Experience Armis Centrix™ at RSA Conference 2025

Join Us @ RSAC
  1. Nautobot logo

    Nautobot

    The integration between Armis and Nautobot helps customers with asset management as a data source for identification, network analysis, and risk-assessment purposes.

  2. LMNTRIX logo

    LMNTRIX

    Lmntrix provides continuous monitoring and on-demand analysis of your network, helping you to prevent cyber attacks. The integration between Armis and Lmntrix further enhances customer capabilities by leveraging asset management data as a data source. Device data enrichment. Full visibility of all Lmntrix managed device profile information, such as the Last check-in date, device name,…

  3. Flexera Logo - 760

    Flexera Spider

    Flexera Spider provides IT management solutions that improve enterprise control and management of IT assets, reduce ongoing software costs, and ensure license compliance. Armis utilizes this integration to enrich the device inventory with information received from Flexera Spider.

  4. Extreme Networks Logo - 760

    Extreme CloudiQ

    ExtremeCloud IQ is an industry-leading approach to cloud-driven networking, designed to take full advantage of Extreme’s end-to-end networking solutions. It delivers unified, full-stack management of access points, switches, and SD-WAN. ExtremeCloud IQ uses innovative ML technologies to analyze and interpret millions of network and user data points, from the edge to the data center, to…

  5. Elastic Defend logo

    Elastic Defend

    Elastic Defend provides organizations with prevention, detection, and response capabilities with deep visibility for EPP, EDR, SIEM, and Security Analytics use cases across Windows, macOS, and Linux operating systems running on both traditional endpoints and public cloud environments. Use Cases Device data enrichment: Full visibility of all Elastic Defend endpoints. Correlation of Elastic Defend devices…

  6. Cybereason logo

    Cybereason

    Cybereason EDR provides comprehensive threat protection by continuously monitoring and analyzing activities to detect and neutralize ransomware, malware, fileless attacks, and in-memory threats. Use Cases Sensors data enrichment: Full visibility of all Cybereason EDR sensors. Correlation of Cybereason EDR sensors with other data sources (such as Active Directory, WLCs). Additional data related to network interfaces…

  7. Cradlepoint NetCloud logo

    Cradlepoint NetCloud

    Cradlepoint’s NetCloud Manager is a network service management software platform that uses wireless cellular routers to allow its users to harness the power of LTE and 5G cellular networks to grant access to their network and ensure the security of the network and its users.

  8. Airlock Digital logo

    Airlock Digital

    The Airlock Digital platform is a cybersecurity solution that focuses on application whitelisting and control. It helps organizations prevent unauthorized applications from running on their systems, improving their security posture. The platform provides a centralized management console for creating and managing application whitelists, as well as monitoring and reporting on application usage.

  9. Cisco Blue Logo - 760

    Cisco Vulnerability Management (Formerly Kenna)

    Cisco Vulnerability Management (Formerly Kenna) is a vulnerability management platform. The platform allows customers to bring data from multiple vendors. It uses various techniques to assess, prioritize, and predict risk. Armis’s integration transforms Armis data about devices and associated vulnerabilities into Kenna Data Importer (KDI) files and pushes the files to Kenna’s Armis Connector. Users…

  10. NVD Logo - 760

    National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD)

    The National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) is the U.S. government repository of standards based vulnerability management data represented using the Security Content Automation Protocol (SCAP). This data enables automation of vulnerability management, security measurement, and compliance. The NVD includes databases of security checklist references, security-related software flaws, misconfigurations, product…