Try our new research platform with insights from 80,000+ expert users

Armis vs Qualys CyberSecurity Asset Management (CSAM) comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

Armis
Ranking in Cyber Asset Attack Surface Management (CAASM)
2nd
Average Rating
8.0
Number of Reviews
6
Ranking in other categories
IoT Security (3rd), Risk-Based Vulnerability Management (9th), Cyber-Physical Systems Protection (2nd)
Qualys CyberSecurity Asset ...
Ranking in Cyber Asset Attack Surface Management (CAASM)
4th
Average Rating
9.6
Number of Reviews
4
Ranking in other categories
Vulnerability Management (25th), Patch Management (17th), Attack Surface Management (ASM) (11th), Software Supply Chain Security (11th)
 

Featured Reviews

Arun Chauhan - PeerSpot reviewer
Aug 30, 2024
Provides a very good vulnerability monitoring system, but the implementation is challenging
We face many issues while implementing Armis in the pharma sector. Some of the customer applications are not supported well by the tool. The applications do not communicate well if we implement Armis. We generally face such issues during implementation. We are planning to implement the product in the wind energy sector, but we don't have any idea how to do it. Currently, it is a very big challenge for us. Products like Dragos, Claroty, and Nozomi provide a much better experience during implementation. If any issues arise, we are told how to resolve such issues during the POC. Armis does not provide the secure remote access feature Claroty provides.
CG
Sep 17, 2024
Provides immediate alerts if any compromise occurs in our environment, highlighting specific loopholes
I would rate Qualys ability to cover the entire attack surface a nine out of ten. Previously, we used Tenable as our preferred tool but switched to Qualys for the cost-effectiveness. However, upon switching to Qualys, our primary concern was ensuring the seamless deployment of agents across our infrastructure. Fortunately, Qualys agents proved to be remarkably lightweight. Additionally, Qualys excels in network security, allowing us to identify vulnerabilities, track SSL and TSL certificates, and monitor their expiration dates. Qualys also offers robust password management capabilities, surpassing Tenable in this regard. Moreover, Qualys' reporting functionality is unparalleled, outperforming competitors like Tenable and other tools in the market. Qualys identifies all risk factors for our assets. For example, assigning a globally traceable computer name or using easily compromised passwords can create vulnerabilities. Qualys provides immediate alerts if any compromise occurs in our environment, highlighting specific loopholes. Consider a scenario where a programmer in a testing environment uses a simple password instead of a complex one. Hackers can easily exploit this, and Qualys will immediately identify the issue, generate a report pinpointing the responsible individual, and notify us. This real-time identification and reporting capability surpasses traditional PAM solutions, allowing for swift remediation of potentially exploitable changes. We use the risk scoring to prioritize the issues by criticality. We use Qualys to convert deployed cloud agents into passive sensors for VM ESX. Whenever new servers or network devices are added, Qualys immediately detects them and flags them as unregistered assets on the network. Based on this information, other teams often reach out to us to onboard or install an agent for enhanced visibility and management within Qualys.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The technology is good."
"The solution’s vulnerability monitoring system is very good."
"Armis is a straightforward and user-friendly solution."
"The tool is user-friendly and helps to detect vulnerabilities."
"The initial setup and deployment were simple."
"The most valuable feature of the solution is asset tracking."
"The end-of-life and end-of-service software and hardware are some of my favorite features."
"The most valuable aspect we receive from Qualys is the remediation."
"When you implement a dynamic tag using a query, you do not need to manually tag all the servers. It categorizes all the servers that come under that query. The tagging part is automatically done within a few minutes. It reduces the effort."
"Tags are very useful for us since we can tag virus applications in infrastructure types such as databases, operating systems, or web platforms."
 

Cons

"The solution's vulnerability testing could be improved."
"Armis doesn't have a back intel feature."
"We have faced issues with the tool's stability."
"We face issues during implementation."
"We face difficulties in integrating the product with ticketing tools like ServiceNow."
"Like any IT tool, continuous learning and improvement are essential for the solution."
"Currently, whenever the agent is running, it consumes over ten percent of my CPU, indicating that CPU consumption is another area Qualys needs to address."
"It is automatically exporting the vulnerabilities and the assets. However, it would be useful to have the ability to select or to filter which we would like to export."
"Qualys CyberSecurity Asset Management could be more cost-effective by offering a lower price point or integrating with existing VMDR features."
"One improvement that they can make in the EASM module is the scan frequency. After EASM is configured the first time, it allows you to do the complete configuration, but if you want to reconfigure it, it will not ask or provide any option for scan frequency. For that, you need to raise a case with Qualys and talk to the Qualys team."
 

Pricing and Cost Advice

"The tool is cheap."
"It is cost-effective because, in a single tool, we are getting everything. All the solutions come in a single license or price."
"The cost for Qualys CyberSecurity Asset Management is high."
"Qualys CyberSecurity Asset Management can be expensive, especially if we already have VMDR."
report
Use our free recommendation engine to learn which Cyber Asset Attack Surface Management (CAASM) solutions are best for your needs.
805,335 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Government
15%
Manufacturing Company
10%
Computer Software Company
10%
Financial Services Firm
9%
Computer Software Company
32%
Government
12%
Manufacturing Company
8%
Comms Service Provider
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
No data available
 

Questions from the Community

What do you like most about Armis?
Armis is a straightforward and user-friendly solution.
What needs improvement with Armis?
We face many issues while implementing Armis in the pharma sector. Some of the customer applications are not supported well by the tool. The applications do not communicate well if we implement Arm...
What is your primary use case for Armis?
We use the product in our OT environment to secure IDs. We also use it for monitoring purposes.
What is your experience regarding pricing and costs for Qualys CyberSecurity Asset Management (CSAM)?
The pricing is fair. We don't have any objection to the current pricing model.
What needs improvement with Qualys CyberSecurity Asset Management (CSAM)?
It is automatically exporting the vulnerabilities and the assets. However, it would be useful to have the ability to select or filter which we would like to export. As of now, anything and everythi...
What is your primary use case for Qualys CyberSecurity Asset Management (CSAM)?
This is the main product that we are using for managing assets, including hardware assets and software assets.
 

Overview

 

Sample Customers

Samsung Research America, IDT Corporation, Gett
Find out what your peers are saying about Armis vs. Qualys CyberSecurity Asset Management (CSAM) and other solutions. Updated: August 2024.
805,335 professionals have used our research since 2012.