23 Integrations with VMware NSX
View a list of VMware NSX integrations and software that integrates with VMware NSX below. Compare the best VMware NSX integrations as well as features, ratings, user reviews, and pricing of software that integrates with VMware NSX. Here are the current VMware NSX integrations in 2024:
-
1
Amazon Web Services (AWS)
Amazon
Whether you're looking for compute power, database storage, content delivery, or other functionality, AWS has the services to help you build sophisticated applications with increased flexibility, scalability and reliability. Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud platform, offering over 175 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups, largest enterprises, and leading government agencies—are using AWS to lower costs, become more agile, and innovate faster. AWS has significantly more services, and more features within those services, than any other cloud provider–from infrastructure technologies like compute, storage, and databases–to emerging technologies, such as machine learning and artificial intelligence, data lakes and analytics, and Internet of Things. This makes it faster, easier, and more cost effective to move your existing applications to the cloud. -
2
BackBox
BackBox
BackBox offers a simple way to intelligently automate the backup, restoration, and management of all devices on a network by providing centralized management of devices such as firewalls, routers, switches, and load balancers. Each of these devices plays a critical role in the availability and security of an organization’s network, and BackBox ensures they all continue to function effectively and effortlessly, streamlining operations for optimal performance. BackBox provides a foundation to harmonize the configuration between multiple devices, enabling seamless integration, and assuring compliance to organization or industry security policies, standards, or guidelines. IT administrators can easily employ BackBox to track configuration changes and see the deviation with the baseline for compliance validation and remediation. -
3
Ansible
Red Hat
Ansible is a radically simple automation engine that automates cloud provisioning, configuration management, application deployment, intra-service orchestration, and many other IT needs. Ansible Automation Platform has grown over the past years to provide powerful automation solutions that work for operators, administrators and IT decision makers across a variety of technology domains. It’s a leading enterprise automation solution from Red Hat®, a thriving open source community, and the de facto standard technology of IT automation. Scale automation, manage complex deployments, and speed productivity with an enterprise automation platform that can be used across entire IT teams. Red Hat or partner consulting services help you advance your end-to-end automation journey for faster time to value.Starting Price: Free -
4
Rackspace OpenStack
Rackspace
Get a full-service experience for building, managing and operating your OpenStack private cloud. OpenStack® Private Cloud can help you increase agility and lower costs while avoiding vendor lock-in. However, half of all businesses attempting to implement OpenStack fail, not just because it’s complex, but because they also lack specific platform expertise. To succeed with OpenStack, you need assistance from certified experts who know how to architect, secure, monitor, patch and upgrade OpenStack clouds. OpenStack Private Cloud from Rackspace Technology is the answer. We blend technology and automation plus human experts to deliver ongoing architecture, security and 24/7/365 operations backed by 1,000+ OpenStack experts. Remove barriers to success with OpenStack delivered as a managed service. And feel the confidence that comes with the support of more than 1,000+ OpenStack experts. -
5
PowerShell
Microsoft
PowerShell is a cross-platform task automation and configuration management framework, consisting of a command-line shell and scripting language. Unlike most shells, which accept and return text, PowerShell is built on top of the .NET Common Language Runtime (CLR), and accepts and returns .NET objects. This fundamental change brings entirely new tools and methods for automation. Unlike traditional command-line interfaces, PowerShell cmdlets are designed to deal with objects. An object is structured information that is more than just the string of characters appearing on the screen. Command output always carries extra information that you can use if you need it. If you've used text-processing tools to process data in the past, you'll find that they behave differently when used in PowerShell. In most cases, you don't need text-processing tools to extract specific information. You directly access portions of the data using standard PowerShell object syntax. -
6
Terraform
HashiCorp
Terraform is an open-source infrastructure as code software tool that provides a consistent CLI workflow to manage hundreds of cloud services. Terraform codifies cloud APIs into declarative configuration files. Write infrastructure as code using declarative configuration files. HashiCorp Configuration Language (HCL) allows for concise descriptions of resources using blocks, arguments, and expressions. Run terraform plan to check whether the execution plan for a configuration matches your expectations before provisioning or changing infrastructure. Apply changes to hundreds of cloud providers with terraform apply to reach the desired state of the configuration. Define infrastructure as code to manage the full lifecycle — create new resources, manage existing ones, and destroy those no longer needed. -
