introduction SRM.pptx
Data Center Server security
NSX on VMware Data Center
Why Security Teams should care about VMware
week 3 cloud computing northumbria foudation
The Role of Network Virtualization in Achieving True Network Agility
#PCMVision: VMware NSX - Transforming Security
 
Cloud security risks
Cloud security risks
VMware overview presentation by alamgir hossain
Cybersecurity | Meta Networks: Software defined perimeter platform
Cloud Architect Company in India

Recently uploaded (20)

PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Cloud computing and distributed systems.
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
KodekX | Application Modernization Development
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
A Presentation on Artificial Intelligence
PDF
Approach and Philosophy of On baking technology
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Empathic Computing: Creating Shared Understanding
Encapsulation_ Review paper, used for researhc scholars
Cloud computing and distributed systems.
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
“AI and Expert System Decision Support & Business Intelligence Systems”
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
20250228 LYD VKU AI Blended-Learning.pptx
KodekX | Application Modernization Development
Mobile App Security Testing_ A Comprehensive Guide.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
NewMind AI Monthly Chronicles - July 2025
Diabetes mellitus diagnosis method based random forest with bat algorithm
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Dropbox Q2 2025 Financial Results & Investor Presentation
Unlocking AI with Model Context Protocol (MCP)
A Presentation on Artificial Intelligence
Approach and Philosophy of On baking technology
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Empathic Computing: Creating Shared Understanding

NSX 9 Core Use Cases

  • 1. © 2015 VMware Inc. All rights reserved. NSX Core Cases Secure & Scale Beyond the Network.
  • 2. Today’s Network / Security Paradigm. Why Are We Still at Risk? Little or no lateral controls inside perimeter Low priority systems are targeted first. Attackers can move freely around the data center. 10110100110 101001010000010 1001110010100 Attackers then gather and exfiltrate data over weeks or even months. Internet Data Center Perimeter
  • 3. Today’s Network / Security Paradigm. It’s Not Just Servers, but Users and the Controls. …and controls make it even harder to manage. VDI to VDI Desktop-to-desktop hacking inside the DC VDI to VM Desktop-to-server hacking inside the DC Bringing desktops into the data center opens up new risks for attack. And a matrix of policies is needed on centralized, choke-point firewalls for the correct security posture. Finance HR Engineering
  • 4. Security. Secure holistically from the Datacenter, to the VM, to the Network and beyond. 1. Datacenter Security1 Data Center Perimeter Internet DMZ • Micro-segmentation allows each machine to retain it’s own hypervisor level firewall. • Attackers can no longer move freely once access is gained to the datacenter. • Virtual machines retain their firewall security as the migrate to ensure portability and security retention. • The firewall is outside the scope of the VM, ensuring attackers are unable to compromise from the VM
  • 5. Security. Secure holistically from the Datacenter, to the VM, to the Network and beyond. 1. Virtual Machine Security2 • Firewall and filter traffic for VMs based upon logical groupings, or based upon provisioning for VDI • Threats to the datacenter from user interaction are eliminated through micro-segmentation • Service-chaining with AV and NGFW partners deliver automated, policy integrated AV/malware protection, IPS/IDS, etc. FinanceMarketing HREngineering • The attack surface increases when all machines are consolidated into a single infrastructure • VDI deployments increase complexity for security due to user interaction and internal access of trusted resources.
  • 6. Security. Secure holistically from the Datacenter, to the VM, to the Network and beyond. 1. Mobile Device Security3 • Mobile devices gain access to infrastructure resources through mobile applications • Users cannot discern which data they’re interacting with, and datacenter controls cannot programmatically manage control • Administration can granularly control which data streams are secured • Control can be applied per device, per user/group or based upon business case or point of access, etc. • NSX and AirWatch together can address the issue of "overprovisioning," in which users get access to more apps and data that they need to do their jobs
  • 7. Scale & Elasticity. Create the ability to scale and shrink as needed, while not compromising security. 1. IT Automation4 IT automating IT • Faster project on boarding Elastic Services • Streamline Security Enforcement • Mergers & Acquisition Developer cloud • Leverage vSphere investment • Faster application development • Brings power of cloud on-prem Multi-tenant infrastructure • Robust security to isolate each tenant organization • Multi-tenancy for legacy apps Switching Routing Load Balancing Connectivity to Physical Networks Firewalling VPN Data Security Activity Monitoring
  • 8. Scale & Elasticity. Create the ability to scale and shrink as needed, while not compromising security. 1. Developer Clouds5 • NSX can be used in a DevOps model, setting up developer environments through APIs quickly. • Using libnetwork, containers can leverage strong, granular security in real time. • libnetwork is a community supported framework that enables Docker plugin models and has been endorsed by the networking community • Containers all share the same kernel. If a contained application is hijacked with a privilege escalation vulnerability, all running containers and the host are compromised. • Since containers are effectively managed by the kernel, a kernel- level exploit has the opportunity of compromising the applications running inside containers
  • 9. Scale & Elasticity. Create the ability to scale and shrink as needed, while not compromising security. 1. MultiTenant Infrastructure • NSX provides isolation between different groups within an organization, or different tenants • Some companies need isolation but may also want overlapping IP addresses for multitenancy, or for going from development and testing into production, and NSX can provide this • NSX integrates directly into VMware’s vRealize Automation platform, allowing for self service creation of secure, scalable networks across tenants and platforms 6
  • 10. 1. Disaster Recovery7 • NSX plays a big role in disaster recovery scenarios, ensuring that networking and security configurations are kept in place when a failure occurs and workloads have to be moved across data centers • NSX can also ensure that firewalls and networking constructs are protected to provide ease of recovery and solidity of business continuity Security. Secure holistically from the Datacenter, to the VM, to the Network and beyond. vCenter B / SRM B Prod_Web_V130 Prod_Web_V130 Prod_Web_V120 Prod_Web_V120 Prod_Web_V110 Prod_Web_V110 Universal Logical Switch vCenter A / SRM A Implicit Mapping Implicit Mapping Implicit Mapping Primary Secondary Data Center 2Data Center 1 SRM-based Disaster Recovery
  • 11. Scale & Elasticity. Create the ability to scale and shrink as needed, while not compromising security. 1. Hybrid Networking Services8 • NSX is a key enabling technology for moving workloads between different clouds • NSX is also part of VMware's "cross-cloud vMotion" technology, which allows running virtual machines to be moved from a private cloud to a public cloud.
  • 12. L2 Extensions Scale & Elasticity. Create the ability to scale and shrink as needed, while not compromising security. 1. Metro Pooling9 • NSX makes it possible for customers to run virtual data centers in which compute, storage and networking are all driven through the hypervisor. Admins can use NSX to create pools of resources, each with their own distinct service level agreements and quality of service rules, which is core to the cloud computing model. • NSX lets customers run an app in multiple data centers with Layer 2 stretched across them

Editor's Notes

  • #5: NSX can control east-west traffic inside the network perimeter through "micro- segmentation.” NSX allows network and security services to be distributed out to the applications in the hypervisor, creating what could be considered a network “hypervisor”
  • #6: ]