Try our new research platform with insights from 80,000+ expert users

CyberArk Identity vs Tenable Cloud Security comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Identity
Average Rating
8.2
Reviews Sentiment
7.0
Number of Reviews
23
Ranking in other categories
Authentication Systems (8th), Identity Management (IM) (10th), Authorization Software (3rd), Enterprise Password Managers (7th), User Entity Behavior Analytics (UEBA) (9th), Access Management (6th), Active Directory Management (8th), Cloud Resource Access Management (2nd), Customer Identity and Access Management (CIAM) (6th)
Tenable Cloud Security
Average Rating
8.4
Reviews Sentiment
7.1
Number of Reviews
9
Ranking in other categories
Identity and Access Management as a Service (IDaaS) (IAMaaS) (12th), Cloud Workload Protection Platforms (CWPP) (14th), Cloud Security Posture Management (CSPM) (18th), Cloud-Native Application Protection Platforms (CNAPP) (14th), Cloud Infrastructure Entitlement Management (CIEM) (4th)
 

Mindshare comparison

While both are Security Software solutions, they serve different purposes. CyberArk Identity is designed for Customer Identity and Access Management (CIAM) and holds a mindshare of 3.8%, up 3.4% compared to last year.
Tenable Cloud Security, on the other hand, focuses on Cloud-Native Application Protection Platforms (CNAPP), holds 2.4% mindshare, up 2.3% since last year.
Customer Identity and Access Management (CIAM)
Cloud-Native Application Protection Platforms (CNAPP)
 

Featured Reviews

Julio Montero - PeerSpot reviewer
Access management system provides strong security and effortless user authentication
The solution can be deployed on cloud or on-premises. CyberArk is more on the cloud than on local hardware. The deployment is initially quite difficult. That said, when you are doing the implementation of CyberArk, there are so many tutorials that make the learning process very easy. The only complaint could be the language barrier. It's difficult if you don't have a very good level of English. Otherwise, it is very easy. You can have it set up within three months without much difficulty. It's hard to get started, however, once you get going, it gets easier. A full deployment takes half a year or less. There is some maintenance necessary. A company is constantly hiring and letting go of employees. The access is always changing, so access must always be adjusted. Or, if we need another law of filter, we would need to add those, or even take them away. That's another aspect of maintenance.
Ondrej Kováč - PeerSpot reviewer
Has vulnerability detection, software composition analysis and asset management features
Due to its robust nature, the platform's adoption can be overwhelming initially. However, once organizations start using it, they tend to get used to it. I haven't had much direct interaction with the support team, but some partners have reported a desire for better support for the product. Another area needing improvement is the implementation complexity, especially in multi-cloud environments. Tenable Cloud Security's features mean there's a steep learning curve, which can consume significant time and resources to utilize the platform's potential and fully see immediate benefits. It's similar to AI in that you must spend time fine-tuning and training before it truly helps.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients."
"The most valuable features of CyberArk Identity are its ability to control access to administrative staff."
"The tool is a very strong and valuable enterprise solution, particularly in ensuring the continuity of service."
"The best thing I like about CyberArk Identity is that it does not require heavy implementation, complex hardware, or complex training."
"CyberArk Identity provides identity governance and gives me control over who and how access to environments occurs, offering significant confidentiality in what is accessed."
"The solution helps with auditing, and monitoring, and integrates with Splunk for log analysis. User activity logs are captured in CyberArk Identity and sent to external tools like Splunk for analysis and monitoring."
"The initial setup is straightforward. It takes me up to an hour and a half."
"If anyone makes an error, or if an incident occurs by accident, the business will not be harmed as a result of this activity."
"The tool alerts us on depreciating performance or deficiencies of our web application. It helps us react on time."
"Scanning and reporting are the most valuable features of Tenable Cloud Security"
"Tenable Cloud Security excels in vulnerability detection, one of its strongest features. Another valuable feature is software composition analysis, which highlights and automates the detection of security flaws. Additionally, their knowledge base is excellent; if anything goes wrong, they provide clear guidance on what needs to be done to address specific vulnerabilities."
"If you have multi-cloud tenancy using AWS and Azure, you can have a single dashboard where you can onboard all the cloud infrastructure and have visibility into it."
"The key benefit lies in having the largest and most up-to-date database. When it comes to using any Tenable product, it excels in finding vulnerabilities and providing analytics."
"The product's deployment phase is easy."
"The product's visibility and remediation work fine for me."
"Ermetic can provide super visibility for our cloud environment (we are using AWS)."
 

