No more typing reviews! Try our Samantha, our new voice AI agent.

CyberArk Identity vs Tenable Cloud Security comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
5.0
Many users find CyberArk Identity valuable for saving time, enhancing security, fostering efficiency, and yielding beneficial returns.
Sentiment score
5.3
Tenable Cloud Security is financially beneficial, offering cost-effective services and positive outcomes despite lacking specific recent metrics.
I have seen over 30% return on investment due to the improvement in operational efficiencies through automation, which enhances productivity.
Private Wealth Advisor at Arima Fund Limited
 

Customer Service

Sentiment score
6.4
CyberArk Identity's customer service is generally effective but faces criticism for response delays and expertise inconsistencies.
Sentiment score
3.4
Tenable Cloud Security support receives mixed reviews with praised efficiency and availability, but some note delayed and inconsistent assistance.
They resolved the problem immediately after I reported it, on the same day, within one hour.
Access Management Analyst at Telefónica
They respond immediately when requests are raised, and they are always available for priority one tickets.
Lead Identity Engineer at a tech vendor with 501-1,000 employees
I received prompt responses and support, which I would rate as very good.
Cybersecurity Delivery Analyst at Accenture
With Element, if you need a feature, you can discuss it with them, and if implementation is possible, you will have that feature within a month or two, depending on complexity.
Information Security Architect at WSP
 

Scalability Issues

Sentiment score
7.4
CyberArk Identity is praised for its scalability, accommodating diverse company sizes and ease of license expansion.
Sentiment score
5.8
Tenable Cloud Security excels in scalability, praised for handling assets efficiently, but faces challenges in larger multi-cloud setups.
We can use it on different phones and computers, demonstrating its scalability.
Program associate at IMAGINE HER
When delving deep into the concepts, there is a lot to address and learn, especially when facing real-time scenarios.
Cybersecurity Delivery Analyst at Accenture
You can scale it out pretty easily, and you can implement it very small.
Cloud Specialist at Perini Beheer
 

Stability Issues

Sentiment score
8.0
CyberArk Identity is highly praised for its reliable stability, quick issue resolution, and effective performance, despite network connectivity challenges.
Sentiment score
7.8
Tenable Cloud Security is stable and reliable, with high ratings and prompt resolution of minor bugs, say users.
We no longer have our data infiltrated by unauthorized persons, and tracking actions within the system has become very easy.
Private Wealth Advisor at Arima Fund Limited
When you have it in the cloud, you have CyberArk every time you need it.
Access Management Analyst at Telefónica
With a stable network, due to the redundant data centers across the globe, it is a lot easier to use as a SaaS solution.
Senior Cyber Security Specialist Architect at a tech consulting company with 11-50 employees
In situations where there was a platform issue, they fixed it immediately and provided a complete explanation for the occurrence.
Information Security Architect at WSP
 

Room For Improvement

CyberArk Identity requires user interface improvements, better integration, enhanced documentation, and easier deployment for improved adoption and operations.
Tenable Cloud Security needs improved speed, automation, integration, clearer licensing, better support, and AI-powered features for multi-cloud environments.
It would be helpful if they released a generalized document for processes such as migration.
Cybersecurity Delivery Analyst at Accenture
Integration or deployment is extremely difficult for CyberArk Identity.
Head of IT at Skutin Solutions
There's a need to enhance network performance.
Senior Technology Manager at a outsourcing company with 501-1,000 employees
Adding capabilities for the scanner to automatically pick up changes and add assets automatically would be valuable.
Information Security Architect at WSP
The only complaint I hear in the market is from resellers that Tenable management team in Brazil doesn't play fair with the channel and resellers.
Owner at SUNLIT TECHNOLOGIES
 

Setup Cost

CyberArk Identity pricing is high but justified for enterprises with discounts and flexible licensing to balance costs.
Tenable Cloud Security is favorably received for its fair pricing, offering good value for enterprise cloud security solutions.
Regarding pricing, it can be quite a lot for small companies.
Access Management Analyst at Telefónica
The pricing is acceptable.
Program associate at IMAGINE HER
If I am not going fully cloud, there are additional resources I will need to purchase, such as spinning more VMs or acquiring an HSM device to encrypt the vault.
Head of IT at Skutin Solutions
 

Valuable Features

CyberArk Identity enhances security and efficiency through integrations, password management, user monitoring, and comprehensive compliance and risk analysis tools.
Tenable Cloud Security offers comprehensive vulnerability detection, asset management, and integration, enhancing security and compliance with proactive monitoring.
It impacts zero trust security strategies. It prevents lateral movements in the organization.
Head of IT at Skutin Solutions
The two-factor authentication is very important, but the fact that every account is being regenerated every time we use it is the most important security feature for us.
Cloud Specialist at Perini Beheer
It is the most powerful access management system.
Access Management Analyst at Telefónica
The automatic integration capabilities, particularly with DNS, Azure, and AWS, are extremely valuable.
Information Security Architect at WSP
Perhaps the best functionalities are related to promoting a deeper analysis of the environment where applications are running in terms of creating a double armor of security to block threats that may come in the cloud with Tenable Cloud Security.
Owner at SUNLIT TECHNOLOGIES
The best features Tenable Cloud Security offers in my experience are automatic scanning, frequent scanning, and automatic finding, which I find valuable.
Cloud Security Engineer at a tech vendor with 51-200 employees
 

