Armis Acquires Silk Security

Learn More
banner background

Armis Powers IBM IoT/OT Security

IBM and Armis deliver a first of its kind, enterprise-class agentless managed security service for unmanaged and IoT/OT devices.

enterprise office

IBM X-Force IoT

Armis has partnered with IBM to deliver end-to-end threat management for Enterprise Internet-of-Things (IoT), Operational Technology (OT) Internet-of-Things (IoT) and Internet-of-Medical-Things (IoMT), under the IBM X-Force™ Threat Management (XFTM) security service. In addition, for customers using IBM Security solutions such as QRadar and Resilient, the Armis Platform is ready to go.

Device visibility conceptual
Device name categories illustration

Identify and Classify

IBM X-Force IoT automatically discovers managed, unmanaged and IoT devices on or off network. It monitors wired and wireless traffic to identify every device and understand its behavior. Agentless and passive, it identifies device type, manufacturer, model, serial number, location, username, OS, installed apps and tracks connections over time.

IBM X-Force IoT also calculates a risk score helping security teams assess the attack surface and meet compliance with regulations requiring vulnerability identification and prioritization. This helps fulfill critical security controls for frameworks like PCI-DSS, HIPAA, NIST and CIS Critical Security Controls.

Detect Threats – Manage and Contain

IBM X-Force IoT detects threats by continuously and passively monitoring devices while detecting behavioral anomalies in real-time. If a threat is detected, IBM X-Force IoT will alert security teams by sending an automated action to stop an attack.

IBM X-Force IoT leverages the world’s largest Device Knowledgebase available, which tracks over 110M devices. Through AI and machine learning, it classifies devices comparing them real-time to “known-good” baselines. IBM X-Force IoT can issue an alert, or automatically disconnect or quarantine a device operating outside of its baseline. Alerts may be due to misconfiguration, a policy violation, or abnormal behavior.

blocked or quarantined device illustration
no agent illustration

Integrated and Powerful

IBM X-Force IoT can integrate with existing networking and security solutions, such as firewalls, network access controls, SIEM, or IBM Managed Security Services to restrict access or quarantine suspicious or malicious devices. Simple, cost-effective deployment combined with ease of on-going management as a cloud-delivered managed service.

With IBM Managed Security Services, the IoT devices discovered are monitored and managed 24x7x365. Our global team of threat analysts and responders can leverage the information from IBM X-Force IoT discovery combined with world-class threat intelligence feeds to provide highly accurate detection and containment.