{"id":719221,"date":"2025-11-11T10:22:14","date_gmt":"2025-11-11T15:22:14","guid":{"rendered":"https:\/\/xentegra.com\/resources\/115-nutanix-weekly-built-in-security-across-platform-data-network-and-applications\/"},"modified":"2026-03-18T13:04:46","modified_gmt":"2026-03-18T17:04:46","slug":"115-nutanix-weekly-built-in-security-across-platform-data-network-and-applications","status":"publish","type":"post","link":"https:\/\/xentegra.com\/hi\/resources\/115-nutanix-weekly-built-in-security-across-platform-data-network-and-applications\/","title":{"rendered":"115: Nutanix Weekly: Built-in Security Across Platform, Data, Network and Applications"},"content":{"rendered":"<p><iframe loading=\"lazy\" style=\"width: 100%; height: 200px;\" src=\"https:\/\/www.buzzsprout.com\/1577275\/episodes\/18085087-nutanix-weekly-built-in-security-across-platform-data-network-and-applications?iframe=true\" width=\"100%\" height=\"200\" frameborder=\"0\" scrolling=\"no\"><\/iframe><\/p>\n\n\n\n<p class=\"has-large-font-size\"><strong>How Built-In Security Across the Stack Strengthens Cyber Resilience<\/strong>&nbsp;<\/p>\n\n\n\n<p>In today\u2019s cyber threat landscape, organizations face an uphill battle: defending increasingly complex IT environments while enabling speed, scale, and innovation. Traditional bolt-on security tools are no longer enough. What\u2019s needed is a shift in mindset \u2014 toward <strong>built-in, end-to-end cybersecurity<\/strong> that protects everything from infrastructure to data, network, and applications.&nbsp;<\/p>\n\n\n\n<p>Nutanix\u2019s approach is clear: security should be invisible, integrated, and always-on. By delivering <strong>built-in cybersecurity for hybrid cloud environments<\/strong>, Nutanix empowers organizations to embed security into the fabric of their IT stack \u2014 not just layer it on afterward.&nbsp;<\/p>\n\n\n\n<p class=\"has-large-font-size\"><strong>Why Security Can\u2019t Be an Afterthought<\/strong>&nbsp;<\/p>\n\n\n\n<p>Today\u2019s cyberattacks are more sophisticated, frequent, and damaging than ever. From ransomware to insider threats, every layer of the digital enterprise is at risk. Meanwhile, IT complexity continues to grow \u2014 spanning on-prem, cloud, and edge deployments.&nbsp;<\/p>\n\n\n\n<p>The solution? Build security into every layer of the infrastructure \u2014 starting at the <strong>platform level<\/strong>, then extending through the <strong>network<\/strong>, <strong>data<\/strong>, \u0914\u0930 <strong>applications<\/strong>.&nbsp;<\/p>\n\n\n\n<p>With Nutanix, this principle is foundational. Rather than relying on disparate third-party tools, organizations gain access to <strong>native security features<\/strong> that are designed to work together \u2014 reducing risk while simplifying operations.&nbsp;<\/p>\n\n\n\n<p class=\"has-large-font-size\"><strong>Platform-Level Security: Compliance-Ready from Day One<\/strong>&nbsp;<\/p>\n\n\n\n<p>The Nutanix Cloud Platform is designed with <strong>Zero Trust architecture<\/strong> at its core. That means:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Role-based access control<\/strong> \u0914\u0930 <strong>multi-factor authentication<\/strong> are natively supported.\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Every change is logged and auditable.\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Systems are hardened by default and align with <strong>security benchmarks like STIG<\/strong> \u0914\u0930 <strong>CIS<\/strong> out of the box.\u00a0<\/li>\n<\/ul>\n\n\n\n<p>Even more compelling: Nutanix\u2019s <strong>self-healing infrastructure security<\/strong> automatically detects and remediates configuration drift \u2014 ensuring continuous compliance with industry standards and internal policies.&nbsp;<\/p>\n\n\n\n<p>Security isn\u2019t just available \u2014 it\u2019s automated, persistent, and intelligent.&nbsp;<\/p>\n\n\n\n<p class=\"has-large-font-size\"><strong>Network Security with Nutanix Flow: Microsegmentation Made Easy<\/strong>&nbsp;<\/p>\n\n\n\n<p>Modern cyberattacks often exploit lateral movement within networks. Nutanix Flow addresses this head-on with <strong>microsegmentation<\/strong>, giving IT teams precise control over east-west traffic between workloads.&nbsp;<\/p>\n\n\n\n<p>Flow supports:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Per-VNIC policy enforcement<\/strong>\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Application-centric security policies<\/strong>\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Built-in <strong>network visualization<\/strong> to map communication patterns\u00a0<\/li>\n<\/ul>\n\n\n\n<p>This allows organizations to <strong>implement Zero Trust policies<\/strong> without deploying complex, external firewalls or agents. Everything is integrated \u2014 and fully manageable via the Nutanix UI or API.&nbsp;<\/p>\n\n\n\n<p>Whether you\u2019re segmenting environments for compliance or isolating high-value assets, Nutanix Flow brings enterprise-grade network security into the core platform.&nbsp;<\/p>\n\n\n\n<p class=\"has-large-font-size\"><strong>Data Security: Visibility, Protection, and Ransomware Defense<\/strong>&nbsp;<\/p>\n\n\n\n<p>Unstructured data continues to explode \u2014 and with it, the risk of exposure. Nutanix tackles this with <strong>Data Lens<\/strong>, a visibility and protection solution purpose-built for unstructured data environments.&nbsp;<\/p>\n\n\n\n<p>Key capabilities include:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>AI-powered cyber threat detection<\/strong> to identify anomalous access behavior\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Ransomware protection<\/strong> with early warning signals\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Detailed <strong>auditing and access pattern insights<\/strong>\u00a0<\/li>\n<\/ul>\n\n\n\n<p>Combined with <strong>immutable snapshots<\/strong> \u0914\u0930 <strong>near-instant recovery<\/strong>, Data Lens strengthens your organization\u2019s ability to prevent, detect, and recover from attacks targeting file shares and object storage.&nbsp;<\/p>\n\n\n\n<p class=\"has-large-font-size\"><strong>Database Security: Built-In Automation and Governance<\/strong>&nbsp;<\/p>\n\n\n\n<p>Databases are among the most targeted assets in any organization. Nutanix Database Service (NDB) provides <strong>database security and automation<\/strong> that helps secure data without slowing down developers or DBAs.&nbsp;<\/p>\n\n\n\n<p>NDB offers:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Secure provisioning via <strong>role-based access controls<\/strong>\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Data masking and backup policies<\/strong> embedded into workflows\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Support for <strong>multi-cloud DR and encryption<\/strong>\u00a0<\/li>\n<\/ul>\n\n\n\n<p>Security is seamlessly integrated into the database lifecycle \u2014 not tacked on after deployment. This supports a <strong>DevSecOps model<\/strong>, where developers can move fast without compromising compliance or governance.&nbsp;<\/p>\n\n\n\n<p class=\"has-large-font-size\"><strong>Integrated Disaster Recovery and Data Protection<\/strong>&nbsp;<\/p>\n\n\n\n<p>Resilience is a key pillar of any strong security strategy. Nutanix provides <strong>integrated disaster recovery and data protection<\/strong> capabilities that help ensure business continuity even during an attack or system failure.&nbsp;<\/p>\n\n\n\n<p>With features like:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Native replication and DR orchestration<\/strong>\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Instantaneous snapshots<\/strong>\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Automated failover and failback<\/strong>\u00a0<\/li>\n<\/ul>\n\n\n\n<p>\u2026organizations can confidently meet recovery time and recovery point objectives (RTO\/RPO) without additional third-party tooling.&nbsp;<\/p>\n\n\n\n<p>This is resilience by design \u2014 deeply embedded into the infrastructure layer.&nbsp;<\/p>\n\n\n\n<p class=\"has-large-font-size\"><strong>A Unified, Built-In Security Model for Modern IT<\/strong>&nbsp;<\/p>\n\n\n\n<p>What sets Nutanix apart is its belief that security should not be separate from IT operations \u2014 it should be woven into the <strong>platform DNA<\/strong>.&nbsp;<\/p>\n\n\n\n<p>By delivering <strong>built-in cybersecurity for hybrid cloud<\/strong>, Nutanix helps organizations:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Reduce operational complexity\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\u00a0Accelerate threat detection and response\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\u00a0Stay continuously compliant\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\u00a0Simplify governance across on-prem and cloud environments\u00a0<\/li>\n<\/ul>\n\n\n\n<p>\u0938\u093e\u0925 <strong>AI-powered cyber threat detection<\/strong>, <strong>zero trust networking<\/strong>, <strong>self-healing infrastructure<\/strong>, \u0914\u0930 <strong>deep data visibility<\/strong>, security becomes a <strong>shared responsibility \u2014 made practical.<\/strong>&nbsp;<\/p>\n\n\n\n<p class=\"has-large-font-size\"><strong>Final Thoughts: Security Built for Scale, Simplicity, and Trust<\/strong>&nbsp;<\/p>\n\n\n\n<p>In a world where attacks are relentless and complexity is growing, <strong>built-in security is the only scalable answer<\/strong>.&nbsp;<\/p>\n\n\n\n<p>With Nutanix, security is no longer an external process or a fragmented set of tools. It&#8217;s an <strong>integrated strategy<\/strong> \u2014 spanning infrastructure, data, networks, and applications \u2014 designed to evolve with your business.&nbsp;<\/p>\n\n\n\n<p>If your teams are navigating audits, compliance, AI threats, or DevSecOps initiatives, it\u2019s time to consider a platform that\u2019s secure by design, not by chance.&nbsp;<\/p>\n\n\n\n<p class=\"has-large-font-size\">\u0938\u0902\u092a\u0930\u094d\u0915 \u092e\u0947\u0902 \u0930\u0939\u094b<\/p>\n\n\n\n<script charset=\"utf-8\" type=\"text\/javascript\" src=\"\/\/js.hsforms.net\/forms\/embed\/v2.js\"><\/script>\n<script>\n  hbspt.forms.create({\n    portalId: \"46409174\",\n    formId: \"56324e25-90bb-4358-acad-9ba8e890ca86\",\n    region: \"na1\"\n  });\n<\/script>\n\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>\u090f\u092a\u093f\u0938\u094b\u0921 \u0935\u093f\u0935\u0930\u0923:<\/strong><\/p>\n\n\n\n<p>o far in 2025, enterprises have faced a surge in sophisticated cyberattacks \u2014 with ransomware, data breaches, and social engineering attacks dominating the threat landscape. AI is playing an increasing role in attacks. Almost 9 in 10 global organizations (87%) faced an AI-powered cyber attack in the last year. Recent cuts in funding for the Cybersecurity and Infrastructure Security Agency (CISA) may add to the cyber risks that enterprises face.\u00a0<\/p>\n\n\n\n<p>\u092c\u094d\u0932\u0949\u0917 \u092d\u0947\u091c\u093e: <a href=\"https:\/\/www.nutanix.com\/blog\/engineered-differently-built-in-security-across-platform-data-network-and-apps#\">https:\/\/www.nutanix.com\/blog\/engineered-differently-built-in-security-across-platform-data-network-and-apps#<\/a><\/p>\n\n\n\n<p>\u0939\u094b\u0938\u094d\u091f: \u092b\u093f\u0932 \u0938\u0947\u0932\u0930\u094d\u0938, \u091c\u093c\u0947\u0928\u091f\u0947\u0917\u094d\u0930\u093e<\/p>\n\n\n\n<p>\u0938\u0939-\u0939\u094b\u0938\u094d\u091f: \u091c\u093f\u0930\u093e\u0939 \u0915\u0949\u0915\u094d\u0938, \u0928\u0941\u091f\u0948\u0928\u093f\u0915\u094d\u0938<\/p>\n\n\n\n<p>Co-Host: Andy Greene, XenTegra<\/p>\n\n\n\n<p>\u0938\u0939-\u092e\u0947\u091c\u092c\u093e\u0928: \u0915\u094d\u0930\u093f\u0938 \u0915\u0948\u0932\u0939\u0949\u0928, \u091c\u093c\u0947\u0928\u091f\u0947\u0917\u094d\u0930\u093e<\/p>\n\n\n\n<div class=\"transcript\">\n<p><!--block-->\u0935\u0947\u092c\u0935\u0940\u091f\u0940\u091f\u0940<\/p>\n<p>1<br>00:00:03.110 &#8211;&gt; 00:00:13.890<br>Philip Sellers: Hey again, and welcome to another episode of Nutanix Weekly. I&#8217;m your host, Phil Sellers, the Practice Director for Modern Data Center here at Zentagra.