Strong CSPM Tool for Multicloud Visibility and Compliance
What do you like best about the product?
This tool offers comprehensive visibility into misconfigurations, excessive permissions, and compliance risks across various cloud platforms. What I appreciate most is its graph-based IAM visualization, which makes it easy to identify risky privilege escalation paths in both AWS and Azure. Additionally, it comes with robust pre-built policies for compliance frameworks such as CIS and NIST.
What do you dislike about the product?
At first glance, some dashboards may appear somewhat cluttered, and the options for customization could be more adaptable. Additionally, setting up the initial cloud provider permissions can be challenging if you don't have a strong background in cloud IAM, which can be particularly difficult for teams that are new to CSPM.
What problems is the product solving and how is that benefiting you?
Tenable Cloud Security addresses visibility gaps within cloud environments by identifying misconfigured resources, insecure identities, and compliance violations. It allows teams to prioritize risks and take proactive steps to remediate issues, which is essential for maintaining both security and audit readiness.
Has significantly improved proactive monitoring through automated asset discovery and seamless integration with cloud environments
What is our primary use case?
We had other solutions that we used. One solution was that we did not have something exactly similar to what Element is doing. For example, we were using Bitsight, Evelin, and also Tenable Cloud Security. However, those products are different. Element was exactly the product we needed to cover close to real-time external surface monitoring. We also used Microsoft Defender for Endpoint, but the Defender product requires substantial manual labor. We were interested in having a tool that would not require too much manual labor and would be more proactive.
The Element team is easy to discuss with. They created modules for integrations, such as with DNS. They collect records automatically and add assets to the platform, which is very useful because we do not have to check each day for new records or remove old ones. Their integration with Azure and AWS makes it great for us. It streamlines the process and gives us assurance that all new assets will be automatically added to the platform.
I am not entirely sure about monitoring cloud applications as I have not used it extensively for that purpose. That is why we implemented Element and have other tools, as we are not using it exactly for that scope.
What is most valuable?
Element is precisely what we needed for close to real-time external surface monitoring. The automatic integration capabilities, particularly with DNS, Azure, and AWS, are extremely valuable. The platform automatically collects records and adds assets, eliminating the need for daily manual checking and updating.
The streamlined process ensures that all new assets are automatically added to the platform, reducing manual labor and making the system more proactive. The ease of communication with the Element team and their responsiveness to integration needs has been particularly beneficial.
What needs improvement?
Making the system smarter would be beneficial. Adding modules for integration with AWS and Azure would be helpful. Adding capabilities for the scanner to automatically pick up changes and add assets automatically would be valuable.
When discussing a big company, it is mandatory to have tools that will assist us rather than waiting for manual input to add hosts. Adding assets manually is prone to mistakes. Humans might forget to add an asset or make errors when adding multiple assets.
Taking the human element out of the context and making it more streamlined is the future for security. The human should be involved where expertise is needed, such as analysis and decision-making. Currently, with resource constraints, we need tools to collect and aggregate data, eliminate false positives as much as possible, and present relevant information to employees for action.
For how long have I used the solution?
I first tested the product in November last year, and we implemented it starting in February.
What do I think about the stability of the solution?
I would rate it as 10 for experience. As with any other solution in the market, they may have small bugs or false positives. However, whenever I encountered an issue, I sent an email to them and they managed to fix it. They investigated and provided full details for further investigation. In situations where there was a platform issue, they fixed it immediately and provided a complete explanation for the occurrence.
How are customer service and support?
Working with Element is straightforward and efficient. For comparison, while working with Bitsight is not difficult, it takes considerably longer. Bitsight is a larger company, and while they will provide the answers needed, the process is more time-consuming. With Bitsight, requesting integrations or new features involves submission and approval processes with uncertain timelines.
With Element, if you need a feature, you can discuss it with them, and if implementation is possible, you will have that feature within a month or two, depending on complexity. Simple integrations, such as DNS integration, can be completed in approximately a week.
How would you rate customer service and support?
What other advice do I have?
Tenable Cloud Security is a mature and trustworthy product. I have been using it since it was available on laptops approximately 10 years ago or more. I initially used it for penetration testing, though currently I perform more manual penetration testing and use the scanner primarily to validate subnets or findings.
I started with Nessus installed on my computer, then moved to server deployment, and finally to Tenable Cloud Security. We still maintain Tenable Cloud Security but have reduced the number of licenses. We now use it occasionally to validate specific items rather than monitoring the entire surface, for which we use Element.
Tenable Cloud Security offers various features including discovery, web scanning, and primarily vulnerability scanning. It increases awareness of system vulnerabilities. In today's environment, information comes from multiple sources including Defender, Nessus, and various other tools within an organization. Using multiple tools is necessary to cover as much of the attack surface as possible, both internal and external.
My review rating for the solution is 10 out of 10.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Microsoft Azure
Comprehensive and Reliable Cloud Security with Actionable Insights
What do you like best about the product?
