Try our new research platform with insights from 80,000+ expert users

Armis vs Cisco Vulnerability Management (formerly Kenna.VM) comparison

Sponsored
 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Zafran Security
Sponsored
Average Rating
0
Number of Reviews
0
Ranking in other categories
Vulnerability Management (65th), Continuous Threat Exposure Management (CTEM) (6th)
Armis
Average Rating
8.6
Reviews Sentiment
7.2
Number of Reviews
8
Ranking in other categories
IoT Security (3rd), Cyber Asset Attack Surface Management (CAASM) (3rd), Risk-Based Vulnerability Management (8th), Cyber-Physical Systems Protection (2nd)
Cisco Vulnerability Managem...
Average Rating
8.0
Reviews Sentiment
6.8
Number of Reviews
1
Ranking in other categories
Cisco Security Portfolio (11th), Risk-Based Vulnerability Management (18th)
 

Featured Reviews

Use Zafran Security?
Share your opinion
Arun Chauhan - PeerSpot reviewer
Provides a very good vulnerability monitoring system, but the implementation is challenging
We face many issues while implementing Armis in the pharma sector. Some of the customer applications are not supported well by the tool. The applications do not communicate well if we implement Armis. We generally face such issues during implementation. We are planning to implement the product in the wind energy sector, but we don't have any idea how to do it. Currently, it is a very big challenge for us. Products like Dragos, Claroty, and Nozomi provide a much better experience during implementation. If any issues arise, we are told how to resolve such issues during the POC. Armis does not provide the secure remote access feature Claroty provides.
AshishPaliwal - PeerSpot reviewer
Offers contextual prioritization and risk-based remediation of vulnerability
An improvement would be some sort of an integration with any GRC suite. There are a lot of GRC suites available, like Archer, MetricStream, Rsam, Protiviti, for example. So how would a solution like this work if my company has already invested thousands or maybe millions in a GRC solution? Do I still need it and how does it fit into an existing SAP environment? There could be interoperability, having more data sources, integrating Splunk, Qualys, FireEye, Rapid7, Carbon Black. I'm sure all that can be done to an extent, with a little more insight and a little more accuracy on the industry numbers and trends. I'd like the solution to offer any sort of assistance in any way with the remediation part, not just identification of vulnerability risk, and that is second.
report
Use our free recommendation engine to learn which Risk-Based Vulnerability Management solutions are best for your needs.
838,713 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
13%
Financial Services Firm
13%
University
9%
Retailer
7%
Government
13%
Computer Software Company
12%
Manufacturing Company
9%
Financial Services Firm
8%
Computer Software Company
23%
Financial Services Firm
15%
Retailer
9%
Manufacturing Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
No data available
 

Questions from the Community

Ask a question
Earn 20 points
What do you like most about Armis?
Armis is a straightforward and user-friendly solution.
What needs improvement with Armis?
There isn't anything specific that needs improvement.
What is your primary use case for Armis?
I used it for asset management in my cybersecurity training program called CyberNow Labs. It was used during security...
Ask a question
Earn 20 points
 

Also Known As

No data available
No data available
Kenna.VM, Kenna Security, Kenna, Kenna Security Platform
 

Overview

 

Sample Customers

Information Not Available
Samsung Research America, IDT Corporation, Gett
TransUnion
Find out what your peers are saying about Tenable, Qualys, Rapid7 and others in Risk-Based Vulnerability Management. Updated: February 2025.
838,713 professionals have used our research since 2012.