Listing Thumbnail

    Tenable Cloud Security [Private Offer Only]

     Info
    Deployed on AWS
    Vendor Insights
    Tenable Cloud Security is an integrated cloud-native application protection (CNAPP) and infrastructure security platform that automates asset discovery, risk analysis, runtime threat detection, compliance and least-privilege remediation.

    Overview

    Tenable Cloud Security is an award-winning, actionable cloud-native application protection (CNAPP) and infrastructure security solution.

    Tenable Cloud Security uses an identity-first approach to automate cloud security posture management (CSPM), cloud infrastructure entitlement management (CIEM), cloud workload protection (CWP), Kubernetes security posture management (KSPM), Data security posture management (DSPM), AI security posture management (AI-SPM), infrastructure as code (IaC) security and more.

    Tenable Cloud Security uses advanced analytics to assess, prioritize and automatically remediate risk in your AWS environment. It offers Just-in-Time (JIT) access and automated least-privilege policies integrated in standard workflows. With Tenable Cloud Security, enterprises can harden cloud applications in their AWS environments and address the top risks in IaaS environments: misconfigured identities, access and privileges.

    By using Tenable Cloud Security, you can secure the complete lifecycle from development to deployment, boost your team's AWS expertise and accelerate security collaboration with development, DevOps and others.

    For custom pricing, EULA, or a private contract, please contact awsMPsales@tenable.com 

    Highlights

    • Discover the compute, identity and data resources in your cloud and get contextualized visibility into how critical resources are accessed.
    • Gain the context you need to focus on the priority risks caused by the toxic combination of misconfigurations, excessive entitlements, vulnerabilities and sensitive data.
    • Reduce cloud risk by closing priority exposures with top speed and surgical precision. Even if you only have five minutes to spare.

    Details

    Delivery method

    Deployed on AWS

    Unlock automation with AI agent solutions

    Fast-track AI initiatives with agents, tools, and solutions from AWS Partners.
    AI Agents

    Features and programs

    Vendor Insights

     Info
    Skip the manual risk assessment. Get verified and regularly updated security info on this product with Vendor Insights.

    Buyer guide

    Gain valuable insights from real users who purchased this product, powered by PeerSpot.
    Buyer guide

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Custom pricing options

    Pricing is based on your specific requirements and eligibility. Request a private offer to receive a custom quote. Sign in to view any offers that have been extended to you.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Resources

    Vendor resources

    Support

    Vendor support

    Tenable (the "Supplier") will provide email support ("Technical Support") eight (8) hours per day, five (5) days per week. Technical Support will include any research and resolution activity performed by Supplier. Technical Support requests are made by calling or emailing Supplier's Technical Support staff. The Technical Support staff shall assign to the request the Problem Severity Level (as defined herein) indicated by the requestor.

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Similar products

    Customer reviews

    Ratings and reviews

     Info
    3.8
    3 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    67%
    33%
    0%
    0%
    3 AWS reviews
    |
    44 external reviews
    Star ratings include only reviews from verified AWS customers. External reviews can also include a star rating, but star ratings from external reviews are not averaged in with the AWS customer star ratings.
    Ajay S.

    Tenable cloud security : Powerful visibility with room to improve on usability and scale.

    Reviewed on Oct 16, 2025
    Review provided by G2
    What do you like best about the product?
    Tenable uses its risk based approach to prioritize misconfigurations and vulnerabilities based on potential exploitability and business impact. It provides unified visibility into AWS, Azure and google cloud environments. Tenable CS can scan IAC templated before deployment, catching misconfigurations. Offers visibility into overly permissive roles and identity relationships in cloud environments.
    What do you dislike about the product?
    For organizations without mature cloud or security practices, getting everything up and running can be time-consuming and need technical expertise. Some users report that the alerts findings include too many low priority items and that the system needs manual tuning to avoid being overwhelmed.
    What problems is the product solving and how is that benefiting you?
    Cloud environments are often misconfigured- either through human error or poor defaults. Tenable solves this by continuously scanning cloud resources for misconfigurations. Mapping them against best practice like CIS benchmarks, NIST and custom policies.
    Prathamesh K.

