Introducing G2.ai, the future of software buying.Try now

Tenable Identity Exposure Reviews & Product Details

Tenable Identity Exposure Media

Tenable Identity Exposure Demo - Dashboard
Dashboards providing a visual representation to analyze the global AD security posture
Tenable Identity Exposure Demo - Indicators of Exposures
Indicators of Exposures expose the list of “AD attacks paths” + “AD opened backdoors”. Each IoE uses is own C# module to compute. The IoEs are updated in real time.
Tenable Identity Exposure Demo - “Deviant objects” tab
In each IoE, the “Deviant objects” tab provides the list of deviant objects related to the IoE. For each object, the technical reason, the dangerous attributes & accurate values are highlighted
Tenable Identity Exposure Demo - The Trail Flow structure
The Trail Flow structure catches all the changes made in Active Directory, including the changes made in the NTDS.dit database and the SYSVOL folder
Tenable Identity Exposure Demo - Domains view
All attacks from all domains are listed in a unique, consolidated view. Domains are clickable to go to the single domain dedicated view
Tenable Identity Exposure Demo - Attack Path
Tenable Identity Exposure helps eliminate attack paths that lead to domain domination
Introduction to Tenable Identity Exposure and Identity Aware Exposure Management
Play Tenable Identity Exposure Video
Introduction to Tenable Identity Exposure and Identity Aware Exposure Management
Monitoring Custom Active Directory (AD) Groups
Play Tenable Identity Exposure Video
Monitoring Custom Active Directory (AD) Groups
Detecting and Uncovering Attacks on Active Directory Group Policy
Play Tenable Identity Exposure Video
Detecting and Uncovering Attacks on Active Directory Group Policy
Monitoring Permissions on Sensitive Organization Units
Play Tenable Identity Exposure Video
Monitoring Permissions on Sensitive Organization Units
Product Avatar Image

Have you used Tenable Identity Exposure before?

Answer a few questions to help the Tenable Identity Exposure community

Tenable Identity Exposure Reviews (4)

Reviews

Tenable Identity Exposure Reviews (4)

4.5
4 reviews

Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
AS
Senior System Engineer
Small-Business (50 or fewer emp.)
"Real-Time AD Monitoring That Delivers Immediate Threat Detection"
What do you like best about Tenable Identity Exposure?

Tenable Identity Exposure provides real time visibility and continuous monitoring of Active Directory, which is extremely valuable in large or complex AD environments.

Any unauthorized modification- GPO changes, privilege assignment, object movement or DC changes is detected immediately, reducing breach detection time significantly. Review collected by and hosted on G2.com.

What do you dislike about Tenable Identity Exposure?

Sometimes the platform produces too many findings, including low priority issues, which can overwhelm teams if not properly tuned. Review collected by and hosted on G2.com.

Vikram C.
VC
Security Operations Center Analyst
Enterprise (> 1000 emp.)
"Secure your AD with tenable"
What do you like best about Tenable Identity Exposure?

Tenable identity exposure formerly tenable.ad The Tenable.ad help us to find & mitigate the Vulnerabilities in AD before the attackers can exploit the Vulnerabilities. We can monitor in real time and we can run various tasks like threat hunting, detection, and incident response, etc. Review collected by and hosted on G2.com.

What do you dislike about Tenable Identity Exposure?

Basically it's a new product launch in the market and i found there is no lag in it. But still it could be cost efficient. Review collected by and hosted on G2.com.

RC
Enterprise (> 1000 emp.)
"Harden AD and AAD"
What do you like best about Tenable Identity Exposure?

Easy to deploy and great visibility to what's happening inside crucial system. Review collected by and hosted on G2.com.

What do you dislike about Tenable Identity Exposure?

Right now it serves the purpose and UI can be little improved. Review collected by and hosted on G2.com.

Verified User in Computer Software
CC
Mid-Market (51-1000 emp.)
"one of the best emerging tool to protect AD"
What do you like best about Tenable Identity Exposure?

Easy to roll out,

SAAS efficiency, don't have to manage servers.

ability to monitor and detect exposure.

also recommends actions for every exposure. Review collected by and hosted on G2.com.

What do you dislike about Tenable Identity Exposure?

there are no major dislikes at the moment. only a small impact security score changes. Review collected by and hosted on G2.com.

