Cisco Application Centric Infrastructure and Network Automation
February 07, 2023

Cisco Application Centric Infrastructure and Network Automation

Charles Greenaway | TrustRadius Reviewer
Score 10 out of 10
Vetted Review

Overall Satisfaction with Cisco Application Centric Infrastructure (Cisco ACI)

I run managed services where we resell the Cisco products and offer fully managed services on those products. Cisco Application Centric Infrastructure provides the means to consolidate legacy data center architectures on to a single platform that can expand across multiple locations. It also solves the challenges around integration and security for private cloud. ACI has built in network automation along with an API first approach for external orchestrators making it easy to drive programmatically.
  • Network automation
  • Scale out security
  • Private cloud integration
  • Multicloud extension for brown field locations on cloud.
  • The tight integration has reduced time to manage changes. The higher throughput translates to people getting work done - higher productivity,
Driving implementation and change functions for fabrics of any size through the northbound API of the APIC controllers improves operations for the business. Also, the Nexus 9000 has a very low failure rate.
The northbound API has been well adopted and supported by frameworks. Terraform and Ansible for example. It makes the infrastructure very acessible to those that do not have a programming background.

Do you think Cisco Application Centric Infrastructure (Cisco ACI) delivers good value for the price?

Yes

Are you happy with Cisco Application Centric Infrastructure (Cisco ACI)'s feature set?

Yes

Did Cisco Application Centric Infrastructure (Cisco ACI) live up to sales and marketing promises?

Yes

Did implementation of Cisco Application Centric Infrastructure (Cisco ACI) go as expected?

Yes

Would you buy Cisco Application Centric Infrastructure (Cisco ACI) again?

Yes

Integration of two or more pods or sites and integration with VMware using security groups and microsegmentation.