7
InsightAppSec
Rapid7
Highest rated DAST solution by an independent research firm three years in a row. Automatically assess modern web apps and APIs with fewer false positives and missed vulnerabilities. Fast-track fixes with rich reporting and integrations, and inform compliance and development stakeholders. Effectively manage the security assessment of your application portfolio, regardless of its size. Automatically crawl and assess web applications to identify vulnerabilities like SQL Injection, XSS, and CSRF. The modern UI and intuitive workflows built on the Insight platform make InsightAppSec easy to deploy, manage, and run. Scan applications hosted on closed networks with the optional on-premise engine. InsightAppSec assesses and reports on your web app's compliance to PCI-DSS, HIPAA, OWASP Top Ten, and other regulatory requirements.Starting Price: $2000 per app per year -
8
Elastiflow
Elastiflow
The most complete network observability solution for use with modern data platforms, providing unprecedented insights at any scale. ElastiFlow allows organizations to achieve unprecedented levels of network performance, availability, and security. ElastiFlow provides granular information about network traffic flows, including source and destination IP addresses, ports, protocols, and the amount of data transmitted. This information allows network administrators to gain deep insights into the network's performance and identify potential issues. ElastiFlow is highly valuable for diagnosing and troubleshooting network issues such as congestion, high latency, or packet loss. By analyzing the network traffic, administrators can pinpoint the cause of the problem and take appropriate action to resolve it. By leveraging ElastiFlow, organizations can improve their security posture, detect and respond to threats more effectively, and maintain compliance with regulatory requirements.Starting Price: Free -
9
VMware Aria Operations for Logs
Broadcom
VMware Aria Operations for Logs (formerly vRealize Log lnsight) is a log analysis tool that delivers highly scalable log management with intuitive, actionable dashboards, sophisticated analytics and broad third-party extensibility. It provides deep operational visibility and faster troubleshooting across physical, virtual and cloud environments. Delivers innovative indexing and machine learning-based intelligent grouping, to enable high performance searching, for faster troubleshooting across physical, virtual and cloud environments. Analyzes massive amounts of log data and delivers near real-time monitoring, search and log analytics, coupled with a dashboard for stored queries, reports and alerts. Speeds correlation of events across an entire IT environment. -
10
Pillr
Pillr
Pillr is powerful security operations software backed by 24/7/365 SOC service and support. The platform unifies security data sources and tools in a single console. Incoming data is automatically analyzed, and the resulting telemetry is correlated with over 35 industry leading threat intelligence feeds to produce actionable, reliable alerts. On Pillr, you can examine data in a customizable dashboard, investigate events with powerful threat intelligence tools, and work collaboratively with Pillr SOC teams to remediate issues. The platform supports over 450 integrations, including tools from Autotask, Check Point, ConnectWise, Crowdstrike, Microsoft, SentinelOne, and Sophos—while expanding integration support for new tools daily. Pillr SOCs operate on a true 24/7/365 model and are staffed by 85+ security analysts and threat hunters, so service providers on the platform receive consistent, real-time guidance and support no matter the day or time. -
11
Snow Commander
Snow
Snow Commander is a powerful hybrid cloud management tool that leverages automation to deliver business agility, oversight, and efficiency. This tool enables IT to eliminate cumbersome, manual approval processes and provide end users with a quick, self-service way to access both public and private clouds that won’t slow down the most agile development teams. Increase agility and efficiency with streamlined hybrid cloud management. Snow Commander uses automation to provide end users with quick and easy access to both public and private cloud resources. The comprehensive self-service portal provides IT with the visibility needed to effectively govern resource usage, while self-service provisioning automation capabilities ensure that the most agile development teams don’t miss a beat. A feature-rich workload engine enables change orchestration with cost analytics, governance policy, and automation. It also boasts extensible functionality to empower process transformation. -
12
Juniper Apstra
Juniper Networks
Juniper Apstra intent-based networking software automates and validates the design, deployment, and operation of data center networks from day 0 through day 2+. As the only solution of its kind with multivendor support, Apstra empowers you to automate and manage your networks across virtually any data center design, vendor, and topology, making private data centers as easy as a cloud. Using Apstra’s single source of truth and powerful analytics, you can now deliver optimal network performance and resolve issues with confidence. Apstra also mitigates network outages with predictive insights and provides change control with networkwide rollback capabilities. Juniper Validated Designs (JVDs) help ensure reliable operations and accelerate deployments. Apstra Cloud Services, a suite of AI-native, cloud-based applications for AI operations (AIOps), works with Apstra’s intent-based networking to expand data center assurance solutions from network assurance to application assurance. -
