Try our new research platform with insights from 80,000+ expert users

Omada Identity vs Tenable Cloud Security comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 2, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
5.6
Omada Identity reduces costs through automation, saving time and improving ROI, despite challenges in quantifying compliance-related ROI.
Sentiment score
5.3
Tenable Cloud Security is financially beneficial, offering cost-effective services and positive outcomes despite lacking specific recent metrics.
If we look at one customer where we initially started, they had about four to ten employees working on IGA, and it is now almost half of it.
principal IGA consultant and partner at Fortigi
Omada Identity has definitely helped us save time when provisioning access for various identities.
Senior Developer at Guidewire Limited
 

Customer Service

Sentiment score
6.6
Omada Identity’s support is responsive and knowledgeable but inconsistent; improvements are needed in documentation and complex issue handling.
Sentiment score
3.4
Tenable Cloud Security support receives mixed reviews with praised efficiency and availability, but some note delayed and inconsistent assistance.
The vendor support needs improvement because we have reported serious incidents that remain unresolved.
Lead Cyber Security Architect at Ernst & Young
Maintenance is necessary, and aside from that, if there are issues with Salesforce cloud, then Omada Identity may go down.
IT Analyst at a manufacturing company with 10,001+ employees
We do not contact their technical support directly because we have a service agreement already in place with them with some dedicated and some non-dedicated resources.
Manager at a manufacturing company with 5,001-10,000 employees
With Element, if you need a feature, you can discuss it with them, and if implementation is possible, you will have that feature within a month or two, depending on complexity.
Information Security Architect at WSP
 

Scalability Issues

Sentiment score
7.7
Omada Identity is praised for scalable integration of cloud and on-prem services, supporting large environments and growing enterprises.
Sentiment score
5.8
Tenable Cloud Security excels in scalability, praised for handling assets efficiently, but faces challenges in larger multi-cloud setups.
The scalability of Omada Identity is excellent; they offer flexible pricing for licenses, accommodating both full accounts and lighter identities, which makes it truly scalable.
Identity Access Management (IAM) Engineer at Draexlmaier
Omada Identity is a top-growing tool that is booming in the market.
IT Analyst at a manufacturing company with 10,001+ employees
Omada Identity's scalability is strong.
principal IGA consultant and partner at Fortigi
 

Stability Issues

Sentiment score
7.6
Omada Identity is reliable and stable, rated highly by users despite minor performance issues and specific component challenges.
Sentiment score
7.8
Tenable Cloud Security is stable and reliable, with high ratings and prompt resolution of minor bugs, say users.
In terms of stability, I rate Omada Identity a nine out of ten.
Identity Access Management (IAM) Engineer at Draexlmaier
We have experienced too many unexpected errors on a daily basis.
Lead Cyber Security Architect at Ernst & Young
Omada Identity is a stable and reliable tool.
IT Analyst at a manufacturing company with 10,001+ employees
In situations where there was a platform issue, they fixed it immediately and provided a complete explanation for the occurrence.
Information Security Architect at WSP
 

Room For Improvement

Omada Identity needs UI, mobile, setup, role management, analytics improvements, error handling, better performance, connectors, and communication upgrades.
Tenable Cloud Security needs improved speed, automation, integration, clearer licensing, better support, and AI-powered features for multi-cloud environments.
The biggest issue, which is the reason why we are transitioning from their product to SailPoint, is the overall user experience.
Manager at a manufacturing company with 5,001-10,000 employees
There is room for improvement in Omada Identity, primarily in customization for administrators; many custom tasks require contacting providers even for simple changes.
Identity Access Management (IAM) Engineer at Draexlmaier
The deployment of Omada Identity is complex; the product is not brilliantly documented.
Lead Cyber Security Architect at Ernst & Young
Adding capabilities for the scanner to automatically pick up changes and add assets automatically would be valuable.
Information Security Architect at WSP
The only complaint I hear in the market is from resellers that Tenable management team in Brazil doesn't play fair with the channel and resellers.
Owner at SUNLIT TECHNOLOGIES
 

Setup Cost

Omada Identity pricing is fair but varies; cloud costs are higher, with negotiation possible for flexible pricing.
Tenable Cloud Security is favorably received for its fair pricing, offering good value for enterprise cloud security solutions.
They are lower than some of their competitors.
Manager at a manufacturing company with 5,001-10,000 employees
the product itself is said to have a good price, although the support can be expensive.
Identity Access Management (IAM) Engineer at Draexlmaier
 

Valuable Features

Omada Identity streamlines identity management with automated provisioning, Microsoft integration, customization, and strong compliance and security features.
Tenable Cloud Security offers comprehensive vulnerability detection, asset management, and integration, enhancing security and compliance with proactive monitoring.
Omada Identity helps automate reviews of access requests and reroutes them to appropriate people, which is what it should do; it really assists in reducing the workload time.
Identity Access Management (IAM) Engineer at Draexlmaier
You can really do it codeless by creating a custom process with the process designer, adding the building blocks of the process designer into the process, and then getting it to work.
principal IGA consultant and partner at Fortigi
Technically, the product does everything one would expect from an identity and access management platform.
Manager at a manufacturing company with 5,001-10,000 employees
The automatic integration capabilities, particularly with DNS, Azure, and AWS, are extremely valuable.
Information Security Architect at WSP
Perhaps the best functionalities are related to promoting a deeper analysis of the environment where applications are running in terms of creating a double armor of security to block threats that may come in the cloud with Tenable Cloud Security.
Owner at SUNLIT TECHNOLOGIES
The best features Tenable Cloud Security offers in my experience are automatic scanning, frequent scanning, and automatic finding, which I find valuable.
Cloud Security Engineer at a tech vendor with 51-200 employees
 

