Try our new research platform with insights from 80,000+ expert users

Balbix BreachControl vs Tenable Cloud Security comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Balbix BreachControl
Average Rating
0.0
Number of Reviews
0
Ranking in other categories
Vulnerability Management (58th), Cyber Asset Attack Surface Management (CAASM) (15th), Risk-Based Vulnerability Management (23rd), Continuous Threat Exposure Management (CTEM) (18th)
Tenable Cloud Security
Average Rating
8.4
Reviews Sentiment
6.7
Number of Reviews
11
Ranking in other categories
Identity and Access Management as a Service (IDaaS) (IAMaaS) (12th), Container Security (24th), Cloud Workload Protection Platforms (CWPP) (11th), Cloud Security Posture Management (CSPM) (17th), Cloud-Native Application Protection Platforms (CNAPP) (13th), Cloud Infrastructure Entitlement Management (CIEM) (4th)
 

Mindshare comparison

While both are Security Software solutions, they serve different purposes. Balbix BreachControl is designed for Continuous Threat Exposure Management (CTEM) and holds a mindshare of 0.6%, up 0.3% compared to last year.
Tenable Cloud Security, on the other hand, focuses on Cloud-Native Application Protection Platforms (CNAPP), holds 2.9% mindshare, up 2.5% since last year.
Continuous Threat Exposure Management (CTEM) Market Share Distribution
ProductMarket Share (%)
Balbix BreachControl0.6%
Cymulate16.3%
XM Cyber16.2%
Other66.9%
Continuous Threat Exposure Management (CTEM)
Cloud-Native Application Protection Platforms (CNAPP) Market Share Distribution
ProductMarket Share (%)
Tenable Cloud Security2.9%
Wiz23.4%
Prisma Cloud by Palo Alto Networks14.5%
Other59.2%
Cloud-Native Application Protection Platforms (CNAPP)
 

Featured Reviews

Use Balbix BreachControl?
Share your opinion
Antonio Scola - PeerSpot reviewer
Offers reliable security support and encourages a safe migration to cloud environments while there is room for better reseller collaboration
I really don't know to tell the truth because we sell many solutions and don't sell exclusively Tenable, so I'm not in a condition to give a precise definition of what could be improved. My perception is this: when customer A needs Tenable Cloud Security, we introduce and demonstrate it. They POC, they appreciate it. The solution serves in such use cases ABC. I am very pragmatic and straightforward - as long as they use or want the solution, I am interested. If they don't, my question is what are the main objections? They may discuss pricing, or they may say they thought the solution had certain technical capabilities that they could not find.
report
Use our free recommendation engine to learn which Continuous Threat Exposure Management (CTEM) solutions are best for your needs.
869,089 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
11%
Financial Services Firm
11%
Healthcare Company
10%
Manufacturing Company
7%
Computer Software Company
13%
Government
11%
Financial Services Firm
10%
Manufacturing Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business5
Midsize Enterprise2
Large Enterprise4
 

Questions from the Community

Ask a question
Earn 20 points
What do you like most about Tenable Cloud Security?
The solution’s vulnerability management feature has helped us identify and mitigate risks well.
What needs improvement with Tenable Cloud Security?
I think Tenable Cloud Security could be improved with more clear licensing. What I would like to see improved with licensing is how they're used in the product. The calculations of what is consider...
What is your primary use case for Tenable Cloud Security?
My main use case for Tenable Cloud Security is managing our security compliance and security posture. I use Tenable Cloud Security for managing compliance and security posture, and we rely on the c...
 

Also Known As

BreachControl
Ermetic, Ermetic Identity Governance for AWS
 

Overview

 

Sample Customers

Cavium
Tyler Technologies, Bilfinger, BarkBox, MongoDB, airSlate, Adama, Latch, Cloudinary, Riskified, AppsFlyer, IntelyCare, Aidoc, 42Dot, and more.
Find out what your peers are saying about Zafran Security, Cymulate, XM Cyber and others in Continuous Threat Exposure Management (CTEM). Updated: September 2025.
869,089 professionals have used our research since 2012.