Armis

Distributing countries: Singapore | Malaysia | Indonesia | Thailand | Philippines | Vietnam | Cambodia | Myanmar | China (including Hong Kong) | India | Sri Lanka | Hong Kong | Australia | New Zealand

Company Overview

Armis is the leading enterprise security company to address the new threat landscape of unmanaged and IoT devices on enterprise networks. Fortune 1000 companies trust our unique out-of-band sensing technology to discover and analyze all managed, unmanaged, un-agentable and IoT devices – from traditional devices like laptops and smartphones to new unmanaged smart devices like smart TVs, webcams, printers, HVAC systems, industrial control systems, medical devices and more. Armis discovers devices on and off the network, continuously analyzes endpoint behavior to detect threats and attacks, and protects critical information and systems by identifying suspicious or malicious devices and quarantining them.

Armis provides solutions for large enterprises across every vertical – manufacturing, industrial, energy, retail, healthcare, pharmaceutical, financial, technology, and more. Armis’ rapidly growing customer list includes 20% of the Fortune 100 and a wide range of Global 2000 companies.

For more information, please visit www.armis.com.

Product Overview

The Armis agentless security platform allows enterprise security teams to discover, monitor and control every managed, unmanaged, and IoT device in their environment. The set of security functions that Armis provides is as follows:

• Asset inventory: Identify make, model, operating system, location, and the software running on every device. Feed real-time inventory information into asset management systems, CMDB systems, etc.

• Risk management: Identify vulnerable devices and risky behaviors, such as devices transmitting unencrypted data and devices reaching out to suspicious Internet domains. Identify the locations of vulnerable software and the devices that are running it.

• Threat detection: Monitor device behavior to detect anomalies which are typically indicative of a compromised device. Detect policy violations.

• Network segmentation: Validate the integrity of existing network segmentation. Provide information such as device type, behavior, and risks that can facilitate the establishment of granular network segmentation policies.

• Incident response: Stop attacks from moving laterally from device to device.

• Integration: Share alerts and information with SOC tools and with firewall, NAC, SIEM, ITAM, CMDB, and other security and management systems.