Try our new research platform with insights from 80,000+ expert users

Armis vs Palo Alto Networks IoT Security comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

Armis
Ranking in IoT Security
3rd
Average Rating
8.2
Reviews Sentiment
7.2
Number of Reviews
7
Ranking in other categories
Cyber Asset Attack Surface Management (CAASM) (3rd), Risk-Based Vulnerability Management (9th), Cyber-Physical Systems Protection (2nd)
Palo Alto Networks IoT Secu...
Ranking in IoT Security
4th
Average Rating
8.6
Number of Reviews
8
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of November 2024, in the IoT Security category, the mindshare of Armis is 18.2%, down from 18.9% compared to the previous year. The mindshare of Palo Alto Networks IoT Security is 7.7%, up from 5.9% compared to the previous year. It is calculated based on PeerSpot user engagement data.
IoT Security
 

Featured Reviews

Arun Chauhan - PeerSpot reviewer
Provides a very good vulnerability monitoring system, but the implementation is challenging
We face many issues while implementing Armis in the pharma sector. Some of the customer applications are not supported well by the tool. The applications do not communicate well if we implement Armis. We generally face such issues during implementation. We are planning to implement the product in the wind energy sector, but we don't have any idea how to do it. Currently, it is a very big challenge for us. Products like Dragos, Claroty, and Nozomi provide a much better experience during implementation. If any issues arise, we are told how to resolve such issues during the POC. Armis does not provide the secure remote access feature Claroty provides.
Alex De Miranda - PeerSpot reviewer
Offers a range of security options, including user ID mapping and VPNs
Palo Alto is valued for its GlobalProtect feature, which offers a range of security options, including user ID mapping and VPNs. Clients also appreciate the firewall's deployment flexibility. IoT provides granular zero trust least privilege policy recommendations. The speed of zero trust policy creation depends on the complexity of the desired outcome. However, assuming a straightforward objective, the process can be quite efficient. Once the desired outcome is clearly documented, creating the policies becomes much easier as the necessary steps are already defined. From there, it's simply a matter of configuring the details and implementing the changes. Overall, creating a zero-trust policy in this scenario is a relatively simple process. Customers appreciate Palo Alto Networks IoT Security's seamless integration with various platforms, including Cisco ISE and other Cisco tools like user identification systems. This flexibility, along with Prisma Access integration, allows for comprehensive security across diverse environments and enhances interoperability with existing infrastructure. The risk assessment information from IoT Security is valuable because it guides necessary changes for compliance with best practices. This is crucial for engineers making adjustments and new deployments, ensuring alignment with industry standards. Palo Alto Networks IoT Security utilizes its next-generation firewall as a sensor, eliminating the need for additional hardware. While this multi-functionality is beneficial, it's important to note that the firewall may not be able to effectively handle every security layer, so relying solely on it for all security needs might not be optimal.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The technology is good."
"Armis is a straightforward and user-friendly solution."
"The initial setup and deployment were simple."
"The most valuable feature of the solution is asset tracking."
"It determines which assets and devices are at risk, alerts you if there's a risk, and categorizes all assets, including personal computers, mobile phones, servers, televisions, cars, and video game consoles."
"The solution’s vulnerability monitoring system is very good."
"The tool is user-friendly and helps to detect vulnerabilities."
"The key strength of Palo Alto firewalls lies in their application-based approach, offering a much finer level of control compared to traditional firewalls."
"This solution has been most valuable for establishing a VPN and implementing allow/deny rules. It has also enabled us to create security policies. It is an easy solution to customise when it comes to creating templates and pulling reports."
"Palo Alto is valued for its GlobalProtect feature, which offers a range of security options, including user ID mapping and VPNs."
"I like the Cortex Data Lake integration with security automation."
"From a security standpoint, it provides a comprehensive range of standard security features that align with our requirements."
"Single-pass traffic processing enables very high throughput and low latency."
"I like the threat information, and we can share the logging data with Cortex Data Lake."
"It is simple to use. We just need to enable features and then configure IoT policies."
 

Cons

"The solution's vulnerability testing could be improved."
"Like any IT tool, continuous learning and improvement are essential for the solution."
"Armis doesn't have a back intel feature."
"We face issues during implementation."
"We have faced issues with the tool's stability."
"We face difficulties in integrating the product with ticketing tools like ServiceNow."
"There isn't anything specific that needs improvement."
"It would be beneficial if Palo Alto IoT Security could integrate with Let's Encrypt for free SSL certificates."
"The reporting for this solution could be improved. The logs we receive are only saved for one week. We would like to have the database timeframe increased to a month or two for historical reporting as well as increased storage capabilities to support this data and reporting."
"While not overly complex, its usability could be enhanced, making it a more intuitive experience for everyone."
"Essentially, this solution focuses on data analysis and cannot perform any physical actions."
"There can be more automation in terms of security and detection. It is already good."
"The cost is still high and licensing is still complex."
"More application signatures are required."
"It would be beneficial to have a more centralized and user-friendly platform that could consolidate all the necessary information, which proved challenging during the initial POC phase."
 

Pricing and Cost Advice

"The tool is cheap."
"While Palo Alto Networks IoT Security might cost more than some competitors, its features and effectiveness justify the price tag."
"The pricing for Palo Alto Networks IoT Security is a bit high."
"The successful migration trend suggests that Palo Alto provides a superior cost-benefit ratio for firewall solutions."
report
Use our free recommendation engine to learn which IoT Security solutions are best for your needs.
816,406 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Government
14%
Computer Software Company
12%
Manufacturing Company
10%
Financial Services Firm
8%
Computer Software Company
16%
Manufacturing Company
16%
Legal Firm
6%
Energy/Utilities Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Armis?
Armis is a straightforward and user-friendly solution.
What needs improvement with Armis?
There isn't anything specific that needs improvement.
What is your primary use case for Armis?
I used it for asset management in my cybersecurity training program called CyberNow Labs. It was used during security operations and investigations to identify assets within our CNL network and to ...
What do you like most about Palo Alto Networks IoT Security?
From a security standpoint, it provides a comprehensive range of standard security features that align with our requirements.
What needs improvement with Palo Alto Networks IoT Security?
It is not very comprehensive in terms of visibility. When we tested, multiple application signatures were not available with Palo Alto. Fortinet, Claroty, and Nozomi had more application signatures...
What is your primary use case for Palo Alto Networks IoT Security?
Our primary use case for Palo Alto Networks IoT Security is for the operational technology (OT) network. We have industrial systems, referred to as ICS or Industrial Control Systems, to control man...
 

Overview

 

Sample Customers

Samsung Research America, IDT Corporation, Gett
Information Not Available
Find out what your peers are saying about Armis vs. Palo Alto Networks IoT Security and other solutions. Updated: October 2024.
816,406 professionals have used our research since 2012.