Technology Partners
Armis collaborates with the world’s premier global technology vendors to ensure our customers can integrate the power of our platform throughout their organizations.
Cloud Alliances
AWS
Read MoreAWS
The Armis Device Security Platform is now available on AWS Marketplace, further extending the benefits of transacting via AWS Marketplace to Armis and AWS customers.
Learn moreGoogle Cloud
Read MoreGoogle Cloud
Armis and Google Cloud partner to provide customers with unrivaled asset management and a fast and simplified transaction process. GCP customers are equipped with actionable data that empowers and accelerates their decision making, thereby strengthening their overall cybersecurity resilience.
Learn moreStrategic Alliances
CrowdStrike
Read MoreCrowdStrike
Together, Armis and CrowdStrike help to strengthen your security posture through real-time assurance that Falcon sensors are properly deployed, updated, and active. The Armis and CrowdStrike integration improves visibility, combining device details from Falcon sensors, with device details gathered by Armis from your other IT and security products, giving you a comprehensive view of every managed and unmanaged asset in your environment, including their potential risks.
Fortinet
Read MoreFortinet
The combined solution provides extreme visibility into the details of every asset. Doing so enables:
- Discovery of every device
- An additional feed into a SIEM which illuminates areas that may not have been visible before
- Dynamic application of device security based on device type, vulnerabilities, risks, behaviors, and threats.
SentinelOne
Read MoreSentinelOne
Armis and SentinalOne have partnered to deliver unified asset intelligence, threat enrichment, and attack surface reduction for enterprise security teams. Automation and orchestration between the platforms can help improve the efficiency of security operations. Security teams can focus on more complex security problems by automating repetitive tasks, such as building a device inventory or gathering information during triage.
Learn more about our integration with SentinalOneServiceNow
Read MoreServiceNow
Ensure that your organization gets the most accurate view of your complete asset inventory, maximize your investments in Configurations Management Database (CMDB), and fill coverage gaps to unify all assets to support your overall business operations and security. Now you can:
- Discover, contextualize, enrich and profile every asset
- Prioritize vulnerability remediation and improve MTTR
- Enable a data driven security response
- Centralize visibility and apply business application dependencies
Torq
Read MoreTorq
Armis Enterprise Workflow Automation (EWA), powered by Torq, provides the security team with a seamless experience to build extremely powerful workflows, and to replace manual processes with an orchestrated response to events. The Torq solution enables security teams to automate any remediation or workflow, involving literally any IT, cyber or communications tool, without requiring any professional services or scripting.
Learn more about our integration with TorqTrueFort
Read MoreTrueFort
TrueFort and Armis collaborate to establish robust security alignment by offering real-time visibility and control across IT, IoT, and OT environments, thereby enabling authorized communications exclusively. By leveraging
our combined expertise, we facilitate a comprehensive mapping of all activities occurring within the production environment, encompassing IT, IoT, OT/ICS/IIoT, building management systems, and medical devices.
Technology Integrations
CMDB
Compliance
Endpoint Protection
IoT Security
Network Security
Security Controls Assessment
SOC
Vulnerability Management
All
Airgap Networks
Read MoreAirgap Networks
Airgap is a cybersecurity company specializing in providing Zero Trust security solutions by isolating and protecting critical infrastructure from potential threats, ensuring that breaches are contained and prevented from spreading.
Akamai
Read MoreAkamai
Akamai Technologies is a global content delivery network (CDN) and cloud service provider, specializing in optimizing and securing digital experiences through edge computing, cybersecurity, and performance solutions.
Anecdotes
Read MoreAnecdotes
The Armis and Anecdotes integration allows customers to automate evidence collection surrounding continuous monitoring and management of critical assets. Once the integration is connected, the Anecdotes platform will automatically collect evidence from Armis, which will then be automatically cross-mapped to all relevant places within your GRC program, including frameworks, risks and others.
AWS
Read MoreAWS
The Armis Device Security Platform is now available on AWS Marketplace, further extending the benefits of transacting via AWS Marketplace to Armis and AWS customers.
Learn moreCheck Point
Read MoreCheck Point
Armis and Check Point have formed a tight partnership to help organizations reduce exposure to the cyber-risk of unmanaged and IoT devices without disrupting business operations across any environment – industrial, healthcare, manufacturing, retail, and more. By combining the Armis platform’s agentless, comprehensive asset discovery and continuous vulnerability assessment with Check Point’s security policy management and security gateways, you can apply a security policy for any device on your environment to mitigate device threats and vulnerabilities.