13
NETSCOUT Arbor DDoS
NETSCOUT
Since 1999, our DDoS protection and network visibility solutions have been tested and proven in the world's largest, most complex networks. We deliver powerful visibility and traffic intelligence, at internet scale, to help customers not only understand their own environment, but threat actors, their tools, behaviors and campaigns on a global basis. Layered, Automated DDoS Attack Protection: Industry best practices recommend a comprehensive layered, approach, backed by continuous threat intelligence. Stop today’s high volume attacks, which are exceeding 600GB/sec. Stealthy application-layer attacks against existing stateful infrastructure devices, such as firewall, IPS and ADCs. Only a tightly integrated defense can adequately protect you from the full spectrum of DDoS attacks. Organizations face increasing pressure to drive technology transformation while managing risk. -
14
DX Virtual Network Assurance
Broadcom
DX Virtual Network Assurance extend visibility and ensure reliability of SDN/NFV networks with network monitoring tools by CA Technologies, a Broadcom company. A converged NetOps portal is required in order to successfully deploy modern network architectures. You can use these network monitoring tools to enable seamless management of traditional and advanced technologies like SDN, NFV, SDDC, SD-WAN and the cloud in a one-dashboard experience. Advanced visualizations of complex Cisco ACI environments provide deployment assurance and on-going health awareness. With our network monitoring tools, you can visualize the new network abstraction via discovery and mapping of your Cisco ACI deployments, along with traditional infrastructure. Close the loop among traditional physical network environments and new virtualized networking technologies to reduce complexity in network visibility and planning. -
15
Converged Cloud Fabric
Arista
Converged Cloud Fabric (CCF)™ is an automated fabric built with cloud networking design principles. CCF leverages VPC/VNet constructs on-prem to deliver a cloud Network-as-a-Service operational model. CCF automates networking for multiple private cloud platforms, enabling the network to operate at the speed of VMs and Containers. With built-in analytics and telemetry, CCF provides real-time contextual visibility across the fabric and one-click troubleshooting workflows. With CCF, NetOps, DevOps and CloudOps teams can effectively collaborate, and rapidly on-board applications and tenants. CCF enables mainstream and midsize organizations to leverage network as a strategic pillar of the digital transformation strategy. With CCF's self-service networking and contextual intelligence, NetOps team can focus on innovations such as new services and analytics, instead of time-consuming manual tasks. -
16
Medigate
Medigate
Healthcare’s Security and Clinical Analytics Company. #1 IoT device security solution designed for Healthcare. Medigate has invested in building out the largest medical device and protocol database so you can have the most detailed device inventories and accurate threat detection available. Medigate offers the industry’s only truly dedicated medical device security platform that identifies and protects all Internet of Medical Things (IoMT) devices connected to a healthcare provider’s network. Unlike general IoT solutions, we’ve built our cyber security platform specifically and only for the unique needs of medical devices and clinical networks. Our solution safeguards clinical networks from all angles by providing complete visibility into all connected medical devices to identify risk based on clinical context, detect anomalies according to manufacturers’ protocols and actively block malicious activities by integrating into your existing firewalls or NAC. -
17
vCloud Usage Meter
Broadcom
Licensing usage metering and automatic reporting using vCloud Usage Meter on-premises agent and vCloud Usage Insight SaaS. Get familiar with Usage Meter and Usage Insight, then download the latest version to get started. Onboard into the Automatic Reporting Service at the center of Cloud Provider Metering Architecture. Download the latest On-Premises agent for collecting license usage and reporting. Drive monthly reporting without having to lift a finger. From data collection to aggregation and reporting to the Commerce Portal, Usage Insight + Usage Meter automate the reporting process end-to-end. With Usage Meter 4.3, you can scale to larger environments within a single deployment. With In-place upgrades, you no longer need to replace the on-premises agent with each new version. Usage Insight provides a central location for downloading and viewing Usage reports. VMware stores the historical records so that partners do not need to maintain their older appliances. -
18
Netvisor ONE
Pluribus Networks
