Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
129 views3 pages

Secure Your Environment With Invisible Security From Nutanix

Uploaded by

AbdullahS.Atshan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
129 views3 pages

Secure Your Environment With Invisible Security From Nutanix

Uploaded by

AbdullahS.Atshan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

SOLU T ION B RIEF

Secure your Environment


with Invisible Security
from Nutanix
Secure Applications and Data to Prevent Malware Spread in Hybrid-Clouds

KEY BENEFITS SECURITY IN THE HYBRID CLOUD BEGINS WITH A


Protect Data and Prevent Breaches ROBUST INFRASTRUCTURE FOUNDATION
• Encrypt data-at-rest Maintaining security in today’s environments is challenging for several reasons.
Many traditional infrastructure stacks are comprised of products from multiple
• Control and restrict access to vendors, each decoupled from the stack - providing a narrow and limited view of
sensitive data security. Validating and maintaining a security baseline through continuous
• Analyze and audit security software upgrades, is time-consuming and often involves error-prone manual
configurations processes that take away from innovation and productivity.

• Secure your hybrid clouds


In the cloud era, security must be ingrained in the culture and security considerations
• Prevent the spread of need to be an essential part of the organization’s decision making in order to
ransomware meet the high-bar of regulatory compliance as well as address the challenges of an
evolving security threat landscape. Enterprises should strive to incorporate
Segment and Secure Networks automation into the process of maintaining security in the infrastructure in order
to avoid human error and deliver seamless scalability without compromising
• Deploy microsegmentation and
network inspection in minutes security in an ever-changing environment.

• Separate regulated environments


with automated software controls
RETHINKING SECURITY FOR A HYBRID CLOUD FUTURE
Simplify Regulatory and Security in the hybrid cloud begins with a robust infrastructure foundation. This
Compliance Efforts is where the industry leading solution from Nutanix not only provides operational
• Automate platform security and financial value, but also aids in improving security posture and preventing data
baseline configurations breaches by supporting a defense-in-depth approach for hybrid cloud security.

• Validate compliance with


regulatory policies (HIPAA, PCI,
NIST, etc)

©2020 Nutanix, Inc. All Rights Reserved


STANDARDS AND DEFENSE AT EVERY LEVEL
CERTIFICATIONS Platform Security: Security is a foundational aspect of product design at Nutanix,
Nutanix employs multiple security starting with security hardening practices (like data-at-rest encryption, compre-
standards and validation programs. hensive access controls, etc.) built into the enterprise cloud platform. Industry
It complies with the strictest best practices and government standards are incorporated into an automated
international standards, including configuration monitoring and self-healing process that supports compliance goals.
numerous ISO, SOC, and FIPS Strict tests for common vulnerabilities and frequent patch releases minimizes the
standards, to assure governments risk of data breaches. Inconsistencies are logged and reverted to the baseline
and enterprises worldwide that ensuring consistency of security configuration.
Nutanix products perform as
expected and work with their Application and Network Security: Nutanix Flow delivers advanced network
existing technology. security inside the data center, providing application visibility and protection from
the spread of cyber threats like ransomware. Networks and applications can easily
Visit nutanix.com/trust for be segmented via a software-defined policy without any additional hardware or
complete details complex network configurations. Native network microsegmentation functionality
provides a discovery, visualization, and policy enforcement model that simplifies
and automates the application of granular network policy (microsegmentation)
between VMs.

SecOps, Compliance, and Audit: Flow Security Central provides hybrid-cloud


security posture visibility, policy management assistance, configuration audits,
and compliance validation for Nutanix HCI. Security Central uses a collection of
automated security audits to detect and fix infrastructure security vulnerabilities
and configuration errors. Security admins can create automated policies to
remediate vulnerabilities in real-time. Security Central also helps to validate the
level of compliance with regulatory guidelines such as PCI-DSS, HIPAA, NIST, etc.
- delivering an always-on security compliance solution.

Prevent, Detect, and Recover: There is no single action, software solution, or


security control that can completely safeguard your organization from the threats
of malware and ransomware. The best solution is a multi-layered approach,
commonly called a “defense in depth” strategy. To minimize both your operational
and financial costs, your comprehensive plan should include all the Nutanix built-in
capabilities working alongside controls and safeguards that may already exist in
your datacenter.

©2020 Nutanix, Inc. All Rights Reserved


TRUST NUTANIX AS PART OF YOUR CYBER DEFENSE
STRATEGY
HCI Platform
• Self-healing security configuration baseline
• Storage snapshots and recovery points
• Data protection, replication, and runbook automation
• FIPS 140-2 validated data-at-rest encryption
• Data plane & control plane segmentation
• Native virtualization - built for security

Patching and Upgrades


• “One-click” CVE patching, platform upgrades, and life cycle management
• Firmware and BIOS upgrade management

Management and Automation


• Role-Based Access Control (RBAC)
• Identity and Access Management
• Resource analytics, insights, and anomaly detection
• Codeless automation and event triggers
• Application blueprints and automation to ensure consistent policy application

Networking and Security


• Network and application segmentation
• Application and network visibility
• Deep packet inspection and threat intelligence partner integrations
• Policy and event logging
• Security Compliance and Audit Tools

Storage Services
• File type blocking policies
• File activity anomaly detection
• ICAP support for antivirus integration
• Immutable WORM policy support

Backup, Business Continuity, and Disaster Recovery


• Native replication and data protection
• Archive and backup solution for secondary storage
• Cloud Disaster-Recovery-as-a-Service

T. 855.NUTANIX (855.688.2649) | F. 408.916.4039


[email protected] | www.nutanix.com | @nutanix

©2020 Nutanix, Inc. All rights reserved. Nutanix, the Nutanix logo and all product and service names mentioned herein
are registered trademarks or trademarks of Nutanix, Inc. in the United States and other countries. All other brand names
mentioned herein are for identification purposes only and may be the trademarks of their respective holder(s).

You might also like