Learn more about our integration with Check PointCisco
Read MoreCisco
Armis uses Cisco pxGrid and its ISE Profiler API to share device classification information and other details with Cisco ISE, allowing ISE to enforce fine-grained network access policies. Armis can also provide Cisco ISE with real-time knowledge of risks and threats, based on our proprietary knowledge base of the expected behavior of millions of different types of unmanaged devices.
Cisco Meraki
Read MoreCisco Meraki
Our partnership with Cisco Meraki™ allows customers to leverage their existing Meraki infrastructure to create a detailed inventory of every device on their network, to analyze device behavior continuously for risks and threats, and to block suspicious or malicious devices automatically. This powerful, market-proven integration gives Meraki and Armis customers rapid time to value with a detailed device inventory within minutes, even in large-scale deployments.
Learn more about our integration with MerakiCrowdStrike
Read MoreCrowdStrike
Together, Armis and CrowdStrike help to strengthen your security posture through real-time assurance that Falcon sensors are properly deployed, updated, and active. The Armis and CrowdStrike integration improves visibility, combining device details from Falcon sensors, with device details gathered by Armis from your other IT and security products, giving you a comprehensive view of every managed and unmanaged asset in your environment, including their potential risks.
Elisity
Read MoreElisity
The integration between Elisity and Armis is designed to enhance security postures by merging Elisity’s micro-segmentation capabilities with Armis’s asset visibility, allowing mutual customers to easily and accurately operationalize micro-segmentation in their critical environments, benefiting from the integration between both solutions.
Eseye
Read MoreEseye
Armis and Eseye enable organizations to deploy connected devices anywhere in the world with enterprise-class security and consistent, reliable cellular connectivity.
Learn more about our integration with EseyeExabeam
Read MoreExabeam
Exabeam leverages Armis agentless device visibility, provided by the Armis platform, to provide IoT and unmanaged device alerting and asset inventory within the Exabeam Security Management Platform.
Learn more about our integration with ExabeamFortinet
Read MoreFortinet
The combined solution provides extreme visibility into the details of every asset. Doing so enables:
- Discovery of every device
- An additional feed into a SIEM which illuminates areas that may not have been visible before
- Dynamic application of device security based on device type, vulnerabilities, risks, behaviors, and threats.
Gigamon
Read MoreGigamon
Gigamon integrates with Armis to deliver a highly intelligent and automated approach to achieving visibility and security.
Learn more about our integration with GigamonGoogle Cloud
Read MoreGoogle Cloud
Armis and Google Cloud partner to provide customers with unrivaled asset management and a fast and simplified transaction process. GCP customers are equipped with actionable data that empowers and accelerates their decision making, thereby strengthening their overall cybersecurity resilience.
Learn moreGoogle Security Operations
Read MoreGoogle Security Operations
Google Security Operations ingests and automatically normalizes Armis device, alert, activity and vulnerability data via the pre-built Armis Default Parsers (for SIEM). In addition, there is also a pre-built connector and automated workflows for Armis ready for use via the Google SecOps SOAR Marketplace
IBM QRadar
Read MoreIBM QRadar
The integration allows users to collect alerts, vulnerabilities and associated assets via Armis API. and visualize collected results in dashboards and overviews
Illumio
Read MoreIllumio
The Armis platform imports device attributes from Illumio Edge endpoints, and exports device device discovery data to Illumio Edge to allow for true end-to-end segmentation deployments.
Download the Solution BriefKeysight
Read MoreKeysight
Features agentless network data collection, scalable hybrid network visibility, and support for devices communicating via off-network wireless connections.
Nuvolo
Read MoreNuvolo
The Armis platform imports enriched device information from the Nuvolo platform.
Learn more about our integration with NuvoloPalo Alto Networks
Read MorePalo Alto Networks
Armis automatically updates the Palo Alto Networks NGFW by adding the compromised device to an External Dynamic List (EDL). The EDL is hosted on the Armis virtual appliance so that it may be used in a NGFW policy to deny, drop or reset a connection.
Qualys
Read MoreQualys
Armis triggers your VA system to immediately scan a new device to produce a more real-time view of risks on your network.
Rapid7
Read MoreRapid7
Rapid7 InsightVM is a vulnerability management solution that provides discovery, detection, verification, risk classification, impact analysis, reporting and mitigation.
