What users are saying about
13 Ratings
<a href='https://www.trustradius.com/static/about-trustradius-scoring' target='_blank' rel='nofollow noopener'>trScore algorithm: Learn more.</a>
Score 8.8 out of 100
39 Ratings
<a href='https://www.trustradius.com/static/about-trustradius-scoring' target='_blank' rel='nofollow noopener'>trScore algorithm: Learn more.</a>
Score 8.4 out of 100

Attribute Ratings

  • VMware NSX is rated higher in 1 area: Likelihood to Recommend

Likelihood to Recommend

7.9

Cisco SD-Access

79%
8 Ratings
8.5

VMware NSX

85%
4 Ratings

Support Rating

8.1

Cisco SD-Access

81%
9 Ratings

VMware NSX

N/A
0 Ratings

Likelihood to Recommend

Cisco SD-Access

The best way to use this solution [Cisco Software SD-Access] is in Campus LAN environments, [which] could be small, medium, and large sites, that includes remote branches also. And always use with 3 node (HA) availability. This solution is not appropriate for Data Center environments. This solution is not mean[t] to connect remote sites (the WAN itself). This solution is ideal to achieve high and low level hierarchies of security and connectivity of end users in a network.
Anonymous | TrustRadius Reviewer

VMware NSX

Recommendation 10 for large companies, with a data center with more than 1000 VM's on average is very appropriate, as the security of the environment can be divided between physical firewall and virtual firewall and have another separate management for cases of troubleshooting, having only physical firewall in these In some cases, the rules are immense and this can cause future problems.
For Medium / Small companies, I do not recommend it, as the main one is a physical firewall, (Remembering that NSX does not replace a physical firewall), as smaller companies with less rules, only a physical firewall can be used.
Jorge Filho | TrustRadius Reviewer

Pros

Cisco SD-Access

  • Automation, pushing template-based configuration to multiple devices in one push saves time and manpower.
  • Assurance [helps trace] issues related to devices, clients, and provide the troubleshoot as [the] best practices.
  • Segmentation, with the use of the SGT tags, we are able to achieve segmentation and micro-segmentation securely.
Inderdeep Singh | TrustRadius Reviewer

VMware NSX

  • Broadcast Suppression: By suppressing broadcast traffic, we have been able to deploy a single VDI network in a /18 network space, allowing for rapid growth and proper DHCP lease timing for a VDI instant clone environment.
  • Networking HA: Leveraging internal mechanisms for high availability, it provides disaster resiliency to a virtual networking environment.
  • Cost Savings: All available features of NSX are licensed simultaneously. Load balancers, firewalls, and routers are all licensed as features, not per object, allowing for the deployment of as many of these objects as are needed.
Christina Harding | TrustRadius Reviewer

Cons

Cisco SD-Access

  • Documentation: Working in this solution I realized there were missing information details about the fusion device support for nexus.
  • Fusion router: This roll in the fabric should be already integrated in the solution, right now it is configured manually.
  • Bugs: Unfortunately the solution still present a lot of bugs, mainly in the controller.
Anonymous | TrustRadius Reviewer

VMware NSX

  • Our biggest challenge is gaining acceptance from network engineers who are used to working with other technologies.
Anonymous | TrustRadius Reviewer

Pricing Details

Cisco SD-Access

General

Free Trial
Free/Freemium Version
Premium Consulting/Integration Services
Entry-level set up fee?
No

Starting Price

VMware NSX

General

Free Trial
Free/Freemium Version
Premium Consulting/Integration Services
Entry-level set up fee?
No

Starting Price

Support Rating

Cisco SD-Access

Cisco SD-Access 8.1
Based on 9 answers
As far as my experience with SD-Access -I'd say things that can be improved are - better functionality with ISE, ease to understand licensing and better documentation for configuration (add-ons, etc), and licensing.
Anonymous | TrustRadius Reviewer

VMware NSX

No score
No answers yet
No answers on this topic

Alternatives Considered

Cisco SD-Access

Automation, pushing template-based configuration to multiple devices in one push saves time and manpower. Assurance helps trace issues related to devices, clients, and provide the troubleshoot as the best practices. Segmentation, with the use of the SGT tags, we are able to achieve segmentation and micro-segmentation securely.
Anonymous | TrustRadius Reviewer

VMware NSX

Anonymous | TrustRadius Reviewer

Return on Investment

Cisco SD-Access

  • Integration with other platforms in a single platform is a great advantage for the user.
  • Saves time in configuring devices on the network
Anonymous | TrustRadius Reviewer

VMware NSX

  • We are a company with 300 VM's and few departments, the investment was more for security, putting in ROI, we can mention that environmental security is priceless.
  • We have a simplified understanding of east-west rules, bringing a lot of satisfaction to the user, since creating and modifying rules is a very simple activity.
  • With NSX for virtual environment, the IT team was also very satisfied with the communication without the need for a physical medium (Switch for example). The machines that need more performance, are placed on the same physical Host, as a rule of affinity and with that the performance reaches the expected very easy.
Jorge Filho | TrustRadius Reviewer

Add comparison