Try our new research platform with insights from 80,000+ expert users

Ping Identity Platform vs Tenable Cloud Security comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 2, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
7.4
Ping Identity Platform simplifies identity management, lowers IT overhead, enhances security, improves efficiency, boosts satisfaction, and offers scalability.
Sentiment score
5.3
Tenable Cloud Security is praised for cost-effectiveness, yielding positive ROI and satisfactory financial benefits despite limited specific metrics.
 

Customer Service

Sentiment score
6.6
Ping Identity Platform's customer service is timely and knowledgeable, though occasionally slow for complex issues; self-help resources are commended.
Sentiment score
3.4
Tenable Cloud Security support receives mixed reviews, praised for responsiveness but criticized for delays and inconsistency in assistance.
I have reached out to technical support for troubleshooting SAML certificate mismatches and federated errors between Ping and enterprise apps.
With Element, if you need a feature, you can discuss it with them, and if implementation is possible, you will have that feature within a month or two, depending on complexity.
 

Scalability Issues

Sentiment score
7.5
Ping Identity Platform offers adaptable scalability and performance, varying by configuration, environment, and server setup for different user needs.
Sentiment score
5.8
Tenable Cloud Security is praised for its scalability and adaptability, although complex multi-cloud asset management requires improvements.
 

Stability Issues

Sentiment score
7.9
Ping Identity Platform is stable and reliable, with minor integration challenges and manageable issues, rated 8-10 for stability.
Sentiment score
7.8
Tenable Cloud Security is stable with high user ratings, though some suggest minor improvements despite no major outages.
In situations where there was a platform issue, they fixed it immediately and provided a complete explanation for the occurrence.
 

Room For Improvement

Ping Identity Platform needs enhanced authentication, integration, and user interface improvements for better security and user adoption.
Tenable Cloud Security needs faster operations, improved support, detailed reporting, AI integration, and easier multi-cloud implementation.
I would like to enable ServiceNow Generative AI for auto-diagnosing PingFederate SSO failures and suggest remediation steps.
Currently, with resource constraints, we need tools to collect and aggregate data, eliminate false positives as much as possible, and present relevant information to employees for action.
The only complaint I hear in the market is from resellers that Tenable management team in Brazil doesn't play fair with the channel and resellers.
 

Setup Cost

Ping Identity Platform offers flexible annual pricing, appealing for large enterprises, valued for security and efficiency over competitors.
Users find Tenable Cloud Security's subscription model reasonably priced and well-suited for enterprises, offering good value compared to competitors.
 

Valuable Features

Ping Identity Platform offers robust security with multi-factor authentication, seamless integrations, and customizable single sign-on for enhanced connectivity.
Tenable Cloud Security offers comprehensive vulnerability detection, deep cloud analysis, IAM features, and multi-cloud integration into a single dashboard.
The platform enhances security measures by analyzing multi-factor authentication attempts, highlighting suspicious patterns, and generating compliance reports.
The automatic integration capabilities, particularly with DNS, Azure, and AWS, are extremely valuable.
The best features Tenable Cloud Security offers in my experience are automatic scanning, frequent scanning, and automatic finding, which I find valuable.
Perhaps the best functionalities are related to promoting a deeper analysis of the environment where applications are running in terms of creating a double armor of security to block threats that may come in the cloud with Tenable Cloud Security.
 

Categories and Ranking

Ping Identity Platform
Ranking in Identity and Access Management as a Service (IDaaS) (IAMaaS)
5th
Average Rating
8.2
Reviews Sentiment
7.1
Number of Reviews
29
Ranking in other categories
Single Sign-On (SSO) (3rd), Authentication Systems (7th), Data Governance (8th), Access Management (3rd), Customer Identity and Access Management (CIAM) (2nd), Directory Servers (1st)
Tenable Cloud Security
Ranking in Identity and Access Management as a Service (IDaaS) (IAMaaS)
12th
Average Rating
8.4
Reviews Sentiment
6.5
Number of Reviews
12
Ranking in other categories
Container Security (24th), Cloud Workload Protection Platforms (CWPP) (11th), Cloud Security Posture Management (CSPM) (17th), Cloud-Native Application Protection Platforms (CNAPP) (13th), Cloud Infrastructure Entitlement Management (CIEM) (4th)
 

