
Overview
Tenable Cloud Security is an award-winning, actionable cloud-native application protection (CNAPP) and infrastructure security solution.
Tenable Cloud Security uses an identity-first approach to automate cloud security posture management (CSPM), cloud infrastructure entitlement management (CIEM), cloud workload protection (CWP), Kubernetes security posture management (KSPM), Data security posture management (DSPM), AI security posture management (AI-SPM), infrastructure as code (IaC) security and more.
Tenable Cloud Security uses advanced analytics to assess, prioritize and automatically remediate risk in your AWS environment. It offers Just-in-Time (JIT) access and automated least-privilege policies integrated in standard workflows. With Tenable Cloud Security, enterprises can harden cloud applications in their AWS environments and address the top risks in IaaS environments: misconfigured identities, access and privileges.
By using Tenable Cloud Security, you can secure the complete lifecycle from development to deployment, boost your team's AWS expertise and accelerate security collaboration with development, DevOps and others.
For custom pricing, EULA, or a private contract, please contact awsMPsales@tenable.comÂ
Highlights
- Discover the compute, identity and data resources in your cloud and get contextualized visibility into how critical resources are accessed.
- Gain the context you need to focus on the priority risks caused by the toxic combination of misconfigurations, excessive entitlements, vulnerabilities and sensitive data.
- Reduce cloud risk by closing priority exposures with top speed and surgical precision. Even if you only have five minutes to spare.
Details
Unlock automation with AI agent solutions

Features and programs
Buyer guide

Financing for AWS Marketplace purchases
Pricing
Custom pricing options
How can we make this page better?
Legal
Content disclaimer
Delivery details
Software as a Service (SaaS)
SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.
Resources
Vendor resources
Support
Vendor support
Tenable (the "Supplier") will provide email support ("Technical Support") eight (8) hours per day, five (5) days per week. Technical Support will include any research and resolution activity performed by Supplier. Technical Support requests are made by calling or emailing Supplier's Technical Support staff. The Technical Support staff shall assign to the request the Problem Severity Level (as defined herein) indicated by the requestor.
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.
Similar products



