Compare Armis and Wiz

At a Glance
Armis
Armis
Star Rating
(13)4.4 out of 5
Market Segments
Enterprise (50.0% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Armis
Wiz
Wiz
Star Rating
(774)4.7 out of 5
Market Segments
Enterprise (54.5% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Free Trial is available
Learn more about Wiz
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that Wiz excels in providing comprehensive visibility across cloud environments, allowing users to easily identify misconfigurations and vulnerabilities in real time. This is highlighted by feedback praising its agentless architecture, which enables quick deployment without the need for extensive setup.
  • Users say that Armis stands out for its ability to integrate various systems into a centralized platform, offering a thorough, real-time perspective of devices and assets. Reviewers appreciate its intuitive interface, which simplifies the process of finding devices that might otherwise be difficult to track.
  • According to verified reviews, Wiz has a slight edge in user satisfaction, reflected in its higher overall ratings. Users commend Wiz for its ability to turn complex data into clear, actionable insights, making it easier to manage security across cloud infrastructures.
  • Reviewers mention that while Armis provides deep visibility into environments, it sometimes faces challenges in matching specific workflow needs, particularly in areas like change management and compliance monitoring, where users have noted room for improvement.
  • G2 reviewers highlight that Wiz's robust reporting dashboards and ITSM tool integration enhance its usability, making it a preferred choice for teams looking for comprehensive vulnerability management and compliance tracking.
  • Users express that Armis has been a game changer for their organizations, particularly in asset discovery, where its depth of insight has allowed teams to uncover previously unknown devices and connections, showcasing its strength in visibility.
Pricing
Entry-Level Pricing
Armis
No pricing available
Wiz
No pricing available
Free Trial
Armis
No trial information available
Wiz
Free Trial is available
Ratings
Meets Requirements
9.2
11
9.1
638
Ease of Use
9.2
11
8.8
642
Ease of Setup
8.3
9
9.1
502
Ease of Admin
8.7
9
9.0
487
Quality of Support
9.1
11
9.2
608
Has the product been a good partner in doing business?
8.7
10
9.4
476
Product Direction (% positive)
8.8
10
9.8
597
Features by Category
Cloud Workload Protection PlatformsHide 10 FeaturesShow 10 Features
Not enough data
8.8
128
Management
Not enough data
8.7
119
Not enough data
8.4
107
Not enough data
9.3
120
Operations
Not enough data
8.9
107
Not enough data
8.6
110
Not enough data
9.0
112
Security Controls
Not enough data
8.6
76
Not enough data
Feature Not Available
Not enough data
9.1
107
Not enough data
Feature Not Available
Not enough data
8.4
209
Administration
Not enough data
9.0
194
Not enough data
8.2
183
Not enough data
9.1
198
Not enough data
8.9
191
Monitoring
Not enough data
8.4
169
Not enough data
7.9
162
Not enough data
8.6
180
Protection
Not enough data
8.5
174
Not enough data
8.0
169
Not enough data
Feature Not Available
Not enough data
7.7
163
Not enough data
8.6
292
Security
Not enough data
9.0
275
Not enough data
8.3
224
Not enough data
Feature Not Available
Not enough data
8.9
250
Compliance
Not enough data
8.7
245
Not enough data
8.4
231
Not enough data
8.3
230
Administration
Not enough data
8.5
259
Not enough data
8.6
233
Not enough data
8.3
248
Not enough data
8.2
299
Performance
Not enough data
8.4
281
Not enough data
8.8
276
Not enough data
7.4
275
Not enough data
9.0
280
Network
Not enough data
8.6
258
Not enough data
8.5
254
Not enough data
8.8
274
Application
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Agentic AI - Vulnerability Scanner
Not enough data
7.4
29
Not enough data
7.3
30
Software Composition AnalysisHide 6 FeaturesShow 6 Features
Not enough data
9.1
67
Functionality - Software Composition Analysis
Not enough data
8.8
54
Not enough data
9.3
60
Not enough data
9.2
56
Effectiveness - Software Composition Analysis
Not enough data
8.7
59
Not enough data
