Listing Thumbnail

    Tenable Cloud Security [Private Offer Only]

     Info
    Deployed on AWS
    Vendor Insights
    Tenable Cloud Security is an integrated cloud-native application protection (CNAPP) and infrastructure security platform that automates asset discovery, risk analysis, runtime threat detection, compliance and least-privilege remediation.

    Overview

    Tenable Cloud Security is an award-winning, actionable cloud-native application protection (CNAPP) and infrastructure security solution.

    Tenable Cloud Security uses an identity-first approach to automate cloud security posture management (CSPM), cloud infrastructure entitlement management (CIEM), cloud workload protection (CWP), Kubernetes security posture management (KSPM), Data security posture management (DSPM), AI security posture management (AI-SPM), infrastructure as code (IaC) security and more.

    Tenable Cloud Security uses advanced analytics to assess, prioritize and automatically remediate risk in your AWS environment. It offers Just-in-Time (JIT) access and automated least-privilege policies integrated in standard workflows. With Tenable Cloud Security, enterprises can harden cloud applications in their AWS environments and address the top risks in IaaS environments: misconfigured identities, access and privileges.

    By using Tenable Cloud Security, you can secure the complete lifecycle from development to deployment, boost your team's AWS expertise and accelerate security collaboration with development, DevOps and others.

    For custom pricing, EULA, or a private contract, please contact awsMPsales@tenable.com 

    Highlights

    • Discover the compute, identity and data resources in your cloud and get contextualized visibility into how critical resources are accessed.
    • Gain the context you need to focus on the priority risks caused by the toxic combination of misconfigurations, excessive entitlements, vulnerabilities and sensitive data.
    • Reduce cloud risk by closing priority exposures with top speed and surgical precision. Even if you only have five minutes to spare.

    Details

    Delivery method

    Deployed on AWS

    Unlock automation with AI agent solutions

    Fast-track AI initiatives with agents, tools, and solutions from AWS Partners.
    AI Agents

    Features and programs

    Vendor Insights

     Info
    Skip the manual risk assessment. Get verified and regularly updated security info on this product with Vendor Insights.

    Buyer guide

    Gain valuable insights from real users who purchased this product, powered by PeerSpot.
    Buyer guide

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Custom pricing options

    Pricing is based on your specific requirements and eligibility. Request a private offer to receive a custom quote. Sign in to view any offers that have been extended to you.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Resources

    Vendor resources

    Support

    Vendor support

    Tenable (the "Supplier") will provide email support ("Technical Support") eight (8) hours per day, five (5) days per week. Technical Support will include any research and resolution activity performed by Supplier. Technical Support requests are made by calling or emailing Supplier's Technical Support staff. The Technical Support staff shall assign to the request the Problem Severity Level (as defined herein) indicated by the requestor.

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Similar products

    Customer reviews

    Ratings and reviews

     Info
    4.1
    7 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    14%
    71%
    14%
    0%
    0%
    7 AWS reviews
    |
    41 external reviews
    Star ratings include only reviews from verified AWS customers. External reviews can also include a star rating, but star ratings from external reviews are not averaged in with the AWS customer star ratings.
    Ojasv P.

    Great tool for vulnerability management, but needs better reporting

    Reviewed on Nov 03, 2025
    Review provided by G2
    What do you like best about the product?
    Continuous monitoring and real-time risk assessment

    Vulnerability management and detection

    Integration with other security tools

    Automated remediation and security recommendations
    What do you dislike about the product?
    Performance or latency issues

    Lack of certain security features or tools

    Difficulty integrating with other security solutions

    Reporting and analytics limitations

    Pricing concerns
    What problems is the product solving and how is that benefiting you?
    Vulnerability management: Helps identify and address security vulnerabilities across cloud environments

    Compliance and risk management: Ensures compliance with industry standards and reduces risk exposure

    Cloud infrastructure visibility: Provides better visibility into cloud security posture across AWS, Azure, GCP, etc.
    Ajay S.

    Tenable cloud security : Powerful visibility with room to improve on usability and scale.

