Tenable Cloud Security Description

The cloud security platform that is actionable. Reduce risk by quickly exposing and closing security gaps caused by misconfigurations. CNAPP solutions replace a patchwork product that can cause more problems than it solves, such as false positives or excessive alerts. These products are often only partially covered and create friction and overhead with the products that they're meant to work with. CNAPPs are the best way to monitor cloud native applications. They allow businesses to monitor cloud infrastructure and application security as a group, rather than monitoring each one individually.

Pricing

Free Trial:
Yes

Integrations

API:
Yes, Tenable Cloud Security has an API

Reviews

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Company Details

Company:
Tenable
Year Founded:
2002
Headquarters:
United States
Website:
www.tenable.com/cloud-security
Update This Listing

Media

Ermetic Dashboard

Ermetic Dashboard

Recommended Products
MongoDB 8.0 on Atlas | Run anywhere Icon
MongoDB 8.0 on Atlas | Run anywhere

Now available in even more cloud regions across AWS, Azure, and Google Cloud.

MongoDB 8.0 brings enhanced performance and flexibility to Atlas—with expanded availability across 125+ regions globally. Build modern apps anywhere your users are, with the power of a modern database behind you.
Learn More

Product Details

Platforms
Web-Based
Types of Training
Training Docs
Live Training (Online)
Webinars
In Person
Training Videos
Customer Support
Business Hours
Live Rep (24/7)
Online Support

Tenable Cloud Security Features and Options

Data Security Software

Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance

Identity Management Software

Access Certification
Compliance Management
Multifactor Authentication
Password Management
Privileged Account Management
Self-Service Access Request
Single Sign On
User Activity Monitoring
User Provisioning

Privileged Access Management Software

Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring

Cybersecurity Software

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Cloud Security Software

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

IT Security Software

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

DevOps Software

Approval Workflow
Dashboard
KPIs
Policy Management
Portfolio Management
Prioritization
Release Management
Timeline Management
Troubleshooting Reports

Tenable Cloud Security Lists

Tenable Cloud Security User Reviews

Write a Review
  • Previous
  • Next