2026 Best Software Awards are here!See the list

Compare Tenable Cloud Security and Thoropass

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
Tenable Cloud Security
Tenable Cloud Security
Star Rating
(37)4.6 out of 5
Market Segments
Mid-Market (58.3% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Tenable Cloud Security
Thoropass
Thoropass
Star Rating
(573)4.7 out of 5
Market Segments
Small-Business (73.0% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Thoropass

Tenable Cloud Security vs Thoropass

When assessing the two solutions, reviewers found Tenable Cloud Security easier to use and administer. Reviewers also felt that Tenable Cloud Security was easier to do business with overall. However, reviewers felt that the products are equally easy to set up.

  • Reviewers felt that Thoropass meets the needs of their business better than Tenable Cloud Security.
  • When comparing quality of ongoing product support, reviewers felt that Thoropass is the preferred option.
  • When assessing product direction, Tenable Cloud Security and Thoropass received similar ratings from our reviewers.
Pricing
Entry-Level Pricing
Tenable Cloud Security
No pricing available
Thoropass
No pricing available
Free Trial
Tenable Cloud Security
No trial information available
Thoropass
No trial information available
Ratings
Meets Requirements
9.1
29
9.3
466
Ease of Use
9.0
30
8.8
472
Ease of Setup
9.0
26
9.0
423
Ease of Admin
9.4
21
9.0
337
Quality of Support
9.0
29
9.5
455
Has the product been a good partner in doing business?
9.6
19
9.5
336
Product Direction (% positive)
9.6
30
9.6
458
Features by Category
Cloud Workload Protection PlatformsHide 10 FeaturesShow 10 Features
Not enough data
Not enough data
Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Operations
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Controls
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
8.4
12
8.9
201
Security
9.4
11
9.2
195
8.0
9
Feature Not Available
6.7
7
8.6
172
8.8
10
8.4
169
Compliance
9.0
10
9.0
178
8.2
10
9.0
175
8.1
8
9.2
183
Administration
8.7
10
9.2
185
8.1
8
9.0
187
8.5
9
8.5
177
8.6
10
Not enough data
Data Protection
7.3
5
Not enough data
8.9
6
Not enough data
8.1
6
Not enough data
8.0
5
Not enough data
8.6
7
Not enough data
Analysis
8.8
8
Not enough data
9.6
8
Not enough data
9.0
7
Not enough data
Administration
8.5
9
Not enough data
8.1
7
Not enough data
9.4
8
Not enough data
Not enough data
Not enough data
Performance
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Network
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Application
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Vulnerability Scanner
Not enough data
Not enough data
Not enough data
Not enough data
Privileged Access Management (PAM)Hide 21 FeaturesShow 21 Features
8.9
7
Not enough data
Administration
9.5
7
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
9.4
6
Not enough data
Not enough data
Not enough data
Functionality
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
8.9
6
Not enough data
9.0
5
Not enough data
8.0
5
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Monitoring
9.0
5
Not enough data
9.3
5
Not enough data
Not enough data
Not enough data
Reporting
Not enough data
Not enough data
8.3
5
Not enough data
Cloud Security Monitoring and AnalyticsHide 13 FeaturesShow 13 Features
Not enough data
Not enough data
Activity Monitoring
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Cloud Security Monitoring and Analytics
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity and Access Management (IAM)Hide 18 FeaturesShow 18 Features
9.0
12
Not enough data
Functionality
9.3
7
Not enough data
8.9
6
Not enough data
9.4
9
Not enough data
9.2
8
Not enough data
9.0
7
Not enough data
8.8
7
Not enough data
Type
9.0
5
Not enough data
9.4
9
Not enough data
Reporting
9.0
8
Not enough data
8.3
9
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Authentication & Authorization - Identity and Access Management (IAM)
Not enough data
Not enough data
Administration & Governance - Identity and Access Management (IAM)
Not enough data
Not enough data
Not enough data
Not enough data
Generative AI - Identity and Access Management (IAM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vendor Security and Privacy AssessmentHide 10 FeaturesShow 10 Features
Not enough data
7.7
166
Functionality
Not enough data
8.1
150
Not enough data
8.7
152
Not enough data
8.5
152