Cons

"When you translate the page from one language to another, it can be a difficult process. The translation isn't always good, and it may have a completely different name. I've noticed this in the English to Spanish translation."
"We would like to see an improvement in the ability to manage mobile devices."
"Integration or deployment is extremely difficult for CyberArk Identity."
"There is room for improvement in documentation. The documentation could be more specific about the changes needed to achieve specific goals."
"In terms of a governance platform, it's worth noting that CyberArk doesn't offer a particularly strong one."
"The user interface could be improved."
"At the moment CyberArk needs to enrich Conjur and it needs to be made more viable so that its adoption can be made much faster."
"In terms of general user feedback, the more security you put in front of a user, the more they complain. So usability and the user experience are always a challenge. So there's always room for improvement."
"There is a need for the support team to improve their response time since it is one of the areas where the product's technical team has certain shortcomings."
"I have faced several bug incidents with the solution"
"If Tenable Cloud Security offers a complete Cnapp solution with CWP, CIEM, and Waap security, it will be able to compete with other competitors."
"Due to its robust nature, the platform's adoption can be overwhelming initially. However, once organizations start using it, they tend to get used to it. I haven't had much direct interaction with the support team, but some partners have reported a desire for better support for the product."
"The product must provide more features."
"I do think there might be room for more integrations. This could allow for further customization and flexibility, essentially offering different functionality options to accommodate various budgets."
"I didn't find anything that wasn't useful or needed to be added."
"Ermetic needs to improve its security scanning. I would like to see more dynamic graphical forms."
 

Pricing and Cost Advice

"CyberArk Identity is an expensive solution."
"There is an initial license and then there is a subscription needed."
"There could be some additional costs apart from the licensing costs of the solution when you want to develop connectors in CyberArk Identity."
"In terms of pricing, BeyondTrust and CyberArk tend to be more expensive, with CyberArk receiving an eight out of ten, in this regard."
"It's not that affordable compared to Delinea or other products. They're less expensive and allow more customization. For the cost, it is expensive."
"The pricing is acceptable. It is worth considering what we are protecting with the amount charged."
"The solution is cheap and I rate its pricing an eight out of ten."
"We find that the pricing and licensing of this solution is adequate, as compared to the other competitors in the market."
"The tool's price is good compared to other brands. The tool's subscription is for a year."
"The tool's pricing is fair."
"There is a need to opt for a subscription-based pricing model to use Tenable Cloud Security. I rate the product price an eight on a scale of one to ten, where one is low price and ten is high price."
report
Use our free recommendation engine to learn which Customer Identity and Access Management (CIAM) solutions are best for your needs.
850,747 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
17%
Computer Software Company
14%
Manufacturing Company
11%
Healthcare Company
6%
Computer Software Company
15%
Financial Services Firm
11%
Government
11%
Manufacturing Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about CyberArk Identity?
The integration capabilities, ability to integrate CyberArk into the overall IBB strategy of our current clients.
What is your experience regarding pricing and costs for CyberArk Identity?
The pricing point is very good. I compared it with other products, and it does not require a heavy investment.
What needs improvement with CyberArk Identity?
It does not have global market penetration, and sometimes, there are support issues. CyberArk Identity can definitely improve on the IAM rules when I create them. The stability can also be better.
What do you like most about Tenable Cloud Security?
The solution’s vulnerability management feature has helped us identify and mitigate risks well.
What needs improvement with Tenable Cloud Security?
Another team uses the tool. Tenable acquired Ermetic. I think Tenable has features, stays up to date, and upgrades every few months. I am not sure of the tool's use case, as another team uses it. I...
What is your primary use case for Tenable Cloud Security?
Right now, I use Tenable as CNAPP, and it is good for the product as it offers enhanced security to users. We did use the tool on the cloud. I am not sure if some models, like CIEM, are available a...
 

Also Known As

Idaptive
Ermetic, Ermetic Identity Governance for AWS
 

Overview

 

Sample Customers

MLB, Citi, Pfizer, SulAmerica, GE Capital, Shiseido
Tyler Technologies, Bilfinger, BarkBox, MongoDB, airSlate, Adama, Latch, Cloudinary, Riskified, AppsFlyer, IntelyCare, Aidoc, 42Dot, and more.
Find out what your peers are saying about CyberArk Identity vs. Tenable Cloud Security and other solutions. Updated: July 2024.
850,747 professionals have used our research since 2012.