Categories and Ranking

CyberArk Identity
Average Rating
8.2
Reviews Sentiment
6.7
Number of Reviews
29
Ranking in other categories
Authentication Systems (9th), Identity Management (IM) (9th), Authorization Software (3rd), Enterprise Password Managers (9th), User Entity Behavior Analytics (UEBA) (9th), Access Management (8th), Active Directory Management (6th), Cloud Resource Access Management (3rd), Customer Identity and Access Management (CIAM) (7th)
Tenable Cloud Security
Average Rating
8.4
Reviews Sentiment
6.5
Number of Reviews
12
Ranking in other categories
Identity and Access Management as a Service (IDaaS) (IAMaaS) (13th), Container Security (22nd), Cloud Workload Protection Platforms (CWPP) (13th), Cloud Security Posture Management (CSPM) (16th), Cloud-Native Application Protection Platforms (CNAPP) (11th), Cloud Infrastructure Entitlement Management (CIEM) (3rd)
 

Mindshare comparison

While both are Security Software solutions, they serve different purposes. CyberArk Identity is designed for Customer Identity and Access Management (CIAM) and holds a mindshare of 3.5%, down 3.9% compared to last year.
Tenable Cloud Security, on the other hand, focuses on Cloud-Native Application Protection Platforms (CNAPP), holds 2.9% mindshare, up 2.4% since last year.
Customer Identity and Access Management (CIAM) Mindshare Distribution
ProductMindshare (%)
CyberArk Identity3.5%
Okta Platform15.5%
Auth0 Platform14.1%
Other66.9%
Customer Identity and Access Management (CIAM)
Cloud-Native Application Protection Platforms (CNAPP) Mindshare Distribution
ProductMindshare (%)
Tenable Cloud Security2.9%
Wiz17.4%
Prisma Cloud by Palo Alto Networks12.4%
Other67.30000000000001%
Cloud-Native Application Protection Platforms (CNAPP)
 

Featured Reviews

Hariharan Thangasamy - PeerSpot reviewer
Cybersecurity Delivery Analyst at Accenture
Has strengthened privileged access control and improved audit visibility through session monitoring and password rotation
On the identity product side, it is awesome. However, they can improve in the documentation parts. For example, if there is a migration process, I can see the maximum customers are moving from self-hosted to on-premises or from on-premises to the cloud. It would be helpful if they released a generalized document for processes such as migration. A clear overview document would assist us in understanding more about the tool, configurations, and automations to enhance our security. Regarding the initial setup of CyberArk Identity, I faced some challenges. At some points, I could not find proper documentation for deploying, enhancing, or integrating with other components. I could not find the proper documentation in the community portal.
CD
Information Security Architect at WSP
Has significantly improved proactive monitoring through automated asset discovery and seamless integration with cloud environments
Making the system smarter would be beneficial. Adding modules for integration with AWS and Azure would be helpful. Adding capabilities for the scanner to automatically pick up changes and add assets automatically would be valuable. When discussing a big company, it is mandatory to have tools that will assist us rather than waiting for manual input to add hosts. Adding assets manually is prone to mistakes. Humans might forget to add an asset or make errors when adding multiple assets. Taking the human element out of the context and making it more streamlined is the future for security. The human should be involved where expertise is needed, such as analysis and decision-making. Currently, with resource constraints, we need tools to collect and aggregate data, eliminate false positives as much as possible, and present relevant information to employees for action.
report
Use our free recommendation engine to learn which Customer Identity and Access Management (CIAM) solutions are best for your needs.
885,728 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
14%
Manufacturing Company
10%
Computer Software Company
9%
Construction Company
7%
Government
11%
Computer Software Company
10%
Financial Services Firm
9%
Manufacturing Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business20
Midsize Enterprise4
Large Enterprise10
By reviewers
Company SizeCount
Small Business5
Midsize Enterprise2
Large Enterprise5
 

Questions from the Community

What is your experience regarding pricing and costs for CyberArk Identity?
I am not certain about CyberArk Identity's exact pricing model. For comparison, Okta was around five dollars per user. CyberArk Identity offers good discounts to some clients, which influences thei...
What needs improvement with CyberArk Identity?
We do not specifically use the password vaulting feature of CyberArk Identity. The centralized user dashboard of CyberArk Identity has not been that important for us. If it would be possible to sha...
What is your primary use case for CyberArk Identity?
It's not being purchased through AWS, but we're using CyberArk Identity as a SaaS solution. I think it's running on AWS, but we bought it directly from CyberArk.
What do you like most about Tenable Cloud Security?
The solution’s vulnerability management feature has helped us identify and mitigate risks well.
What needs improvement with Tenable Cloud Security?
Making the system smarter would be beneficial. Adding modules for integration with AWS and Azure would be helpful. Adding capabilities for the scanner to automatically pick up changes and add asset...
What is your primary use case for Tenable Cloud Security?
We had other solutions that we used. One solution was that we did not have something exactly similar to what Element is doing. For example, we were using Bitsight, Evelin, and also Tenable Cloud Se...
 

Also Known As

Idaptive
Ermetic, Ermetic Identity Governance for AWS
 

Overview

 

Sample Customers

MLB, Citi, Pfizer, SulAmerica, GE Capital, Shiseido
Tyler Technologies, Bilfinger, BarkBox, MongoDB, airSlate, Adama, Latch, Cloudinary, Riskified, AppsFlyer, IntelyCare, Aidoc, 42Dot, and more.
Find out what your peers are saying about CyberArk Identity vs. Tenable Cloud Security and other solutions. Updated: July 2024.
885,728 professionals have used our research since 2012.