Try our new research platform with insights from 80,000+ expert users

Armis vs Qualys CyberSecurity Asset Management comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jul 27, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Armis
Ranking in Cyber Asset Attack Surface Management (CAASM)
1st
Average Rating
8.6
Reviews Sentiment
7.2
Number of Reviews
10
Ranking in other categories
IoT Security (2nd), Risk-Based Vulnerability Management (8th), Cyber-Physical Systems Protection (1st)
Qualys CyberSecurity Asset ...
Ranking in Cyber Asset Attack Surface Management (CAASM)
3rd
Average Rating
9.2
Reviews Sentiment
7.6
Number of Reviews
23
Ranking in other categories
Vulnerability Management (8th), Patch Management (6th), Attack Surface Management (ASM) (3rd), Software Supply Chain Security (5th)
 

Mindshare comparison

As of September 2025, in the Cyber Asset Attack Surface Management (CAASM) category, the mindshare of Armis is 22.7%, up from 16.9% compared to the previous year. The mindshare of Qualys CyberSecurity Asset Management is 10.6%, up from 3.8% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Cyber Asset Attack Surface Management (CAASM) Market Share Distribution
ProductMarket Share (%)
Armis22.7%
Qualys CyberSecurity Asset Management10.6%
Other66.7%
Cyber Asset Attack Surface Management (CAASM)
 

Featured Reviews

SaketShrivastava - PeerSpot reviewer
Comprehensive asset visibility and OT operations support enhance risk mitigation
I use Armis for asset discovery and vulnerability assessments of the OT network Armis is easy to use. Very few software solutions have OT capabilities that do not impact OT operations. Its asset visibility is good as well. This comprehensive feature set is crucial for our operations.…
Nicki Møller - PeerSpot reviewer
Enables automation and quick access to necessary information
One of the significant challenges Qualys is discovery, which I know Microsoft excels at. I can't recall how well Qualys performs this function; it seems I might be missing some details. However, if there's one key aspect to focus on, it's discovery—the ability to identify assets that you are not aware of, even when you can see they are present. Understanding what those assets are is crucial. With Qualys CyberSecurity Asset Management, it was very difficult to extract detections from the system. The features within Qualys are limited to what they have developed. Sometimes a complete overview is needed to push to a Power BI dashboard, Splunk, ServiceNow, or other platforms. The export process is incredibly challenging. We needed a developer to write a hundred-line Python script that would loop over certain assets due to export limitations. Qualys CyberSecurity Asset Management could improve its integration capabilities. While it generates substantial data, correlating it with other data sources can be challenging. The export process is difficult, and pre-built integrations with other tools could be enhanced for better process implementation.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable feature of the solution is asset tracking."
"Armis is a straightforward and user-friendly solution."
"The tool is user-friendly and helps to detect vulnerabilities."
"Armis is easy to use."
"It determines which assets and devices are at risk, alerts you if there's a risk, and categorizes all assets, including personal computers, mobile phones, servers, televisions, cars, and video game consoles."
"The initial setup and deployment were simple."
"Armis saves time by automating asset inventory management, allowing enterprises to quickly strategize by understanding their assets and exposures."
"The solution’s vulnerability monitoring system is very good."
"When you implement a dynamic tag using a query, you do not need to manually tag all the servers. It categorizes all the servers that come under that query. The tagging part is automatically done within a few minutes. It reduces the effort."
"We have had zero attacks since we enabled all the features in Qualys CSAM."
"We have a diverse organization with a robust infrastructure of more than 300,000 assets. By creating unauthorized lists and rules in the Qualys CSAM module, I can block certain software from being used in the organization."
"The best feature is asset discovery through their cloud agent or IP-based scanning."
"Authorized and unauthorized software visibility is the best feature for me."
"Qualys CSAM helps find all the assets. It categorizes information based on various criteria such as host and tenant version. It provides in-depth visibility into both hardware and software."
"Tags are very useful for us since we can tag virus applications in infrastructure types such as databases, operating systems, or web platforms."
"I recommend Qualys CyberSecurity Asset Management due to its superior asset information collection capabilities, including comprehensive hardware and software inventorying."
 