Tenable Cloud Security provides excellent visibility across multi-cloud environments, allowing us to quickly identify misconfigurations, vulnerabilities, and compliance risks. The dashboards are intuitive, and the reporting features make it easy to communicate risk posture to both technical and non-technical stakeholders. I particularly appreciate the ease of integration with existing workflows and the ability to prioritize issues based on severity, which helps the team focus on the most critical risks first. Customer support has also been responsive and helpful whenever needed.
What do you dislike about the product?
While the platform is powerful, the initial setup and configuration can feel complex, especially for organizations without a mature cloud security framework. Some advanced features require fine-tuning to avoid excessive noise or false positives. Additionally, pricing may be a consideration for smaller teams, as the cost can add up when scaling across multiple cloud accounts. More streamlined onboarding and clearer guidance for less experienced teams would be a valuable improvement.
What problems is the product solving and how is that benefiting you?
Tenable Cloud Security helps us gain visibility into our multi-cloud environments, quickly identifying misconfigurations, vulnerabilities, and compliance gaps. This allows us to proactively address risks before they escalate, reducing the chance of security incidents. The tool also streamlines compliance reporting, saving time during audits and helping us align with regulatory requirements. Overall, it improves our ability to prioritize remediation efforts, strengthen our security posture, and ensure that development and operations teams work with greater confidence.
Reliable and intuitive cloud security platform with strong visibility features
What do you like best about the product?
What I really like is the visibility it provides into our cloud infrastructure. It’s easy to monitor misconfigurations, get alerts, and maintain compliance across multiple cloud accounts. The dashboard is clean, and I appreciate the detailed risk breakdowns with actionable insights. It integrates smoothly with our existing tools, which made adoption super smooth.
What do you dislike about the product?
There’s a bit of a learning curve in the beginning, especially when configuring custom policies or alerts. Some of the documentation could be clearer, particularly for more advanced use cases. Also, the pricing structure could be more flexible for smaller teams or startups.
What problems is the product solving and how is that benefiting you?
Tenable Cloud Security helps us identify and fix cloud misconfigurations, policy violations, and potential vulnerabilities before they turn into real issues. It solves the problem of limited visibility across our multi-cloud environment and reduces the manual effort required for compliance checks. As a result, our security posture has improved significantly, audits are smoother, and our team can focus more on proactive risk mitigation instead of reactive firefighting.
Recognize the impact of proactive compliance and risk reduction features
What is our primary use case?
My main use case for Tenable Cloud Security is managing our security compliance and security posture.
I use Tenable Cloud Security for managing compliance and security posture, and we rely on the compliance reports and findings of our cloud configuration.
I don't have anything else to add about my use case or how I use Tenable Cloud Security day-to-day.
What is most valuable?
The best features Tenable Cloud Security offers in my experience are automatic scanning, frequent scanning, and automatic finding, which I find valuable.
Tenable Cloud Security has positively impacted my organization with risk reduction and compliance.
We weren't previously measuring compliance, so that's completely new to our organization regarding risk reduction and compliance improvements.
What needs improvement?
I think Tenable Cloud Security could be improved with more clear licensing.
What I would like to see improved with licensing is how they're used in the product.
The calculations of what is considered a license between virtual machines, containers, Kubernetes clusters, and similar components should be made more clear.
I will add more about the needed improvements.
For how long have I used the solution?
I have been using Tenable Cloud Security for about a year and a half.
What do I think about the stability of the solution?
In my experience, Tenable Cloud Security is not very stable. There are no downtime, no outages, and a few support tickets, but nothing out of the ordinary.
How are customer service and support?
Customer support for Tenable Cloud Security is recommended, with no problems and very responsive.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
We haven't had a tool like Tenable Cloud Security in our organization in the past.
What was our ROI?
We don't have metrics for a return on investment from using Tenable Cloud Security because this was a new product, a new deployment.
What's my experience with pricing, setup cost, and licensing?
I wasn't involved with the pricing, setup cost and licensing for Tenable Cloud Security.
Which other solutions did I evaluate?
I wasn't involved in evaluating other options before choosing Tenable Cloud Security.
What other advice do I have?
My advice to others looking into using Tenable Cloud Security is to go in with expectations around how to manage findings and criticalities and how to manage exceptions. Have an exception process at the ready.
I don't have any additional thoughts about Tenable Cloud Security before we wrap up.
On a scale of one to ten, I rate Tenable Cloud Security an eight.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Offers reliable security support and encourages a safe migration to cloud environments while there is room for better reseller collaboration
What is our primary use case?
They are looking to promote a deeper security strategy with Tenable Cloud Security. Companies are migrating from on-premise to clouds and they must ensure their applications in the cloud will be more safe and secure.
Healthcare is most likely the kind of clients we see migrating to Tenable Cloud Security.
What is most valuable?
