1. BigFix Logo - 760

    BigFix

    BigFix helps customers with asset management as a data source for identification, network analysis and risk assessment purposes.

  2. CrowdStrike Logo - 760

    CrowdStrike

    CrowdStrike provides cloud-delivered endpoint detection and response (EDR), workload protection, managed threat hunting, and threat intelligence. Use Cases Retrieve detailed information on CrowdStrike managed devices. The retrieved information is correlated with other data sources. Verify compliance with CrowdStrike security policies by discovering the following: Missing or malfunctioning CrowdStrike agents CrowdStrike agents running out-of-date software versions…

  3. Google Cloud Logo - 760

    Google Cloud Platform (GCP)

    GCP offers a suite of computing services to do everything from data management to delivering web and video over the web to AI and machine learning tools. Use Cases Retrieve information on GCP related devices, including their identification and operating system details.

  4. Microsoft Azure Logo - 760

    Microsoft Entra (formerly Azure AD)

    Microsoft Azure Active Directory (Azure AD) is a cloud-based identity and access management service. This service helps employees access external resources, such as Microsoft 365, the Azure portal, and thousands of other SaaS applications. Azure Active Directory also helps them access internal resources like apps on the corporate intranet network, along with any cloud apps…

  5. Microsoft Defender Logo - 760

    Microsoft Defender for Endpoint

    Microsoft Defender for Endpoint is an enterprise endpoint security platform designed to help enterprise networks prevent, detect, investigate, and respond to advanced threats. Use Cases Gain visibility of managed assets and their attributes Audit for presence and compliance Report on EPP effectiveness

  6. Okta Logo - 760

    Okta

    Okta is cloud software that helps companies manage their employees’ passwords by enabling single sign-on, automated user provisioning. Use Cases Provide detailed device information and correlate it with other data sources Retrieve and collect user data Verify compliance with security policies by detecting disabled Okta users who are still active in Active Directory

  7. Qualys Logo - 760

    Qualys

    The Qualys Cloud Platform monitors customers’ global security and compliance posture using scanner appliances. This adapter connects to the Qualys Cloud Platform service to import information about devices and vulnerabilities. Use Cases Retrieve detailed information on all Qualys-related devices and correlate it with other data sources Verify device compliance with Qualys security policies by detecing:…

  8. Rapid7 Logo - 760

    Rapid7 InsightVM

    Rapid7 InsightVM is a vulnerability management solution that provides discovery, detection, verification, risk classification, impact analysis, reporting and mitigation. Use Cases Retrieve detailed information on all Rapid7 InsightVM related devices and correlate it with other data sources Verify device compliance with Rapid7 InsightVM security policies by detecting: Devices missing vulnerability scans and patches Unmanaged devices…

  9. ServiceNow Logo - 760

    ServiceNow CMDB

    Armis sends device information to the ServiceNow CMDB.

  10. ServiceNow Logo - 760

    ServiceNow Ticketing

    Armis sends alert information to the ServiceNow platform for incident workflow and remediation.