Overview
Tenable Cloud Security is an award-winning, holistic cloud-native application protection (CNAPP) and infrastructure security solution that reveals and accurately prioritizes security gaps, and enables immediate remediation.
Tenable Cloud Security uses an identity-first approach to automate cloud security posture management (CSPM), cloud infrastructure entitlement management (CIEM), cloud workload protection (CWP), Kubernetes security posture management (KSPM) and infrastructure as code (IaC) security. It unifies full asset discovery, deep risk analysis, runtime threat detection and compliance reporting, combined with pinpoint visualization and step-by-step guidance. It is a full, multi-cloud, cloud-native application protection solution.
Tenable Cloud Security uses advanced analytics to assess, prioritize and automatically remediate risk in your AWS environment. It offers automated least-privilege policies integrated in standard workflows. With Tenable Cloud Security, enterprises can harden the cloud applications in their AWS environments and address the top risk in IaaS environments: misconfigured identities, access and privileges.
By using Tenable Cloud Security, you can secure the complete lifecycle from development to deployment, boost your team's AWS expertise and accelerate security collaboration with development, DevOps and others.
For custom pricing, EULA, or a private contract, please contact awsMPsales@tenable.com
Highlights
- Cloud Security Posture Management (CSPM) - Manage multi-cloud inventory. Enforce security policies and remediate misconfigurations across workloads, vulnerabilities, network, and data exposure. Drive compliance and alignment with best practices (e.g., AWS Well-Architected).
- Cloud Infrastructure Entitlement Management (CIEM) and Cloud Detection and Response (CDR) - Govern human and machine identities. Detect access risks, e.g. overprivileged entitlements, toxic combinations, and privilege escalations. Enforce least-privilege and Just-in-Time (JIT) access. Detect anomalous access activities and support investigation and forensics.
- Cloud Workload Protection and Kubernetes Security Posture Management (CWP & KSPM) - Continuously scan your Virtual Machines, Containers, Serverless workloads, and Kubernetes clusters for critical risks including vulnerabilities, sensitive data, malware secrets, and compliance misconfigurations.
Details
Features and programs
Pricing
Dimension | Description | Cost/12 months |
---|---|---|
1 Asset | Tenable Cloud Security [Private Offer Only] 1 Asset | $250,000.00 |
Vendor refund policy
No refunds except as required by law.
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
Software as a Service (SaaS)
SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.
Resources
Vendor resources
Support
Vendor support
Ermetic (the "Supplier") will provide email support ("Technical Support") eight (8) hours per day, five (5) days per week. Technical Support will include any research and resolution activity performed by Supplier. Technical Support requests are made by calling or emailing Supplier's Technical Support staff. The Technical Support staff shall assign to the request the Problem Severity Level (as defined herein) indicated by the requestor. support@ermetic.com support@ermetic.com
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.
Similar products
Customer reviews
Making DevOps & Security Teams Easier
It's helping me navigate and jump between resources in all the accounts, to find which resource is connected to which and to easily monitor the cloud events. In addition, the provided links to each resource are reducing the searching time significantly.
Great visibility of cloud misconfigurations and vulnerabilities
Doesn't really integrate well into Cloud
The findings integrate into the Tenable findings board
Does not cover all CSP's
We stopped using it because it was not as good as some of the other market leaders in this space
When we first turned it on it rinsed through all of our licence count instantly, so beware