<\/p>\n<p>2<br>00:00:14.290 &#8211;&gt; 00:00:30.490<br>Philip Sellers: This podcast, along with so many others that we have coming at us Integra, is something we like to call Content with Context. We scour the internet for the best content around the topics we&#8217;re covering, and then try to bring our real-world context to the conversation.<\/p>\n<p>3<br>00:00:30.720 &#8211;&gt; 00:00:38.129<br>Philip Sellers: But conversation&#8217;s not one-sided. I have to have friends on the podcast to make this thing happen, so,<\/p>\n<p>4<br>00:00:38.310 &#8211;&gt; 00:00:47.660<br>Philip Sellers: Please welcome, some of my friends, Andy Green, a Solutions Architect here at Zentegra. Andy, how&#8217;s things going today?<\/p>\n<p>5<br>00:00:48.600 &#8211;&gt; 00:00:51.070<br>Andy Greene: Going well. Excited to be here.<\/p>\n<p>6<br>00:00:51.070 &#8211;&gt; 00:01:05.869<br>Philip Sellers: Yeah, you know, hopefully the rain outside today has not got you too far down. You may not even know that it&#8217;s raining. You&#8217;ve been heads down in work all day, I&#8217;m sure, but it&#8217;s raining outside.<\/p>\n<p>7<br>00:01:05.870 &#8211;&gt; 00:01:12.469<br>Andy Greene: We had a beautiful weekend in North Carolina, and if it had to rain, Monday was the perfect day for it to happen.<\/p>\n<p>8<br>00:01:12.470 &#8211;&gt; 00:01:26.500<br>Philip Sellers: Hey, I like that attitude. You found a, a silver lining, for sure, in those clouds. Chris Calhoun&#8217;s also here, another Solutions Architect on my team, here at Zentagra. Chris, how are you on a gray day?<\/p>\n<p>9<br>00:01:27.020 &#8211;&gt; 00:01:31.370<br>Chris Calhoun | XenTegra: Not quite as fantastic as I usually am.<\/p>\n<p>10<br>00:01:31.710 &#8211;&gt; 00:01:32.560<br>Philip Sellers: fair?<\/p>\n<p>11<br>00:01:32.700 &#8211;&gt; 00:01:34.990<br>Chris Calhoun | XenTegra: Pretty good, pretty good start to the week.<\/p>\n<p>12<br>00:01:35.140 &#8211;&gt; 00:01:47.080<br>Philip Sellers: Yeah, normally his answer is fantastic, so, not as fantastic, but that&#8217;s okay. As Andy pointed out, at least it&#8217;s a workday, and not the weekend. We got a beautiful weekend.<\/p>\n<p>13<br>00:01:47.080 &#8211;&gt; 00:01:47.790<br>Chris Calhoun | XenTegra: after that.<\/p>\n<p>14<br>00:01:48.540 &#8211;&gt; 00:02:00.010<br>Philip Sellers: And we&#8217;re also joined with Jair Cox, a principal architect for Nutanix, and very good friend of the podcast, been here pretty much since the beginning.<\/p>\n<p>15<br>00:02:00.420 &#8211;&gt; 00:02:06.070<br>Philip Sellers: I would say 99% of our episodes, you&#8217;ve been a part of.<\/p>\n<p>16<br>00:02:07.100 &#8211;&gt; 00:02:14.519<br>Jirah Cox: And\u2026 and happy to be a part of this one, too! I, as we keep on, you know, muddling our way through<\/p>\n<p>17<br>00:02:14.910 &#8211;&gt; 00:02:30.969<br>Jirah Cox: technology changes of varying degrees. I was just reading about how it took, like, 40 years just to get adoption of barcodes for, like, supermarket goods. So, you know, if you&#8217;re listening to this and you&#8217;re thinking about technology changes.<\/p>\n<p>18<br>00:02:31.000 &#8211;&gt; 00:02:37.730<br>Jirah Cox: Just know sometimes these things can take a very long time, but hopefully we can help you shortcut that, that process.<\/p>\n<p>19<br>00:02:38.050 &#8211;&gt; 00:02:52.580<br>Philip Sellers: Well, and it&#8217;s interesting you bring up barcodes in the supermarket. I saw an article over the weekend that now, if you think to go into Best Buy and the digital price tags that they have in front of all the products.<\/p>\n<p>20<br>00:02:52.880 &#8211;&gt; 00:03:06.570<br>Philip Sellers: Those are starting to come to the grocery stores, too, and it&#8217;s the first step towards dynamic pricing inside of a store. So you think about dynamic pricing that happens on Amazon and things like that, they raise and lower prices to test us out.<\/p>\n<p>21<br>00:03:06.980 &#8211;&gt; 00:03:09.689<br>Philip Sellers: That may be coming to a store near you in the near future.<\/p>\n<p>22<br>00:03:09.940 &#8211;&gt; 00:03:15.590<br>Jirah Cox: I think Christmas Day just got a little bit less fantastic learning about surge pricing for groceries.<\/p>\n<p>23<br>00:03:15.590 &#8211;&gt; 00:03:21.620<br>Philip Sellers: Yeah, I&#8217;m judged by Chris&#8217;s face that that&#8217;s not good news for him.<\/p>\n<p>24<br>00:03:22.010 &#8211;&gt; 00:03:23.200<br>Chris Calhoun | XenTegra: No thanks.<\/p>\n<p>25<br>00:03:24.790 &#8211;&gt; 00:03:26.570<br>Chris Calhoun | XenTegra: Unsubscribe from that.<\/p>\n<p>26<br>00:03:26.570 &#8211;&gt; 00:03:39.979<br>Philip Sellers: But the same goes, like, the only thing constant is change, and especially in the IT industry, we&#8217;ve been faced with a lot of change. We&#8217;ve also been faced with new challenges we didn&#8217;t see coming,<\/p>\n<p>27<br>00:03:40.120 &#8211;&gt; 00:03:54.460<br>Philip Sellers: The blog post we&#8217;re talking about today is from Nutanix.com slash blog. It&#8217;s called Built-in Security Across Platform, Data, Network, and Applications. It&#8217;s written by Jason Burns and Eric Walters.<\/p>\n<p>28<br>00:03:54.460 &#8211;&gt; 00:04:11.940<br>Philip Sellers: Just want to say shout out to Jason Burns, who has done an awful lot of collaboration with the team here at Zentagra, most of our managed services products, and especially Nutanix Flow. Jason&#8217;s been really instrumental in helping us over the years, so shout out to Eric and Jason.<\/p>\n<p>29<br>00:04:12.560 &#8211;&gt; 00:04:32.349<br>Philip Sellers: But, you know, backing up to the point, the only thing constant is change. We&#8217;ve got a lot of change that&#8217;s happened this year alone when it comes to cybersecurity and, really cyber attacks. There&#8217;s a lot more sophisticated cyber attacks that are coming.<\/p>\n<p>30<br>00:04:32.480 &#8211;&gt; 00:04:44.580<br>Philip Sellers: You know, as the article kind of points out, almost 9 in 10 global organizations, 87%, faced some type of AI-powered cyber attack in the last year.<\/p>\n<p>31<br>00:04:44.810 &#8211;&gt; 00:04:57.660<br>Philip Sellers: And that all comes on top of the fact that the federal government has cut funding to the Cybersecurity and Infrastructure Security Agency, or CISA, CESA,<\/p>\n<p>32<br>00:04:57.700 &#8211;&gt; 00:05:09.309<br>Philip Sellers: And that may be, you know, added risk to enterprises, because we&#8217;re not getting notifications of vulnerabilities and other services from CISA.<\/p>\n<p>33<br>00:05:09.550 &#8211;&gt; 00:05:17.890<br>Philip Sellers: Yeah, that&#8217;s a considerable amount of risk increasing in just a calendar year.<\/p>\n<p>34<br>00:05:18.700 &#8211;&gt; 00:05:20.950<br>Philip Sellers: But the good news is that\u2026<\/p>\n<p>35<br>00:05:21.360 &#8211;&gt; 00:05:33.510<br>Philip Sellers: from a Nutanix perspective, they&#8217;ve approached infrastructure as security first, security integrated. And, I don&#8217;t know\u2026 guys, have any of you read the Phoenix Project?<\/p>\n<p>36<br>00:05:34.950 &#8211;&gt; 00:05:50.930<br>Philip Sellers: So, Jairah, I&#8217;ll pose this question to you. This was required reading in my last job, and it&#8217;s a book that I love, because it tells a great story, but the cybersecurity guy in the Phoenix Project, he was basically the land of no.<\/p>\n<p>37<br>00:05:51.210 &#8211;&gt; 00:06:01.759<br>Philip Sellers: And, his teammates didn&#8217;t really care for him, but what did he learn as kind of a principal learning during the course of the Phoenix Project?<\/p>\n<p>38<br>00:06:04.470 &#8211;&gt; 00:06:09.010<br>Jirah Cox: You know, that&#8217;s a good question, Phil, and I think\u2026 I think both\u2026 I mean, obviously I know, but I think\u2026<\/p>\n<p>39<br>00:06:09.010 &#8211;&gt; 00:06:15.120<br>Philip Sellers: Chris and Andy and all of our listeners would appreciate you kind of restating it in your words. Sorry, I thought you owned completely.<\/p>\n<p>40<br>00:06:15.120 &#8211;&gt; 00:06:16.439<br>Chris Calhoun | XenTegra: Good answer! Good answer!<\/p>\n<p>41<br>00:06:16.440 &#8211;&gt; 00:06:27.160<br>Philip Sellers: Hey, it&#8217;s that security is in the middle of everything. It shouldn&#8217;t be a bolt-on. It should be something that is a thread throughout the story.<\/p>\n<p>42<br>00:06:27.160 &#8211;&gt; 00:06:41.349<br>Philip Sellers: And that&#8217;s what I love about Nutanix, is that they have taken and adopted that. Security is baked into everything. And Jairah, I am so sorry. I did not mean to throw you for a loop there, man.<\/p>\n<p>43<br>00:06:41.350 &#8211;&gt; 00:06:42.879<br>Jirah Cox: Oh, good! Keeps me on my toes.<\/p>\n<p>44<br>00:06:42.880 &#8211;&gt; 00:06:59.419<br>Philip Sellers: So yeah, you know, as we talk about this blog post today, you know, there&#8217;s really a lot of different aspects we&#8217;re going to kind of talk about, but the Nutanix difference is stated here, it is security that is built in, not bolted on.<\/p>\n<p>45<br>00:06:59.420 &#8211;&gt; 00:07:17.180<br>Philip Sellers: And that&#8217;s by design. At every level, from the platform, the data, the network, and the application, Nutanix Cloud Platform lets you protect your apps and data against cyber attacks and data loss. So we&#8217;re gonna dig into this and talk about it, because I think it&#8217;s a really important topic, it&#8217;s timely.<\/p>\n<p>46<br>00:07:17.180 &#8211;&gt; 00:07:24.790<br>Philip Sellers: I may actually bump a couple blog posts to get this one out, or excuse me, a couple podcast episodes to get this out quicker.<\/p>\n<p>47<br>00:07:25.350 &#8211;&gt; 00:07:28.029<br>Philip Sellers: Because I do believe this is something people\u2026<\/p>\n<p>48<br>00:07:28.630 &#8211;&gt; 00:07:45.759<br>Philip Sellers: need to hear. Cybersecurity is something that needs to be integrated at every level of your business, at every level of your decisioning, and it does not need to be an afterthought. So let&#8217;s\u2026 let&#8217;s talk about, a little bit, the Nutanix difference. I&#8217;m going to throw to you first, Jairah.<\/p>\n<p>49<br>00:07:46.190 &#8211;&gt; 00:07:54.010<br>Philip Sellers: what is\u2026 kind of the platform difference for, Nutanix.<\/p>\n<p>50<br>00:07:55.030 &#8211;&gt; 00:07:56.660<br>Jirah Cox: So,<\/p>\n<p>51<br>00:07:56.780 &#8211;&gt; 00:08:04.250<br>Jirah Cox: as we live in this security space, right, where we&#8217;ve all heard the phrase, defense in depth, right, security for us is not one thing, and we&#8217;ll spend<\/p>\n<p>52<br>00:08:04.450 &#8211;&gt; 00:08:21.019<br>Jirah Cox: the rest of the episode probably unpacking this. Security for us is, is a whole bunch of things, right? It&#8217;s across the entire stack, across lots of various aspects and offerings, and it&#8217;s for that\u2026 getting that layers of protection, right? So, of course, at the base level, it&#8217;s infrastructure. That&#8217;s got to be hardened, gotta be secure.<\/p>\n<p>53<br>00:08:21.020 &#8211;&gt; 00:08:29.659<br>Jirah Cox: At just how do we exist, right? As we host customer data and are a steward of that, that&#8217;s got to be absolutely, unimpeachably, thoroughly secure.<\/p>\n<p>54<br>00:08:29.690 &#8211;&gt; 00:08:37.520<br>Jirah Cox: Moving up, of course, there&#8217;s networking, you know, at the VM level, at the network level, that needs to be secured as well.<\/p>\n<p>55<br>00:08:37.520 &#8211;&gt; 00:08:57.219<br>Jirah Cox: how do we do things like data protection for DR? And then getting into the app level, right? How do we offer application and data services? How do we, you know, add security to things like containers, to VMs, right? Wherever\u2026 however that application is shaped, we need to be able to have a thorough, baked-in, to your point, security offering for that.<\/p>\n<p>56<br>00:08:58.170 &#8211;&gt; 00:09:06.290<br>Philip Sellers: Yeah, it is important, and baked in is exactly how I would describe what Nutanix is delivering, because<\/p>\n<p>57<br>00:09:06.700 &#8211;&gt; 00:09:11.109<br>Philip Sellers: Yo, out of the box\u2026 You have a secure state.