Mindshare comparison

As of October 2025, in the Identity and Access Management as a Service (IDaaS) (IAMaaS) category, the mindshare of Ping Identity Platform is 5.3%, down from 6.6% compared to the previous year. The mindshare of Tenable Cloud Security is 0.8%, up from 0.6% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Identity and Access Management as a Service (IDaaS) (IAMaaS) Market Share Distribution
ProductMarket Share (%)
Ping Identity Platform5.3%
Tenable Cloud Security0.8%
Other93.9%
Identity and Access Management as a Service (IDaaS) (IAMaaS)
 

Featured Reviews

MAHESHKUMAR7 - PeerSpot reviewer
Offers multi-factor authentication and application support side of PingFederate but application only supports specific protocols
A lot of teams work with technical support, but I work with it for user issues only. You might need support with things like application swaps, application names, and application URLs. I didn't know where to find those in Ping Identity, so I contacted technical support for those issues. The support team is very clever and active. They provide end-to-end support once an issue is created. I have worked with most of the support team. I also work with the support team because I work with the operations team. I provide 24/7 support to production and non-production environments. I coordinate with application and network teams to troubleshoot critical tickets and issues related to Ping Identity solutions.
DragosCernat - PeerSpot reviewer
Has significantly improved proactive monitoring through automated asset discovery and seamless integration with cloud environments
Making the system smarter would be beneficial. Adding modules for integration with AWS and Azure would be helpful. Adding capabilities for the scanner to automatically pick up changes and add assets automatically would be valuable. When discussing a big company, it is mandatory to have tools that will assist us rather than waiting for manual input to add hosts. Adding assets manually is prone to mistakes. Humans might forget to add an asset or make errors when adding multiple assets. Taking the human element out of the context and making it more streamlined is the future for security. The human should be involved where expertise is needed, such as analysis and decision-making. Currently, with resource constraints, we need tools to collect and aggregate data, eliminate false positives as much as possible, and present relevant information to employees for action.
report
Use our free recommendation engine to learn which Identity and Access Management as a Service (IDaaS) (IAMaaS) solutions are best for your needs.
869,202 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
24%
Computer Software Company
9%
Manufacturing Company
9%
Retailer
9%
Computer Software Company
13%
Government
11%
Financial Services Firm
10%
Manufacturing Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business8
Midsize Enterprise2
Large Enterprise20
By reviewers
Company SizeCount
Small Business5
Midsize Enterprise2
Large Enterprise5
 

Questions from the Community

What do you like most about PingID?
The mobile biometric authentication option improved user experience. It's always about security because, with two-factor authentication, it's always a separate device verifying the actual user logg...
What is your experience regarding pricing and costs for PingID?
The pricing is neither too expensive nor too cheap.
What needs improvement with PingID?
The management console needs to be improved. PingID should revise it.
What do you like most about Tenable Cloud Security?
The solution’s vulnerability management feature has helped us identify and mitigate risks well.
What needs improvement with Tenable Cloud Security?
I think Tenable Cloud Security could be improved with more clear licensing. What I would like to see improved with licensing is how they're used in the product. The calculations of what is consider...
What is your primary use case for Tenable Cloud Security?
My main use case for Tenable Cloud Security is managing our security compliance and security posture. I use Tenable Cloud Security for managing compliance and security posture, and we rely on the c...
 

Also Known As

Ping Identity (ID), PingFederate, PingAccess, PingOne, PingDataGovernance, PingDirectory, OpenDJ
Ermetic, Ermetic Identity Governance for AWS
 

Overview

 

Sample Customers

Equinix, Land O'Lakes, CDPHP, Box, International SOS, Opower, VSP, Chevron, Truist, Academy of Art University, Northern Air Cargo, Repsol
Tyler Technologies, Bilfinger, BarkBox, MongoDB, airSlate, Adama, Latch, Cloudinary, Riskified, AppsFlyer, IntelyCare, Aidoc, 42Dot, and more.
Find out what your peers are saying about Ping Identity Platform vs. Tenable Cloud Security and other solutions. Updated: September 2025.
869,202 professionals have used our research since 2012.