No more typing reviews! Try our Samantha, our new voice AI agent.

Armis vs Cisco Vulnerability Management (formerly Kenna.VM) comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Armis
Ranking in Risk-Based Vulnerability Management
7th
Average Rating
8.6
Reviews Sentiment
7.0
Number of Reviews
15
Ranking in other categories
IoT Security (1st), Cyber Asset Attack Surface Management (CAASM) (2nd), Cyber-Physical Systems Protection (1st)
Cisco Vulnerability Managem...
Ranking in Risk-Based Vulnerability Management
22nd
Average Rating
8.0
Reviews Sentiment
6.8
Number of Reviews
1
Ranking in other categories
Cisco Security Portfolio (11th)
 

Mindshare comparison

As of May 2026, in the Risk-Based Vulnerability Management category, the mindshare of Armis is 3.1%, up from 2.6% compared to the previous year. The mindshare of Cisco Vulnerability Management (formerly Kenna.VM) is 2.4%, up from 2.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Risk-Based Vulnerability Management Mindshare Distribution
ProductMindshare (%)
Armis3.1%
Cisco Vulnerability Management (formerly Kenna.VM)2.4%
Other94.5%
Risk-Based Vulnerability Management
 

Featured Reviews

GA
IDM Consultant at GCA Consultoria de Informática Ltda
Identity management has streamlined user lifecycle and now guarantees first-day access
The best features Armis offers include the interaction with my manager in Brazil, whose first name is Rui, and who provided a lot of experience, especially Horácio, who used to work for Microsoft. Horácio helped with issues related to Active Directory and provided ideas on how to best integrate the solutions. The aspect of Armis solution that stood out to me was its flexibility to integrate different applications. The collaboration of the team is really important and key for the project to go well and bring the results the customer is looking for. The solution has the necessary resources and connectors that have built many of the rules needed for integration, regardless of whether the application is an Active Directory, an LDAP directory, a database, or even a specific solution such as SAP. It is also flexible enough to build the business rules that apply specifically to that customer. Armis has positively impacted my organization and my client's organization by ensuring that on day one, new users had all the access they needed to work for the applications that were integrated. Additionally, if a user was dismissed from the company, they would lose all access to the integrated applications because Active Directory, which was key for user authentication, would disable their account. I do not recall any specific statistics regarding measurable results, but there was positive feedback from managers concerning the process during the time I was there.
AshishPaliwal - PeerSpot reviewer
Self-employed at Self-employed
Offers contextual prioritization and risk-based remediation of vulnerability
An improvement would be some sort of an integration with any GRC suite. There are a lot of GRC suites available, like Archer, MetricStream, Rsam, Protiviti, for example. So how would a solution like this work if my company has already invested thousands or maybe millions in a GRC solution? Do I still need it and how does it fit into an existing SAP environment? There could be interoperability, having more data sources, integrating Splunk, Qualys, FireEye, Rapid7, Carbon Black. I'm sure all that can be done to an extent, with a little more insight and a little more accuracy on the industry numbers and trends. I'd like the solution to offer any sort of assistance in any way with the remediation part, not just identification of vulnerability risk, and that is second.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It determines which assets and devices are at risk, alerts you if there's a risk, and categorizes all assets, including personal computers, mobile phones, servers, televisions, cars, and video game consoles."
"Armis is easy to use."
"I find the most valuable features of Armis to be its focus on IT, OT security, and medical device security."
"Armis is a straightforward and user-friendly solution."
"The solution’s vulnerability monitoring system is very good."
"Real-time asset monitoring in Armis helps with network operations, especially in comparison to Nozomi."
"The most valuable feature of the solution is asset tracking."
"The initial setup and deployment were simple."
"The risk context of any vulnerability is a valuable feature."
"The risk context of any vulnerability is a valuable feature; that is what it is used for and then data from different sources can be fed into it, and they have good dashboards, risk meters, and virtualization."
 

Cons

"We face issues during implementation."
"Like any IT tool, continuous learning and improvement are essential for the solution."
"There isn't anything specific that needs improvement."
"There are occasional issues with some built-in integrations that require troubleshooting, particularly with DHCP integration. Developing additional integrations would be beneficial."
"Armis doesn't have a back intel feature."
"The solution's vulnerability testing could be improved."
"The vulnerability assessment for Windows is not that great. It misses out on a lot of vulnerabilities."
"We have faced issues with the tool's stability."
"An improvement would be some sort of an integration with any GRC suite."
"An improvement would be some sort of an integration with any GRC suite."
 

Pricing and Cost Advice

"The tool is cheap."
"I think the pricing is based on the number of endpoints, so it's more subscription-based."
report
Use our free recommendation engine to learn which Risk-Based Vulnerability Management solutions are best for your needs.
893,244 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Manufacturing Company
11%
Government
9%
Financial Services Firm
9%
Computer Software Company
7%
Retailer
16%
Computer Software Company
13%
Financial Services Firm
11%
Manufacturing Company
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business7
Midsize Enterprise2
Large Enterprise7
No data available
 

Questions from the Community

What needs improvement with Armis?
AI is one improvement I noted for Armis, and I may have other examples as well.
What is your primary use case for Armis?
I confirm my experience with Armis, and as a cybersecurity specialist, I have several years of experience in this sphere. In terms of AI-driven risk assessments in Armis, I have insights to share b...
What advice do you have for others considering Armis?
I am still dealing with Armis to some extent, as I have not stopped working with it for more than a year. I can confirm that I am also working with other vendors such as Fortinet and various vulner...
Ask a question
Earn 20 points
 

Also Known As

No data available
Kenna.VM, Kenna Security, Kenna, Kenna Security Platform
 

Overview

 

Sample Customers

Samsung Research America, IDT Corporation, Gett
TransUnion
Find out what your peers are saying about Qualys, Horizon3.ai, Tenable and others in Risk-Based Vulnerability Management. Updated: April 2026.
893,244 professionals have used our research since 2012.