No more typing reviews! Try our Samantha, our new voice AI agent.

Armis vs Armis Centrix for OT/IoT Security comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Mar 8, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Armis
Ranking in IoT Security
1st
Average Rating
8.6
Reviews Sentiment
7.0
Number of Reviews
14
Ranking in other categories
Cyber Asset Attack Surface Management (CAASM) (2nd), Risk-Based Vulnerability Management (7th), Cyber-Physical Systems Protection (1st)
Armis Centrix for OT/IoT Se...
Ranking in IoT Security
8th
Average Rating
8.0
Reviews Sentiment
6.6
Number of Reviews
1
Ranking in other categories
Operational Technology (OT) Security (8th)
 

Featured Reviews

GA
IDM Consultant at GCA Consultoria de Informática Ltda
Identity management has streamlined user lifecycle and now guarantees first-day access
The best features Armis offers include the interaction with my manager in Brazil, whose first name is Rui, and who provided a lot of experience, especially Horácio, who used to work for Microsoft. Horácio helped with issues related to Active Directory and provided ideas on how to best integrate the solutions. The aspect of Armis solution that stood out to me was its flexibility to integrate different applications. The collaboration of the team is really important and key for the project to go well and bring the results the customer is looking for. The solution has the necessary resources and connectors that have built many of the rules needed for integration, regardless of whether the application is an Active Directory, an LDAP directory, a database, or even a specific solution such as SAP. It is also flexible enough to build the business rules that apply specifically to that customer. Armis has positively impacted my organization and my client's organization by ensuring that on day one, new users had all the access they needed to work for the applications that were integrated. Additionally, if a user was dismissed from the company, they would lose all access to the integrated applications because Active Directory, which was key for user authentication, would disable their account. I do not recall any specific statistics regarding measurable results, but there was positive feedback from managers concerning the process during the time I was there.
reviewer2807997 - PeerSpot reviewer
Network and Security Engineer
Security monitoring has uncovered unauthorized devices and now protects client networks
I think the best feature of Armis Centrix for OT/IoT Security is that it ensures only the authorized devices and users are authorized to prevent any potential breaches. I think that clear definition is very essential for a lot of networks because it helps us understand who should be there and who shouldn't be. For our clientele, we were able to discover a lot of unauthorized devices that were on their network. This first of all helped them remove a lot of potential security breaches and cleared the bandwidth of the network as well. I think this has been one of the biggest cases that we have found. For most of the clients where we have deployed it, this has always been a common occurrence because a lot of people enter the network and then you don't know who is there, who has the access, and so on. I think this is the very reason I said what I said earlier.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Armis is a straightforward and user-friendly solution."
"The solution’s vulnerability monitoring system is very good."
"Armis has positively impacted my organization and my client's organization by ensuring that on day one, new users had all the access they needed to work for the applications that were integrated."
"Armis is very easy to implement due to its agentless design and offers a granular level of visibility for all assets in the network."
"The initial setup and deployment were simple."
"Armis is easy to use."
"Armis has positively impacted my organization by helping me identify vulnerabilities more effectively, especially on assets that I did not know existed on the network."
"Armis saves time by automating asset inventory management, allowing enterprises to quickly strategize by understanding their assets and exposures."
"I think the best feature of Armis Centrix for OT/IoT Security is that it ensures only the authorized devices and users are authorized to prevent any potential breaches."
 

Cons

"After implementing Armis, an organization experiences it as an add-on. Without asset visibility or vulnerability prioritization, it becomes a useless product."
"Armis could improve its geographic spread and marketing campaigns across regions."
"Armis doesn't have a back intel feature."
"We have faced issues with the tool's stability."
"The OpenText solution we used had to improve its development in relation to cloud environments. They have started to offer a version that works on the cloud, but they are really behind in that aspect today."
"There isn't anything specific that needs improvement."
"We face issues during implementation."
"In terms of stability, Armis is not completely stable, as sometimes incidents may occur."
"I'm not exactly sure how scalable it is if you're managing multiple locations, but I think it still has some potential for improvement for multiple locations."
 

Pricing and Cost Advice

"The tool is cheap."
Information not available
report
Use our free recommendation engine to learn which IoT Security solutions are best for your needs.
893,244 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Manufacturing Company
11%
Government
9%
Financial Services Firm
9%
Computer Software Company
7%
Financial Services Firm
13%
Manufacturing Company
12%
Government
10%
Comms Service Provider
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business7
Midsize Enterprise2
Large Enterprise7
No data available
 

Questions from the Community

What needs improvement with Armis?
AI is one improvement I noted for Armis, and I may have other examples as well.
What is your primary use case for Armis?
I confirm my experience with Armis, and as a cybersecurity specialist, I have several years of experience in this sphere. In terms of AI-driven risk assessments in Armis, I have insights to share b...
What advice do you have for others considering Armis?
I am still dealing with Armis to some extent, as I have not stopped working with it for more than a year. I can confirm that I am also working with other vendors such as Fortinet and various vulner...
What needs improvement with Armis Centrix for OT/IoT Security?
I think Armis Centrix for OT/IoT Security already has an active AI agent in there, but if the AI agent could be more diverse to help non-technical users handle their own interfaces or educate them ...
What is your primary use case for Armis Centrix for OT/IoT Security?
We have been using Armis Centrix for OT/IoT Security for approximately eight to nine months now. We use Armis Centrix for OT/IoT Security for our clientele, with some requiring their own security s...
What advice do you have for others considering Armis Centrix for OT/IoT Security?
I would rate Armis Centrix for OT/IoT Security an eight, which I think is a fair assessment based on its capabilities and ease of use. I would recommend it to others. It is a pretty good platform, ...
 

Overview

 

Sample Customers

Samsung Research America, IDT Corporation, Gett
Information Not Available
Find out what your peers are saying about Armis, Nozomi, Palo Alto Networks and others in IoT Security. Updated: May 2026.
893,244 professionals have used our research since 2012.