Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Armis Centrix™ unifies cybersecurity operations by delivering continuous discovery, monitoring, and protection of every asset across complex hybrid networks. Its AI-powered intelligence engine enables security teams to detect unmanaged devices, assess vulnerabilities, and mitigate risks before attackers can exploit them. Organizations can manage IT systems, industrial OT environments, medical IoMT fleets, and IoT devices from a single platform with zero blind spots. The platform supports both on-premises and SaaS deployments, making it flexible for industries like healthcare, utilities, manufacturing, and critical infrastructure. VIPR Pro enhances the platform with automated remediation workflows, helping teams prioritize issues based on real-world threat activity. Early Warning intelligence provides insight into vulnerabilities actively being weaponized, ensuring organizations can act ahead of threats. Armis Centrix™ also improves business outcomes by increasing operational efficiency, supporting compliance, and strengthening resilience. Trusted by global enterprises and recognized by Gartner and GigaOm, Armis Centrix™ is built to meet the cybersecurity demands of modern digital environments.

Description

Minimize downtime for end-users by gaining a comprehensive understanding of their devices and the software installed on them. By assessing the age of computers and monitors, you can proactively manage your budget and mitigate risks, allowing for more informed decisions regarding which equipment needs replacement. Empower your service desk to efficiently handle break-fix issues by utilizing existing device warranties, which can lead to significant cost savings. Regularly upgrading, patching, or uninstalling user-installed software is essential for maintaining a secure environment. Adhering to company compliance standards not only reduces vulnerabilities but also enhances overall security. Identifying potential security weaknesses within your software inventory can be a challenging task at the user level, often leading to a sense of frustration, especially when addressing issues related to non-compliant software feels equally daunting. This comprehensive oversight ultimately facilitates a more robust IT management strategy.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

ServiceNow
Akamai Guardicore Segmentation
Aruba ClearPass
Axonius
Brinqa
Check Point Infinity
Cisco Identity Services Engine (ISE)
Cisco Meraki
CloudStorm
Flexera One
Google Cloud Platform
Google Digital Risk Protection
IBM Cloud
Optiv Managed XDR
Phosphorus
Puppet Enterprise
Qualys TruRisk Platform
Rapid7 Incident Command
Sumo Logic
vSRX Virtual Firewall

Integrations

ServiceNow
Akamai Guardicore Segmentation
Aruba ClearPass
Axonius
Brinqa
Check Point Infinity
Cisco Identity Services Engine (ISE)
Cisco Meraki
CloudStorm
Flexera One
Google Cloud Platform
Google Digital Risk Protection
IBM Cloud
Optiv Managed XDR
Phosphorus
Puppet Enterprise
Qualys TruRisk Platform
Rapid7 Incident Command
Sumo Logic
vSRX Virtual Firewall

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Armis

Founded

2015

Country

United States

Website

www.armis.com

Vendor Details

Company Name

Recast Software

Founded

2015

Country

United States

Website

www.recastsoftware.com/endpoint-insights/

Product Features

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

IoT

Application Development
Big Data Analytics
Configuration Management
Connectivity Management
Data Collection
Data Management
Device Management
Performance Management
Prototyping
Visualization

IT Asset Management

Asset Tracking
Audit Management
Compliance Management
Configuration Management
Contract/License Management
Cost Tracking
Depreciation Management
IT Service Management
Inventory Management
Maintenance Management
Procurement Management
Requisition Management
Supplier Management

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

SCADA

Alarm Management
Archiving & Retention
Dashboard Designer
Data Aggregation
Data Visualization
HMI Integration
Hardware Integration
Real-time Monitoring

Vulnerability Management

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Product Features

IT Asset Management

Asset Tracking
Audit Management
Compliance Management
Configuration Management
Contract/License Management
Cost Tracking
Depreciation Management
IT Service Management
Inventory Management
Maintenance Management
Procurement Management
Requisition Management
Supplier Management

Alternatives

Alternatives

Tenable One Reviews

Tenable One

Tenable
baramundi Management Suite Reviews

baramundi Management Suite

baramundi Software USA