Customer reviews
Has significantly improved proactive monitoring through automated asset discovery and seamless integration with cloud environments
What is our primary use case?
We had other solutions that we used. One solution was that we did not have something exactly similar to what Element is doing. For example, we were using Bitsight , Evelin, and also Tenable Cloud Security . However, those products are different. Element was exactly the product we needed to cover close to real-time external surface monitoring. We also used Microsoft Defender for Endpoint , but the Defender product requires substantial manual labor. We were interested in having a tool that would not require too much manual labor and would be more proactive.
The Element team is easy to discuss with. They created modules for integrations, such as with DNS. They collect records automatically and add assets to the platform, which is very useful because we do not have to check each day for new records or remove old ones. Their integration with Azure and AWS makes it great for us. It streamlines the process and gives us assurance that all new assets will be automatically added to the platform.
I am not entirely sure about monitoring cloud applications as I have not used it extensively for that purpose. That is why we implemented Element and have other tools, as we are not using it exactly for that scope.
What is most valuable?
Element is precisely what we needed for close to real-time external surface monitoring. The automatic integration capabilities, particularly with DNS, Azure , and AWS , are extremely valuable. The platform automatically collects records and adds assets, eliminating the need for daily manual checking and updating.
The streamlined process ensures that all new assets are automatically added to the platform, reducing manual labor and making the system more proactive. The ease of communication with the Element team and their responsiveness to integration needs has been particularly beneficial.
What needs improvement?
Making the system smarter would be beneficial. Adding modules for integration with AWS and Azure would be helpful. Adding capabilities for the scanner to automatically pick up changes and add assets automatically would be valuable.
When discussing a big company, it is mandatory to have tools that will assist us rather than waiting for manual input to add hosts. Adding assets manually is prone to mistakes. Humans might forget to add an asset or make errors when adding multiple assets.
Taking the human element out of the context and making it more streamlined is the future for security. The human should be involved where expertise is needed, such as analysis and decision-making. Currently, with resource constraints, we need tools to collect and aggregate data, eliminate false positives as much as possible, and present relevant information to employees for action.
For how long have I used the solution?
I first tested the product in November last year, and we implemented it starting in February.
What do I think about the stability of the solution?
I would rate it as 10 for experience. As with any other solution in the market, they may have small bugs or false positives. However, whenever I encountered an issue, I sent an email to them and they managed to fix it. They investigated and provided full details for further investigation. In situations where there was a platform issue, they fixed it immediately and provided a complete explanation for the occurrence.
How are customer service and support?
Working with Element is straightforward and efficient. For comparison, while working with Bitsight is not difficult, it takes considerably longer. Bitsight is a larger company, and while they will provide the answers needed, the process is more time-consuming. With Bitsight, requesting integrations or new features involves submission and approval processes with uncertain timelines.
With Element, if you need a feature, you can discuss it with them, and if implementation is possible, you will have that feature within a month or two, depending on complexity. Simple integrations, such as DNS integration, can be completed in approximately a week.
How would you rate customer service and support?
Positive
What other advice do I have?
Tenable Cloud Security is a mature and trustworthy product. I have been using it since it was available on laptops approximately 10 years ago or more. I initially used it for penetration testing, though currently I perform more manual penetration testing and use the scanner primarily to validate subnets or findings.
I started with Nessus installed on my computer, then moved to server deployment, and finally to Tenable Cloud Security. We still maintain Tenable Cloud Security but have reduced the number of licenses. We now use it occasionally to validate specific items rather than monitoring the entire surface, for which we use Element.
Tenable Cloud Security offers various features including discovery, web scanning, and primarily vulnerability scanning. It increases awareness of system vulnerabilities. In today's environment, information comes from multiple sources including Defender, Nessus, and various other tools within an organization. Using multiple tools is necessary to cover as much of the attack surface as possible, both internal and external.
My review rating for the solution is 10 out of 10.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Comprehensive and Reliable Cloud Security with Actionable Insights
Reliable and intuitive cloud security platform with strong visibility features
Recognize the impact of proactive compliance and risk reduction features
What is our primary use case?
My main use case for Tenable Cloud Security is managing our security compliance and security posture.
I use Tenable Cloud Security for managing compliance and security posture, and we rely on the compliance reports and findings of our cloud configuration.
I don't have anything else to add about my use case or how I use Tenable Cloud Security day-to-day.
What is most valuable?
The best features Tenable Cloud Security offers in my experience are automatic scanning, frequent scanning, and automatic finding, which I find valuable.
Tenable Cloud Security has positively impacted my organization with risk reduction and compliance.
We weren't previously measuring compliance, so that's completely new to our organization regarding risk reduction and compliance improvements.
What needs improvement?
I think Tenable Cloud Security could be improved with more clear licensing.
What I would like to see improved with licensing is how they're used in the product.
The calculations of what is considered a license between virtual machines, containers, Kubernetes clusters, and similar components should be made more clear.
I will add more about the needed improvements.
For how long have I used the solution?
I have been using Tenable Cloud Security for about a year and a half.
What do I think about the stability of the solution?
In my experience, Tenable Cloud Security is not very stable. There are no downtime, no outages, and a few support tickets, but nothing out of the ordinary.
How are customer service and support?
Customer support for Tenable Cloud Security is recommended, with no problems and very responsive.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We haven't had a tool like Tenable Cloud Security in our organization in the past.
What was our ROI?
We don't have metrics for a return on investment from using Tenable Cloud Security because this was a new product, a new deployment.
What's my experience with pricing, setup cost, and licensing?
I wasn't involved with the pricing, setup cost and licensing for Tenable Cloud Security.
Which other solutions did I evaluate?
I wasn't involved in evaluating other options before choosing Tenable Cloud Security.
What other advice do I have?
My advice to others looking into using Tenable Cloud Security is to go in with expectations around how to manage findings and criticalities and how to manage exceptions. Have an exception process at the ready.
I don't have any additional thoughts about Tenable Cloud Security before we wrap up.
On a scale of one to ten, I rate Tenable Cloud Security an eight.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Offers reliable security support and encourages a safe migration to cloud environments while there is room for better reseller collaboration
What is our primary use case?
They are looking to promote a deeper security strategy with Tenable Cloud Security . Companies are migrating from on-premise to clouds and they must ensure their applications in the cloud will be more safe and secure.
Healthcare is most likely the kind of clients we see migrating to Tenable Cloud Security .
What is most valuable?
From what I know, though I'm not an expert technically speaking, perhaps the best functionalities are related to promoting a deeper analysis of the environment where applications are running in terms of creating a double armor of security to block threats that may come in the cloud with Tenable Cloud Security.
Companies are looking for cloud security, specifically Tenable Cloud Security, because they know it's a reliable company with long-term presence in the market, and they trust Tenable for their product strategy and support. This is the main reason.
What needs improvement?
I really don't know to tell the truth because we sell many solutions and don't sell exclusively Tenable, so I'm not in a condition to give a precise definition of what could be improved. My perception is this: when customer A needs Tenable Cloud Security, we introduce and demonstrate it. They POC, they appreciate it. The solution serves in such use cases ABC.
I am very pragmatic and straightforward - as long as they use or want the solution, I am interested. If they don't, my question is what are the main objections? They may discuss pricing, or they may say they thought the solution had certain technical capabilities that they could not find.
Â
For how long have I used the solution?
It's just recently that these customers asked us to introduce Cloud Security, so I'm still in the process of getting to know this solution in more detail.
How was the initial setup?
Depending on the size of the project, it takes perhaps 15 days or a week or something similar.
What about the implementation team?
We have a technical person that helps with the setup or the implementation, and either the distributor or the vendor always assists us.
Which other solutions did I evaluate?
We resell Tenable and other cybersecurity companies in Brazil.
What other advice do I have?
Companies are migrating from on-premise to clouds and they must ensure their applications in the cloud will be more safe and secure.
Customers will be more secure in terms of knowing that their applications are running in a safe environment protected by Tenable Cloud Security, so they can promote and extend the migration process to either GCP, AWS , or Azure .
The analytical and reporting capabilities are pretty straightforward and show every transaction and major attempt to attack the application in the cloud. These analytical tools are very complete.
This solution can help organizations adhere to and comply with regulatory requirements such as HIPAA.
On a scale of 1-10, I rate this solution an 8.