Armis

Armis

Armis Security
+
+
Visit Website

Platforms Supported

Windows
Mac
Linux
SaaS / Web
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
SaaS / Web
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Companies looking for a device security solution to keep their businesses secure

Audience

Guardz is built for MSPs and IT Service Providers

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

$9 per month
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 5.0 / 5
ease 5.0 / 5
features 4.5 / 5
design 5.0 / 5
support 5.0 / 5
Read all reviews

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Armis Security
Founded: 2015
United States
www.armis.com

Company Information

Guardz
Founded: 2022
Israel
guardz.com

Alternatives

Alternatives

Forescout

Forescout

Forescout Technologies
Tenable One

Tenable One

Tenable
SanerNow

SanerNow

SecPod Technologies
Dark Web ID

Dark Web ID

IDAgent

Categories

Categories

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

IT Asset Management Features

Asset Tracking
Audit Management
Compliance Management
Configuration Management
Contract/License Management
Cost Tracking
Depreciation Management
Inventory Management
IT Service Management
Maintenance Management
Procurement Management
Requisition Management
Supplier Management

IoT Features

Application Development
Big Data Analytics
Configuration Management
Connectivity Management
Data Collection
Data Management
Device Management
Performance Management
Prototyping
Visualization

Network Security Features

Access Control
Analytics / Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

SCADA Features

Alarm Management
Archiving & Retention
Dashboard Designer
Data Aggregation
Data Visualization
Hardware Integration
HMI Integration
Real-time Monitoring

Vulnerability Management Features

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Cloud Security Features

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Data Loss Prevention Features

Compliance Reporting
Incident Management
Policy Management
Sensitive Data Identification
Web Threat Management
Whitelisting / Blacklisting

Email Security Features

Anti Spam
Anti Virus
Email Attachment Protection
Encryption
Policy Management
Quarantine
Reporting/Analytics
Whitelisting / Blacklisting

Endpoint Protection Features

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

Incident Response Features

Attack Behavior Analytics
Automated Remediation
Compliance Reporting
Forensic Data Retention
Incident Alerting
Incident Database
Incident Logs
Incident Reporting
Privacy Breach Reporting
Security Orchestration
SIEM Data Ingestion / Correlation
SLA Tracking / Management
Threat Intelligence
Timeline Analysis
Workflow Automation
Workflow Management

MSP Features

Backup Management
Billing & Invoicing
CRM
Dashboard
Help Desk
Issue Management
Live Chat
Patch Management
Privileged Access Management (PAM)
Project Management
Remote Access
Remote Systems Monitoring
Scheduling

Integrations

Microsoft 365
BlueCat Edge
Check Point IPS
Check Point Infinity
Chronicle SOAR
Cisco ISE
Cisco Meraki
IBM Cloud
Ivanti Endpoint Manager
Jamf Protect
Junos Traffic Vision
Puppet Enterprise
Securonix Security Operations and Analytics
Sentinel
SentinelOne Singularity
ServiceNow Configuration Management Database
Splunk Cloud Platform
Sumo Logic
VMware Carbon Black EDR
Veriti

Integrations

Microsoft 365
BlueCat Edge
Check Point IPS
Check Point Infinity
Chronicle SOAR
Cisco ISE
Cisco Meraki
IBM Cloud
Ivanti Endpoint Manager
Jamf Protect
Junos Traffic Vision
Puppet Enterprise
Securonix Security Operations and Analytics
Sentinel
SentinelOne Singularity
ServiceNow Configuration Management Database
Splunk Cloud Platform
Sumo Logic
VMware Carbon Black EDR
Veriti
Claim Armis and update features and information
Claim Armis and update features and information