No more typing reviews! Try our Samantha, our new voice AI agent.

Armis vs Trellix Embedded Control comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Armis
Ranking in IoT Security
1st
Average Rating
8.6
Reviews Sentiment
7.0
Number of Reviews
14
Ranking in other categories
Cyber Asset Attack Surface Management (CAASM) (2nd), Risk-Based Vulnerability Management (7th), Cyber-Physical Systems Protection (1st)
Trellix Embedded Control
Ranking in IoT Security
9th
Average Rating
8.0
Reviews Sentiment
7.5
Number of Reviews
1
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of May 2026, in the IoT Security category, the mindshare of Armis is 11.9%, down from 19.3% compared to the previous year. The mindshare of Trellix Embedded Control is 2.5%, up from 1.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
IoT Security Mindshare Distribution
ProductMindshare (%)
Armis11.9%
Trellix Embedded Control2.5%
Other85.6%
IoT Security
 

Featured Reviews

GA
IDM Consultant at GCA Consultoria de Informática Ltda
Identity management has streamlined user lifecycle and now guarantees first-day access
The best features Armis offers include the interaction with my manager in Brazil, whose first name is Rui, and who provided a lot of experience, especially Horácio, who used to work for Microsoft. Horácio helped with issues related to Active Directory and provided ideas on how to best integrate the solutions. The aspect of Armis solution that stood out to me was its flexibility to integrate different applications. The collaboration of the team is really important and key for the project to go well and bring the results the customer is looking for. The solution has the necessary resources and connectors that have built many of the rules needed for integration, regardless of whether the application is an Active Directory, an LDAP directory, a database, or even a specific solution such as SAP. It is also flexible enough to build the business rules that apply specifically to that customer. Armis has positively impacted my organization and my client's organization by ensuring that on day one, new users had all the access they needed to work for the applications that were integrated. Additionally, if a user was dismissed from the company, they would lose all access to the integrated applications because Active Directory, which was key for user authentication, would disable their account. I do not recall any specific statistics regarding measurable results, but there was positive feedback from managers concerning the process during the time I was there.
Abdullah Al Hadi - PeerSpot reviewer
Information Security Engineer at Nhq Distribution Ltd
Offers DLP solutions with drive encryption, and application control
When installing McAfee ePO, we need to set up a self-check configuration. To join the system, we run a specific command. We configure connections for the data center, data server, and application server during this setup. Sometimes, we encounter communication issues between the database and application servers. These issues can prevent the database from communicating with ePO, leading to problems with updates and other functions. If the database cannot communicate with ePO, it affects our ability to manage configurations and updates, creating various issues. Additionally, roaming users outside the network must receive the latest signatures and updates. In a Citrix environment, a handler is configured to manage communication for these roaming users. However, we sometimes face issues with public and private IP configurations. Users may prefer to keep their IPs private, which can cause complications. For environments without Internet access, we use a DNS server to facilitate updates, which are managed locally. This type of configuration can be complex, but it's crucial for maintaining functionality without external network access. Trellix Embedded Control is a product used by companies in infrastructure development. The specific products and tools they use can vary based on their needs. DLP operates with devices, but network DLP is required for classification tasks. The choice of solutions depends on the organization's infrastructure and customer requirements, guiding the following implementation steps. Clients deploy the solution with their provider within one week.
report
Use our free recommendation engine to learn which IoT Security solutions are best for your needs.
893,221 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Manufacturing Company
11%
Government
9%
Financial Services Firm
9%
Computer Software Company
7%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business7
Midsize Enterprise2
Large Enterprise7
No data available
 

Questions from the Community

What needs improvement with Armis?
AI is one improvement I noted for Armis, and I may have other examples as well.
What is your primary use case for Armis?
I confirm my experience with Armis, and as a cybersecurity specialist, I have several years of experience in this sphere. In terms of AI-driven risk assessments in Armis, I have insights to share b...
What advice do you have for others considering Armis?
I am still dealing with Armis to some extent, as I have not stopped working with it for more than a year. I can confirm that I am also working with other vendors such as Fortinet and various vulner...
What is your experience regarding pricing and costs for Trellix Embedded Control?
Trellix is expensive, depending on the organization's size and financial capacity. For some, it is economical and fits well with their infrastructure. Larger organizations may seek a high-quality p...
What needs improvement with Trellix Embedded Control?
Customers and organizations are aware of attacks in VPN environments and how to protect against them. Forensic investigations play a crucial role in understanding why such attacks occur and how the...
What is your primary use case for Trellix Embedded Control?
Trellix offers many products, such as DLP solutions for endpoint and network, drive encryption, and application control. It also provides robust endpoint security solutions. Furthermore, Trellix of...
 

Also Known As

No data available
McAfee Embedded Control, Intel Security Controller, McAfee Controller
 

Overview

 

Sample Customers

Samsung Research America, IDT Corporation, Gett
Kleberg Bank, Sicredi, Seagate, Loop Technology, Vidant Health, Xcel Energy, Cook County, Berkshire Health Systems, Mauser, China Pacific Insurance, Cologne-Bonn Airport, Bank Central Asia, Boston Medical Center, Boston Scientific
Find out what your peers are saying about Armis, Nozomi, Palo Alto Networks and others in IoT Security. Updated: May 2026.
893,221 professionals have used our research since 2012.