Best Software for 2025 is now live!
Show rating breakdown
Save to My Lists
Paid
Claimed

Tenable Identity Exposure Reviews & Product Details

Tenable Identity Exposure Overview

What is Tenable Identity Exposure?

Tenable Identity Exposure (formerly Tenable.ad) is a fast, agentless Active Directory security solution that allows you to see everything in your complex Active Directory and Entra ID environments, predict what matters to reduce risk and eliminate attack paths before attackers exploit them. Take control of your identity security to find and fix flaws before they become business-impacting issues.

Tenable Identity Exposure Details
Product Website
Languages Supported
English, French, Japanese, Chinese (Simplified)
Show LessShow More
Product Description

Behind every breach headline is an insecure Active Directory (AD) deployment. AD has become the favored target for attackers to elevate privileges and facilitate lateral movement through leveraging known flaws and misconfigurations. Unfortunately, most organizations struggle with Active Directory security due to misconfigurations piling up as domains increase in complexity, leaving security teams unable to find and fix flaws before they become business-impacting issues. Tenable.ad enables you to see everything, predict what matters, and act to address risk in Active Directory to disrupt attack paths before attackers exploit them.


Seller Details
Seller
Tenable
Company Website
HQ Location
Columbia, MD
Twitter
@TenableSecurity
87,017 Twitter followers
LinkedIn® Page
www.linkedin.com
2,154 employees on LinkedIn®
Ownership
NASDAQ: TENB
Description

Tenable, the Exposure Management company, empowers organizations to understand and reduce cyber risk.


AA
Overview Provided by:

Recent Tenable Identity Exposure Reviews

Vikram C.
VC
Vikram C.Enterprise (> 1000 emp.)
4.0 out of 5
"Secure your AD with tenable"
Tenable identity exposure formerly tenable.ad The Tenable.ad help us to find & mitigate the Vulnerabilities in AD before the attackers can exploit ...
RC
Ravi C.Enterprise (> 1000 emp.)
5.0 out of 5
"Harden AD and AAD"
Easy to deploy and great visibility to what's happening inside crucial system.
Verified User
C
Verified UserMid-Market (51-1000 emp.)
4.5 out of 5
"one of the best emerging tool to protect AD"
Easy to roll out, SAAS efficiency, don't have to manage servers. ability to monitor and detect exposure. also recommends actions for every exp...
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
0 people requested security information

Tenable Identity Exposure Media

Tenable Identity Exposure Demo - Dashboard
Dashboards providing a visual representation to analyze the global AD security posture
Tenable Identity Exposure Demo - Indicators of Exposures
Indicators of Exposures expose the list of “AD attacks paths” + “AD opened backdoors”. Each IoE uses is own C# module to compute. The IoEs are updated in real time.
Tenable Identity Exposure Demo - “Deviant objects” tab
In each IoE, the “Deviant objects” tab provides the list of deviant objects related to the IoE. For each object, the technical reason, the dangerous attributes & accurate values are highlighted
Tenable Identity Exposure Demo - The Trail Flow structure
The Trail Flow structure catches all the changes made in Active Directory, including the changes made in the NTDS.dit database and the SYSVOL folder
Tenable Identity Exposure Demo - Domains view
All attacks from all domains are listed in a unique, consolidated view. Domains are clickable to go to the single domain dedicated view
Tenable Identity Exposure Demo - Attack Path
Tenable Identity Exposure helps eliminate attack paths that lead to domain domination
Introduction to Tenable Identity Exposure and Identity Aware Exposure Management
Play Tenable Identity Exposure Video
Introduction to Tenable Identity Exposure and Identity Aware Exposure Management
Monitoring Custom Active Directory (AD) Groups
Play Tenable Identity Exposure Video
Monitoring Custom Active Directory (AD) Groups
Detecting and Uncovering Attacks on Active Directory Group Policy
Play Tenable Identity Exposure Video
Detecting and Uncovering Attacks on Active Directory Group Policy
Monitoring Permissions on Sensitive Organization Units
Play Tenable Identity Exposure Video
Monitoring Permissions on Sensitive Organization Units

Official Downloads

Answer a few questions to help the Tenable Identity Exposure community
Have you used Tenable Identity Exposure before?
Yes

3 Tenable Identity Exposure Reviews

4.5 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
3 Tenable Identity Exposure Reviews
4.5 out of 5
3 Tenable Identity Exposure Reviews
4.5 out of 5

Tenable Identity Exposure Pros and Cons

How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cons
G2 reviews are authentic and verified.
Vikram C.
VC
Security Operations Center Analyst
Enterprise(> 1000 emp.)
Validated Reviewer
Review source: G2 invite
Incentivized Review
(Original )Information
What do you like best about Tenable Identity Exposure?

Tenable identity exposure formerly tenable.ad The Tenable.ad help us to find & mitigate the Vulnerabilities in AD before the attackers can exploit the Vulnerabilities. We can monitor in real time and we can run various tasks like threat hunting, detection, and incident response, etc. Review collected by and hosted on G2.com.

