Executive summary
- Broadcom's acquisition of VMware has created uncertainty, cost escalations, and strategic challenges for NSX users, pushing IT leaders to seek alternatives that enhance security without added complexity.
- Akamai Guardicore Segmentation provides a more fit-for-purpose upgrade with deep visibility, true Zero Trust implementation, and AI-powered automation that enables unified protection across hybrid IT environments.
- Transitioning to Akamai Guardicore Segmentation offers a low-risk migration path, predictable costs, and superior segmentation capabilities for a more-resilient security posture.
Broadcom’s acquisition of VMware has become a major inflection point for IT leaders everywhere. What was once a predictable (albeit complex) part of the infrastructure stack is now a source of significant uncertainty, and CISOs and infrastructure managers are grappling with forced product bundling, staggering price hikes, and a growing sense of being trapped.
It isn’t just a pricing issue — it’s a strategic one. This new reality is forcing IT leaders to make a choice: accept a future of escalating costs and rigid terms or seek a modern alternative that aligns with the dynamic needs of the modern business.
Many security leaders are choosing to turn this challenge into an opportunity to move beyond the limitations of NSX, VMware’s network and security virtualization platform for software-defined networking and microsegmentation. Instead, they’re adopting more flexible, effective, and cost-efficient approaches to reducing risk.
This is where Akamai Guardicore Segmentation emerges not only as a replacement, but as a strategic upgrade.
The new reality of NSX: Spiraling costs and security gaps
Since the VMware acquisition, organizations have been reporting platform renewal quotes that are 3x to 6x their previous costs and often bundled with other products they don’t need — but the financial strain is only part of the problem.
The core challenges of the platform include:
- Limited coverage
- Poor visibility
- Operational complexity
Limited coverage
NSX was designed for a VMware vSphere-centric world. It offers little-to-no protection for critical assets that live outside that ecosystem, including bare-metal servers, legacy systems, Internet of Things (IoT) devices, cyber-physical systems (CPS), and modern platform as a service (PaaS) resources. This leaves significant portions of a company’s attack surface exposed.
Poor visibility
Relying on Layer 4 (IP/port) visibility is like trying to direct traffic while not knowing the rules of the road. You can’t understand application dependencies, create granular policies that follow the workload, or detect sophisticated attacks that misuse legitimate ports.
Operational complexity
Managing separate, cumbersome policies for on-premises, cloud, and containerized environments is a drain on resources and a recipe for human error. This complexity slows down the business and makes a consistent security posture nearly impossible to maintain.
Akamai Guardicore Segmentation: a stronger, more comprehensive approach
Migrating from NSX to Akamai Guardicore Segmentation is a fundamental shift to a more intelligent and comprehensive security model.
Four of the benefits that the platform provides are the abilities to:
- See everything from the data center to the cloud
- Protect everything using true Zero Trust across your entire estate
- Simplify everything with AI-powered policy and automation
- Gain predictable value from a licensing model that makes sense
See everything from the data center to the cloud
You can't protect what you can't see. While NSX is limited to IP addresses and ports, Akamai Guardicore Segmentation provides deep Layer 7 visibility down to the individual process level. This means you see not just what is being communicated, but precisely which application or process is communicating it.
This granular, real-time map of your entire estate — across every environment — allows you to build policies based on application behavior, not just network constructs.
Akamai Guardicore Segmentation further enhances these capabilities with new AI-powered features that drastically simplify and accelerate segmentation, ensuring swift workload isolation and reduced lateral movement risks across your infrastructure.
Protect everything using true Zero Trust across your entire estate
Your infrastructure is heterogeneous, but your segmentation solution shouldn’t have to be. Akamai Guardicore Segmentation delivers a single, unified policy engine that protects every asset, regardless of where it resides: VMs, containers, bare-metal servers, cloud instances, and even legacy systems that other solutions can’t touch.
Building on this solid foundation, Akamai’s other Zero Trust solutions work together to verify every access request based on identity, context, and risk. We combine microsegmentation, Zero Trust Network Access (ZTNA), and multi-factor authentication (MFA) to combat persistent threats like ransomware, ensuring consistent protection across your entire estate.
As a result, you can achieve a consistent Zero Trust posture everywhere, closing the dangerous gaps left open by NSX.
Simplify everything with AI-powered policy and automation
Building and maintaining segmentation policies shouldn't require an army of experts. Akamai Guardicore Segmentation’s AI-powered engine analyzes traffic flows and recommends policies, dramatically simplifying the path to enforcement.
The Guardicore AI Assistant, a generative AI chatbot, acts as an in-house expert, offering tailored advice on segmentation and Zero Trust. AI Labeling automates asset classification by analyzing workload behaviors, which enables fast, scalable, and intuitive policy enforcement.
Intuitive wizards and attribute-based rules simplify management even further, allowing you to create powerful, granular policies that are easy to manage and adapt as your environment changes.
Gain predictable value from a licensing model that makes sense
In contrast to VMware's forced bundles, Akamai offers a flexible, per-asset licensing model. You only pay for what you need to protect, and only for the capabilities you want to use. Our more flexible approach gives you a predictable, transparent total cost of ownership (TCO) and helps ensure that your security investment scales directly with your business needs, without any superfluous add-ons.
A proven, risk-free path forward
Real-life example
It's time for a strategic move
Learn more
Tags