Try our new research platform with insights from 80,000+ expert users

Armis vs Palo Alto Networks IoT Security comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Feb 3, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Armis
Ranking in IoT Security
3rd
Average Rating
8.6
Reviews Sentiment
7.2
Number of Reviews
10
Ranking in other categories
Cyber Asset Attack Surface Management (CAASM) (3rd), Risk-Based Vulnerability Management (9th), Cyber-Physical Systems Protection (2nd)
Palo Alto Networks IoT Secu...
Ranking in IoT Security
4th
Average Rating
8.4
Reviews Sentiment
7.0
Number of Reviews
10
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of May 2025, in the IoT Security category, the mindshare of Armis is 19.4%, up from 17.8% compared to the previous year. The mindshare of Palo Alto Networks IoT Security is 6.8%, down from 7.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
IoT Security
 

Featured Reviews

SaketShrivastava - PeerSpot reviewer
Comprehensive asset visibility and OT operations support enhance risk mitigation
I use Armis for asset discovery and vulnerability assessments of the OT network Armis is easy to use. Very few software solutions have OT capabilities that do not impact OT operations. Its asset visibility is good as well. This comprehensive feature set is crucial for our operations.…
Engineerinfosec67 - PeerSpot reviewer
Recognizing and classifying devices with AI and machine learning boosts security without extra network controls
Palo Alto Networks IoT Security ( /products/palo-alto-networks-iot-security-reviews ) integrates with a cloud-based engine that uses artificial intelligence and machine learning for device recognition and classification based on traffic types. This adaptability, which does not rely strictly on a static database, allows for identifying a wider range of devices. The behavior-based identification of devices enhances the capabilities of security controls, extending the network security platform's recognition capacity without deploying a separate network access control system.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Armis saves time by automating asset inventory management, allowing enterprises to quickly strategize by understanding their assets and exposures."
"The initial setup and deployment were simple."
"It determines which assets and devices are at risk, alerts you if there's a risk, and categorizes all assets, including personal computers, mobile phones, servers, televisions, cars, and video game consoles."
"Armis is very easy to implement due to its agentless design and offers a granular level of visibility for all assets in the network."
"The technology is good."
"The solution’s vulnerability monitoring system is very good."
"Armis is a straightforward and user-friendly solution."
"Armis is very easy to implement due to its agentless design and offers a granular level of visibility for all assets in the network."
"Single-pass traffic processing enables very high throughput and low latency."
"I like the threat information, and we can share the logging data with Cortex Data Lake."
"It is simple to use. We just need to enable features and then configure IoT policies."
"I like the Cortex Data Lake integration with security automation."
"From a security standpoint, it provides a comprehensive range of standard security features that align with our requirements."
"This solution has been most valuable for establishing a VPN and implementing allow/deny rules. It has also enabled us to create security policies. It is an easy solution to customise when it comes to creating templates and pulling reports."
"I find Palo Alto Networks IoT Security to be highly responsive, and its separate management and data planes are a major advantage."
"Palo Alto is valued for its GlobalProtect feature, which offers a range of security options, including user ID mapping and VPNs."
 

Cons

"Like any IT tool, continuous learning and improvement are essential for the solution."
"We have faced issues with the tool's stability."
"There are occasional issues with some built-in integrations that require troubleshooting, particularly with DHCP integration. Developing additional integrations would be beneficial."
"We face issues during implementation."
"Armis could improve its geographic spread and marketing campaigns across regions."
"The vulnerability assessment for Windows is not that great. It misses out on a lot of vulnerabilities."
"Armis doesn't have a back intel feature."
"We face difficulties in integrating the product with ticketing tools like ServiceNow."
"Palo Alto Networks IoT Security's reporting capabilities are less comprehensive and robust than those provided by Cisco."
"The cost is still high and licensing is still complex."
"It would be beneficial to have a more centralized and user-friendly platform that could consolidate all the necessary information, which proved challenging during the initial POC phase."
"The reporting for this solution could be improved. The logs we receive are only saved for one week. We would like to have the database timeframe increased to a month or two for historical reporting as well as increased storage capabilities to support this data and reporting."
"Essentially, this solution focuses on data analysis and cannot perform any physical actions."
"The support is in line with Palo Alto Networks services for other products but needs improvement."
"More application signatures are required."
"There can be more automation in terms of security and detection. It is already good."
 

Pricing and Cost Advice

"The tool is cheap."
"The pricing for Palo Alto Networks IoT Security is a bit high."
"The successful migration trend suggests that Palo Alto provides a superior cost-benefit ratio for firewall solutions."
"The initial investment is substantial, but the renewal costs make it financially unsustainable."
"While Palo Alto Networks IoT Security might cost more than some competitors, its features and effectiveness justify the price tag."
report
Use our free recommendation engine to learn which IoT Security solutions are best for your needs.
849,686 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Government
13%
Computer Software Company
11%
Manufacturing Company
9%
Financial Services Firm
9%
Manufacturing Company
16%
Computer Software Company
15%
Comms Service Provider
5%
Government
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Armis?
Armis is a straightforward and user-friendly solution.
What needs improvement with Armis?
The vulnerability assessment for Windows is not that great. It misses out on a lot of vulnerabilities. Additionally, the filtration process in Armis is not that great.
What is your primary use case for Armis?
I use Armis ( /products/armis-reviews ) for asset discovery and vulnerability assessments of the OT network.
What do you like most about Palo Alto Networks IoT Security?
From a security standpoint, it provides a comprehensive range of standard security features that align with our requirements.
What needs improvement with Palo Alto Networks IoT Security?
The major challenge is the integration with existing complex production lines. These architectures were developed with a focus on automation functionalities, not security. Finding the right integra...
What is your primary use case for Palo Alto Networks IoT Security?
I use Palo Alto Networks IoT Security ( /products/palo-alto-networks-iot-security-reviews ) for discovering automation devices and detecting various types of data traffic on automation infrastructu...
 

Overview

 

Sample Customers

Samsung Research America, IDT Corporation, Gett
Information Not Available
Find out what your peers are saying about Armis vs. Palo Alto Networks IoT Security and other solutions. Updated: April 2025.
849,686 professionals have used our research since 2012.