Moving to Open Networking bare metal switches brings significant operational and financial benefits to build next-generation networks. These switches provide the capacity needed to achieve cloud-scale, agility, elasticity, and adaptability. As you move to a disaggregated open networking strategy, selecting the right Network Operating System (OS) is a critical success factor. Why? The Network OS deployed unlocks the performance, functionality, and services from Open Networking switches to realize the most value. Netvisor® ONE is an open, secure, and programable next-generation Network OS that is purpose-built to optimize the power and performance of bare metal Open Networking hardware. Deployment-proven in production mission-critical enterprise and carrier networks, Netvisor ONE operating system meets the most stringent performance requirements and delivers the maximum levels of reliability and flexibility at scale, and without compromise. -
19
VMware Cloud Foundation
Broadcom
Our new multi-cloud offering includes VMware Cloud Foundation-Subscription (includes Tanzu Standard), which adds a flexible term-based licensing option for on-premises deployments. VMware Cloud Foundation supports both traditional enterprise and modern apps and provides a complete set of highly secure software-defined services for compute, storage, network, security, Kubernetes and cloud management Increase enterprise agility and flexibility with consistent infrastructure and operations across private and public clouds. Achieve reduced CapEx and OpEx and lower TCO with consistent operations and the broadest range of deployment options. Run workloads at scale without compromise with consistent infrastructure for both existing enterprises applications and modern containerized applications. Provision agile infrastructure from a pool of virtualized resources on premises, at the edge, or in the cloud. -
20
CloudVision
Arista
CloudVision is a modern, multi-domain network management plane built on cloud networking principles for telemetry, analytics, and automation. Designed for use in data centers, wired and wireless campuses, multi-cloud, and routing use-cases, CloudVision provides a consistent operational model across domains, helping enterprises to simplify network operations by breaking down traditional network management silos. CloudVision’s abstraction of the physical network to this broader, network-wide perspective allows for a more efficient approach for several operational and network telemetry capabilities. Turn-key automation with CloudVision Studios for initial and ongoing provisioning, ZTP as-a-Service, configuration management, and network-wide change control, including automated upgrades, network rollback, and network snapshots. Real-time state streaming for network telemetry and analytics - a modern approach to replace legacy polling per device. -
21
VMware vDefend Distributed Firewall
Broadcom
Stop the lateral spread of threats across multi-cloud environments with a software-based Layer 7 firewall distributed at each workload. Threat actors moving throughout your infrastructure and increasingly sophisticated ransomware attacks make east-west the new battleground. Get the advantage with a software-defined Layer 7 firewall that delivers granular enforcement at scale to secure east-west traffic across today’s multi-cloud world. Easily segment the network, stop the lateral spread of threats, and securely move at the speed of development on your path to Zero Trust. Gain visibility across all network flows to easily achieve granular micro-segmentation and generate context-aware policies for each workload. Reduce the attack surface and defend against known and unknown threats moving within and across clouds with a modern, distributed firewall solution that is purpose-built to secure multi-cloud traffic across virtualized workloads. -
22
NETSCOUT vSTREAM
NETSCOUT
Visibility for performance management, user experience, and cybersecurity in virtualized environments. NETSCOUT's vSTREAM virtual appliance complements existing Adaptive Session Intelligence (ASI)-based instrumentation to provide the same smart data visibility within virtualized and cloud infrastructures that are already possible in physical environments. The vSTREAM is ideal for monitoring service-critical traffic running within virtualized and/or cloud infrastructures. With deep packet inspection at scale, organizations have the end-through-end visibility needed to assure network and application performance and high-quality user experiences in virtual environments. Leverage end-through-end visibility across data centers, multi-cloud, and remote offices to assure high-quality user experiences anywhere. Scalable and simplified packet-data visibility and analysis is easy to deploy, manage, and fit into your organization’s budget. -
23
Sungard AS
Sungard Availability Services
When an aging mainframe couldn't keep up with high transaction volumes and continued growth, a simple "lift and shift" upgrade strategy wouldn't do. Sungard Availability Services (Sungard AS) provided a realistic roadmap to the near and far future as well as the migration and hosting services to help Global Atlantic get there without disruption and ahead of schedule. Cabot Financial Ireland, a leader in consumer credit management, combines its proven application software with contact center expertise to deliver outsourced credit and collections services for more than 40 credit unions across Ireland. The company relies on Sungard Availability Services (Sungard AS) to assure resilience for the IT infrastructure that supports this critical service. Cabot is now teaming with Sungard AS to complete a phased migration to the AWS cloud, fully managed by Sungard AS, to support its primary and recovery environments.
- Previous
- You're on page 1
- Next