Categories and Ranking

Omada Identity
Ranking in Identity and Access Management as a Service (IDaaS) (IAMaaS)
4th
Average Rating
8.0
Reviews Sentiment
6.7
Number of Reviews
53
Ranking in other categories
User Provisioning Software (4th), Identity Management (IM) (4th), Customer Identity and Access Management (CIAM) (5th)
Tenable Cloud Security
Ranking in Identity and Access Management as a Service (IDaaS) (IAMaaS)
13th
Average Rating
8.4
Reviews Sentiment
6.5
Number of Reviews
12
Ranking in other categories
Container Security (23rd), Cloud Workload Protection Platforms (CWPP) (12th), Cloud Security Posture Management (CSPM) (17th), Cloud-Native Application Protection Platforms (CNAPP) (13th), Cloud Infrastructure Entitlement Management (CIEM) (4th)
 

Mindshare comparison

As of January 2026, in the Identity and Access Management as a Service (IDaaS) (IAMaaS) category, the mindshare of Omada Identity is 2.4%, down from 3.0% compared to the previous year. The mindshare of Tenable Cloud Security is 0.8%, up from 0.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Identity and Access Management as a Service (IDaaS) (IAMaaS) Market Share Distribution
ProductMarket Share (%)
Omada Identity2.4%
Tenable Cloud Security0.8%
Other96.8%
Identity and Access Management as a Service (IDaaS) (IAMaaS)
 

Featured Reviews

Lars Henrik Jensen - PeerSpot reviewer
Lead Cyber Security Architect at Ernst & Young
Faced deployment delays and daily errors but have streamlined access reviews and improved termination processes
The deployment of Omada Identity is complex; the product is not brilliantly documented, and it lacks the same level of documentation that could be found for systems such as SailPoint or Saviynt, making it harder to find material or help online, particularly with Omada Cloud. The system performance of Omada Identity is inconsistent; we've been analyzing this issue together with Omada, but we haven't been able to resolve whether the problem lies on their side or my client's side, which causes long response times and long run times in Omada sometimes. Omada Identity does not help deploy IGA within 12 weeks; the time frame for applying the rapid deployment solution was much longer than expected, and I am unsure if it is built on best practices across all systems. When we receive an error or system message from Omada Identity, it's very hard to decode what it means; we have had serious issues in daily imports that we can't explain, indicating a need for improved stability. The comprehensiveness of out-of-the-box connectors that Omada provides differs; the connectors for Microsoft and Salesforce are good, but for SAP, they are basically non-existent.
CD
Information Security Architect at WSP
Has significantly improved proactive monitoring through automated asset discovery and seamless integration with cloud environments
Making the system smarter would be beneficial. Adding modules for integration with AWS and Azure would be helpful. Adding capabilities for the scanner to automatically pick up changes and add assets automatically would be valuable. When discussing a big company, it is mandatory to have tools that will assist us rather than waiting for manual input to add hosts. Adding assets manually is prone to mistakes. Humans might forget to add an asset or make errors when adding multiple assets. Taking the human element out of the context and making it more streamlined is the future for security. The human should be involved where expertise is needed, such as analysis and decision-making. Currently, with resource constraints, we need tools to collect and aggregate data, eliminate false positives as much as possible, and present relevant information to employees for action.
report
Use our free recommendation engine to learn which Identity and Access Management as a Service (IDaaS) (IAMaaS) solutions are best for your needs.
881,082 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
16%
Manufacturing Company
9%
Computer Software Company
8%
Government
6%
Government
11%
Computer Software Company
11%
Financial Services Firm
10%
Manufacturing Company
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business9
Midsize Enterprise3
Large Enterprise43
By reviewers
Company SizeCount
Small Business5
Midsize Enterprise2
Large Enterprise5
 

Questions from the Community

What do you like most about Omada Identity Cloud?
As an administrator, we benefit from a lot of functionality that is available out of the box, but it is also configurable to meet our specific needs.
What is your experience regarding pricing and costs for Omada Identity Cloud?
Regarding the pricing of Omada Identity, this is not taken care of by me. The price and everything is managed by the organization, particularly by my IT director. Therefore, I am not aware of the e...
What needs improvement with Omada Identity Cloud?
Regarding areas of Omada Identity that could be improved or enhanced, I do not have much idea. As of now, the tool is good, and I haven't seen any bugs or errors. I consider it perfect as of now.
What do you like most about Tenable Cloud Security?
The solution’s vulnerability management feature has helped us identify and mitigate risks well.
What needs improvement with Tenable Cloud Security?
Making the system smarter would be beneficial. Adding modules for integration with AWS and Azure would be helpful. Adding capabilities for the scanner to automatically pick up changes and add asset...
What is your primary use case for Tenable Cloud Security?
We had other solutions that we used. One solution was that we did not have something exactly similar to what Element is doing. For example, we were using Bitsight, Evelin, and also Tenable Cloud Se...
 

Also Known As

Omada Identity Suite, Omada Identity Cloud
Ermetic, Ermetic Identity Governance for AWS
 

Overview

 

Sample Customers

Bayer, ECCO Shoes, Vattenfall, NuStar Energy, Unicredit, Schiphol Group, BMW Group, Deutsche Leasing
Tyler Technologies, Bilfinger, BarkBox, MongoDB, airSlate, Adama, Latch, Cloudinary, Riskified, AppsFlyer, IntelyCare, Aidoc, 42Dot, and more.
Find out what your peers are saying about Omada Identity vs. Tenable Cloud Security and other solutions. Updated: December 2025.
881,082 professionals have used our research since 2012.