    Comprehensive Security Visibility with Tenable Cloud Security

    Reviewed on Oct 10, 2025
    Review provided by G2
    What do you like best about the product?
    Tenable Cloud Security offers excellent visibility across multi-cloud environments, making it easier to identify and prioritize risks. I particularly appreciate its ability to continuously monitor configurations and detect misconfigurations or policy violations in real-time. The integration with CI/CD pipelines is a standout feature, enabling early detection of vulnerabilities during development. Its risk-based prioritization helps focus on the most critical issues first, improving remediation efficiency. The user interface is clean and intuitive, making navigation and reporting straightforward. I also value the depth of insights provided through its dashboards and compliance reports. Support for multiple cloud platforms like AWS, Azure, and GCP makes it a flexible solution. Overall, it strengthens our cloud posture with proactive security controls.
    What do you dislike about the product?
    Tenable Cloud Security is powerful, there are areas that could be improved. The initial setup and integration with complex cloud environments can be a bit time-consuming and may require technical expertise. Some dashboards feel overwhelming with too much data and limited customization options. The alerting system could benefit from more granular control to reduce noise from low-priority issues. In certain cases, scan times for large environments can be longer than expected. I’ve also noticed that documentation, while extensive, isn’t always clear or up to date for newer features. The pricing structure might be a concern for smaller organizations. Additionally, support response times can occasionally be slower than ideal. Despite these drawbacks, the platform remains a valuable tool for cloud security management.
    What problems is the product solving and how is that benefiting you?
    Tenable Cloud Security helps address the challenge of maintaining visibility and control across complex, multi-cloud environments. It identifies misconfigurations, policy violations, and vulnerabilities in real time, helping us proactively reduce our cloud attack surface. The platform also improves compliance by mapping findings to industry standards like CIS, NIST, and ISO, which simplifies audit preparation. By integrating with CI/CD pipelines, it enables us to detect security issues earlier in the development lifecycle, reducing remediation costs and effort. Its risk-based prioritization ensures our team focuses on the most critical threats first, enhancing overall security efficiency. Ultimately, it’s helping us strengthen cloud governance, reduce risk exposure, and operate with greater confidence in the cloud.
    Gibs S.

    Reports need improvement.

    Reviewed on Oct 09, 2025
    Review provided by G2
    What do you like best about the product?
    I appreciate how straightforward the console is when it comes to managing policies and templates. Its simplicity makes the process much easier and more efficient.
    What do you dislike about the product?
    The reports, particularly the executive summary, ought to be more straightforward and practical. At present, they come across as overly technical for their intended purpose.
    What problems is the product solving and how is that benefiting you?
    Occasionally, my session ends unexpectedly, though it doesn't happen every time.
    Computer & Network Security

    Strong CSPM Tool for Multicloud Visibility and Compliance

    Reviewed on Oct 08, 2025
    Review provided by G2
    What do you like best about the product?
    This tool offers comprehensive visibility into misconfigurations, excessive permissions, and compliance risks across various cloud platforms. What I appreciate most is its graph-based IAM visualization, which makes it easy to identify risky privilege escalation paths in both AWS and Azure. Additionally, it comes with robust pre-built policies for compliance frameworks such as CIS and NIST.
    What do you dislike about the product?
    At first glance, some dashboards may appear somewhat cluttered, and the options for customization could be more adaptable. Additionally, setting up the initial cloud provider permissions can be challenging if you don't have a strong background in cloud IAM, which can be particularly difficult for teams that are new to CSPM.
    What problems is the product solving and how is that benefiting you?
    Tenable Cloud Security addresses visibility gaps within cloud environments by identifying misconfigured resources, insecure identities, and compliance violations. It allows teams to prioritize risks and take proactive steps to remediate issues, which is essential for maintaining both security and audit readiness.
    DragosCernat

    Has significantly improved proactive monitoring through automated asset discovery and seamless integration with cloud environments

    Reviewed on Oct 07, 2025
    Review from a verified AWS customer

    What is our primary use case?