<\/p>\n<p>58<br>00:09:11.330 &#8211;&gt; 00:09:18.770<br>Philip Sellers: you know, I remember a time with Microsoft where there\u2026 baseline\u2026<\/p>\n<p>59<br>00:09:19.120 &#8211;&gt; 00:09:24.670<br>Philip Sellers: something analyzers, MBPA, I think was the acronym,<\/p>\n<p>60<br>00:09:24.790 &#8211;&gt; 00:09:29.700<br>Philip Sellers: Helped you establish that baseline, helped you get to a secure place.<\/p>\n<p>61<br>00:09:29.840 &#8211;&gt; 00:09:36.859<br>Philip Sellers: The difference with Nutanix is you&#8217;re secure out of the box. Tell us how that&#8217;s done.<\/p>\n<p>62<br>00:09:37.640 &#8211;&gt; 00:09:54.079<br>Jirah Cox: Sure. The biggest one that we&#8217;ve had, the longest, because it was asked for by some of our earliest customers in our history, right, is aligning to, Department of Defense, STIG guidelines, right? They&#8217;re secure technical implementation guides, which say, if you&#8217;re gonna run this, configure it this way.<\/p>\n<p>63<br>00:09:54.380 &#8211;&gt; 00:10:09.610<br>Jirah Cox: we taught our systems how to self-harden themselves to those baselines, a long, long time ago, and we&#8217;ve maintained that. So, it&#8217;s as little as one instruction, right, from the operator to the system to say, pardon yourself to that, DoD baseline.<\/p>\n<p>64<br>00:10:09.610 &#8211;&gt; 00:10:27.769<br>Jirah Cox: And the system can then even monitor its compliance to that baseline, and will re-heal if someone monkeys with it, right? If I go in and say, or reduce, like, say, SSH from a key-based authentication down to, like, password, we&#8217;ll catch that, we&#8217;ll automatically alert on that, and then re-heal back to the stated desired baseline.<\/p>\n<p>65<br>00:10:27.820 &#8211;&gt; 00:10:45.150<br>Jirah Cox: So, that&#8217;s huge. One of our recent improvements, right, to go from oldest to newest, I love our security dashboard, right? So, in the product, we now give the customer and the administrator a dashboard that helps them understand, hey, how secure is my posture here, right? What do I also need to consider?<\/p>\n<p>66<br>00:10:45.150 &#8211;&gt; 00:10:56.470<br>Jirah Cox: To get to a secure deployment, right? Things like, you know, we&#8217;ll touch more on this, that network micro-segmentation, even that stig posture, any kind of, high severity patching that&#8217;s required.<\/p>\n<p>67<br>00:10:56.470 &#8211;&gt; 00:11:07.230<br>Jirah Cox: network security policies, things like that. We can give you a dashboard that you can even give to your security teams, right, so that they can get visibility as well as stakeholders of the platform into how secure it is.<\/p>\n<p>68<br>00:11:08.000 &#8211;&gt; 00:11:22.260<br>Jirah Cox: Obviously, zero trust, right? Commonly means starting with, like, network-level micro-segmentation, where we help out with, how do we help wrap a firewall around a virtual machine so that we can actually enforce policy into and out of that virtual machine for what it can talk to.<\/p>\n<p>69<br>00:11:22.430 &#8211;&gt; 00:11:39.449<br>Jirah Cox: A great enhancement that just shipped recently from us that I was doing some reading on is we can now enforce that on a per-VNIC basis, not just a per-VM basis. So that means I can now have, like, an internal and an external NIC, and have different security policies for what each virtual adapter on the virtual machine can talk to.<\/p>\n<p>70<br>00:11:39.450 &#8211;&gt; 00:11:45.870<br>Jirah Cox: So, even more dynamic ability to apply those policies, and target where I need that control to be.<\/p>\n<p>71<br>00:11:45.970 &#8211;&gt; 00:11:55.540<br>Jirah Cox: And then, of course, managing the vulnerabilities and upgrades, right? So, all software, needs patching. All software has flaws, because it&#8217;s all made by humans.<\/p>\n<p>72<br>00:11:55.590 &#8211;&gt; 00:12:13.940<br>Jirah Cox: Very timely statement, as you can tell I&#8217;m saying that in 2025. Maybe in the future, we&#8217;ll have software not made by humans, but today, so far, all software made or aided by humans, so some bugs do ship. So sometimes the way to fix those is to patch. So how do we help make it easier for customers to patch, to know when they need to patch, to get them applied to their clusters.<\/p>\n<p>73<br>00:12:13.940 &#8211;&gt; 00:12:17.329<br>Jirah Cox: With, of course, table stakes for that is zero downtime.<\/p>\n<p>74<br>00:12:17.330 &#8211;&gt; 00:12:39.069<br>Jirah Cox: and automating the entire process, right? So you just tell us when to apply patches, and which code version you want to move to, and then our native LCM engine, which does lifecycle management, knows how to take those patches, fetch them from either our support portal, or you can host an internal repository and apply them to your one cluster, your dozens of clusters, your hundreds of clusters, same process at any scale.<\/p>\n<p>75<br>00:12:40.410 &#8211;&gt; 00:12:56.619<br>Philip Sellers: So, Andy, you know, as we talk about the self-healing stick, you know, configuration drift is a really, real problem. You know, we talk about it with our VDI heritage. Every time you make hone of a virtual machine, it&#8217;s an exact copy, right?<\/p>\n<p>76<br>00:12:56.700 &#8211;&gt; 00:13:05.769<br>Philip Sellers: But how long does it stay an exact copy? And configuration drift is a real big problem with most other infrastructure systems.<\/p>\n<p>77<br>00:13:06.530 &#8211;&gt; 00:13:14.839<br>Philip Sellers: how does this, you know\u2026 and I guess, how pervasive is that configuration drift problem based on what you&#8217;ve seen working with customers?<\/p>\n<p>78<br>00:13:15.760 &#8211;&gt; 00:13:24.060<br>Andy Greene: Yeah, it&#8217;s definitely, an issue. It&#8217;s definitely out there. You know, one thing that we see is that we live in a<\/p>\n<p>79<br>00:13:24.060 &#8211;&gt; 00:13:37.020<br>Andy Greene: world where our clients tend to be managing many different sites, right? We may have a hybrid cloud model where we have some on-prem workloads, we&#8217;re operating in the hyperscalers.<\/p>\n<p>80<br>00:13:37.020 &#8211;&gt; 00:13:50.319<br>Andy Greene: We may have brought compute to the edge sites, and as a result of that, you know, we have many different environments that we need to monitor. So bringing all of this into a single platform with those self-healing capabilities that we just talked about.<\/p>\n<p>81<br>00:13:50.320 &#8211;&gt; 00:14:01.590<br>Andy Greene: You know, goes a long way towards making sure that as we stand up new environments, as we, make changes in a singular environment, as one engineer makes one change.<\/p>\n<p>82<br>00:14:01.590 &#8211;&gt; 00:14:10.879<br>Andy Greene: that those changes aren&#8217;t impacting that security baseline that we&#8217;ve set for the organization. And, you know, if we do make any of those changes, like Jaira called out.<\/p>\n<p>83<br>00:14:10.880 &#8211;&gt; 00:14:22.069<br>Andy Greene: the self-healing capability of that machine-readable STIG will come into play, and it&#8217;ll alert administrators, and in some cases, set itself back to that security baseline.<\/p>\n<p>84<br>00:14:23.660 &#8211;&gt; 00:14:27.419<br>Philip Sellers: Yeah, and the fact is, you hit a key topic.<\/p>\n<p>85<br>00:14:28.430 &#8211;&gt; 00:14:30.280<br>Philip Sellers: It does it on its own.<\/p>\n<p>86<br>00:14:30.610 &#8211;&gt; 00:14:49.569<br>Philip Sellers: So, with someone heads down managing other systems, this isn&#8217;t something that&#8217;s going to go unresolved. It&#8217;s going to show up as an alert, or it&#8217;s going to get fixed on its own. So, that&#8217;s the nirvana state, right, for a busy administrator. And so, that&#8217;s one of the key differences to me.<\/p>\n<p>87<br>00:14:49.710 &#8211;&gt; 00:14:52.690<br>Philip Sellers: Versus other infrastructure solutions.<\/p>\n<p>88<br>00:14:52.920 &#8211;&gt; 00:15:01.229<br>Philip Sellers: Chris, you know, vulnerabilities, you know, as Jairus said, at least today, you know, AI&#8217;s changing things with AI-generated code.<\/p>\n<p>89<br>00:15:01.340 &#8211;&gt; 00:15:11.180<br>Philip Sellers: But, you know, vulnerabilities are there, and I would argue at the state where we&#8217;re at today, AI-generated code can be less<\/p>\n<p>90<br>00:15:11.600 &#8211;&gt; 00:15:14.510<br>Philip Sellers: Compliant and less secure.<\/p>\n<p>91<br>00:15:14.800 &#8211;&gt; 00:15:27.259<br>Philip Sellers: than human-written code. I saw a meme where it showed a straight railroad track, and then it showed AI-generated code as the next one, and it had rails going all over each other.<\/p>\n<p>92<br>00:15:27.350 &#8211;&gt; 00:15:35.510<br>Philip Sellers: And I think it&#8217;s an appropriate meme, right? You know, it&#8217;s more complicated code today as AI is figuring out how to code.<\/p>\n<p>93<br>00:15:35.980 &#8211;&gt; 00:15:38.840<br>Philip Sellers: But, vulnerabilities happen, you know.<\/p>\n<p>94<br>00:15:38.940 &#8211;&gt; 00:15:47.550<br>Philip Sellers: LCM&#8217;s a great additional feature to same point as Andy was getting at simplicity in the platform.<\/p>\n<p>95<br>00:15:47.720 &#8211;&gt; 00:15:51.830<br>Philip Sellers: Can you talk a little bit about the Vulnerability Management and Lifecycle Manager?<\/p>\n<p>96<br>00:15:52.230 &#8211;&gt; 00:16:05.899<br>Chris Calhoun | XenTegra: Absolutely, because to me, this is\u2026 this is definitely, it hits home from my past, because I remember the days of having to analyze a matrix of compatibility from past,<\/p>\n<p>97<br>00:16:06.660 &#8211;&gt; 00:16:23.450<br>Chris Calhoun | XenTegra: fiber channel adapters matching up with versions of VMware ESX. Which one comes first? Oops, did I read the small asterisk? And then, did I then apply the second asterisk before the fir- and just that approach alone made<\/p>\n<p>98<br>00:16:23.770 &#8211;&gt; 00:16:25.340<br>Chris Calhoun | XenTegra: patching scary.<\/p>\n<p>99<br>00:16:25.750 &#8211;&gt; 00:16:44.050<br>Chris Calhoun | XenTegra: vulnerability management scary, you know, just as a whole, because you wanted to almost turn a blind eye because I don&#8217;t want to touch it. You know, it kind of goes back to that day one, it&#8217;s pristine, it&#8217;s in good condition, it&#8217;s the most secure, and then from there, it&#8217;s all downhill. You know, from<\/p>\n<p>100<br>00:16:44.050 &#8211;&gt; 00:16:46.270<br>Chris Calhoun | XenTegra: We&#8217;ll say past technologies.<\/p>\n<p>101<br>00:16:46.280 &#8211;&gt; 00:16:49.269<br>Chris Calhoun | XenTegra: But obviously, in\u2026<\/p>\n<p>102<br>00:16:49.420 &#8211;&gt; 00:17:01.829<br>Chris Calhoun | XenTegra: respect to LCM specifically. To me, that&#8217;s a fantastic way of Nutanix taking a difficult concept and making it simple for end users. It&#8217;s really, hey, look.<\/p>\n<p>103<br>00:17:01.830 &#8211;&gt; 00:17:10.879<br>Chris Calhoun | XenTegra: Because of the, hardware compatibility list that&#8217;s built into Nutanix, it aids in the simplicity of<\/p>\n<p>104<br>00:17:10.880 &#8211;&gt; 00:17:25.050<br>Chris Calhoun | XenTegra: keeping your environment up to date. It&#8217;ll do the scan for you, it applies the updates in the order that it needs, and I really think that that&#8217;s just a part of the overall functionality of Nutanix, but even more so that<\/p>\n<p>105<br>00:17:25.530 &#8211;&gt; 00:17:38.470<br>Chris Calhoun | XenTegra: I would say it&#8217;s less vulnerable than some of the competitors. I remember days past as a customer where there was a day zero vulnerability out pretty much once or twice a month.<\/p>\n<p>106<br>00:17:38.760 &#8211;&gt; 00:17:55.880<br>Chris Calhoun | XenTegra: And if you were a large customer, you just barely got everything patched before the next round of vulnerabilities came in. So, to me, that&#8217;s a big difference in the approach that now Nutanix is taking for simplicity, and just making the life of a day-to-day engineer much easier.<\/p>\n<p>107<br>00:17:56.640 &#8211;&gt; 00:17:59.109<br>Jirah Cox: Yeah, I think that&#8217;s part of the philosophy, is how do we make it\u2026<\/p>\n<p>108<br>00:17:59.350 &#8211;&gt; 00:18:01.960<br>Jirah Cox: Easier and more boring to patch more often.<\/p>\n<p>109<br>00:18:02.110 &#8211;&gt; 00:18:02.650<br>Chris Calhoun | XenTegra: Right.