

Find out what your peers are saying about Armis, Axonius, Qualys and others in Cyber Asset Attack Surface Management (CAASM).
| Product | Mindshare (%) |
|---|---|
| Axonius | 27.8% |
| Armis | 15.6% |
| Qualys CyberSecurity Asset Management | 10.6% |
| Other | 46.0% |
| Product | Mindshare (%) |
|---|---|
| Device42 | 4.0% |
| ServiceNow | 12.7% |
| Freshservice | 5.3% |
| Other | 78.0% |

| Company Size | Count |
|---|---|
| Small Business | 2 |
| Midsize Enterprise | 1 |
| Large Enterprise | 6 |
| Company Size | Count |
|---|---|
| Small Business | 9 |
| Midsize Enterprise | 6 |
| Large Enterprise | 20 |
Axonius offers robust asset management, enhancing network visibility by consolidating data from various devices. It excels in automatic device categorization for up-to-date inventories, crucial for compliance and risk assessments. Key features include automated policy enforcement and comprehensive reporting tools, which streamline workflows and improve organizational productivity and security compliance. Integrations with other IT tools further enhance its efficiency.
Device42 empowers enterprises with automatic IT asset discovery, application dependency mapping, and agentless discovery, streamlining asset management, improving decision-making, and supporting migration initiatives.
Device42 automates network discovery and provides comprehensive IT data management, making it indispensable for asset and infrastructure management. The platform’s integration capabilities, such as with ServiceNow, allow seamless management of physical and virtual environments. Its application dependency mapping is a critical feature for efficient cloud migration, while advanced search and dashboards enhance operational tasks. Device42's ease of deployment coupled with integration into cloud services offers robust operational insights and simplifies onboarding.
What are Device42's key features?Device42 is widely used across sectors for IT asset and infrastructure management, where automation in inventory and documentation aids compliance and resource optimization. It excels in industries requiring integration with existing systems and comprehensive network solutions. Application dependency mapping bolsters cloud migration efficiency in enterprise environments.
We monitor all Cyber Asset Attack Surface Management (CAASM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.