Try our new research platform with insights from 80,000+ expert users

Armis vs Qualys CyberSecurity Asset Management comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Nov 2, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Armis
Ranking in Cyber Asset Attack Surface Management (CAASM)
1st
Average Rating
8.6
Reviews Sentiment
7.2
Number of Reviews
10
Ranking in other categories
IoT Security (2nd), Risk-Based Vulnerability Management (10th), Cyber-Physical Systems Protection (1st)
Qualys CyberSecurity Asset ...
Ranking in Cyber Asset Attack Surface Management (CAASM)
3rd
Average Rating
9.0
Reviews Sentiment
7.0
Number of Reviews
35
Ranking in other categories
Vulnerability Management (7th), Patch Management (4th), Attack Surface Management (ASM) (2nd), Software Supply Chain Security (4th)
 

Mindshare comparison

As of January 2026, in the Cyber Asset Attack Surface Management (CAASM) category, the mindshare of Armis is 19.4%, down from 23.0% compared to the previous year. The mindshare of Qualys CyberSecurity Asset Management is 10.5%, up from 5.3% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Cyber Asset Attack Surface Management (CAASM) Market Share Distribution
ProductMarket Share (%)
Armis19.4%
Qualys CyberSecurity Asset Management10.5%
Other70.1%
Cyber Asset Attack Surface Management (CAASM)
 

Featured Reviews

SaketShrivastava - PeerSpot reviewer
Technology and Digitization Lead at JLL
Comprehensive asset visibility and OT operations support enhance risk mitigation
I use Armis for asset discovery and vulnerability assessments of the OT network Armis is easy to use. Very few software solutions have OT capabilities that do not impact OT operations. Its asset visibility is good as well. This comprehensive feature set is crucial for our operations.…
AN
Cyber Security Specialist at UBS Financial
Customized dashboards and quick deployment support comprehensive asset management
We use the True Risk Score for vulnerability prioritization, though we do not solely rely upon it since some assets may be decommissioned soon or not in use. From Qualys CyberSecurity Asset Management, we primarily focus on internet-facing assets. We have created separate tasks for internet-facing assets and track the True Risk dashboard specifically for these assets. If the True Risk Score is higher for any internet-facing assets, then we take action accordingly. The True Risk Score is very helpful for prioritization. The initial setup was straightforward and easy. We needed to create customized tags, group them twice, and validate whether the operating system detection was true positive or false positive. We encountered some false positives, which required coordination with the IT team for verification. In six months, we had approximately 20-25 machines that needed verification on a weekly basis. We coordinated with the IT team to identify the exact operating system specifications.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The tool is user-friendly and helps to detect vulnerabilities."
"Armis is easy to use."
"The initial setup and deployment were simple."
"Armis is very easy to implement due to its agentless design and offers a granular level of visibility for all assets in the network."
"The most valuable feature of the solution is asset tracking."
"The technology is good."
"Armis saves time by automating asset inventory management, allowing enterprises to quickly strategize by understanding their assets and exposures."
"Armis is a straightforward and user-friendly solution."
"The end-of-life and end-of-service software and hardware are some of my favorite features."
"Authorized and unauthorized software visibility is the best feature for me."
"Tags are very useful for us since we can tag virus applications in infrastructure types such as databases, operating systems, or web platforms."
"The most valuable aspect we receive from Qualys is the remediation."
"The best features of Qualys CyberSecurity Asset Management include its ability to scan and consider each and every endpoint based on the target we have given. This makes it stand out."
"I appreciate the feature that simplifies cloud security posture, offering insights into vulnerabilities, and reducing the complexity of managing the security program."
"Authorized and unauthorized software visibility is the best feature for me. It helps me understand security controls on our network and where we lack visibility. With a single security tool, we are able to get an extensive list."
"The most valuable features of Qualys CSAM include the ability to manage authorized and unauthorized applications efficiently. This feature helps in validating applications and maintaining a secure environment."
 