Not enough data
9.0
152
Risk assessment
Not enough data
8.8
154
Not enough data
7.8
134
Not enough data
Feature Not Available
Not enough data
6.1
40
Generative AI - Vendor Security and Privacy Assessment
Not enough data
6.4
35
Not enough data
6.5
34
Cloud Security Posture Management (CSPM)Hide 11 FeaturesShow 11 Features
9.0
10
Not enough data
Configuration
8.7
5
Not enough data
9.2
8
Not enough data
9.5
7
Not enough data
9.0
7
Not enough data
7.7
8
Not enough data
Visibility
8.1
8
Not enough data
9.1
9
Not enough data
Vulnerability Management
9.2
6
Not enough data
9.3
5
Not enough data
9.3
5
Not enough data
9.3
7
Not enough data
Not enough data
8.6
230
Generative AI
Not enough data
6.9
162
Not enough data
6.8
157
Workflows - Audit Management
Not enough data
8.9
124
Not enough data
8.8
127
Not enough data
8.5
125
Not enough data
8.5
126
Not enough data
8.7
128
Documentation - Audit Management
Not enough data
8.9
130
Not enough data
9.2
132
Reporting & Analytics - Audit Management
Not enough data
9.1
131
Not enough data
9.4
129
Not enough data
9.4
130
Cloud Infrastructure Entitlement Management (CIEM)Hide 8 FeaturesShow 8 Features
Not enough data
Not enough data
Access control - Cloud Infrastructure Entitlement Management (CIEM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Monitoring - Cloud Infrastructure Entitlement Management (CIEM)
Not enough data
Not enough data
Not enough data
Not enough data
Auditing - Cloud Infrastructure Entitlement Management (CIEM)
Not enough data
Not enough data
Not enough data
Not enough data
Cloud-Native Application Protection Platform (CNAPP)Hide 11 FeaturesShow 11 Features
7.7
6
Not enough data
Security - Cloud-Native Application Protection Platform (CNAPP)
8.6
6
Not enough data
7.8
6
Not enough data
7.5
6
Not enough data
7.3
5
Not enough data
Artificial Intelligence - Cloud-Native Application Protection Platform (CNAPP)
7.2
6
Not enough data
8.1
6
Not enough data
7.5
6
Not enough data
Cloud Configuration Management - Cloud-Native Application Protection Platform (CNAPP)
7.5
6
Not enough data
8.1
6
Not enough data
Agentic AI - Cloud-Native Application Protection Platform (CNAPP)
6.9
6
Not enough data
8.1
6
Not enough data
AI Security Posture Management (AI-SPM) ToolsHide 9 FeaturesShow 9 Features
Not enough data
Not enough data
Functionality - AI Security Posture Management (AI-SPM) Tools
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Risk Assessment - AI Security Posture Management (AI-SPM) Tools
Not enough data
Not enough data
Not enough data
Not enough data
Governance & Compliance - AI Security Posture Management (AI-SPM) Tools
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
7.3
89
Generative AI - Security Compliance
Not enough data
6.9
84
Not enough data
7.7
87
Reviews
Reviewers' Company Size
Tenable Cloud Security
Tenable Cloud Security
Small-Business(50 or fewer emp.)
2.8%
Mid-Market(51-1000 emp.)
58.3%
Enterprise(> 1000 emp.)
38.9%
Thoropass
Thoropass
Small-Business(50 or fewer emp.)
73.0%
Mid-Market(51-1000 emp.)
26.5%
Enterprise(> 1000 emp.)
0.5%
Reviewers' Industry
Tenable Cloud Security
Tenable Cloud Security
Information Technology and Services
25.0%
Computer Software
19.4%
Financial Services
16.7%
Retail
5.6%
Staffing and Recruiting
2.8%
Other
30.6%
Thoropass
Thoropass
Computer Software
31.6%
Information Technology and Services
15.2%
Financial Services
11.4%
Hospital & Health Care
8.2%
Marketing and Advertising
3.1%
Other
30.5%
Alternatives
Tenable Cloud Security
Tenable Cloud Security Alternatives
Microsoft Defender for Cloud
Microsoft Defender for Cloud
Add Microsoft Defender for Cloud
Wiz
Wiz
Add Wiz
FortiCNAPP
FortiCNAPP
Add FortiCNAPP
Microsoft Entra ID
Microsoft Entra ID
Add Microsoft Entra ID
Thoropass
Thoropass Alternatives
Vanta
Vanta
Add Vanta
Secureframe
Secureframe
Add Secureframe
Drata
Drata
Add Drata
Sprinto
Sprinto
Add Sprinto
Discussions
Tenable Cloud Security
Tenable Cloud Security Discussions
What is Ermetic used for?
1 Comment
VP
Cloud Security Posture ManagementRead more
Monty the Mongoose crying
Tenable Cloud Security has no more discussions with answers
Thoropass
Thoropass Discussions
What is Laika used for?
1 Comment
Kevin H.
KH
Managing compliance activities in a platform to help organise evidence, create workflows with the objective of attaining IT security certifications with SOC2...Read more
Monty the Mongoose crying
Thoropass has no more discussions with answers