Armis headquartered in Palo Alto offers an agentless, enterprise-class security platform to address the new threat landscape of unmanaged and IoT devices, an out-of-band sensing technology to discover and analyze all managed, unmanaged, and IoT devices—from traditional devices like laptops and smartphones to new unmanaged smart devices like smart TVs, webcams, printers, HVAC systems, industrial robots, medical devices and more. Armis discovers devices on and off the network, continuously…
N/A
Microsoft Defender for IoT
Score 9.0 out of 10
N/A
Microsoft states users can protect IoT/OT devices and get visibility into risk with Microsoft Defender for IoT (formerly Azure Defender for IoT), boasting agentless network monitoring for asset discovery, vulnerability management, and continuous threat detection across IoT/OT devices whether they’re unmanaged devices or managed devices provisioned via Azure IoT Hub. Features an integration with Azure Sentinel and third-party solutions. Deploy in either on-premises or Azure-connected…
We started an entirely new network segregation implementation for security policies. Armis was unparalleled at helping us find rogue static IP-assigned devices in our old network and helped us identify what they were so we could tackle the challenge of moving everything to the new network VLANs. Another use case is finding a specific device or a specific user account to track their activity. The layout is phenomenal, and the data is easy to understand and drill down into for further information. The new AVM (Asset Vulnerability Management) section is awesome to help us find the out-of-date devices or other risks on the network to figure out where we are most vulnerable and at risk. If you're looking for a way to have Armis auto patch vulnerabilities - that's only on the radar from what I've heard - but currently, it is an amazing tool for finding and detailing the CVEs and other risks. You can create policies to block specific risky behaviors, but currently, at the time of writing, there isn't any automated patching or remediation to known CVEs found on a device.
Suited in almost all situations as it has a server less option where if your end device cannot bear the load of an agent, it could be used to protect the network. The comprehensive dashboarding and its integration with Microsoft Defender 365 and Sentinel allows automated remediation and full incident investigation at a single pane. If you don't have a 24*7 SOC team this ca come handy as you can automate workbooks and scripts to run with custom triggers. I haven't faced any scenario where it is not a suitable choice.
I've requested integration with Mosyle Manager for our Apple MDM products - it is on the radar but slow going - Mosyle has an API and a free 30-day trial, so implementation shouldn't be difficult - but honestly, other than that - Armis support has been astonishing, and there are so many integrations already - it's small potatoes.
Considering Armis has all the data collected and parsed - it would be nice to see a back-end system for those of us who are true nerds and want to really dig into the Syslog data and analyze packets directly - however, building some quick queries is probably easier if you know what you are looking for anyway - which is probably why this is a backward way of my own thinking and no fault of Armis at all. They make the interface so easy to use it's not necessary, but it hurts my inner geek.
Armis is kind of a total conglomeration of a ton of different tools/systems, and depending on how you want to set it up can do almost anything a lot of these other tools can do - and in some cases, even better. It doesn't do software deployment or other things like SCCM I have listed, but the reporting side is so much better than SCCM's interface. As far as data breaches, user/device activity tracking, vulnerability outlook, network scanning, device identification, and agentless miracles of magic - Armis is the king.