Cons

"The vulnerability assessment for Windows is not that great. It misses out on a lot of vulnerabilities."
"We have faced issues with the tool's stability."
"We face difficulties in integrating the product with ticketing tools like ServiceNow."
"Armis could improve its geographic spread and marketing campaigns across regions."
"We face issues during implementation."
"Like any IT tool, continuous learning and improvement are essential for the solution."
"The solution's vulnerability testing could be improved."
"There are occasional issues with some built-in integrations that require troubleshooting, particularly with DHCP integration. Developing additional integrations would be beneficial."
"All required features are available in Qualys CSAM. However, it would be helpful if Qualys CSAM started incorporating AI models. An inclusion of threat details for AI and LLM-related risks would be beneficial."
"The Qualys CAPS service requires further exploration and improvement, particularly in its handling of protocols and reactivity with MAC and IP addresses for CAP agents."
"We encountered some false positives, which required coordination with the IT team for verification."
"In the best practice for categorizing assets with the C-SAM module in Qualys CyberSecurity Asset Management, I see potential for improvement with integration of other CMDB systems in creating a relationship with Qualys and other solutions."
"Qualys CyberSecurity Asset Management is moderately good, while Rapid7 is slightly much better."
"There can be further simplification to reduce the overall noise and provide ESAM-related data."
"Qualys CyberSecurity Asset Management could be more cost-effective by offering a lower price point or integrating with existing VMDR features."
"The main aspect that needs improvement is the user interface, which should be more intuitive."
 

Pricing and Cost Advice

"The tool is cheap."
"The pricing for Qualys Cybersecurity Asset Management is reasonable, with an annual subscription costing around $1,000 per year or a monthly subscription starting at approximately $72 per month, depending on the specific package and features included."
"The pricing is market-competitive."
"The cost for Qualys CyberSecurity Asset Management is high."
"Qualys offers excellent value for money."
"It is cost-effective because, in a single tool, we are getting everything. All the solutions come in a single license or price."
"Though the solution is considered expensive, if bundled with other services such as VMDR or cloud agents, its value would significantly increase. It is currently a bit costly, but with bundling, it could become attractive to more customers."
"The Qualys Cybersecurity Asset Management pricing is well-aligned with our usage."
"The pricing is reasonable relative to the features provided, as it collects all module data and operates as a main, centralized inventory, making it a cost-effective solution."
report
Use our free recommendation engine to learn which Cyber Asset Attack Surface Management (CAASM) solutions are best for your needs.
881,082 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Manufacturing Company
10%
Government
10%
Financial Services Firm
9%
Computer Software Company
8%
Computer Software Company
13%
Financial Services Firm
13%
Manufacturing Company
9%
Comms Service Provider
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business4
Large Enterprise6
By reviewers
Company SizeCount
Small Business8
Midsize Enterprise2
Large Enterprise23
 

Questions from the Community

What needs improvement with Armis?
The vulnerability assessment for Windows is not that great. It misses out on a lot of vulnerabilities. Additionally, the filtration process in Armis is not that great.
What is your primary use case for Armis?
I use Armis ( /products/armis-reviews ) for asset discovery and vulnerability assessments of the OT network.
What advice do you have for others considering Armis?
I have not seen any machine learning features or AI capabilities in the product. If AI provided a better understanding of vulnerabilities, it would be great. I rate my experience with Armis as nine...
What needs improvement with Qualys CyberSecurity Asset Management?
I think the one thing Qualys CyberSecurity Asset Management can do better is the package management and the updating process. Knowing that you can't update any of the packages until you've done the...
What is your primary use case for Qualys CyberSecurity Asset Management?
I primarily use it for a small, single-site, multi-source setup with multi-WAN inputs. I have a main fiber connection and a couple of failovers while managing different networks across different se...
 

Overview

 

Sample Customers

Samsung Research America, IDT Corporation, Gett
Information Not Available
Find out what your peers are saying about Armis vs. Qualys CyberSecurity Asset Management and other solutions. Updated: December 2025.
881,082 professionals have used our research since 2012.