    We had other solutions that we used. One solution was that we did not have something exactly similar to what Element is doing. For example, we were using Bitsight , Evelin, and also Tenable Cloud Security . However, those products are different. Element was exactly the product we needed to cover close to real-time external surface monitoring. We also used Microsoft Defender for Endpoint , but the Defender product requires substantial manual labor. We were interested in having a tool that would not require too much manual labor and would be more proactive.

    The Element team is easy to discuss with. They created modules for integrations, such as with DNS. They collect records automatically and add assets to the platform, which is very useful because we do not have to check each day for new records or remove old ones. Their integration with Azure  and AWS  makes it great for us. It streamlines the process and gives us assurance that all new assets will be automatically added to the platform.

    I am not entirely sure about monitoring cloud applications as I have not used it extensively for that purpose. That is why we implemented Element and have other tools, as we are not using it exactly for that scope.

    What is most valuable?

    Element is precisely what we needed for close to real-time external surface monitoring. The automatic integration capabilities, particularly with DNS, Azure , and AWS , are extremely valuable. The platform automatically collects records and adds assets, eliminating the need for daily manual checking and updating.

    The streamlined process ensures that all new assets are automatically added to the platform, reducing manual labor and making the system more proactive. The ease of communication with the Element team and their responsiveness to integration needs has been particularly beneficial.

    What needs improvement?

    Making the system smarter would be beneficial. Adding modules for integration with AWS and Azure would be helpful. Adding capabilities for the scanner to automatically pick up changes and add assets automatically would be valuable.

    When discussing a big company, it is mandatory to have tools that will assist us rather than waiting for manual input to add hosts. Adding assets manually is prone to mistakes. Humans might forget to add an asset or make errors when adding multiple assets.

    Taking the human element out of the context and making it more streamlined is the future for security. The human should be involved where expertise is needed, such as analysis and decision-making. Currently, with resource constraints, we need tools to collect and aggregate data, eliminate false positives as much as possible, and present relevant information to employees for action.

    For how long have I used the solution?

    I first tested the product in November last year, and we implemented it starting in February.

    What do I think about the stability of the solution?

    I would rate it as 10 for experience. As with any other solution in the market, they may have small bugs or false positives. However, whenever I encountered an issue, I sent an email to them and they managed to fix it. They investigated and provided full details for further investigation. In situations where there was a platform issue, they fixed it immediately and provided a complete explanation for the occurrence.

    How are customer service and support?

    Working with Element is straightforward and efficient. For comparison, while working with Bitsight  is not difficult, it takes considerably longer. Bitsight is a larger company, and while they will provide the answers needed, the process is more time-consuming. With Bitsight, requesting integrations or new features involves submission and approval processes with uncertain timelines.

    With Element, if you need a feature, you can discuss it with them, and if implementation is possible, you will have that feature within a month or two, depending on complexity. Simple integrations, such as DNS integration, can be completed in approximately a week.

    How would you rate customer service and support?

    Positive

    What other advice do I have?

    Tenable Cloud Security  is a mature and trustworthy product. I have been using it since it was available on laptops approximately 10 years ago or more. I initially used it for penetration testing, though currently I perform more manual penetration testing and use the scanner primarily to validate subnets or findings.

    I started with Nessus installed on my computer, then moved to server deployment, and finally  to Tenable Cloud Security. We still maintain Tenable Cloud Security but have reduced the number of licenses. We now use it occasionally to validate specific items rather than monitoring the entire surface, for which we use Element.

    Tenable Cloud Security offers various features including discovery, web scanning, and primarily vulnerability scanning. It increases awareness of system vulnerabilities. In today's environment, information comes from multiple sources including Defender, Nessus, and various other tools within an organization. Using multiple tools is necessary to cover as much of the attack surface as possible, both internal and external.

    My review rating for the solution is 10 out of 10.

    Which deployment model are you using for this solution?

    Public Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Microsoft Azure
    View all reviews