<\/p>\n<p>110<br>00:18:02.650 &#8211;&gt; 00:18:07.999<br>Jirah Cox: Because when you\u2026 when you have a hand in owning that infrastructure, if you&#8217;re a customer, you&#8217;ve\u2026<\/p>\n<p>111<br>00:18:08.080 &#8211;&gt; 00:18:22.290<br>Jirah Cox: heard me say this, like, the value prop to being a practitioner of, like, I manage the hardware firmware, I manage the, you know, HBA or the NIC firmware updates, it&#8217;s like, well, that&#8217;s kind of a zero-sum value prop to you as the practitioner, right? Either it&#8217;s<\/p>\n<p>112<br>00:18:22.330 &#8211;&gt; 00:18:34.919<br>Jirah Cox: either you do it so well that no one notices it, and all the redundancy works, and everything kicks in, and it&#8217;s one of those invisible IT, like, business forgets there&#8217;s value there, and that being done well, or\u2026<\/p>\n<p>113<br>00:18:35.650 &#8211;&gt; 00:18:48.959<br>Jirah Cox: if anyone in the business notices that it&#8217;s happening, that&#8217;s bad too, right? So, there&#8217;s no\u2026 there&#8217;s less and less value in being good at it, and the cost of failure there gets scarier and scarier. Therefore.<\/p>\n<p>114<br>00:18:49.000 &#8211;&gt; 00:18:58.709<br>Jirah Cox: That&#8217;s the value in, look, we automate the entire thing, we know how to do it for the full stack, you just tell us how far to upgrade to, which version, and when to start. And that&#8217;s it.<\/p>\n<p>115<br>00:18:58.850 &#8211;&gt; 00:19:11.399<br>Jirah Cox: Right, so that, to Chris&#8217;s point, how do we help do it faster, right? Again, to your point, Philip, Phoenix Project, great. How would I do it weekly? How would I do it daily? How would I make it boring and just in the fabric of existing with the platform?<\/p>\n<p>116<br>00:19:11.770 &#8211;&gt; 00:19:19.999<br>Philip Sellers: Yeah, safer. Safer is how I would sum that up, right? How do you do this in a way that it reduces risk within your organization?<\/p>\n<p>117<br>00:19:20.460 &#8211;&gt; 00:19:21.010<br>Chris Calhoun | XenTegra: Yeah.<\/p>\n<p>118<br>00:19:21.480 &#8211;&gt; 00:19:22.520<br>\u0915\u094d\u0930\u093f\u0938 \u0915\u0948\u0932\u0939\u094c\u0928 | \u091c\u0947\u0928\u091f\u0947\u0917\u094d\u0930\u093e: \u092c\u093f\u0932\u094d\u0915\u0941\u0932\u0964<\/p>\n<p>119<br>00:19:23.030 &#8211;&gt; 00:19:35.610<br>Philip Sellers: And, Chris, you are our resident former teacher. You&#8217;ve got some homework for everyone listening, because this blog post is pretty special. It&#8217;s got a lot of\u2026<\/p>\n<p>120<br>00:19:36.110 &#8211;&gt; 00:19:37.410<br>Philip Sellers: Extras.<\/p>\n<p>121<br>00:19:37.860 &#8211;&gt; 00:19:38.630<br>Chris Calhoun | XenTegra: Yes.<\/p>\n<p>122<br>00:19:38.790 &#8211;&gt; 00:19:54.549<br>Chris Calhoun | XenTegra: So, there are sections, obviously, throughout this, particular blog post that I think are absolutely foundationally fantastic for, those engineers, those admins, those upper-level executives that want to understand<\/p>\n<p>123<br>00:19:54.660 &#8211;&gt; 00:19:56.639<br>Chris Calhoun | XenTegra: how Nutanix is different.<\/p>\n<p>124<br>00:19:56.900 &#8211;&gt; 00:20:03.789<br>Chris Calhoun | XenTegra: This is a centralized post that pretty much talks about those components, and each one has<\/p>\n<p>125<br>00:20:03.860 &#8211;&gt; 00:20:19.509<br>Chris Calhoun | XenTegra: an included video from some of the Nutanix experts that you mentioned. Jason Burns has got a great one in here. Throughout the scrolling through are all of the names that are\u2026 and it&#8217;s not about name dropping, but it&#8217;s about content dropping.<\/p>\n<p>126<br>00:20:19.510 &#8211;&gt; 00:20:25.689<br>Chris Calhoun | XenTegra: This is a fantastic place to come for this particular article, just to understand<\/p>\n<p>127<br>00:20:25.690 &#8211;&gt; 00:20:35.740<br>Chris Calhoun | XenTegra: the holistic approach that Nutanix takes, the value of security. Whenever, obviously, Andy and I, our past, we\u2026<\/p>\n<p>128<br>00:20:35.810 &#8211;&gt; 00:20:49.939<br>Chris Calhoun | XenTegra: talk Nutanix security from day one, and that&#8217;s really built in the platform, and that&#8217;s, to me, the key differential that some folks haven&#8217;t recognized that goodness yet. So please come here.<\/p>\n<p>129<br>00:20:50.000 &#8211;&gt; 00:20:58.699<br>Chris Calhoun | XenTegra: Listen to the podcast first, give us a vote of 110,000, thumbs up, and\u2026<\/p>\n<p>130<br>00:20:58.970 &#8211;&gt; 00:21:08.330<br>Chris Calhoun | XenTegra: go listen to these videos, watch those, in your free time. I promise you, you&#8217;ll gain some understanding and appreciation from<\/p>\n<p>131<br>00:21:08.330 &#8211;&gt; 00:21:22.839<br>Chris Calhoun | XenTegra: one of the specific concepts that&#8217;ll help you in understanding the value of Nutanix. So, that&#8217;s the homework that I would recommend. Check out the videos, check out the blog, and check out this crazy crew of, cast of characters in our podcasts.<\/p>\n<p>132<br>00:21:23.250 &#8211;&gt; 00:21:25.260<br>Jirah Cox: And, teacher, that&#8217;s, due when?<\/p>\n<p>133<br>00:21:26.700 &#8211;&gt; 00:21:29.050<br>Chris Calhoun | XenTegra: By next episode.<\/p>\n<p>134<br>00:21:29.050 &#8211;&gt; 00:21:33.599<br>Philip Sellers: That&#8217;s fantastic. Thank you, Professor Calhoun.<\/p>\n<p>135<br>00:21:33.940 &#8211;&gt; 00:21:43.309<br>Philip Sellers: For everybody listening, you go watch the videos, we&#8217;re gonna send you, something for completing Nutanix 310 as assigned here from the podcast.<\/p>\n<p>136<br>00:21:43.700 &#8211;&gt; 00:21:44.330<br>Chris Calhoun | XenTegra: There you go.<\/p>\n<p>137<br>00:21:44.680 &#8211;&gt; 00:21:57.279<br>Philip Sellers: But, it is great. This is\u2026 we were talking before we started the recording today, this is a great introduction. If you&#8217;re looking at moving to Nutanix from VMware or from another platform.<\/p>\n<p>138<br>00:21:57.310 &#8211;&gt; 00:22:09.980<br>Philip Sellers: This is a great central blog post to kind of understand what it&#8217;s all about, how things work. So, there&#8217;s a ton of additional content linked to the blog post. Please do check that out.<\/p>\n<p>139<br>00:22:10.940 &#8211;&gt; 00:22:19.439<br>Philip Sellers: So let&#8217;s move to the next layer. We talked about the platform first, now let&#8217;s talk about the data. Data protection is core.<\/p>\n<p>140<br>00:22:19.600 &#8211;&gt; 00:22:29.080<br>Philip Sellers: There&#8217;s a lot of different ways around data protection, so we&#8217;re gonna highlight 3 of them. Jaira, what are those 3 for data protection?<\/p>\n<p>141<br>00:22:29.980 &#8211;&gt; 00:22:34.510<br>Jirah Cox: First one&#8217;s, data host encryption. Gotta do it, right? As we&#8217;re hosting data.<\/p>\n<p>142<br>00:22:34.700 &#8211;&gt; 00:22:44.800<br>Jirah Cox: Lots and lots of regulation can exist for lots of very good reasons, saying that data must be stored in an encrypted fashion, especially think about\u2026 think about IoT, think about AI at the edge.<\/p>\n<p>143<br>00:22:44.850 &#8211;&gt; 00:22:56.590<br>Jirah Cox: As the data lives closer to where perhaps end users or even less trusted users might reside, like, think point of sale, encryption&#8217;s got to be table stakes, and of course we have that. We specifically call out ours as being flexible.<\/p>\n<p>144<br>00:22:56.610 &#8211;&gt; 00:23:15.419<br>Jirah Cox: Because we can do it with or without specialized hardware. If you require specialized hardware encryption, we can, of course, comply with that. Software, of course, can run anywhere, and even can get integrated with, like, cloud-based key managers as well, when you have a cloud-based requirement to use a KMS as a service from, like, a hyperscaler as well.<\/p>\n<p>145<br>00:23:16.160 &#8211;&gt; 00:23:34.780<br>Jirah Cox: Business continuity and disaster recovery, right? Because again, part of security is availability, right? So therefore, part of an attack can be denial of availability. So then business continuity, disaster recovery, things like, how do we replicate your data from, location A to location B, or location A to B and C?<\/p>\n<p>146<br>00:23:34.880 &#8211;&gt; 00:23:45.330<br>Jirah Cox: And how fast, right? So, nightly, hourly, minutely, or even if you&#8217;re close enough that laws of physics support it, even full synchronous replication as well.<\/p>\n<p>147<br>00:23:45.440 &#8211;&gt; 00:23:53.600<br>Jirah Cox: How do we store that data using immutable snapshots? Immutable both in that they can&#8217;t be changed after they&#8217;re taken, but also immutable, like, we can prevent<\/p>\n<p>148<br>00:23:53.600 &#8211;&gt; 00:24:08.670<br>Jirah Cox: say, deletion by, like, a malicious admin account. So if I even had one of my users get, compromised and had full-on admin credentials to the cluster, maybe only one human isn&#8217;t allowed to delete that data. I need to have two humans approve that kind of action.<\/p>\n<p>149<br>00:24:09.320 &#8211;&gt; 00:24:25.930<br>Jirah Cox: How would I even store data up in, like, cloud-like formats? How can I take a snapshot from a running application on-prem, send that up to, like, say, AWS S3 storage as a usable snapshot? Well, that&#8217;s mostly 321 compliant, right? It&#8217;s not a backup, it&#8217;s, like, a 3.21 snapshot.<\/p>\n<p>150<br>00:24:25.930 &#8211;&gt; 00:24:30.019<br>Jirah Cox: But now I&#8217;ve got multiple copies, in multiple formats, in multiple availability zones.<\/p>\n<p>151<br>00:24:30.020 &#8211;&gt; 00:24:31.990<br>Jirah Cox: That&#8217;s pretty resilient.<\/p>\n<p>152<br>00:24:32.120 &#8211;&gt; 00:24:46.810<br>Jirah Cox: And then lastly, you know, how do you get visibility into that data, right? And something that we just, frankly, couldn&#8217;t say enough good things about if we tried to for data lens, right? Our eye in the sky, watching transactions into the unstructured data you host on the platform, so think<\/p>\n<p>153<br>00:24:46.810 &#8211;&gt; 00:24:53.749<br>Jirah Cox: file shares, think object shares, you know, that kind of stuff. I love about Datalens, how we&#8217;ve walked down<\/p>\n<p>154<br>00:24:53.750 &#8211;&gt; 00:25:07.620<br>Jirah Cox: that exposure window. When we first launched it, it was, like, 15 minutes of response time was our published, SLA there. We were at 10 minutes for a while. Now, this article called out 6 minutes or less for a threat containment window.<\/p>\n<p>155<br>00:25:07.620 &#8211;&gt; 00:25:26.460<br>Jirah Cox: for active ransomware doing bad things to my data, 6 minutes is pretty darn fast, where we can detect and alert and block that attack from happening, and then if you give us permission to, automatically recover that share to a prior known good point in time, which might be<\/p>\n<p>156<br>00:25:26.490 &#8211;&gt; 00:25:39.840<br>Jirah Cox: maybe 7 minutes ago, right? Get that share back online, automatically, zero human interaction, and let the business keep on moving forward in time with very, very little data loss. And then I can have my forensics teams come in, sweep the data that was touched.<\/p>\n<p>157<br>00:25:39.840 &#8211;&gt; 00:25:51.569<br>Jirah Cox: isolate it, you know, do what they need to do for that, for reporting, or, or selective restores, and, you know, as I&#8217;m doing all of that, I&#8217;m also moving forward in time and helping the business stay running.<\/p>\n<p>158<br>00:25:52.270 &#8211;&gt; 00:26:01.390<br>Philip Sellers: Yeah, love DataLens, love the\u2026 the purpose of that tool, and it comes at an amazing time when there is increasing<\/p>\n<p>159<br>00:26:01.810 &#8211;&gt; 00:26:08.419<br>Philip Sellers: risk from AI-based attacks. You know, earlier this year, you also,<\/p>\n<p>160<br>00:26:08.460 &#8211;&gt; 00:26:20.849<br>Philip Sellers: released an integration with CrowdStrike. So, CrowdStrike plus Data Lens is another place where you&#8217;re able to work together with their next-gen SIM, to be able to,<\/p>\n<p>161<br>00:26:20.850 &#8211;&gt; 00:26:37.160<br>Philip Sellers: correlate and do some alerting. So, you&#8217;ve always had that mindset of better together, working with partners in the ecosystem. So that&#8217;s just a great place to highlight that you&#8217;re continuing to push forward, even in newer products like Data Lens.