Select your language

Home arrow-right ... arrow-right Cloud Security Software arrow-right Cloud Security Monitoring and Analytics Software arrow-right Tenable Identity Exposure

We've compiled a list of 26 free and paid alternatives to Tenable Identity Exposure. The primary competitors include Cloudflare, Datadog. In addition to these, users also draw comparisons between Tenable Identity Exposure and Tenable Cloud Security, Tenable Vulnerability Management, Tenable One. Also you can look at other similar options here: Cloud Security Software, Cloud Security Monitoring and Analytics Software.


Cloudflare is a software-as-a-service hosted front-end transparent proxy designed to be put in...

Datadog is a monitoring service for IT, Dev & Ops teams who write and run applications at...

Tenable Cloud Security is a user-friendly, comprehensive CNAPP solution that simplifies multi-cloud security (AWS, Azure, GCP) and enables efficient identification and remediation of accurately prioritized risks. It offers Cloud Security Posture Man…

Tenable Vulnerability Management
Free Trial Subscription

Strengthen your vulnerability management approach with Tenable's robust solution. Gain deep insights into your attack surface, prioritize critical vulnerabilities, and respond promptly to threats. Utilize continuous assessment, extensive coverage, a…

Tenable One
Subscription

Tenable One is a trusted exposure management platform that converts technical asset, vulnerability, and threat data into actionable insights for security professionals. With broad coverage across IT, OT, IoT, cloud resources, and more, coupled with …

Tenable Security Center, an on-premises managed solution, leverages Nessus technology to offer vulnerability coverage. It provides a risk-based perspective of your IT, security, and compliance posture, enabling rapid identification, investigation, a…

Microsoft Defender for Cloud
Free Trial Subscription

Microsoft Defender for Cloud is an integrated security platform for Microsoft cloud services. It provides monitoring, protection, and threat detection for virtual machines, storage, and networks.

Container Security from Tenable provides a proactive approach to securing container workloads, offering unmatched visibility, context, and prioritization. With features like registry scanning, vulnerability assessment, malware detection, and policy …

Duo Security
Free Free Trial Subscription

Duo Security by Cisco is a user-centric zero-trust security platform employing two-factor authentication to safeguard access to sensitive data for all users, devices, and applications.

Coro Cybersecurity
Free Free Trial Subscription

Coro provides comprehensive protection that enables organizations to defend against malware, ransomware, phishing, bots, account takeover and malicious behavior on devices, for users and cloud applications.

Tenable Identity Exposure is an advanced, agentless solution that safeguards Active Directory (AD) and Azure AD environments. It enables you to quickly discover and remediate vulnerabilities using Tenable's Identity Risk Score, detect and respond to real-time AD attacks, and gain valuable insights to strengthen your SIEM, SOC, or SOAR capabilities. Minimize attack paths and proactively manage identity risks to protect your organization from cyber threats.

Tenable Identity Exposure Platforms

tick-square Web-Based

Tenable Identity Exposure Video and Screenshots

Tenable Identity Exposure Features

tick-square Intrusion Detection System
tick-square Cloud Application Security
tick-square Authentication
tick-square Active Directory Integration
tick-square Behavioral Analytics
tick-square Vulnerability Scanning
tick-square Risk Alerts
tick-square Threat Response
tick-square Threat Intelligence
tick-square Application Security
tick-square Anomaly/Malware Detection
tick-square Data Security
tick-square Monitoring
tick-square Customizable Reports
tick-square Audit Management
tick-square Compliance Management
tick-square Activity Tracking
tick-square Access Controls/Permissions
tick-square Reporting/Analytics
tick-square User Management
tick-square Audit Trail
tick-square Activity Monitoring
tick-square Incident management
tick-square Encryption
tick-square Real-time monitoring

Top Tenable Identity Exposure Alternatives

Share your opinion about the software, leave a review and help make it even better!

Suggest Changes

Your Feedback

Select a rating
Please select a rating

Your vote has been counted.

Do you have experience using this software?