9.2
58
Not enough data
9.2
60
8.9
5
Not enough data
Asset Inventory
9.3
5
Not enough data
8.3
5
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
10.0
5
Not enough data
Generative AI
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - IT Asset Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Management
9.3
5
Not enough data
8.7
5
Not enough data
8.3
5
Not enough data
8.7
5
Not enough data
Risk-Based Vulnerability ManagementHide 11 FeaturesShow 11 Features
7.6
7
Not enough data
Risk Analysis
8.6
7
Not enough data
9.3
7
Not enough data
7.9
7
Not enough data
Vulnerability Assesment
7.6
7
Not enough data
8.6
7
Not enough data
8.8
7
Not enough data
9.3
7
Not enough data
Automation
6.7
7
Not enough data
6.7
6
Not enough data
5.0
6
Not enough data
5.6
6
Not enough data
Cloud Security Monitoring and AnalyticsHide 13 FeaturesShow 13 Features
Not enough data
8.2
249
Activity Monitoring
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
7.5
183
Not enough data
8.0
196
Security
Not enough data
8.6
204
Not enough data
8.9
216
Not enough data
8.4
221
Administration
Not enough data
8.4
201
Not enough data
8.7
213
Not enough data
9.1
213
Agentic AI - Cloud Security Monitoring and Analytics
Not enough data
7.5
20
Not enough data
7.4
21
Not enough data
7.5
19
IoT Security SolutionsHide 12 FeaturesShow 12 Features
8.0
7
Not enough data
Connected Device Security
8.1
6
Not enough data
7.8
6
Not enough data
6.4
7
Not enough data
7.5
6
Not enough data
8.3
6
Not enough data
9.2
6
Not enough data
7.5
6
Not enough data
8.1
7
Not enough data
Platform
8.6
7
Not enough data
8.6
6
Not enough data
7.5
6
Not enough data
7.9
7
Not enough data
Extended Detection and Response (XDR) PlatformsHide 14 FeaturesShow 14 Features
Not enough data
8.9
33
Detection & Response
Not enough data
9.1
27
Not enough data
9.2
26
Not enough data
9.6
26
Not enough data
8.5
28
Management
Not enough data
8.6
26
Not enough data
8.9
25
Not enough data
9.2
23
Analytics
Not enough data
8.8
27
Not enough data
8.2
26
Not enough data
8.8
27
Agentic AI - Extended Detection and Response (XDR) Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Services - Extended Detection and Response (XDR)
Not enough data
Not enough data
Cloud Security Posture Management (CSPM)Hide 11 FeaturesShow 11 Features
Not enough data
8.8
326
Configuration
Not enough data
Feature Not Available
Not enough data
8.9
278
Not enough data
8.4
251
Not enough data
8.1
248
Not enough data
8.5
269
Visibility
Not enough data
9.3
290
Not enough data
9.2
287
Vulnerability Management
Not enough data
8.4
268
Not enough data
9.2
297
Not enough data
9.0
278
Not enough data
9.1
294
Attack Surface ManagementHide 12 FeaturesShow 12 Features
6.5
5
8.6
222
Asset Management
9.3
5
9.3
193
6.3
5
8.0
167
4.0
5
7.6
163
Monitoring
4.7
5
8.6
176
7.7
5
9.0
191
3.7
5
8.8
179
7.3
5
9.0
188
Risk Management
6.0
5
9.2
207
8.0
5
8.6
195
7.0
5
8.7
192
7.0
5
8.5
196
Generative AI
Not enough data
8.0
101
Not enough data
8.6
135
Alerts management
Not enough data
8.8
109
Not enough data
8.5
110
Not enough data
9.0
119
Monitoring
Not enough data
8.4
104
Not enough data
8.5
115
Not enough data
8.4
101
Not enough data
7.8
104
Automation
Not enough data
8.2
109
Not enough data
8.6
112
Analysis
Not enough data
8.7
126
Not enough data
8.5
123
Not enough data
9.3
126
Not enough data
8.5
114
Issue Resolution
Not enough data
8.6
117
Not enough data
8.9
122
Not enough data
9.0
114
Cloud Infrastructure Entitlement Management (CIEM)Hide 8 FeaturesShow 8 Features
Not enough data
8.2
51
Access control - Cloud Infrastructure Entitlement Management (CIEM)
Not enough data
8.1
44
Not enough data
8.7
45
Not enough data
8.5
45
Not enough data
6.8
43
Monitoring - Cloud Infrastructure Entitlement Management (CIEM)
Not enough data
8.4
47
Not enough data
7.2
46
Auditing - Cloud Infrastructure Entitlement Management (CIEM)
Not enough data
9.0
50
Not enough data
8.9
49
Cloud-Native Application Protection Platform (CNAPP)Hide 11 FeaturesShow 11 Features
Not enough data
9.0
27
Security - Cloud-Native Application Protection Platform (CNAPP)
Not enough data
9.5
20
Not enough data
9.3
20
Not enough data
8.9
20
Not enough data
9.6
