Skip to main content
TrustRadius
Tenable Identity Exposure

Tenable Identity Exposure
Formerly Tenable.ad / Alsid

Overview

What is Tenable Identity Exposure?

Tenable Identity Exposure (formerly Tenable.ad and before that Alsid) identifies misconfigurations and flaws in the Active Directory environment to eliminate attack paths before they can be exploited.

Read more
Recent Reviews
TrustRadius

Leaving a review helps other professionals like you evaluate Vulnerability Management Tools

Be the first one in your network to review Tenable Identity Exposure, and make your voice heard!

Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is Tenable Identity Exposure?

Tenable Identity Exposure (formerly Tenable.ad and before that Alsid) identifies misconfigurations and flaws in the Active Directory environment to eliminate attack paths before they can be exploited.

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

22 people also want pricing

Alternatives Pricing

What is Automox?

Automox is an endpoint management solution from the company of the same name in Boulder. Cloud-based and globally available, Automox enforces OS & third-party patch management, security configurations, and custom scripting across Windows, Mac, and Linux from a single console. With it, IT and SecOps…

What is Kaspersky Endpoint Security Cloud?

Kaspersky Endpoint Security Cloud provides a solution for organizations' IT security needs, blocking ransomware, file-less malware, zero-day attacks and other emerging threats. Kaspersky’s cloud-based approach helps users to work securely on any device, and collaborate safely online, at work or at…

Return to navigation

Product Details

What is Tenable Identity Exposure?

Tenable Identity Exposure (formerly Tenable.ad and before that Alsid) identifies misconfigurations and flaws in the Active Directory environment to eliminate attack paths before they can be exploited.

The attack path is a route through an environment that attackers could use to successfully monetize poor cyber hygiene. By combining Risk-based Vulnerability Management and Active Directory Security, Tenable Identity Exposure enables users to eliminate these attack paths, ensuring attackers struggle to find a foothold and have no next step if they do.

Tenable Identity Exposure is used to find & fix weaknesses in Active Directory before attackers exploit them and detect & respond to attacks in real time. The main capabilities of Tenable Identity Exposure are:
  • Uncover any hidden weaknesses within your Active Directory configurations
  • Discover the underlying issues threatening AD security
  • Dissect each misconfiguration in simple terms
  • Get recommended fixes for each issue
  • Create custom dashboards to manage AD security to drive risk reduction
  • Discover dangerous trust relationships
  • Catch every change in AD
  • Uncover major attacks per domain in AD
  • Visualize every threat from an accurate attack timeline
  • Consolidate attack distribution in a single view
  • Make the link between AD changes and malicious actions
  • Analyze in-depth details of an AD attack
  • Explore MITRE ATT&CK ® descriptions directly from detected incidents

Tenable Identity Exposure Integrations

Tenable Identity Exposure Technical Details

Operating SystemsUnspecified
Mobile ApplicationNo
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews

Sorry, no reviews are available for this product yet

Return to navigation