<\/p>\n<p>162<br>00:26:37.160 &#8211;&gt; 00:26:38.690<br>Jirah Cox: Yep, it&#8217;s definitely very exciting.<\/p>\n<p>163<br>00:26:39.090 &#8211;&gt; 00:26:44.220<br>Philip Sellers: And Andy, I mean, when we talk about DR in general,<\/p>\n<p>164<br>00:26:44.570 &#8211;&gt; 00:26:57.359<br>Philip Sellers: you know, the data set, or the toolset here in the Nutanix platform is amazing. You know, the outcomes we can drive are really fundamentally different than,<\/p>\n<p>165<br>00:26:57.380 &#8211;&gt; 00:27:07.440<br>Philip Sellers: other competitive platforms. Talk a little bit about the DR capabilities and the outcomes we&#8217;re driving with customers.<\/p>\n<p>166<br>00:27:08.120 &#8211;&gt; 00:27:24.899<br>Andy Greene: Sure, sure, yeah, you know, like I mentioned before, we live in that hybrid, multi-cloud world, and you know, the Nutanix platform has those capabilities built in, so we don&#8217;t need third-party applications or necessarily the application-specific capabilities.<\/p>\n<p>167<br>00:27:24.900 &#8211;&gt; 00:27:31.600<br>Andy Greene: to provide that data protection and online DR for the applications that our clients are managing.<\/p>\n<p>168<br>00:27:31.670 &#8211;&gt; 00:27:50.000<br>Andy Greene: So, you know, they&#8217;re going to provide strong protection across all RPO and RTO levels, and you really don&#8217;t need to purchase anything additional to do that site recovery, whether you&#8217;re recovering to the same data center, recovering to your DR site, recovering to the cloud, maybe a cleanroom scenario.<\/p>\n<p>169<br>00:27:50.000 &#8211;&gt; 00:27:53.980<br>Andy Greene: Or, you know, here at Zentegra, we have our own,<\/p>\n<p>170<br>00:27:54.450 &#8211;&gt; 00:28:14.019<br>Andy Greene: product that&#8217;s available for that, and that would be DR as a service that allows our clients to basically have, you know, full-stack Nutanix, both in your data center and in ours, and take advantage of all of that BCDR capability that&#8217;s built into the platform without having to manage and maintain that secondary data center.<\/p>\n<p>171<br>00:28:14.920 &#8211;&gt; 00:28:24.329<br>Philip Sellers: Yeah, you know, it&#8217;s simplified again. At the end of the day, we&#8217;re driving outcomes, and it&#8217;s a full feature set. You know, you&#8217;re able to do\u2026<\/p>\n<p>172<br>00:28:24.420 &#8211;&gt; 00:28:36.059<br>Philip Sellers: The data replication, which is generally where storage vendors stop, they do data replication, and then some other application has to come along and handle orchestration.<\/p>\n<p>173<br>00:28:36.260 &#8211;&gt; 00:28:47.319<br>Philip Sellers: this is all built in. You can orchestrate, you can run scripts, you can have failover. It is really end-to-end, and so I think that&#8217;s one of the key differentiators, is it&#8217;s not\u2026<\/p>\n<p>174<br>00:28:47.560 &#8211;&gt; 00:28:57.780<br>Philip Sellers: an afterthought, just like security, DR protection is fully baked. You&#8217;ve got the end-to-end solution, and that&#8217;s something to be really appreciated.<\/p>\n<p>175<br>00:29:00.100 &#8211;&gt; 00:29:18.749<br>Philip Sellers: Once again, homework. There is a great video here about Datalins, embedded into the article. Would love for you to spend some time learning more about Datalins, if that&#8217;s not a product that you&#8217;re aware or familiar with. Definitely homework from Professor Calhoun.<\/p>\n<p>176<br>00:29:20.480 &#8211;&gt; 00:29:33.749<br>Philip Sellers: And then, let&#8217;s move to the next layer, the networking layer. Jaira, networking comes in a couple of different varieties when it comes to Nutanix, and they share a name.<\/p>\n<p>177<br>00:29:35.150 &#8211;&gt; 00:29:46.100<br>Jirah Cox: They do! They&#8217;re in the same family, if you will, right? So, under that, under our flow marketing umbrella, right, we&#8217;ve got, two main,<\/p>\n<p>178<br>00:29:46.240 &#8211;&gt; 00:29:47.240<br>Jirah Cox: Pillars?<\/p>\n<p>179<br>00:29:47.680 &#8211;&gt; 00:30:01.050<br>Jirah Cox: what goes under umbrellas? There&#8217;s two people under the umbrella, I guess, is maybe the analogy, goes that way. The first one, of course, is, is flow virtual networking, right? So how do we apply, like, SDN principles<\/p>\n<p>180<br>00:30:01.050 &#8211;&gt; 00:30:08.979<br>Jirah Cox: to bring, cloud-like networking, think, like, VPCs, right? So, which themselves, it gets, I guess, to be kind of a recursive acronym.<\/p>\n<p>181<br>00:30:08.980 &#8211;&gt; 00:30:16.499<br>Jirah Cox: of virtual private clouds to your deployment, right? How can I treat my on-prem networking, or my cola networking, or even my edge networking<\/p>\n<p>182<br>00:30:16.500 &#8211;&gt; 00:30:26.010<br>Jirah Cox: like I would cloud networking, right? Where I can define my networks per application or per tenant, all in software, no need for additional hardware.<\/p>\n<p>183<br>00:30:26.010 &#8211;&gt; 00:30:38.019<br>Jirah Cox: And even that by itself can lead to things like tenant isolation or application isolation that I might want for my security outcomes, and I&#8217;m doing that at the, you know, layer 3, layer 4 network layer as well.<\/p>\n<p>184<br>00:30:38.150 &#8211;&gt; 00:30:53.629<br>Jirah Cox: But on top of that, of course, we can also do, network security, right? So flow network security, the other, the other person under that umbrella. Micro-segmentation, right? So zero trust for how do I ensure that even two VMs with, joining IP addresses.<\/p>\n<p>185<br>00:30:53.630 &#8211;&gt; 00:31:00.699<br>Jirah Cox: on the same network, on the same hypervisor, still can&#8217;t talk to each other in any ways that I don&#8217;t approve of, right? So I can\u2026<\/p>\n<p>186<br>00:31:00.700 &#8211;&gt; 00:31:05.419<br>Jirah Cox: block at the VM level, block at the VNIC level, block at the port level.<\/p>\n<p>187<br>00:31:05.680 &#8211;&gt; 00:31:11.680<br>Jirah Cox: or even for a VDI use case, make all of this application, Active Directory aware.<\/p>\n<p>188<br>00:31:11.680 &#8211;&gt; 00:31:28.869<br>Jirah Cox: So that I can even have per-user rule sets as well. Because I like to think of, and apologies to all my EUC friends, the VDI part of the network is, like, the dirtiest, least trusted part of the network. That&#8217;s where users live, they open attachments and click on links and do their email.<\/p>\n<p>189<br>00:31:28.870 &#8211;&gt; 00:31:48.189<br>Jirah Cox: Click on random YouTube videos. So, like, I want to have a lot of security in that part of the network, for sure. So letting that control to say, maybe in my entire VDI environment, no desktop, talk to any other desktop, period. They talk to patching, talk to XDR, I can get northbound, but I can never get east-west.<\/p>\n<p>190<br>00:31:48.190 &#8211;&gt; 00:31:53.360<br>Jirah Cox: Is a huge, huge restriction immediately on what ransomware can do with my environment.<\/p>\n<p>191<br>00:31:54.570 &#8211;&gt; 00:32:08.200<br>Chris Calhoun | XenTegra: And I think I&#8217;ve got a good example of that, because thinking about those kind of users, Jairus specifically, you know, obviously those EUC users, they\u2026 out in a remote workforce, they are using<\/p>\n<p>192<br>00:32:08.200 &#8211;&gt; 00:32:19.079<br>Chris Calhoun | XenTegra: this device as a connection into corporate, but they need to be filtered, monitored, protected, secured, and almost fenced in as<\/p>\n<p>193<br>00:32:19.080 &#8211;&gt; 00:32:32.379<br>Chris Calhoun | XenTegra: please be careful of what you access. So, to me, the guardrails are really key to that, and I think one of the neat, concepts is being able to even, by use of Active Directory groups.<\/p>\n<p>194<br>00:32:32.380 &#8211;&gt; 00:32:39.480<br>Chris Calhoun | XenTegra: specifically limit, what users can get to. And I think either\u2026 I&#8217;ll say limit, but also allow.<\/p>\n<p>195<br>00:32:39.480 &#8211;&gt; 00:32:59.300<br>Chris Calhoun | XenTegra: So that&#8217;s a good way of putting it, from some structure that you already have as a, I&#8217;ll say, a capable system administrator that already has some logical constructs in place for the grouping of those end-user compute users, that that would be something that you would want to implement.<\/p>\n<p>196<br>00:32:59.330 &#8211;&gt; 00:33:06.019<br>Chris Calhoun | XenTegra: And then, to segue, my own, thought is something else that I just remembered, is\u2026<\/p>\n<p>197<br>00:33:06.090 &#8211;&gt; 00:33:14.989<br>Chris Calhoun | XenTegra: Back in my day, of course, app owners would come to me and say, hey, Chris, I need your help, understanding what my application talks to.<\/p>\n<p>198<br>00:33:15.810 &#8211;&gt; 00:33:29.730<br>Chris Calhoun | XenTegra: Believe it or not. And I was like, okay, you wrote the application, it&#8217;s homemade script, so how do you not know? But, with the fact that with Flow Virtual\u2026 I&#8217;m sorry, Flow Network Security, you can put it in monitoring mode.<\/p>\n<p>199<br>00:33:29.730 &#8211;&gt; 00:33:39.070<br>Chris Calhoun | XenTegra: That&#8217;s something that is an absolute blessing for any system administrator, and just watch the communication, so that you can help users<\/p>\n<p>200<br>00:33:39.070 &#8211;&gt; 00:33:56.730<br>Chris Calhoun | XenTegra: put guardrails around that so that they just don&#8217;t say, okay, I need any, any access from a network&#8217;s perspective. So, with those two faults of guardrails, that&#8217;s kind of my main focus here around flow network security, is\u2026<\/p>\n<p>201<br>00:33:56.740 &#8211;&gt; 00:33:58.140<br>Chris Calhoun | XenTegra: Please be\u2026<\/p>\n<p>202<br>00:33:58.520 &#8211;&gt; 00:34:10.840<br>Chris Calhoun | XenTegra: of course, diligent, and also purposed in your efforts to make sure that you put guardrails around your end users, and I&#8217;m telling you, Flow can help with that, for sure.<\/p>\n<p>203<br>00:34:11.230 &#8211;&gt; 00:34:14.669<br>Jirah Cox: Well, obviously that person doesn&#8217;t want their phone ringing too much after 5 o&#8217;clock.<\/p>\n<p>204<br>00:34:15.050 &#8211;&gt; 00:34:16.820<br>Jirah Cox: Maybe not even before 5 o&#8217;clock.<\/p>\n<p>205<br>00:34:16.820 &#8211;&gt; 00:34:17.279<br>Chris Calhoun | XenTegra: There you go.<\/p>\n<p>206<br>00:34:17.280 &#8211;&gt; 00:34:26.080<br>Jirah Cox: Sounds like a really good way that we could actually add security to running applications without making the phone ring more, which kind of is job number one, right?<\/p>\n<p>207<br>00:34:26.080 &#8211;&gt; 00:34:29.370<br>Chris Calhoun | XenTegra: Absolutely. Almost like, fantastic.<\/p>\n<p>208<br>00:34:30.920 &#8211;&gt; 00:34:37.780<br>Andy Greene: Yeah, I definitely have been a big fan of Flow Network Security from when it was first released.<\/p>\n<p>209<br>00:34:37.790 &#8211;&gt; 00:34:51.349<br>Andy Greene: you know, I think, back to our discussion earlier about that defense-in-depth strategy, this is the perfect example of it. Traditionally, you know, we treated the data center like a fortress, and we built that big, strong wall around it.<\/p>\n<p>210<br>00:34:51.350 &#8211;&gt; 00:34:57.980<br>Andy Greene: And then we used something like a VPN to get in, and we trusted that that made our data center secure.<\/p>\n<p>211<br>00:34:57.980 &#8211;&gt; 00:35:12.540<br>Andy Greene: But, you know, Flow brings to the table the ability for our platform administrators now to have security at the vSwitch layer. And if you think about it, all of that network traffic from all of your virtual machines has to flow through the vSwitch.<\/p>\n<p>212<br>00:35:12.540 &#8211;&gt; 00:35:18.079<br>Andy Greene: So, you know, we can do that without necessarily involving the networking team if we don&#8217;t want to.