23
Artificial Intelligence - Cloud-Native Application Protection Platform (CNAPP)
Not enough data
8.9
19
Not enough data
9.2
22
Not enough data
9.0
18
Cloud Configuration Management - Cloud-Native Application Protection Platform (CNAPP)
Not enough data
9.4
21
Not enough data
9.5
20
Agentic AI - Cloud-Native Application Protection Platform (CNAPP)
Not enough data
7.9
18
Not enough data
8.1
17
Exposure Management PlatformsHide 6 FeaturesShow 6 Features
Not enough data
7.6
15
Generative AI - Exposure Management Platforms
Not enough data
6.2
14
Not enough data
5.9
13
Risk Identification and Assessment - Exposure Management Platforms
Not enough data
8.3
13
Not enough data
8.3
13
Monitoring and Integration - Exposure Management Platforms
Not enough data
8.3
13
Not enough data
8.6
14
Not enough data
Not enough data
Systems Management - OT Security Tools
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Connected Device Security - OT Security Tools
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Reporting - OT Security Tools
Not enough data
Not enough data
Not enough data
Not enough data
Generative AI - OT Security Tools
Not enough data
Not enough data
Not enough data
Not enough data
Data Security Posture Management (DSPM)Hide 9 FeaturesShow 9 Features
Not enough data
8.6
13
Discovery & Classification - Data Security Posture Management (DSPM)
Not enough data
8.7
9
Not enough data
8.3
8
Not enough data
8.1
7
Risk Prioritization - Data Security Posture Management (DSPM)
Not enough data
8.7
9
Not enough data
9.0
8
Not enough data
8.8
8
Remediation & Governance - Data Security Posture Management (DSPM)
Not enough data
8.5
10
Not enough data
8.5
9
Not enough data
8.5
8
Not enough data
Not enough data
Model Protection - AI Security Solutions
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Runtime Monitoring - AI Security Solutions
Not enough data
Not enough data
Not enough data
Not enough data
Policy Enforcement and Compliance - AI Security Solutions
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
AI Security Posture Management (AI-SPM) ToolsHide 9 FeaturesShow 9 Features
Not enough data
Not enough data
Functionality - AI Security Posture Management (AI-SPM) Tools
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Risk Assessment - AI Security Posture Management (AI-SPM) Tools
Not enough data
Not enough data
Not enough data
Not enough data
Governance & Compliance - AI Security Posture Management (AI-SPM) Tools
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Compliance
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Detection and Response (CDR)Hide 4 FeaturesShow 4 Features
Not enough data
7.2
12
Agentic AI - Cloud Detection and Response (CDR)
Not enough data
6.7
11
Not enough data
7.0
11
Not enough data
7.0
11
Services - Cloud Detection and Response (CDR)
Not enough data
8.2
12
Reviews
Reviewers' Company Size
Armis
Armis
Small-Business(50 or fewer emp.)
33.3%
Mid-Market(51-1000 emp.)
16.7%
Enterprise(> 1000 emp.)
50.0%
Wiz
Wiz
Small-Business(50 or fewer emp.)
6.3%
Mid-Market(51-1000 emp.)
39.1%
Enterprise(> 1000 emp.)
54.5%
Reviewers' Industry
Armis
Armis
Hospital & Health Care
25.0%
Education Management
16.7%
Textiles
8.3%
Leisure, Travel & Tourism
8.3%
Information Technology and Services
8.3%
Other
33.3%
Wiz
Wiz
Financial Services
18.3%
Information Technology and Services
12.0%
Computer Software
11.2%
Hospital & Health Care
4.1%
Computer & Network Security
4.0%
Other
50.4%
Alternatives
Armis
Armis Alternatives
Scrut Automation
Scrut Automation
Add Scrut Automation
SolarWinds Service Desk
SolarWinds Service Desk
Add SolarWinds Service Desk
TeamViewer
TeamViewer
Add TeamViewer
NinjaOne
NinjaOne
Add NinjaOne
Wiz
Wiz Alternatives
Microsoft Defender for Cloud
Microsoft Defender for Cloud
Add Microsoft Defender for Cloud
CrowdStrike Falcon Cloud Security
CrowdStrike Falcon Cloud...
Add CrowdStrike Falcon Cloud Security
Orca Security
Orca Security
Add Orca Security
FortiCNAPP
FortiCNAPP
Add FortiCNAPP
Discussions
Armis
Armis Discussions
Monty the Mongoose crying
Armis has no discussions with answers
Wiz
Wiz Discussions
Monty the Mongoose crying
Wiz has no discussions with answers