Experience Armis Centrix™ at RSA Conference 2025

Join Us @ RSAC
  1. Cisco Meraki Logo - 760

    Cisco Meraki

    Cloud-to-cloud integration gives you visibility into the devices and software on your network, connections between devices, and services being used.

  2. Cisco Blue Logo - 760

    Cisco Secure Endpoint

    Cisco Secure Endpoint management offers cloud-delivered endpoint protection and advanced endpoint detection and response across multidomain control points. Use Cases Device data enrichment. Enrichment of existing Armis devices with data exposed by Cisco Secure Endpoint.

  3. CVE Logo - 760

    Common Vulnerabilities and Exposures (CVE)

    The Common Vulnerabilities and Exposures (CVE) system provides a reference-method for publicly known information-security vulnerabilities and exposures. The CVE integration is automatically deployed for any customers of the Armis Asset Vulnerability Management module.

  4. CrowdStrike Logo - 760

    CrowdStrike

    CrowdStrike provides cloud-delivered endpoint detection and response (EDR), workload protection, managed threat hunting, and threat intelligence. Use Cases Retrieve detailed information on CrowdStrike managed devices. The retrieved information is correlated with other data sources. Verify compliance with CrowdStrike security policies by discovering the following: Missing or malfunctioning CrowdStrike agents CrowdStrike agents running out-of-date software versions…

  5. CSV Logo - 760

    CSV

    Upload CSV data to manually import new assets or add asset attributes for contextual analysis.

  6. CISA Logo - 760

    Cybersecurity and Infrastructure Security Agency (CISA)

    Cybersecurity and Infrastructure Security Agency (CISA) manages a catalog of Known Exploited Vulnerabilities (KEV) and requires federal civilian agencies to remediate such vulnerabilities within specific timeframes. Use Cases Audit vulnerability remediation by the CISA Due Date The CISA KEV integration is automatically deployed for any customers of the Armis Asset Vulnerability Management module.

  7. Device42 Logo - 760

    Device42

    Device42 ITSM system provides comprehensive IT asset management capabilities, including powerful asset auto–discovery and configurable asset types to completely document all IT assets across your infrastructure deployment. Use Cases Device data enrichment Enrichment of existing Armis devices with data exposed by Device42.

  8. Dropbox Logo - 760

    Dropbox

    Dropbox is a SaaS file sharing and cloud storage platform. Use Cases Import user accounts Import user activities

  9. Duo Logo - 760

    Duo Beyond

    Duo Beyond identifies corporate vs. personal devices with easy certificate deployment, block untrusted endpoints, and give users secure access to internal applications without using VPNs. Use Cases Identify Duo users Retrieve detailed information on Duo endpoints, that is laptops, desktops, tablets, mobile phones, and other devices used to access Duo-protected applications and services. Currently, the…

  10. Dynatrace Logo - 760

    Dynatrace

    Dynatrace is a software intelligence and infrastructure monitoring platform that simplifies enterprise cloud complexity and accelerates digital transformation. Dynatrace seamlessly brings infrastructure and cloud, application performance, and digital experience monitoring into an all-in-one, automated solution that’s powered by artificial intelligence. This integration fetches useful information from the OneAgent-managed devices. Dynatrace OneAgent is essentially one binary…