Overview
What is Tenable Identity Exposure?
Tenable Identity Exposure (formerly Tenable.ad and before that Alsid) identifies misconfigurations and flaws in the Active Directory environment to eliminate attack paths before they can be exploited.
Recent Reviews
Leaving a review helps other professionals like you evaluate Vulnerability Management Tools
Be the first one in your network to review Tenable Identity Exposure, and make your voice heard!
Get StartedPricing
Entry-level set up fee?
- No setup fee
Offerings
- Free Trial
- Free/Freemium Version
- Premium Consulting/Integration Services
Would you like us to let the vendor know that you want pricing?
22 people also want pricing
Alternatives Pricing
Product Details
- About
- Integrations
- Tech Details
What is Tenable Identity Exposure?
Tenable Identity Exposure (formerly Tenable.ad and before that Alsid) identifies misconfigurations and flaws in the Active Directory environment to eliminate attack paths before they can be exploited.
The attack path is a route through an environment that attackers could use to successfully monetize poor cyber hygiene. By combining Risk-based Vulnerability Management and Active Directory Security, Tenable Identity Exposure enables users to eliminate these attack paths, ensuring attackers struggle to find a foothold and have no next step if they do.
The attack path is a route through an environment that attackers could use to successfully monetize poor cyber hygiene. By combining Risk-based Vulnerability Management and Active Directory Security, Tenable Identity Exposure enables users to eliminate these attack paths, ensuring attackers struggle to find a foothold and have no next step if they do.
Tenable Identity Exposure is used to find & fix weaknesses in Active Directory before attackers exploit them and detect & respond to attacks in real time. The main capabilities of Tenable Identity Exposure are:
- Uncover any hidden weaknesses within your Active Directory configurations
- Discover the underlying issues threatening AD security
- Dissect each misconfiguration in simple terms
- Get recommended fixes for each issue
- Create custom dashboards to manage AD security to drive risk reduction
- Discover dangerous trust relationships
- Catch every change in AD
- Uncover major attacks per domain in AD
- Visualize every threat from an accurate attack timeline
- Consolidate attack distribution in a single view
- Make the link between AD changes and malicious actions
- Analyze in-depth details of an AD attack
- Explore MITRE ATT&CK ® descriptions directly from detected incidents
Tenable Identity Exposure Integrations
Tenable Identity Exposure Technical Details
Operating Systems | Unspecified |
---|---|
Mobile Application | No |