No more typing reviews! Try our Samantha, our new voice AI agent.

Clutch Security vs Tenable Cloud Security comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Clutch Security
Average Rating
0.0
Number of Reviews
0
Ranking in other categories
Non-Human Identity Management (NHIM) (9th)
Tenable Cloud Security
Average Rating
8.4
Reviews Sentiment
6.5
Number of Reviews
12
Ranking in other categories
Identity and Access Management as a Service (IDaaS) (IAMaaS) (15th), Container Security (23rd), Cloud Workload Protection Platforms (CWPP) (14th), Cloud Security Posture Management (CSPM) (15th), Cloud-Native Application Protection Platforms (CNAPP) (12th), Cloud Infrastructure Entitlement Management (CIEM) (2nd)
 

Mindshare comparison

While both are Identity and Access Management solutions, they serve different purposes. Clutch Security is designed for Non-Human Identity Management (NHIM) and holds a mindshare of 5.0%, up 4.8% compared to last year.
Tenable Cloud Security, on the other hand, focuses on Cloud-Native Application Protection Platforms (CNAPP), holds 3.2% mindshare, up 2.5% since last year.
Non-Human Identity Management (NHIM) Mindshare Distribution
ProductMindshare (%)
Clutch Security5.0%
Astrix12.3%
Saviynt Identity Cloud12.0%
Other70.7%
Non-Human Identity Management (NHIM)
Cloud-Native Application Protection Platforms (CNAPP) Mindshare Distribution
ProductMindshare (%)
Tenable Cloud Security3.2%
Wiz13.8%
Prisma Cloud by Palo Alto Networks11.0%
Other72.0%
Cloud-Native Application Protection Platforms (CNAPP)
 

Featured Reviews

Use Clutch Security?
Leave a review
CD
Information Security Architect at WSP
Has significantly improved proactive monitoring through automated asset discovery and seamless integration with cloud environments
Making the system smarter would be beneficial. Adding modules for integration with AWS and Azure would be helpful. Adding capabilities for the scanner to automatically pick up changes and add assets automatically would be valuable. When discussing a big company, it is mandatory to have tools that will assist us rather than waiting for manual input to add hosts. Adding assets manually is prone to mistakes. Humans might forget to add an asset or make errors when adding multiple assets. Taking the human element out of the context and making it more streamlined is the future for security. The human should be involved where expertise is needed, such as analysis and decision-making. Currently, with resource constraints, we need tools to collect and aggregate data, eliminate false positives as much as possible, and present relevant information to employees for action.
report
Use our free recommendation engine to learn which Non-Human Identity Management (NHIM) solutions are best for your needs.
893,221 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
No data available
Government
11%
Financial Services Firm
10%
Manufacturing Company
9%
Computer Software Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business5
Midsize Enterprise2
Large Enterprise5
 

Questions from the Community

Ask a question
Earn 20 points
What needs improvement with Tenable Cloud Security?
Making the system smarter would be beneficial. Adding modules for integration with AWS and Azure would be helpful. Adding capabilities for the scanner to automatically pick up changes and add asset...
What is your primary use case for Tenable Cloud Security?
We had other solutions that we used. One solution was that we did not have something exactly similar to what Element is doing. For example, we were using Bitsight, Evelin, and also Tenable Cloud Se...
What is your experience regarding pricing and costs for Ermetic CSPM?
I wasn't involved with the pricing, setup cost and licensing for Tenable Cloud Security.
 

Also Known As

No data available
Ermetic, Ermetic Identity Governance for AWS
 

Overview

 

Sample Customers

Information Not Available
Tyler Technologies, Bilfinger, BarkBox, MongoDB, airSlate, Adama, Latch, Cloudinary, Riskified, AppsFlyer, IntelyCare, Aidoc, 42Dot, and more.
Find out what your peers are saying about One Identity, Astrix Security, Entro Security and others in Non-Human Identity Management (NHIM). Updated: May 2026.
893,221 professionals have used our research since 2012.