No more typing reviews! Try our Samantha, our new voice AI agent.

CyberArk Secure Cloud Access vs Tenable Cloud Security comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Mar 29, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

CyberArk Secure Cloud Access
Ranking in Cloud Infrastructure Entitlement Management (CIEM)
7th
Average Rating
8.4
Reviews Sentiment
5.7
Number of Reviews
6
Ranking in other categories
Cloud Access Security Brokers (CASB) (16th)
Tenable Cloud Security
Ranking in Cloud Infrastructure Entitlement Management (CIEM)
3rd
Average Rating
8.4
Reviews Sentiment
6.5
Number of Reviews
12
Ranking in other categories
Identity and Access Management as a Service (IDaaS) (IAMaaS) (13th), Container Security (22nd), Cloud Workload Protection Platforms (CWPP) (13th), Cloud Security Posture Management (CSPM) (16th), Cloud-Native Application Protection Platforms (CNAPP) (11th)
 

Mindshare comparison

As of March 2026, in the Cloud Infrastructure Entitlement Management (CIEM) category, the mindshare of CyberArk Secure Cloud Access is 3.9%. The mindshare of Tenable Cloud Security is 14.3%, down from 25.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Cloud Infrastructure Entitlement Management (CIEM) Mindshare Distribution
ProductMindshare (%)
Tenable Cloud Security14.3%
CyberArk Secure Cloud Access3.9%
Other81.8%
Cloud Infrastructure Entitlement Management (CIEM)
 

Featured Reviews

Manojkumar Reddy - PeerSpot reviewer
Associate Technology Consultant at a tech vendor with 10,001+ employees
Centralized cloud access has strengthened identity control and simplified keyless logins
The best feature of CyberArk Secure Cloud Access is that private keys can be configured once and users can log in using CyberArk credentials. Instead of providing the private key every time into the system, it is not needed. With CyberArk, we do not require it and can directly use CyberArk credentials to access the virtual machines or run the pipelines. Using CyberArk credentials instead of private keys has made things easier for our team because previously every user had to remember the private key and store it somewhere else and insert it whenever they attempted to log into the server. This was cumbersome. Instead, organizations use CyberArk to configure the private keys, which helps because it is no longer required for users to store it on their system or somewhere else to maintain security. This additionally prevents users without access to the server from logging in. This feature of CyberArk Secure Cloud Access also reduces time and dependency on other people. Once a user is given access, they can be tracked anytime and anywhere. Access is revocable whenever people leave the organization. CyberArk Secure Cloud Access has positively impacted our organization because we have observed many changes. One significant impact is that since implementing it, the dependency on people has drastically been reduced. Additionally, we do not need to log in or store the private keys every time as they can be automatically configured.
CD
Information Security Architect at WSP
Has significantly improved proactive monitoring through automated asset discovery and seamless integration with cloud environments
Making the system smarter would be beneficial. Adding modules for integration with AWS and Azure would be helpful. Adding capabilities for the scanner to automatically pick up changes and add assets automatically would be valuable. When discussing a big company, it is mandatory to have tools that will assist us rather than waiting for manual input to add hosts. Adding assets manually is prone to mistakes. Humans might forget to add an asset or make errors when adding multiple assets. Taking the human element out of the context and making it more streamlined is the future for security. The human should be involved where expertise is needed, such as analysis and decision-making. Currently, with resource constraints, we need tools to collect and aggregate data, eliminate false positives as much as possible, and present relevant information to employees for action.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"CyberArk Secure Cloud Access is a good product that is well positioned in the market as an enhancement that provides new possibilities beyond the classical PAM solution, for which CyberArk is most recognizable with its classical on-premises PAM."
"Their presence in the European market and the cloud-based SaaS consumption model is the most exciting aspect for customers."
"We were partners and a Tier 1 partner with CyberArk Secure Cloud Access, so the support was very high."
"The use of dynamic role-based access controls enhances our organization's cloud security as it is part of the controls that we require to meet our TFL obligations."
"My advice to others looking into using CyberArk Secure Cloud Access is that it is a must-go product if they want to have a secure platform and secure product, and integrate it with the different products that the organization is using or virtual machines."
"My advice to others looking into using CyberArk Secure Cloud Access is that it is a must-go product if they want to have a secure platform and secure product, and integrate it with the different products that the organization is using or virtual machines."
"CyberArk Secure Cloud Access offers unmatched security features, essential for critical sectors like finance and banking."
"Ermetic can provide super visibility for our cloud environment (we are using AWS), the dashboard is simple to use, the findings provide all of the information you require, it provides detection and remediation, and creating a Jira ticket from a finding is just one click away."
"The key benefit lies in having the largest and most up-to-date database. When it comes to using any Tenable product, it excels in finding vulnerabilities and providing analytics."
"The product's visibility and remediation work fine for me."
"Element is precisely what we needed for close to real-time external surface monitoring, and the automatic integration capabilities, particularly with DNS, Azure, and AWS, are extremely valuable."
"Scanning and reporting are the most valuable features of Tenable Cloud Security"
"The product's deployment phase is easy."
"The solution’s vulnerability management feature has helped us identify and mitigate risks well."
"The analytical and reporting capabilities are pretty straightforward and show every transaction and major attempt to attack the application in the cloud."
 

