We had other solutions that we used. One solution was that we did not have something exactly similar to what Element is doing. For example, we were using Bitsight, Evelin, and also Tenable Cloud Security. However, those products are different. Element was exactly the product we needed to cover close to real-time external surface monitoring. We also used Microsoft Defender for Endpoint, but the Defender product requires substantial manual labor. We were interested in having a tool that would not require too much manual labor and would be more proactive. The Element team is easy to discuss with. They created modules for integrations, such as with DNS. They collect records automatically and add assets to the platform, which is very useful because we do not have to check each day for new records or remove old ones. Their integration with Azure and AWS makes it great for us. It streamlines the process and gives us assurance that all new assets will be automatically added to the platform. I am not entirely sure about monitoring cloud applications as I have not used it extensively for that purpose. That is why we implemented Element and have other tools, as we are not using it exactly for that scope.
Cloud Security Engineer at a tech vendor with 51-200 employees
Real User
Top 20
2025-07-20T23:13:24Z
Jul 20, 2025
My main use case for Tenable Cloud Security is managing our security compliance and security posture. I use Tenable Cloud Security for managing compliance and security posture, and we rely on the compliance reports and findings of our cloud configuration. I don't have anything else to add about my use case or how I use Tenable Cloud Security day-to-day.
They are looking to promote a deeper security strategy with Tenable Cloud Security. Companies are migrating from on-premise to clouds and they must ensure their applications in the cloud will be more safe and secure. Healthcare is most likely the kind of clients we see migrating to Tenable Cloud Security.
Right now, I use Tenable as CNAPP, and it is good for the product as it offers enhanced security to users. We did use the tool on the cloud. I am not sure if some models, like CIEM, are available as a feature for users. When it comes to a module in CNAPP, I think it is fairly good for using and monitoring on the cloud while also being easy to deploy. I am not sure how the tool is used in my company because I got transferred to another team that is involved only in monitoring. I use the reporting part on CNAPP. I only use the tool for customized reports. The tool had a fairly easy way to get customized reports.
Senior System Engineer at a tech consulting company with 10,001+ employees
Real User
Top 20
2024-05-27T04:56:00Z
May 27, 2024
Tenable Cloud Security is used for scanning purposes, including vulnerabilities and remediation. The graphs provided by the solution are unsatisfactory and frequent updates are needed. For instance, suppose you have a specific kernel version of 4.5, and you updated it to version 5.0; the solution still suggests that the older version needs to be fetched and even, in some instances, suggests upgrading to version 5.1. Once the solution implements scans, the records are saved, and a bit of fine-tuning is required for remediation, I have to check manually in a few cases to decrease the number for a few metrics. Sometimes I need to contact the support team to fix bugs.
Tenable Cloud Security essentially falls under the umbrella of cloud security. In cloud security, we have a diverse Tenable portfolio which includes Nessus, Nessus Professional, Nessus Expert, Tenable.io Vulnerability Management, Tenable Security Center, Tenable Cloud Security, Tenable Lumen, Tenable Active Directory, and Tenable One.
Tenable Cloud Security is a comprehensive solution designed to help organizations secure their cloud environments across various platforms, including AWS, Azure, and Google Cloud. It offers continuous visibility, compliance management, and threat detection to ensure that cloud infrastructure and applications are protected from vulnerabilities and misconfigurations.
Tenable Cloud Security exemplifies a comprehensive Cloud-Native Application Protection Platform (CNAPP) by providing a unified...
We had other solutions that we used. One solution was that we did not have something exactly similar to what Element is doing. For example, we were using Bitsight, Evelin, and also Tenable Cloud Security. However, those products are different. Element was exactly the product we needed to cover close to real-time external surface monitoring. We also used Microsoft Defender for Endpoint, but the Defender product requires substantial manual labor. We were interested in having a tool that would not require too much manual labor and would be more proactive. The Element team is easy to discuss with. They created modules for integrations, such as with DNS. They collect records automatically and add assets to the platform, which is very useful because we do not have to check each day for new records or remove old ones. Their integration with Azure and AWS makes it great for us. It streamlines the process and gives us assurance that all new assets will be automatically added to the platform. I am not entirely sure about monitoring cloud applications as I have not used it extensively for that purpose. That is why we implemented Element and have other tools, as we are not using it exactly for that scope.
My main use case for Tenable Cloud Security is managing our security compliance and security posture. I use Tenable Cloud Security for managing compliance and security posture, and we rely on the compliance reports and findings of our cloud configuration. I don't have anything else to add about my use case or how I use Tenable Cloud Security day-to-day.
They are looking to promote a deeper security strategy with Tenable Cloud Security. Companies are migrating from on-premise to clouds and they must ensure their applications in the cloud will be more safe and secure. Healthcare is most likely the kind of clients we see migrating to Tenable Cloud Security.
Right now, I use Tenable as CNAPP, and it is good for the product as it offers enhanced security to users. We did use the tool on the cloud. I am not sure if some models, like CIEM, are available as a feature for users. When it comes to a module in CNAPP, I think it is fairly good for using and monitoring on the cloud while also being easy to deploy. I am not sure how the tool is used in my company because I got transferred to another team that is involved only in monitoring. I use the reporting part on CNAPP. I only use the tool for customized reports. The tool had a fairly easy way to get customized reports.
Tenable Cloud Security is used for scanning purposes, including vulnerabilities and remediation. The graphs provided by the solution are unsatisfactory and frequent updates are needed. For instance, suppose you have a specific kernel version of 4.5, and you updated it to version 5.0; the solution still suggests that the older version needs to be fetched and even, in some instances, suggests upgrading to version 5.1. Once the solution implements scans, the records are saved, and a bit of fine-tuning is required for remediation, I have to check manually in a few cases to decrease the number for a few metrics. Sometimes I need to contact the support team to fix bugs.
The use cases attached to Tenable Cloud Security include compliance verifications for the cloud environment.
We use Ermetic for monitoring and alerting.
Tenable Cloud Security essentially falls under the umbrella of cloud security. In cloud security, we have a diverse Tenable portfolio which includes Nessus, Nessus Professional, Nessus Expert, Tenable.io Vulnerability Management, Tenable Security Center, Tenable Cloud Security, Tenable Lumen, Tenable Active Directory, and Tenable One.