<\/p>\n<p>213<br>00:35:18.080 &#8211;&gt; 00:35:32.990<br>Andy Greene: And it&#8217;s just a great way to head off that east-west traffic and, you know, with the understanding that once some type of infection, some type of malware gets into your data center, the first thing that it wants to do is it wants to spread itself, and<\/p>\n<p>214<br>00:35:32.990 &#8211;&gt; 00:35:41.129<br>Andy Greene: So I&#8217;ve always been a big fan of flow. You know, I think there is a level of simplicity that we haven&#8217;t seen with a lot of similar type of<\/p>\n<p>215<br>00:35:41.130 &#8211;&gt; 00:35:51.819<br>Andy Greene: micro-segmentation products that are out on the market today. And, you know, the simplicity and just being part of that defense in-depth strategy is a big part of why.<\/p>\n<p>216<br>00:35:53.560 &#8211;&gt; 00:35:56.119<br>Philip Sellers: Yeah, I&#8217;ll\u2026 I&#8217;ll point out that,<\/p>\n<p>217<br>00:35:56.400 &#8211;&gt; 00:36:03.410<br>Philip Sellers: Nicera, before VMware acquired them, their innovation was in the overlay networks, and that was really\u2026<\/p>\n<p>218<br>00:36:03.540 &#8211;&gt; 00:36:10.209<br>Philip Sellers: their take on network virtualization. You guys approached it differently. You started in the security space.<\/p>\n<p>219<br>00:36:10.250 &#8211;&gt; 00:36:24.300<br>Philip Sellers: then brought the overlay networks kind of to bear, and\u2026 if I have my history right. And, you know, I think that&#8217;s a realization that this east-west conversation is a much more valuable thing<\/p>\n<p>220<br>00:36:24.320 &#8211;&gt; 00:36:41.079<br>Philip Sellers: you guys had this unbuckled from your overlays, because again, it didn&#8217;t quite exist then, where VMware had to unbuckle their network security product from overlays, and then make it available to traditional vSwitches, so\u2026<\/p>\n<p>221<br>00:36:41.460 &#8211;&gt; 00:36:50.329<br>Philip Sellers: from the beginning, your intent has always been securing the network, no matter where the traffic&#8217;s at, and I think that&#8217;s a great value to customers.<\/p>\n<p>222<br>00:36:50.570 &#8211;&gt; 00:36:57.710<br>Jirah Cox: Totally agree. I would also submit that, there&#8217;s some real opportunities that we were able to take advantage of by<\/p>\n<p>223<br>00:36:58.050 &#8211;&gt; 00:37:16.990<br>Jirah Cox: coming along after public clouds, right? Because that&#8217;s really become the goal, is to look, act, feel like a cloud platform that you can vend securely to your tenants and with full sovereignty and full governance, wherever you want to run it, right? So, private cloud, public cloud, hybrid multi-cloud, your data center, colo, or even in hyperscalers.<\/p>\n<p>224<br>00:37:16.990 &#8211;&gt; 00:37:32.849<br>Jirah Cox: So therefore, it&#8217;s easier to look, act, and feel like cloud after cloud had been invented. So that&#8217;s\u2026 that&#8217;s one\u2026 one, one thing that was in our favor. And then also, the dramatic rise in open source, right? So we get to use things like OpenVSwitch, which we can program ACLs into.<\/p>\n<p>225<br>00:37:32.850 &#8211;&gt; 00:37:51.429<br>Jirah Cox: to power, the actual functionality of our micro-segmentation, things like Genev tunneling for our overlays, that can power, the VPCs. It&#8217;s, it&#8217;s a better-together kind of approach of how can we help make using awesome open source tech easier for our customers.<\/p>\n<p>226<br>00:37:51.430 &#8211;&gt; 00:38:03.429<br>Jirah Cox: without requiring traditional open source care and feeding of, you know, you pay for that differently, not with cash, but with, like, human capital around getting SMEs. Well, this is both, right? It&#8217;s just a product that you get to own and administer.<\/p>\n<p>227<br>00:38:04.060 &#8211;&gt; 00:38:05.230<br>Philip Sellers: Yeah, absolutely.<\/p>\n<p>228<br>00:38:05.640 &#8211;&gt; 00:38:12.600<br>Philip Sellers: You know, one more thing to talk about when it comes to networking security from Nutanix is Security Central.<\/p>\n<p>229<br>00:38:12.750 &#8211;&gt; 00:38:20.530<br>Philip Sellers: overarching product, helps with compliance. Jairic, what can you tell us a little more about Security Central?<\/p>\n<p>230<br>00:38:21.230 &#8211;&gt; 00:38:39.449<br>Jirah Cox: So, yeah, the goal of Security Central, and I love it, right, is to give you that kind of, one browser tab to rule them all, right, that shows you all of your stuff everywhere, all of the time, right? So, in even keeping with this theme, well, I want to have a global dashboard for things like vulnerabilities, or configuration drift.<\/p>\n<p>231<br>00:38:39.480 &#8211;&gt; 00:38:55.740<br>Jirah Cox: I want to see all of my stuff, whether it&#8217;s at the edge, or in a hyperscaler, or in the, you know, through the wall behind me, no matter where it lives. And that, helps give visibility to things like, you know, am I aligned with my NIST baselines? Am I aligned with my PCI DSS baselines?<\/p>\n<p>232<br>00:38:55.740 &#8211;&gt; 00:39:06.949<br>Jirah Cox: And I can see that in one spot now. So that&#8217;s, you know, to be not too obvious here, the central part of Security Central, you know, as part of, as part of Nutanix Central.<\/p>\n<p>233<br>00:39:07.560 &#8211;&gt; 00:39:16.749<br>Philip Sellers: Well, and having had to do PCI, and understanding and trying to navigate just the rules and regulations that come from the body.<\/p>\n<p>234<br>00:39:18.110 &#8211;&gt; 00:39:34.899<br>Philip Sellers: Yeah, I feel for you. So, if you&#8217;re doing PCI, and you&#8217;re doing it manually, there&#8217;s a ton of value, and you should be talking to someone at Nutanix about Security Central, because, again, simplifying that process, being able to not only<\/p>\n<p>235<br>00:39:35.060 &#8211;&gt; 00:39:46.380<br>Philip Sellers: get into the desired state, but keep it in desired state, and then prove that back to an auditor. There&#8217;s huge value in that, and that&#8217;s what Security Central&#8217;s all about.<\/p>\n<p>236<br>00:39:47.780 &#8211;&gt; 00:39:57.100<br>Philip Sellers: Let&#8217;s wrap things up with one last section. We&#8217;re going to talk about application security. What do we have from an application security standpoint, Jairah?<\/p>\n<p>237<br>00:39:57.620 &#8211;&gt; 00:40:14.840<br>Jirah Cox: So keeping with that theme of availability, right? Things like, how do we help apply that to databases, right? Because databases, and what our database as a service platform can do, you know, things like, how quickly can you go patch every critical database engine that hosts data that powers your business?<\/p>\n<p>238<br>00:40:14.840 &#8211;&gt; 00:40:25.819<br>Jirah Cox: Right? Do you even have up-to-date spreadsheets around which versions of SQL or Oracle or, you know, Postgres are we running, to even know where, like, maybe a hot new CVE applies?<\/p>\n<p>239<br>00:40:25.820 &#8211;&gt; 00:40:36.050<br>Jirah Cox: how quickly, once you knew where to go stamp out those patches, could you get humans to go do that, right? Is database patching still exciting or boring yet in your organization, right? We obviously want to help<\/p>\n<p>240<br>00:40:36.100 &#8211;&gt; 00:40:50.689<br>Jirah Cox: with, processes and products to help make it much more boring, rather than spicy. And so, helping patch databases, helping patch those environments, and even in that vein of, you know, consistency.<\/p>\n<p>241<br>00:40:50.690 &#8211;&gt; 00:41:07.350<br>Jirah Cox: yields uptime, right? Just even solving for, like, configuration drift and getting closer to policy-based management, that&#8217;s where we play in the database as a service space, which you get to own and run and host anywhere you choose to, right? In a private cluster, in the cloud, in a hyperscaler, in a colo, or anywhere.<\/p>\n<p>242<br>00:41:08.110 &#8211;&gt; 00:41:25.819<br>Jirah Cox: Again, you know, we&#8217;re all big fans of humans clicking on fewer buttons and letting automation and policy-based governance do more and more for us. That, of course, is where leaning into automated application deployments yields a lot of benefits, right? That&#8217;s where our NCM self-service product really shines.<\/p>\n<p>243<br>00:41:25.820 &#8211;&gt; 00:41:33.579<br>Jirah Cox: Where we can help, people create blueprints, and I can write that once and then deploy it many. Some folks even have, like, a blueprint for<\/p>\n<p>244<br>00:41:33.580 &#8211;&gt; 00:41:45.219<br>Jirah Cox: you know, if they&#8217;re doing higher, more complex tasks, like, I have developers that are running software that I sell, cool, here&#8217;s a blueprint to give a new developer on day one their own sandbox, right? Their own\u2026<\/p>\n<p>245<br>00:41:45.220 &#8211;&gt; 00:41:55.600<br>Jirah Cox: code repo, their own sandbox, their own, maybe, database fork, so they can get productive even sooner, right? Or if they break it all, I can redeploy that, even faster.<\/p>\n<p>246<br>00:41:55.670 &#8211;&gt; 00:42:06.619<br>Jirah Cox: And then, keeping in that vein, the most platonic ideal of automated application deployments, of course, is Kubernetes, right? Where, like, literally everything is done in everything as code.<\/p>\n<p>247<br>00:42:06.620 &#8211;&gt; 00:42:18.880<br>Jirah Cox: And so being here for both, you know, applications of, like, say, yesterday and today&#8217;s shape of virtual machines, and of tomorrow&#8217;s shape of containers, but offering that unified benefit of, like, security and automation for the entire thing.<\/p>\n<p>248<br>00:42:19.270 &#8211;&gt; 00:42:36.280<br>Jirah Cox: that by having a Kubernetes platform built into our platform, customers get the benefit of that for both container-based deployments, but also the security aspects as well, right? It&#8217;s not just fast, it&#8217;s not just agile, it&#8217;s not just something that my developers want to see me vent to them as an application architect.<\/p>\n<p>249<br>00:42:36.280 &#8211;&gt; 00:42:42.140<br>Jirah Cox: It also brings along security and observability, and yields uptime by virtue of what it is.<\/p>\n<p>250<br>00:42:48.800 &#8211;&gt; 00:43:05.420<br>Philip Sellers: Yeah, you know, the changes in the way that we use software, the way that we architect applications is a big part of, you know, the conversation these days. I mean, supporting app developers, and again, automation being a key point.<\/p>\n<p>251<br>00:43:05.420 &#8211;&gt; 00:43:09.330<br>Philip Sellers: You talked about it with Nutanix, or NCM Self-Service.<\/p>\n<p>252<br>00:43:09.400 &#8211;&gt; 00:43:10.979<br>Philip Sellers: But also, you know, the<\/p>\n<p>253<br>00:43:11.090 &#8211;&gt; 00:43:20.000<br>Philip Sellers: primary value of NKP is self-service, too. You&#8217;re really driving those outcomes for businesses. You know, one of the\u2026<\/p>\n<p>254<br>00:43:20.010 &#8211;&gt; 00:43:33.460<br>Philip Sellers: One of the things that I love that you guys have done is, you&#8217;ve also entitled every user who already has NCI Pro or Ultimate to have NKP Starter. That&#8217;s a great way of getting<\/p>\n<p>255<br>00:43:33.650 &#8211;&gt; 00:43:41.899<br>Philip Sellers: A platform where you can highly automate your software development, marry it to your pipelines, meet your app developers halfway.<\/p>\n<p>256<br>00:43:42.100 &#8211;&gt; 00:43:49.790<br>Philip Sellers: and be cloud-like You know, 3 great things that are all of value to your organization.<\/p>\n<p>257<br>00:43:49.950 &#8211;&gt; 00:44:02.320<br>Philip Sellers: So, you know, it&#8217;s a great way to take an infrastructure team and make yourself look like a huge winner. You&#8217;re a pro company, you&#8217;re pro-app developer. This is a great way of being able to do it.<\/p>\n<p>258<br>00:44:02.440 &#8211;&gt; 00:44:18.330<br>Philip Sellers: I happened to do a lab with a group I&#8217;m a part of through Nutanix, and got to see the deployment and the tooling and stuff in NKP. And, you know, what I would say is, like so many other things you&#8217;re doing.<\/p>\n<p>259<br>00:44:18.540 &#8211;&gt; 00:44:36.479<br>Philip Sellers: NKP makes Kubernetes approachable. You&#8217;re giving GUIs and interfaces and the ability to do policies and controls. So I know we&#8217;re talking security. Those policies and controls are not an afterthought. It&#8217;s all prescribed. You can add users and add access and\u2026<\/p>\n<p>260<br>00:44:36.610 &#8211;&gt; 00:44:45.219<br>Philip Sellers: It&#8217;s really approachable for an administrator, it&#8217;s point and click. So, that&#8217;s a huge win, along with the supportability for<\/p>\n<p>261<br>00:44:45.390 &#8211;&gt; 00:45:00.769<br>Philip Sellers: as you said, something that&#8217;s largely CNCF\u2026 well, it is CNCF compliant, but largely open source in its base. So, that&#8217;s what an enterprise needs to be able to succeed, with open source.