Cons

"CyberArk Secure Cloud Access involves substantial effort when performing on-premises deployments."
"The efficacy of the solution is more or less specific to particular use cases rather than generic use cases."
"The customization of CyberArk Secure Cloud Access could be improved because I found scenarios where I could not provide the correct configuration due to insufficient options available."
"CyberArk Secure Cloud Access has limitations in support for on-premise teams. When issues arise with the VPN portal or the frontend, the admin team must directly engage the vendor, which can be time-consuming."
"I find the pricing definitely expensive, and it is something that we are debating as to whether we will continue longer term with CyberArk, but at the moment, it is the platform that is there and it is being rolled out to meet our TFL obligations, so it will continue, but there is significant discussion around the cost of the licenses."
"If Tenable Cloud Security offers a complete Cnapp solution with CWP, CIEM, and Waap security, it will be able to compete with other competitors."
"I do think there might be room for more integrations. This could allow for further customization and flexibility, essentially offering different functionality options to accommodate various budgets."
"I didn't find anything that wasn't useful or needed to be added."
"Ermetic needs to improve its security scanning. I would like to see more dynamic graphical forms."
"I have faced several bug incidents with the solution"
"The product must provide more features."
"There is a need for the support team to improve their response time since it is one of the areas where the product's technical team has certain shortcomings."
"We still maintain Tenable Cloud Security but have reduced the number of licenses. We now use it occasionally to validate specific items rather than monitoring the entire surface, for which we use Element."
 

Pricing and Cost Advice

Information not available
"The tool's price is good compared to other brands. The tool's subscription is for a year."
"The tool's pricing is fair."
"There is a need to opt for a subscription-based pricing model to use Tenable Cloud Security. I rate the product price an eight on a scale of one to ten, where one is low price and ten is high price."
report
Use our free recommendation engine to learn which Cloud Infrastructure Entitlement Management (CIEM) solutions are best for your needs.
885,311 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
No data available
Government
12%
Computer Software Company
10%
Financial Services Firm
9%
Manufacturing Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business4
Large Enterprise3
By reviewers
Company SizeCount
Small Business5
Midsize Enterprise2
Large Enterprise5
 

Questions from the Community

What is your experience regarding pricing and costs for CyberArk Secure Cloud Access?
The experience with pricing, setup cost, and licensing for CyberArk Secure Cloud Access is that the setup cost initially will be higher as it needs to be integrated with different applications that...
What needs improvement with CyberArk Secure Cloud Access?
The customization of CyberArk Secure Cloud Access could be improved because I found scenarios where I could not provide the correct configuration due to insufficient options available. I understand...
What is your primary use case for CyberArk Secure Cloud Access?
As a distributor, I sell CyberArk Secure Cloud Access to partners and then to customers. I don't have the products deployed in production. I maintain a lab that I use for presentations and demos. I...
What do you like most about Tenable Cloud Security?
The solution’s vulnerability management feature has helped us identify and mitigate risks well.
What needs improvement with Tenable Cloud Security?
Making the system smarter would be beneficial. Adding modules for integration with AWS and Azure would be helpful. Adding capabilities for the scanner to automatically pick up changes and add asset...
What is your primary use case for Tenable Cloud Security?
We had other solutions that we used. One solution was that we did not have something exactly similar to what Element is doing. For example, we were using Bitsight, Evelin, and also Tenable Cloud Se...
 

Also Known As

No data available
Ermetic, Ermetic Identity Governance for AWS
 

Overview

 

Sample Customers

Information Not Available
Tyler Technologies, Bilfinger, BarkBox, MongoDB, airSlate, Adama, Latch, Cloudinary, Riskified, AppsFlyer, IntelyCare, Aidoc, 42Dot, and more.
Find out what your peers are saying about CyberArk Secure Cloud Access vs. Tenable Cloud Security and other solutions. Updated: February 2026.
885,311 professionals have used our research since 2012.