What do you dislike about Tenable Identity Exposure?

Basically it's a new product launch in the market and i found there is no lag in it. But still it could be cost efficient. Review collected by and hosted on G2.com.

Recommendations to others considering Tenable Identity Exposure:

It is best Saas product with security. Review collected by and hosted on G2.com.

What problems is Tenable Identity Exposure solving and how is that benefiting you?

We are protecting the Database, through this product. We can easily find and fix Active Directory vulnerabilities, to eliminate attack paths, prevent lateral movement, and stop privilege escalation before a breach happens. Review collected by and hosted on G2.com.

RC
Enterprise(> 1000 emp.)
Validated Reviewer
Verified Current User
Review source: Organic
What do you like best about Tenable Identity Exposure?

Easy to deploy and great visibility to what's happening inside crucial system. Review collected by and hosted on G2.com.

What do you dislike about Tenable Identity Exposure?

Right now it serves the purpose and UI can be little improved. Review collected by and hosted on G2.com.

What problems is Tenable Identity Exposure solving and how is that benefiting you?

Its helping us solve things we can look into in AD/AAD which are difficult to find. Review collected by and hosted on G2.com.

Verified User in Computer Software
CC
Mid-Market(51-1000 emp.)
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about Tenable Identity Exposure?

Easy to roll out,

SAAS efficiency, don't have to manage servers.

ability to monitor and detect exposure.

also recommends actions for every exposure. Review collected by and hosted on G2.com.

What do you dislike about Tenable Identity Exposure?

there are no major dislikes at the moment. only a small impact security score changes. Review collected by and hosted on G2.com.

What problems is Tenable Identity Exposure solving and how is that benefiting you?

making it easier to manage AD on a saas-based environment. It is mostly plug and play. Review collected by and hosted on G2.com.

There are not enough reviews of Tenable Identity Exposure for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Palo Alto Cortex XSIAM Logo
Palo Alto Cortex XSIAM
4.3
(474)
2
Wiz Logo
Wiz
4.7
(697)
Wiz is a CNAPP that consolidates CSPM, KSPM, CWPP, vulnerability management, IaC scanning, CIEM, DSPM, and container and Kubernetes security into a single platform.
3
CloudBees Logo
CloudBees
4.4
(621)
Enabling the world’s biggest and brightest companies to transition from incoherent, disconnected DevOps to self-service, fast, secure workflows connecting software delivery to business outcomes.
4
Lacework Logo
Lacework
4.3
(381)
Lacework offers the data-driven security platform for the cloud, and is the leading cloud-native application protection platform (CNAPP) solution. The Polygraph Data Platform is purpose-built with a single detection engine, user interface, and API framework. With the Platform, your team only needs to learn one system for all of your cloud and workload protections, leading to tool consolidation, greater organizational efficiencies, and cost savings. Only Lacework can collect, analyze, and accurately correlate data — without requiring manually written rules — across your organizations' AWS, Azure, Google Cloud, and Kubernetes environments, and narrow it down to the handful of security events that matter. By taking a data-driven approach to security, the more data you put in, the smarter the Platform gets. This automated intelligence drives better efficacy and a higher return on your investment. Security and DevOps teams around the world trust Lacework to secure cloud-native applications across the full lifecycle from code to cloud.
5
Sumo Logic Logo
Sumo Logic
4.3
(323)
Sumo Logic enables enterprises to build analytical power that transforms daily operations into intelligent business decisions
6
Microsoft Defender for Cloud Logo
Microsoft Defender for Cloud
4.4
(302)
Azure Security Center provides security management and threat protection across your hybrid cloud workloads. It allows you to prevent, detect, and respond to security threats with increased visibility.
7
Coralogix Logo
Coralogix
4.6
(226)
Coralogix is a stateful streaming data platform that provides real-time insights and long-term trend analysis with no reliance on storage or indexing, solving the monitoring challenges of data growth in large scale systems.
8
Cisco Vulnerability Management (formerly Kenna.VM) Logo
Cisco Vulnerability Management (formerly Kenna.VM)
4.3
(217)
Cisco Vulnerability Management (formerly Kenna.VM), the original SaaS risk-based vulnerability management platform, prioritizes vulnerabilities that pose a real risk, enabling Security and IT teams to focus their limited resources and remediate more efficiently. Cisco’s data science-driven prioritization evaluates both enterprise data and a wealth of data on real-world exploit activity and translates that context into actionable intelligence to guide remediation.
9
Coro Cybersecurity Logo
Coro Cybersecurity
4.7
(205)
Monitors your cloud applications for data leaks, cyber-threats and regulatory violations that put your business at risk.
10
Qualys VMDR Logo
Qualys VMDR
4.4
(166)
Discover, assess, prioritize, and patch critical vulnerabilities in real time and across your global hybrid-IT landscape — all from a single solution.
Show More