<\/p>\n<p>262<br>00:45:01.210 &#8211;&gt; 00:45:12.619<br>Jirah Cox: And what I love about that, to your point about it being included for so many of our customers, is that, we&#8217;ve all been there. I&#8217;ve been the person on the other end of the email catching a surprise, and oops, I need to go solve for that.<\/p>\n<p>263<br>00:45:12.700 &#8211;&gt; 00:45:31.139<br>Jirah Cox: And this is such a great inclusion for our customers that, you know, when someone says, hey, I need this, you can say, hold on, give me 20 minutes, come back, and look, that&#8217;s now solved for. So, you know, no one loves that whole, oops, let me go find a product for that, or solution for that, and demo it, and POC it, and integrate it. This is\u2026 this is\u2026 that&#8217;s all done for you here.<\/p>\n<p>264<br>00:45:31.300 &#8211;&gt; 00:45:42.569<br>Philip Sellers: Quinn, the last point, integrate it, right? You know, there&#8217;s a lot of products out there, but do they integrate? Do they\u2026 do they integrate to a level that meets the user needs?<\/p>\n<p>265<br>00:45:43.080 &#8211;&gt; 00:46:00.800<br>Philip Sellers: More than likely, the answer is yes now, where Nutanix stands in the industry. You know, there&#8217;s wide support across all sorts of applications and ecosystem partners, so that&#8217;s\u2026 that&#8217;s all a check mark. But again, where it&#8217;s built into the platform, it&#8217;s fully integrated.<\/p>\n<p>266<br>00:46:03.700 &#8211;&gt; 00:46:10.280<br>Chris Calhoun | XenTegra: I definitely think, something to\u2026 to me around the app deployment that really makes sense is,<\/p>\n<p>267<br>00:46:10.370 &#8211;&gt; 00:46:26.020<br>Chris Calhoun | XenTegra: with a focus around security, these days, obviously, anything that&#8217;s being automated, tooling that you guys, as end users, or, I&#8217;m sorry, as admins are, are using, whether it&#8217;s a PowerShell, it&#8217;s\u2026<\/p>\n<p>268<br>00:46:26.020 &#8211;&gt; 00:46:45.630<br>Chris Calhoun | XenTegra: any kind of scripting environment that you&#8217;re accustomed to, Nutanix, to me, what used to be called Nutanix Calm is now this, NCM self-service. And the benefit there is Nutanix is the glue. You don&#8217;t have to change your tooling, so if you&#8217;ve already got<\/p>\n<p>269<br>00:46:45.710 &#8211;&gt; 00:46:59.679<br>Chris Calhoun | XenTegra: a secure scripted environment. Continue using that. Integrate that with Nutanix, and that&#8217;s the\u2026 that&#8217;s the integration that we&#8217;ve all talked about today, is it&#8217;s baked in. And\u2026 and\u2026<\/p>\n<p>270<br>00:46:59.970 &#8211;&gt; 00:47:15.420<br>Chris Calhoun | XenTegra: Nutanix is allowing for that, even though, yes, it is additional tooling, but it&#8217;s not anything that you have to pick up and learn. Use your existing automation toolset, continue with the platform, and move forward with making your work<\/p>\n<p>271<br>00:47:16.080 &#8211;&gt; 00:47:20.590<br>Chris Calhoun | XenTegra: Smarter and more secure just by, automation.<\/p>\n<p>272<br>00:47:21.630 &#8211;&gt; 00:47:27.690<br>Philip Sellers: Yeah, and, you know, I think that&#8217;s been kind of the key point all throughout this section, talking about<\/p>\n<p>273<br>00:47:27.950 &#8211;&gt; 00:47:40.779<br>Philip Sellers: applications is\u2026 is automation. And so, I think, you know, Jairus said it really well when we talk about Nutanix database services. It&#8217;s really around changing that paradigm<\/p>\n<p>274<br>00:47:41.890 &#8211;&gt; 00:47:46.080<br>Philip Sellers: to think about databases differently, Andy,<\/p>\n<p>275<br>00:47:46.710 &#8211;&gt; 00:47:53.779<br>Philip Sellers: what\u2026 what kind of have you seen in the past with databases and DBAs that\u2026 that\u2026<\/p>\n<p>276<br>00:47:54.420 &#8211;&gt; 00:47:58.550<br>Philip Sellers: probably needs to change, and that MDB can help with.<\/p>\n<p>277<br>00:47:59.770 &#8211;&gt; 00:48:08.180<br>Andy Greene: you know, in the past, databases were really just set up to run and run and run. We didn&#8217;t make changes unless we really had to.<\/p>\n<p>278<br>00:48:08.210 &#8211;&gt; 00:48:23.040<br>Andy Greene: But, you know, that&#8217;s not providing a service to the business. So, database as a service is just something far more dynamic. It makes it very easy to do things like all of your patching, your cloning.<\/p>\n<p>279<br>00:48:23.040 &#8211;&gt; 00:48:42.290<br>Andy Greene: standing up those additional copies for your test dev environments, QA environments, etc. But I think the, you know, the key thing with regards to this security discussion that we&#8217;re having is making sure that you&#8217;re always up to the latest, you know, patch levels from a security perspective.<\/p>\n<p>280<br>00:48:42.700 &#8211;&gt; 00:48:44.570<br>Philip Sellers: Yeah, I think Waterfall\u2026<\/p>\n<p>281<br>00:48:44.860 &#8211;&gt; 00:48:52.320<br>Philip Sellers: versus Agile, you know, the development methods has really kind of driven this change in the database culture.<\/p>\n<p>282<br>00:48:52.660 &#8211;&gt; 00:48:57.069<br>Philip Sellers: You know, it used to be we would take an application, we would buy it.<\/p>\n<p>283<br>00:48:57.510 &#8211;&gt; 00:49:00.740<br>Philip Sellers: There&#8217;d be a release once, twice a year.<\/p>\n<p>284<br>00:49:01.120 &#8211;&gt; 00:49:09.200<br>Philip Sellers: the database was just supporting that application. And that&#8217;s waterfall method. You know, you do a big code release, big bang.<\/p>\n<p>285<br>00:49:09.490 &#8211;&gt; 00:49:15.479<br>Philip Sellers: DevOps and Agile change the world. We&#8217;re doing incremental changes all the time, and so\u2026<\/p>\n<p>286<br>00:49:15.600 &#8211;&gt; 00:49:28.740<br>Philip Sellers: the database layer, or I&#8217;d argue the caching layer with something like Redis, or any of these other microservices that support data interchange.<\/p>\n<p>287<br>00:49:28.740 &#8211;&gt; 00:49:36.439<br>Philip Sellers: in an application, all of those services are just expected to be incrementally updated, and so\u2026<\/p>\n<p>288<br>00:49:36.510 &#8211;&gt; 00:49:51.559<br>Philip Sellers: NDB is recognition of the fact that you need APIs to be able to interact with it. Cloning that data is a critical thing, because you need clones of it to test it, right? As part of automated testing and things in your development pipeline.<\/p>\n<p>289<br>00:49:52.000 &#8211;&gt; 00:49:57.860<br>Philip Sellers: But to your point, keeping it secure is paramount. Can&#8217;t afford to have insecure<\/p>\n<p>290<br>00:49:58.040 &#8211;&gt; 00:50:06.380<br>Philip Sellers: things just sitting on your network anymore. The entry points and the AI to leverage the hosts is out there, and so\u2026<\/p>\n<p>291<br>00:50:06.570 &#8211;&gt; 00:50:08.619<br>Philip Sellers: That kind of brings us full circle.<\/p>\n<p>292<br>00:50:08.850 &#8211;&gt; 00:50:12.970<br>Philip Sellers: to the topic that we started with, AI attacks are up.<\/p>\n<p>293<br>00:50:13.190 &#8211;&gt; 00:50:32.009<br>Philip Sellers: We need to protect things. You know, so much of the infrastructure&#8217;s running on our hosting platform, on our cloud platform. How do we keep it secure? And kudos to folks at Nutanix, because this is an integrated approach across all layers, and<\/p>\n<p>294<br>00:50:32.470 &#8211;&gt; 00:50:37.039<br>Philip Sellers: it&#8217;s gonna help you have less calls. I love that call out, Jairah.<\/p>\n<p>295<br>00:50:37.210 &#8211;&gt; 00:50:44.630<br>Philip Sellers: Have less calls after 5, and, you know, just manage and maintain, because none of us want the call.<\/p>\n<p>296<br>00:50:44.930 &#8211;&gt; 00:50:48.670<br>Philip Sellers: Of some sort of a cybersecurity event at the end of the day.<\/p>\n<p>297<br>00:50:48.800 &#8211;&gt; 00:51:00.489<br>Philip Sellers: And it&#8217;s never my point, or I think any of our collective points, to instill fear out there, but there has to be a realization of the landscape and how it&#8217;s changing, so\u2026<\/p>\n<p>298<br>00:51:00.860 &#8211;&gt; 00:51:19.270<br>Philip Sellers: Guys, I appreciate all of your perspectives. We&#8217;ve had a great conversation around this. It&#8217;s a longer blog post, and I&#8217;m gonna tease, with your homework to go see the videos. There&#8217;s also another section at the end that you can read for yourself, how Nutanix Security stacks up against VMware.<\/p>\n<p>299<br>00:51:19.270 &#8211;&gt; 00:51:29.559<br>Philip Sellers: We&#8217;re not going to cover that on this podcast, but it&#8217;s a great reason for you to go and look this one up. Again, it&#8217;s available at Nutanix.com slash blog. The name of the<\/p>\n<p>300<br>00:51:29.650 &#8211;&gt; 00:51:41.299<br>Philip Sellers: blog post is built-in security across platform data, network, and applications. We covered all four of those major areas. Thank you, Jairah. Thank you, Chris. Thank you, Andy.<\/p>\n<p>301<br>00:51:42.030 &#8211;&gt; 00:51:46.130<br>Philip Sellers: Appreciate you having on the podcast with me today, and<\/p>\n<p>302<br>00:51:46.240 &#8211;&gt; 00:51:51.220<br>Philip Sellers: Thank you for listening. We appreciate it, we know your time&#8217;s valuable, and<\/p>\n<p>303<br>00:51:51.320 &#8211;&gt; 00:51:55.650<br>Philip Sellers: We hope to catch you on the next episode. Until then, have a great day.<\/p>\n<p>&nbsp;<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>How Built-In Security Across the Stack Strengthens Cyber Resilience&nbsp; In today\u2019s cyber threat landscape, organizations face an uphill battle: defending increasingly complex IT environments while enabling speed, scale, and innovation. &hellip;<\/p>","protected":false},"author":7,"featured_media":65766,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_price":"","_stock":"","_tribe_ticket_header":"","_tribe_default_ticket_provider":"","_tribe_ticket_capacity":"0","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":"[]","_tribe_ticket_has_attendee_info_fields":false,"footnotes":""},"categories":[5],"tags":[],"class_list":["post-719221","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-podcast"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>115: Nutanix Weekly: Built-in Security Across Platform, Data, Network and Applications - XenTegra<\/title>\n<meta name=\"description\" content=\"By delivering built-in cybersecurity for hybrid cloud environments, Nutanix empowers organizations to embed security into the fabric of their IT stack.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xentegra.com\/hi\/resources\/115-nutanix-weekly-built-in-security-across-platform-data-network-and-applications\/\" \/>\n<meta property=\"og:locale\" content=\"hi_IN\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"115: Nutanix Weekly: Built-in Security Across Platform, Data, Network and Applications - XenTegra\" \/>\n<meta property=\"og:description\" content=\"By delivering built-in cybersecurity for hybrid cloud environments, Nutanix empowers organizations to embed security into the fabric of their IT stack.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xentegra.com\/hi\/resources\/115-nutanix-weekly-built-in-security-across-platform-data-network-and-applications\/\" \/>\n<meta property=\"og:site_name\" content=\"XenTegra\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XenTegra\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-11-11T15:22:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-18T17:04:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Nutanix-Weekly.