There are not enough reviews of Tenable Identity Exposure for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Palo Alto Cortex XSIAM Logo
Palo Alto Cortex XSIAM
4.3
(473)
Product Description: Palo Alto Networks' Cortex XSIAM is an AI-driven security operations platform designed to transform traditional Security Operations Centers by integrating and automating key functions such as data centralization, threat detection, and incident response. By leveraging machine learning and automation, it enables organizations to detect and respond to threats more efficiently, reducing manual workloads and improving overall security posture. Key Features and Functionality: - Data Centralization: Aggregates data from various sources into a unified platform, providing comprehensive visibility across the enterprise. - AI-Powered Threat Detection: Utilizes machine learning algorithms to identify anomalies and potential threats in real-time. - Automated Incident Response: Streamlines response processes through automation, enabling rapid mitigation of security incidents. - Integrated SOC Capabilities: Combines functions such as Extended Detection and Response , Security Orchestration, Automation, and Response , Attack Surface Management , and Security Information and Event Management into a cohesive platform, eliminating the need for multiple disparate tools. - Scalability: Designed to handle large volumes of data and adapt to the evolving needs of modern enterprises. Primary Value and Problem Solved: Cortex XSIAM addresses the challenges of disjointed data, weak threat defense, and heavy reliance on manual work in traditional SOCs. By centralizing data and automating security operations, it simplifies processes, enhances threat detection accuracy, and accelerates incident response times. This transformation enables organizations to proactively outpace threats, reduce operational costs, and achieve a more robust security posture.
2
Wiz Logo
Wiz
4.7
(738)
Wiz is a CNAPP that consolidates CSPM, KSPM, CWPP, vulnerability management, IaC scanning, CIEM, DSPM, and container and Kubernetes security into a single platform.
3
CloudBees Logo
CloudBees
4.4
(623)
Enabling the world’s biggest and brightest companies to transition from incoherent, disconnected DevOps to self-service, fast, secure workflows connecting software delivery to business outcomes.
4
FortiCNAPP Logo
FortiCNAPP
4.4
(384)
FortiCNAPP is a comprehensive Cloud-Native Application Protection Platform (CNAPP) that consolidates Cloud Security Posture Management (CSPM), Cloud Workload Protection (CWPP), Cloud Infrastructure Entitlement Management (CIEM), Kubernetes security, and compliance into a single solution. Using AI-based anomaly detection and behavioral analytics, FortiCNAPP continuously monitors cloud environments to identify misconfigurations, vulnerabilities, and active threats in real time. The platform supports agentless and agent-based deployment models, ensuring flexible coverage across diverse architectures. FortiCNAPP also integrates with the Fortinet Security Fabric, correlating cloud data with network and endpoint insights from FortiGuard, FortiSOAR, and more, delivering full-stack threat context, faster remediation, and unified risk management.
5
Sumo Logic Logo
Sumo Logic
4.3
(363)
Sumo Logic enables enterprises to build analytical power that transforms daily operations into intelligent business decisions
6
Coralogix Logo
Coralogix
4.6
(329)
Coralogix is a stateful streaming data platform that provides real-time insights and long-term trend analysis with no reliance on storage or indexing, solving the monitoring challenges of data growth in large scale systems.
7
Microsoft Defender for Cloud Logo
Microsoft Defender for Cloud
4.4
(303)
Azure Security Center provides security management and threat protection across your hybrid cloud workloads. It allows you to prevent, detect, and respond to security threats with increased visibility.
8
Arctic Wolf Logo
Arctic Wolf
4.7
(275)
Arctic Wolf provides Cyber-SOC as a service, designed to make every link in the security chain stronger.
9
Cisco Vulnerability Management (formerly Kenna.VM) Logo
Cisco Vulnerability Management (formerly Kenna.VM)
4.3
(217)
Cisco Vulnerability Management (formerly Kenna.VM), the original SaaS risk-based vulnerability management platform, prioritizes vulnerabilities that pose a real risk, enabling Security and IT teams to focus their limited resources and remediate more efficiently. Cisco’s data science-driven prioritization evaluates both enterprise data and a wealth of data on real-world exploit activity and translates that context into actionable intelligence to guide remediation.
10
Coro Cybersecurity Logo
Coro Cybersecurity
4.7
(217)
Monitors your cloud applications for data leaks, cyber-threats and regulatory violations that put your business at risk.
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
Product Avatar Image