    Reviewed on Oct 16, 2025
    Review provided by G2
    What do you like best about the product?
    Tenable uses its risk based approach to prioritize misconfigurations and vulnerabilities based on potential exploitability and business impact. It provides unified visibility into AWS, Azure and google cloud environments. Tenable CS can scan IAC templated before deployment, catching misconfigurations. Offers visibility into overly permissive roles and identity relationships in cloud environments.
    What do you dislike about the product?
    For organizations without mature cloud or security practices, getting everything up and running can be time-consuming and need technical expertise. Some users report that the alerts findings include too many low priority items and that the system needs manual tuning to avoid being overwhelmed.
    What problems is the product solving and how is that benefiting you?
    Cloud environments are often misconfigured- either through human error or poor defaults. Tenable solves this by continuously scanning cloud resources for misconfigurations. Mapping them against best practice like CIS benchmarks, NIST and custom policies.
    Prathamesh K.

    Comprehensive Security Visibility with Tenable Cloud Security

    Reviewed on Oct 10, 2025
    Review provided by G2
    What do you like best about the product?
    Tenable Cloud Security offers excellent visibility across multi-cloud environments, making it easier to identify and prioritize risks. I particularly appreciate its ability to continuously monitor configurations and detect misconfigurations or policy violations in real-time. The integration with CI/CD pipelines is a standout feature, enabling early detection of vulnerabilities during development. Its risk-based prioritization helps focus on the most critical issues first, improving remediation efficiency. The user interface is clean and intuitive, making navigation and reporting straightforward. I also value the depth of insights provided through its dashboards and compliance reports. Support for multiple cloud platforms like AWS, Azure, and GCP makes it a flexible solution. Overall, it strengthens our cloud posture with proactive security controls.
    What do you dislike about the product?
    Tenable Cloud Security is powerful, there are areas that could be improved. The initial setup and integration with complex cloud environments can be a bit time-consuming and may require technical expertise. Some dashboards feel overwhelming with too much data and limited customization options. The alerting system could benefit from more granular control to reduce noise from low-priority issues. In certain cases, scan times for large environments can be longer than expected. I’ve also noticed that documentation, while extensive, isn’t always clear or up to date for newer features. The pricing structure might be a concern for smaller organizations. Additionally, support response times can occasionally be slower than ideal. Despite these drawbacks, the platform remains a valuable tool for cloud security management.
    What problems is the product solving and how is that benefiting you?
    Tenable Cloud Security helps address the challenge of maintaining visibility and control across complex, multi-cloud environments. It identifies misconfigurations, policy violations, and vulnerabilities in real time, helping us proactively reduce our cloud attack surface. The platform also improves compliance by mapping findings to industry standards like CIS, NIST, and ISO, which simplifies audit preparation. By integrating with CI/CD pipelines, it enables us to detect security issues earlier in the development lifecycle, reducing remediation costs and effort. Its risk-based prioritization ensures our team focuses on the most critical threats first, enhancing overall security efficiency. Ultimately, it’s helping us strengthen cloud governance, reduce risk exposure, and operate with greater confidence in the cloud.
    Gibs S.

    Reports need improvement.

    Reviewed on Oct 09, 2025
    Review provided by G2
    What do you like best about the product?
    I appreciate how straightforward the console is when it comes to managing policies and templates. Its simplicity makes the process much easier and more efficient.
    What do you dislike about the product?
    The reports, particularly the executive summary, ought to be more straightforward and practical. At present, they come across as overly technical for their intended purpose.
    What problems is the product solving and how is that benefiting you?
    Occasionally, my session ends unexpectedly, though it doesn't happen every time.
    Computer & Network Security

    Strong CSPM Tool for Multicloud Visibility and Compliance

    Reviewed on Oct 08, 2025
    Review provided by G2
    What do you like best about the product?
    This tool offers comprehensive visibility into misconfigurations, excessive permissions, and compliance risks across various cloud platforms. What I appreciate most is its graph-based IAM visualization, which makes it easy to identify risky privilege escalation paths in both AWS and Azure. Additionally, it comes with robust pre-built policies for compliance frameworks such as CIS and NIST.
    What do you dislike about the product?
    At first glance, some dashboards may appear somewhat cluttered, and the options for customization could be more adaptable. Additionally, setting up the initial cloud provider permissions can be challenging if you don't have a strong background in cloud IAM, which can be particularly difficult for teams that are new to CSPM.
    What problems is the product solving and how is that benefiting you?
    Tenable Cloud Security addresses visibility gaps within cloud environments by identifying misconfigured resources, insecure identities, and compliance violations. It allows teams to prioritize risks and take proactive steps to remediate issues, which is essential for maintaining both security and audit readiness.
    View all reviews