No more typing reviews! Try our Samantha, our new voice AI agent.

Entrust Identity Enterprise vs Tenable Cloud Security comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 2, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Entrust Identity Enterprise
Ranking in Identity and Access Management as a Service (IDaaS) (IAMaaS)
27th
Average Rating
8.8
Reviews Sentiment
7.7
Number of Reviews
7
Ranking in other categories
Authentication Systems (18th)
Tenable Cloud Security
Ranking in Identity and Access Management as a Service (IDaaS) (IAMaaS)
15th
Average Rating
8.4
Reviews Sentiment
6.5
Number of Reviews
12
Ranking in other categories
Container Security (23rd), Cloud Workload Protection Platforms (CWPP) (14th), Cloud Security Posture Management (CSPM) (15th), Cloud-Native Application Protection Platforms (CNAPP) (12th), Cloud Infrastructure Entitlement Management (CIEM) (2nd)
 

Mindshare comparison

As of May 2026, in the Identity and Access Management as a Service (IDaaS) (IAMaaS) category, the mindshare of Entrust Identity Enterprise is 1.2%, up from 0.8% compared to the previous year. The mindshare of Tenable Cloud Security is 0.9%, up from 0.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Identity and Access Management as a Service (IDaaS) (IAMaaS) Mindshare Distribution
ProductMindshare (%)
Tenable Cloud Security0.9%
Entrust Identity Enterprise1.2%
Other97.9%
Identity and Access Management as a Service (IDaaS) (IAMaaS)
 

Featured Reviews

Iwegbue Godspower Isioma - PeerSpot reviewer
Cyber Security Analyst at Platview Technologies
Provides strong authentication feature, which requires users to enter a one-time password (OTP)
The main issue I've noticed pertains to setting up the desktop client on virtual machines in Azure, GCP, or AWS, specifically for Entrust Identity Enterprise intended for on-premises use. It works for on-premises, but I'm not sure if it's fully supported in cloud environments. If support were added, it would function perfectly with on-premises configurations. So, it functions well on-premises, but integrating it with cloud services like AWS or Azure could be challenging. There are issues with cloud integrations, such as Azure, AWS, and GCP.
CD
Information Security Architect at WSP
Has significantly improved proactive monitoring through automated asset discovery and seamless integration with cloud environments
Making the system smarter would be beneficial. Adding modules for integration with AWS and Azure would be helpful. Adding capabilities for the scanner to automatically pick up changes and add assets automatically would be valuable. When discussing a big company, it is mandatory to have tools that will assist us rather than waiting for manual input to add hosts. Adding assets manually is prone to mistakes. Humans might forget to add an asset or make errors when adding multiple assets. Taking the human element out of the context and making it more streamlined is the future for security. The human should be involved where expertise is needed, such as analysis and decision-making. Currently, with resource constraints, we need tools to collect and aggregate data, eliminate false positives as much as possible, and present relevant information to employees for action.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The integration matrix of the solution is huge compared to others."
"Entrust Identity Enterprise is a very mature product, it is very reliable and there are many use cases for which you can use the solution."
"This solution is flexible and easy to use for our clients. We use it with different kinds of applications and integrate it with different processes."
"This solution is flexible and easy to use for our clients, and we use it with different kinds of applications and integrate it with different processes."
"Entrust is an enterprise account, and they have a support system. Their training is also top-notch, and they are willing to share their knowledge with their partners."
"I am impressed with Entrust because they are one of the most advanced identity access management companies. Their portfolio of products is well aligned with the CISA zero trust framework. If you compare the features of Entrust products with the CISA pillars of zero trust, you'll see that they're perfectly matched with CISA requirements."
"It is a scalable solution. You can add users and credentials without problems."
"The product's visibility and remediation work fine for me."
"Ermetic can provide super visibility for our cloud environment (we are using AWS), the dashboard is simple to use, the findings provide all of the information you require, it provides detection and remediation, and creating a Jira ticket from a finding is just one click away."
"The product's deployment phase is easy."
"Element is precisely what we needed for close to real-time external surface monitoring, and the automatic integration capabilities, particularly with DNS, Azure, and AWS, are extremely valuable."
"Scanning and reporting are the most valuable features of Tenable Cloud Security"
"Tenable Cloud Security excels in vulnerability detection, one of its strongest features. Another valuable feature is software composition analysis, which highlights and automates the detection of security flaws. Additionally, their knowledge base is excellent; if anything goes wrong, they provide clear guidance on what needs to be done to address specific vulnerabilities."
"The tool alerts us on depreciating performance or deficiencies of our web application. It helps us react on time."
"If you have multi-cloud tenancy using AWS and Azure, you can have a single dashboard where you can onboard all the cloud infrastructure and have visibility into it."
 