From what I know, though I'm not an expert technically speaking, perhaps the best functionalities are related to promoting a deeper analysis of the environment where applications are running in terms of creating a double armor of security to block threats that may come in the cloud with Tenable Cloud Security.
Companies are looking for cloud security, specifically Tenable Cloud Security, because they know it's a reliable company with long-term presence in the market, and they trust Tenable for their product strategy and support. This is the main reason.
What needs improvement?
I really don't know to tell the truth because we sell many solutions and don't sell exclusively Tenable, so I'm not in a condition to give a precise definition of what could be improved. My perception is this: when customer A needs Tenable Cloud Security, we introduce and demonstrate it. They POC, they appreciate it. The solution serves in such use cases ABC.
I am very pragmatic and straightforward - as long as they use or want the solution, I am interested. If they don't, my question is what are the main objections? They may discuss pricing, or they may say they thought the solution had certain technical capabilities that they could not find.
For how long have I used the solution?
It's just recently that these customers asked us to introduce Cloud Security, so I'm still in the process of getting to know this solution in more detail.
How was the initial setup?
Depending on the size of the project, it takes perhaps 15 days or a week or something similar.
What about the implementation team?
We have a technical person that helps with the setup or the implementation, and either the distributor or the vendor always assists us.
Which other solutions did I evaluate?
We resell Tenable and other cybersecurity companies in Brazil.
What other advice do I have?
Companies are migrating from on-premise to clouds and they must ensure their applications in the cloud will be more safe and secure.
Customers will be more secure in terms of knowing that their applications are running in a safe environment protected by Tenable Cloud Security, so they can promote and extend the migration process to either GCP, AWS, or Azure.
The analytical and reporting capabilities are pretty straightforward and show every transaction and major attempt to attack the application in the cloud. These analytical tools are very complete.
This solution can help organizations adhere to and comply with regulatory requirements such as HIPAA.
On a scale of 1-10, I rate this solution an 8.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Very good CIEM product
What do you like best about the product?
The identity and permissions features (CIEM) are amazing. Very detailled and covering GCP, AWS and Azure, it's a very complete solution.
What do you dislike about the product?
The Threat detection part is maybe the least powerful feature of this CNAPP.
What problems is the product solving and how is that benefiting you?
It helps to detect misconfigurations and issues with entitlement management in Cloud platforms
Easy to use tools
What do you like best about the product?
Very easy to use, solve our problems with relatively low cost
What do you dislike about the product?
If there are more features in the product that could help us automate security tasks, that would be even better.
What problems is the product solving and how is that benefiting you?
Automatic scan of our sytem for compliance purposes
Offers flexibility and cost-effectiveness to users
What is our primary use case?
Right now, I use Tenable as CNAPP, and it is good for the product as it offers enhanced security to users. We did use the tool on the cloud. I am not sure if some models, like CIEM, are available as a feature for users. When it comes to a module in CNAPP, I think it is fairly good for using and monitoring on the cloud while also being easy to deploy.
I am not sure how the tool is used in my company because I got transferred to another team that is involved only in monitoring. I use the reporting part on CNAPP. I only use the tool for customized reports. The tool had a fairly easy way to get customized reports.
What needs improvement?
Another team uses the tool. Tenable acquired Ermetic. I think Tenable has features, stays up to date, and upgrades every few months. I am not sure of the tool's use case, as another team uses it. I think another team in my company wants to use the tool for use cases associated with patching and testing. For use cases, Tenable needs to offer a patch-based solution since it is an area where the tool lacks a bit.
For how long have I used the solution?
I have experience with Tenable Cloud Security.
What do I think about the stability of the solution?
There are no stability or bug-related issues in the tool.
How was the initial setup?
The product's deployment phase is easy.
What was our ROI?
The tool is cost-effective.
What's my experience with pricing, setup cost, and licensing?
The tool's price is good compared to other brands. The tool's subscription is for a year.
What other advice do I have?
The tool can be used in the area of vulnerability management to improve our company's security.
I saw some impacts on our finances, especially on the banking side. In our company, we forecast the point for maturity and performance through assessments and security vulnerabilities in the cloud. Before I bought Tenable, I compared it with another band. The tool has been a really good point for the price.
One of the teams in my company would like to use the tool and integrate it with other products used for patching and vulnerability assessment tools.
The tool is a good product that is flexible and on the cloud.
I rate the tool an eight out of ten.
Making DevOps & Security Teams Easier
What do you like best about the product?
As a DevOps engineer, it makes my life easier when I use Tenable Cloud Security.
It's helping me navigate and jump between resources in all the accounts, to find which resource is connected to which and to easily monitor the cloud events. In addition, the provided links to each resource are reducing the searching time significantly.
What do you dislike about the product?
The only disadvantage is that it's quite expensive.
What problems is the product solving and how is that benefiting you?
Tenable Cloud Security gives me efficient and easy navigation between the AWS resources and the IAM roles. It helps us to track what is connected to what and gives us the best visibility for the accounts state.