ReliaQuest
Read MoreReliaQuest
Unify IT and OT security operations by leveraging Armis asset visibility and querying capabilities within GreyMatter.
Securonix
Read MoreSecuronix
Integrating Securonix Next-Gen SIEM with the Armis® Agentless Device Security Platform provides you with end-to-end visibility into your enterprise network, across IT, IoT, and unmanaged devices. Securonix leverages the asset inventory and alert data from the Armis platform for IoT analytics, compliance reporting, and adding contextual data for investigations.
SeeMetrics
Read MoreSeeMetrics
SeeMetrics is a security data fabric for risk management. Integrating Armis into SeeMetrics enriches asset data with additional layers of knowledge, allows enforcing dynamic policies based on asset group level of maturity and benchmarking performance based on Armis assets.
SentinelOne
Read MoreSentinelOne
Armis and SentinalOne have partnered to deliver unified asset intelligence, threat enrichment, and attack surface reduction for enterprise security teams. Automation and orchestration between the platforms can help improve the efficiency of security operations. Security teams can focus on more complex security problems by automating repetitive tasks, such as building a device inventory or gathering information during triage.
Learn more about our integration with SentinalOneServiceNow
Read MoreServiceNow
Ensure that your organization gets the most accurate view of your complete asset inventory, maximize your investments in Configurations Management Database (CMDB), and fill coverage gaps to unify all assets to support your overall business operations and security. Now you can:
- Discover, contextualize, enrich and profile every asset
- Prioritize vulnerability remediation and improve MTTR
- Enable a data driven security response
- Centralize visibility and apply business application dependencies
SoftPro
Read MoreSoftPro
Armis Centrix™ and Medusa by SoftPro Medical Solutions offer a two-way integration. Asset intelligence and security information is pulled from Armis Centrix™ into Medusa for comprehensive visibility.
Learn More About Our Integration With SoftProSplunk
Read MoreSplunk
The Armis platform’s integration with Splunk® extends unmanaged and IoT device visibility and security to Splunk for a consolidated view of devices and risks that helps you keep your entire environment protected. Along with the rich asset inventory, risk assessment, and threat detection Armis provides, the Splunk add-on for OT Security expands existing Splunk Enterprise Security frameworks to improve security visibility in OT environments.
Learn More About Our Integration With SplunkStellar Cyber
Read MoreStellar Cyber
With Armis Centrix and Stellar Cyber working together, security teams have a powerful integrated solution that eliminates the time-consuming manual-intensive tasks associated with finding asset and device data related to any potential threat. When an Armis user deploys Stellar Cyber, this critical information can automatically be incorporated into Stellar Cyber Open XDR Platform, providing security analysts with all the context they need to determine the full scope of an attack and take decisive action to mitigate the threat fully.
Tenable
Read MoreTenable
Armis triggers your VA system to immediately scan a new device to produce a more real-time view of risks on your network.
Tines
Read MoreTines
The integration between Tines and Armis supports 44 actions to detect and remediate risks across all devices
Torq
Read MoreTorq
Armis Enterprise Workflow Automation (EWA), powered by Torq, provides the security team with a seamless experience to build extremely powerful workflows, and to replace manual processes with an orchestrated response to events. The Torq solution enables security teams to automate any remediation or workflow, involving literally any IT, cyber or communications tool, without requiring any professional services or scripting.
Learn more about our integration with TorqTrellix
Read MoreTrellix
The Armis integration for Trellix Helix Connect reads alerts, events, and devices from the Armis API and matches that telemetry against our massive collection of intelligence, anomaly detection, and detection rules and combines it with Trellix Wise, our generative AI auto investigation service to produce a curated set of investigated cases.
TrueFort
Read MoreTrueFort
TrueFort and Armis collaborate to establish robust security alignment by offering real-time visibility and control across IT, IoT, and OT environments, thereby enabling authorized communications exclusively. By leveraging
our combined expertise, we facilitate a comprehensive mapping of all activities occurring within the production environment, encompassing IT, IoT, OT/ICS/IIoT, building management systems, and medical devices.
Veriti
Read MoreVeriti
The integration between Veriti Exposure Assessment and Remediation and Armis Centrix™ offers organizations a unified solution for identifying, prioritizing, and remediating security gaps and misconfigurations
Viakoo
Read MoreViakoo
Together, Armis® Agentless Device Security Platform and the Viakoo® Action Platform discover unmanaged and IT devices and remediate their risks automatically to keep devices and your business safe.
Learn more about our integration with Viakoo