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1100\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Chase Newmyer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xentegra\" \/>\n<meta name=\"twitter:site\" content=\"@xentegra\" \/>\n<meta name=\"twitter:label1\" content=\"\u0926\u094d\u0935\u093e\u0930\u093e \u0932\u093f\u0916\u093f\u0924\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chase Newmyer\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u0905\u0928\u0941\u092e\u093e\u0928\u093f\u0924 \u092a\u0922\u093c\u0928\u0947 \u0915\u093e \u0938\u092e\u092f\" \/>\n\t<meta name=\"twitter:data2\" content=\"48 \u092e\u093f\u0928\u091f\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/115-nutanix-weekly-built-in-security-across-platform-data-network-and-applications\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/115-nutanix-weekly-built-in-security-across-platform-data-network-and-applications\\\/\"},\"author\":{\"name\":\"Chase Newmyer\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/person\\\/84736408f096bfd92b80305aea8846a7\"},\"headline\":\"115: Nutanix Weekly: Built-in Security Across Platform, Data, Network and Applications\",\"datePublished\":\"2025-11-11T15:22:14+00:00\",\"dateModified\":\"2026-03-18T17:04:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/115-nutanix-weekly-built-in-security-across-platform-data-network-and-applications\\\/\"},\"wordCount\":10698,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/115-nutanix-weekly-built-in-security-across-platform-data-network-and-applications\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Nutanix-Weekly.png\",\"articleSection\":[\"Podcast\"],\"inLanguage\":\"hi-IN\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/xentegra.com\\\/resources\\\/115-nutanix-weekly-built-in-security-across-platform-data-network-and-applications\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/115-nutanix-weekly-built-in-security-across-platform-data-network-and-applications\\\/\",\"url\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/115-nutanix-weekly-built-in-security-across-platform-data-network-and-applications\\\/\",\"name\":\"115: Nutanix Weekly: Built-in Security Across Platform, Data, Network and Applications - XenTegra\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/115-nutanix-weekly-built-in-security-across-platform-data-network-and-applications\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/115-nutanix-weekly-built-in-security-across-platform-data-network-and-applications\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Nutanix-Weekly.png\",\"datePublished\":\"2025-11-11T15:22:14+00:00\",\"dateModified\":\"2026-03-18T17:04:46+00:00\",\"description\":\"By delivering built-in cybersecurity for hybrid cloud environments, Nutanix empowers organizations to embed security into the fabric of their IT stack.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/115-nutanix-weekly-built-in-security-across-platform-data-network-and-applications\\\/#breadcrumb\"},\"inLanguage\":\"hi-IN\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/xentegra.com\\\/resources\\\/115-nutanix-weekly-built-in-security-across-platform-data-network-and-applications\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"hi-IN\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/115-nutanix-weekly-built-in-security-across-platform-data-network-and-applications\\\/#primaryimage\",\"url\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Nutanix-Weekly.png\",\"contentUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Nutanix-Weekly.png\",\"width\":1100,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/115-nutanix-weekly-built-in-security-across-platform-data-network-and-applications\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/xentegra.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"115: Nutanix Weekly: Built-in Security Across Platform, Data, Network and Applications\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#website\",\"url\":\"https:\\\/\\\/xentegra.com\\\/\",\"name\":\"XenTegra\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/xentegra.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"hi-IN\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#organization\",\"name\":\"XenTegra\",\"url\":\"https:\\\/\\\/xentegra.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hi-IN\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/1519903807641-min.jpg\",\"contentUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/1519903807641-min.jpg\",\"width\":200,\"height\":200,\"caption\":\"XenTegra\"},\"image\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/XenTegra\\\/\",\"https:\\\/\\\/x.com\\\/xentegra\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/xentegra-llc\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/person\\\/84736408f096bfd92b80305aea8846a7\",\"name\":\"Chase Newmyer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hi-IN\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g\",\"caption\":\"Chase Newmyer\"},\"url\":\"https:\\\/\\\/xentegra.com\\\/hi\\\/resources\\\/author\\\/chasenewmyer\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"115: Nutanix Weekly: Built-in Security Across Platform, Data, Network and Applications - XenTegra","description":"By delivering built-in cybersecurity for hybrid cloud environments, Nutanix empowers organizations to embed security into the fabric of their IT stack.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xentegra.com\/hi\/resources\/115-nutanix-weekly-built-in-security-across-platform-data-network-and-applications\/","og_locale":"hi_IN","og_type":"article","og_title":"115: Nutanix Weekly: Built-in Security Across Platform, Data, Network and Applications - XenTegra","og_description":"By delivering built-in cybersecurity for hybrid cloud environments, Nutanix empowers organizations to embed security into the fabric of their IT stack.","og_url":"https:\/\/xentegra.com\/hi\/resources\/115-nutanix-weekly-built-in-security-across-platform-data-network-and-applications\/","og_site_name":"XenTegra","article_publisher":"https:\/\/www.facebook.com\/XenTegra\/","article_published_time":"2025-11-11T15:22:14+00:00","article_modified_time":"2026-03-18T17:04:46+00:00","og_image":[{"width":1100,"height":600,"url":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Nutanix-Weekly.png","type":"image\/png"}],"author":"Chase Newmyer","twitter_card":"summary_large_image","twitter_creator":"@xentegra","twitter_site":"@xentegra","twitter_misc":{"\u0926\u094d\u0935\u093e\u0930\u093e \u0932\u093f\u0916\u093f\u0924":"Chase Newmyer","\u0905\u0928\u0941\u092e\u093e\u0928\u093f\u0924 \u092a\u0922\u093c\u0928\u0947 \u0915\u093e \u0938\u092e\u092f":"48 \u092e\u093f\u0928\u091f"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xentegra.com\/resources\/115-nutanix-weekly-built-in-security-across-platform-data-network-and-applications\/#article","isPartOf":{"@id":"https:\/\/xentegra.com\/resources\/115-nutanix-weekly-built-in-security-across-platform-data-network-and-applications\/"},"author":{"name":"Chase Newmyer","@id":"https:\/\/xentegra.com\/#\/schema\/person\/84736408f096bfd92b80305aea8846a7"},"headline":"115: Nutanix Weekly: Built-in Security Across Platform, Data, Network and Applications","datePublished":"2025-11-11T15:22:14+00:00","dateModified":"2026-03-18T17:04:46+00:00","mainEntityOfPage":{"@id":"https:\/\/xentegra.com\/resources\/115-nutanix-weekly-built-in-security-across-platform-data-network-and-applications\/"},"wordCount":10698,"commentCount":0,"publisher":{"@id":"https:\/\/xentegra.com\/#organization"},"image":{"@id":"https:\/\/xentegra.com\/resources\/115-nutanix-weekly-built-in-security-across-platform-data-network-and-applications\/#primaryimage"},"thumbnailUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Nutanix-Weekly.png","articleSection":["Podcast"],"inLanguage":"hi-IN","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/xentegra.com\/resources\/115-nutanix-weekly-built-in-security-across-platform-data-network-and-applications\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/xentegra.com\/resources\/115-nutanix-weekly-built-in-security-across-platform-data-network-and-applications\/","url":"https:\/\/xentegra.com\/resources\/115-nutanix-weekly-built-in-security-across-platform-data-network-and-applications\/","name":"115: Nutanix Weekly: Built-in Security Across Platform, Data, Network and Applications - XenTegra","isPartOf":{"@id":"https:\/\/xentegra.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xentegra.com\/resources\/115-nutanix-weekly-built-in-security-across-platform-data-network-and-applications\/#primaryimage"},"image":{"@id":"https:\/\/xentegra.com\/resources\/115-nutanix-weekly-built-in-security-across-platform-data-network-and-applications\/#primaryimage"},"thumbnailUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Nutanix-Weekly.png","datePublished":"2025-11-11T15:22:14+00:00","dateModified":"2026-03-18T17:04:46+00:00","description":"By delivering built-in cybersecurity for hybrid cloud environments, Nutanix empowers organizations to embed security into the fabric of their IT stack.","breadcrumb":{"@id":"https:\/\/xentegra.com\/resources\/115-nutanix-weekly-built-in-security-across-platform-data-network-and-applications\/#breadcrumb"},"inLanguage":"hi-IN","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xentegra.com\/resources\/115-nutanix-weekly-built-in-security-across-platform-data-network-and-applications\/"]}]},{"@type":"ImageObject","inLanguage":"hi-IN","@id":"https:\/\/xentegra.com\/resources\/115-nutanix-weekly-built-in-security-across-platform-data-network-and-applications\/#primaryimage","url":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Nutanix-Weekly.png","contentUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Nutanix-Weekly.png","width":1100,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/xentegra.com\/resources\/115-nutanix-weekly-built-in-security-across-platform-data-network-and-applications\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xentegra.com\/"},{"@type":"ListItem","position":2,"name":"115: Nutanix Weekly: Built-in Security Across Platform, Data, Network and Applications"}]},{"@type":"WebSite","@id":"https:\/\/xentegra.com\/#website","url":"https:\/\/xentegra.com\/","name":"\u091c\u093c\u0947\u0928\u091f\u0947\u0917\u094d\u0930\u093e","description":"","publisher":{"@id":"https:\/\/xentegra.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xentegra.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"hi-IN"},{"@type":"Organization","@id":"https:\/\/xentegra.com\/#organization","name":"\u091c\u093c\u0947\u0928\u091f\u0947\u0917\u094d\u0930\u093e","url":"https:\/\/xentegra.com\/","logo":{"@type":"ImageObject","inLanguage":"hi-IN","@id":"https:\/\/xentegra.com\/#\/schema\/logo\/image\/","url":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2023\/06\/1519903807641-min.jpg","contentUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2023\/06\/1519903807641-min.jpg","width":200,"height":200,"caption":"XenTegra"},"image":{"@id":"https:\/\/xentegra.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XenTegra\/","https:\/\/x.com\/xentegra","https:\/\/www.linkedin.com\/company\/xentegra-llc"]},{"@type":"Person","@id":"https:\/\/xentegra.com\/#\/schema\/person\/84736408f096bfd92b80305aea8846a7","name":"Chase Newmyer","image":{"@type":"ImageObject","inLanguage":"hi-IN","@id":"https:\/\/secure.gravatar.com\/avatar\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g","caption":"Chase Newmyer"},"url":"https:\/\/xentegra.com\/hi\/resources\/author\/chasenewmyer\/"}]}},"_links":{"self":[{"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/posts\/719221","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/comments?post=719221"}],"version-history":[{"count":2,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/posts\/719221\/revisions"}],"predecessor-version":[{"id":719269,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/posts\/719221\/revisions\/719269"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/media\/65766"}],"wp:attachment":[{"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/media?parent=719221"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/categories?post=719221"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xentegra.com\/hi\/wp-json\/wp\/v2\/tags?post=719221"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}