
Overview
Tenable Cloud Security is an award-winning, actionable cloud-native application protection (CNAPP) and infrastructure security solution.
Tenable Cloud Security uses an identity-first approach to automate cloud security posture management (CSPM), cloud infrastructure entitlement management (CIEM), cloud workload protection (CWP), Kubernetes security posture management (KSPM), Data security posture management (DSPM), AI security posture management (AI-SPM), infrastructure as code (IaC) security and more.
Tenable Cloud Security uses advanced analytics to assess, prioritize and automatically remediate risk in your AWS environment. It offers Just-in-Time (JIT) access and automated least-privilege policies integrated in standard workflows. With Tenable Cloud Security, enterprises can harden cloud applications in their AWS environments and address the top risks in IaaS environments: misconfigured identities, access and privileges.
By using Tenable Cloud Security, you can secure the complete lifecycle from development to deployment, boost your team's AWS expertise and accelerate security collaboration with development, DevOps and others.
For custom pricing, EULA, or a private contract, please contact awsMPsales@tenable.comÂ
Highlights
- Discover the compute, identity and data resources in your cloud and get contextualized visibility into how critical resources are accessed.
- Gain the context you need to focus on the priority risks caused by the toxic combination of misconfigurations, excessive entitlements, vulnerabilities and sensitive data.
- Reduce cloud risk by closing priority exposures with top speed and surgical precision. Even if you only have five minutes to spare.
Details
Unlock automation with AI agent solutions

Features and programs
Buyer guide

Financing for AWS Marketplace purchases
Pricing
Custom pricing options
How can we make this page better?
Legal
Content disclaimer
Delivery details
Software as a Service (SaaS)
SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.
Resources
Vendor resources
Support
Vendor support
Tenable (the "Supplier") will provide email support ("Technical Support") eight (8) hours per day, five (5) days per week. Technical Support will include any research and resolution activity performed by Supplier. Technical Support requests are made by calling or emailing Supplier's Technical Support staff. The Technical Support staff shall assign to the request the Problem Severity Level (as defined herein) indicated by the requestor.
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.
Similar products



Customer reviews
Tenable cloud security : Powerful visibility with room to improve on usability and scale.
Comprehensive Security Visibility with Tenable Cloud Security
Reports need improvement.
Strong CSPM Tool for Multicloud Visibility and Compliance
Has significantly improved proactive monitoring through automated asset discovery and seamless integration with cloud environments
What is our primary use case?
We had other solutions that we used. One solution was that we did not have something exactly similar to what Element is doing. For example, we were using Bitsight , Evelin, and also Tenable Cloud Security . However, those products are different. Element was exactly the product we needed to cover close to real-time external surface monitoring. We also used Microsoft Defender for Endpoint , but the Defender product requires substantial manual labor. We were interested in having a tool that would not require too much manual labor and would be more proactive.
The Element team is easy to discuss with. They created modules for integrations, such as with DNS. They collect records automatically and add assets to the platform, which is very useful because we do not have to check each day for new records or remove old ones. Their integration with Azure and AWS makes it great for us. It streamlines the process and gives us assurance that all new assets will be automatically added to the platform.
I am not entirely sure about monitoring cloud applications as I have not used it extensively for that purpose. That is why we implemented Element and have other tools, as we are not using it exactly for that scope.
What is most valuable?
Element is precisely what we needed for close to real-time external surface monitoring. The automatic integration capabilities, particularly with DNS, Azure , and AWS , are extremely valuable. The platform automatically collects records and adds assets, eliminating the need for daily manual checking and updating.
The streamlined process ensures that all new assets are automatically added to the platform, reducing manual labor and making the system more proactive. The ease of communication with the Element team and their responsiveness to integration needs has been particularly beneficial.
What needs improvement?
Making the system smarter would be beneficial. Adding modules for integration with AWS and Azure would be helpful. Adding capabilities for the scanner to automatically pick up changes and add assets automatically would be valuable.
When discussing a big company, it is mandatory to have tools that will assist us rather than waiting for manual input to add hosts. Adding assets manually is prone to mistakes. Humans might forget to add an asset or make errors when adding multiple assets.
Taking the human element out of the context and making it more streamlined is the future for security. The human should be involved where expertise is needed, such as analysis and decision-making. Currently, with resource constraints, we need tools to collect and aggregate data, eliminate false positives as much as possible, and present relevant information to employees for action.
For how long have I used the solution?
I first tested the product in November last year, and we implemented it starting in February.
What do I think about the stability of the solution?
I would rate it as 10 for experience. As with any other solution in the market, they may have small bugs or false positives. However, whenever I encountered an issue, I sent an email to them and they managed to fix it. They investigated and provided full details for further investigation. In situations where there was a platform issue, they fixed it immediately and provided a complete explanation for the occurrence.
How are customer service and support?
Working with Element is straightforward and efficient. For comparison, while working with Bitsight is not difficult, it takes considerably longer. Bitsight is a larger company, and while they will provide the answers needed, the process is more time-consuming. With Bitsight, requesting integrations or new features involves submission and approval processes with uncertain timelines.
With Element, if you need a feature, you can discuss it with them, and if implementation is possible, you will have that feature within a month or two, depending on complexity. Simple integrations, such as DNS integration, can be completed in approximately a week.
How would you rate customer service and support?
Positive
What other advice do I have?
Tenable Cloud Security is a mature and trustworthy product. I have been using it since it was available on laptops approximately 10 years ago or more. I initially used it for penetration testing, though currently I perform more manual penetration testing and use the scanner primarily to validate subnets or findings.
I started with Nessus installed on my computer, then moved to server deployment, and finally to Tenable Cloud Security. We still maintain Tenable Cloud Security but have reduced the number of licenses. We now use it occasionally to validate specific items rather than monitoring the entire surface, for which we use Element.
Tenable Cloud Security offers various features including discovery, web scanning, and primarily vulnerability scanning. It increases awareness of system vulnerabilities. In today's environment, information comes from multiple sources including Defender, Nessus, and various other tools within an organization. Using multiple tools is necessary to cover as much of the attack surface as possible, both internal and external.
My review rating for the solution is 10 out of 10.