Cons

"Like any IT tool, continuous learning and improvement are essential for the solution."
"Armis could improve its geographic spread and marketing campaigns across regions."
"We face issues during implementation."
"There isn't anything specific that needs improvement."
"We have faced issues with the tool's stability."
"We face difficulties in integrating the product with ticketing tools like ServiceNow."
"The solution's vulnerability testing could be improved."
"There are occasional issues with some built-in integrations that require troubleshooting, particularly with DHCP integration. Developing additional integrations would be beneficial."
"We have had challenges modifying the agent configuration. Particularly, when we want to change the tenant that the agent is pointing to, we have had difficulties making that reliable and working properly."
"In my opinion, the area that needs improvement is the role-based access control (RBAC). The access privilege management needs to be more robust and streamlined to enhance user access management."
"The scanning function could be improved."
"The only minor issue is occasionally being redirected to multiple teams, causing slight delays."
"The UI needs improvement as it can become overwhelming after prolonged use."
"Currently, whenever the agent is running, it consumes over ten percent of my CPU, indicating that CPU consumption is another area Qualys needs to address."
"With Qualys CyberSecurity Asset Management, it was very difficult to extract detections from the system."
"Based on the company's budget, Qualys offers limited features, which can also be utilized in other environments."
 

Pricing and Cost Advice

"The tool is cheap."
"The Qualys Cybersecurity Asset Management pricing is well-aligned with our usage."
"The cost for Qualys CyberSecurity Asset Management is high."
"Qualys CyberSecurity Asset Management can be expensive, especially if we already have VMDR."
"The pricing is market-competitive."
"It is cost-effective because, in a single tool, we are getting everything. All the solutions come in a single license or price."
"The pricing is reasonable relative to the features provided, as it collects all module data and operates as a main, centralized inventory, making it a cost-effective solution."
"The pricing for Qualys CSAM is nominal."
"Qualys offers excellent value for money."
report
Use our free recommendation engine to learn which Cyber Asset Attack Surface Management (CAASM) solutions are best for your needs.
867,497 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Government
12%
Computer Software Company
10%
Manufacturing Company
9%
Financial Services Firm
9%
Computer Software Company
16%
Financial Services Firm
14%
Manufacturing Company
7%
Government
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business4
Large Enterprise6
By reviewers
Company SizeCount
Small Business6
Midsize Enterprise2
Large Enterprise15
 

Questions from the Community

What do you like most about Armis?
Armis is a straightforward and user-friendly solution.
What needs improvement with Armis?
The vulnerability assessment for Windows is not that great. It misses out on a lot of vulnerabilities. Additionally, the filtration process in Armis is not that great.
What is your primary use case for Armis?
I use Armis ( /products/armis-reviews ) for asset discovery and vulnerability assessments of the OT network.
What is your experience regarding pricing and costs for Qualys CyberSecurity Asset Management?
The pricing is reasonable relative to the features provided, as it collects all module data and operates as a main, centralized inventory, making it a cost-effective solution.
What needs improvement with Qualys CyberSecurity Asset Management?
Qualys CyberSecurity Asset Management helps us prioritize assets according to operating system, kernel version, installed software, and current version information. The ASM assists with attack surf...
What is your primary use case for Qualys CyberSecurity Asset Management?
We are using Qualys CyberSecurity Asset Management for daily activities such as identifying new assets through network scanning and agent-based scanning for newly provisioned assets. When any new a...
 

Overview

 

Sample Customers

Samsung Research America, IDT Corporation, Gett
Information Not Available
Find out what your peers are saying about Armis vs. Qualys CyberSecurity Asset Management and other solutions. Updated: July 2025.
867,497 professionals have used our research since 2012.