Cons

"The product is very costly compared to other alternative solutions."
"It functions well on-premises, but integrating it with cloud services like AWS or Azure could be challenging. There are issues with cloud integrations, such as Azure, AWS, and GCP."
"It would be better if the on-prem Entrust Identity Enterprise solution could have the same features as the cloud version because the latter is easier to use."
"I would like to improve the tool's implementation and pricing."
"We are introducing new processes and are migrating to a new version. Once we explore new functionalities, we'll be able to assess what could be improved."
"I didn't find anything that wasn't useful or needed to be added."
"There is a need for the support team to improve their response time since it is one of the areas where the product's technical team has certain shortcomings."
"In my experience, Tenable Cloud Security is not very stable."
"We still maintain Tenable Cloud Security but have reduced the number of licenses. We now use it occasionally to validate specific items rather than monitoring the entire surface, for which we use Element."
"The product must provide more features."
"I have faced several bug incidents with the solution"
"I do think there might be room for more integrations. This could allow for further customization and flexibility, essentially offering different functionality options to accommodate various budgets."
"Due to its robust nature, the platform's adoption can be overwhelming initially. However, once organizations start using it, they tend to get used to it. I haven't had much direct interaction with the support team, but some partners have reported a desire for better support for the product."
 

Pricing and Cost Advice

"It's worth the money."
"I would rate the product's pricing a five out of ten."
"The subscription could be yearly or monthly, depending upon your choice."
"The tool's pricing is fair."
"The tool's price is good compared to other brands. The tool's subscription is for a year."
"There is a need to opt for a subscription-based pricing model to use Tenable Cloud Security. I rate the product price an eight on a scale of one to ten, where one is low price and ten is high price."
report
Use our free recommendation engine to learn which Identity and Access Management as a Service (IDaaS) (IAMaaS) solutions are best for your needs.
894,738 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Performing Arts
10%
Construction Company
9%
Government
8%
Financial Services Firm
7%
Government
11%
Financial Services Firm
10%
Manufacturing Company
9%
Computer Software Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business5
Midsize Enterprise1
Large Enterprise2
By reviewers
Company SizeCount
Small Business5
Midsize Enterprise2
Large Enterprise5
 

Questions from the Community

Ask a question
Earn 20 points
What needs improvement with Tenable Cloud Security?
Making the system smarter would be beneficial. Adding modules for integration with AWS and Azure would be helpful. Adding capabilities for the scanner to automatically pick up changes and add asset...
What is your primary use case for Tenable Cloud Security?
We had other solutions that we used. One solution was that we did not have something exactly similar to what Element is doing. For example, we were using Bitsight, Evelin, and also Tenable Cloud Se...
What is your experience regarding pricing and costs for Ermetic CSPM?
I wasn't involved with the pricing, setup cost and licensing for Tenable Cloud Security.
 

Also Known As

IdentityGuard
Ermetic, Ermetic Identity Governance for AWS
 

Overview

 

Sample Customers

Bank of New Zealand, CRISIL, Banco Mercantil, G_teborg University, Ministry of Economic Development of New Zealand, Ocean Systems, Skanska, Societe Generale, Susquehanna Bancshares
Tyler Technologies, Bilfinger, BarkBox, MongoDB, airSlate, Adama, Latch, Cloudinary, Riskified, AppsFlyer, IntelyCare, Aidoc, 42Dot, and more.
Find out what your peers are saying about Entrust Identity Enterprise vs. Tenable Cloud Security and other solutions. Updated: April 2026.
894,738 professionals have used our research since 2012.