

Okta Platform and Tenable Cloud Security compete in the cloud security and identity management domain. Okta Platform seems to possess an advantage due to user satisfaction with pricing and support, whereas Tenable offers enhanced features that justify its cost.
Features: Okta Platform provides secure identity management, extensive app integrations, and adaptive multi-factor authentication. Tenable Cloud Security is noted for comprehensive vulnerability management, cloud scanning capabilities, and real-time threat detection.
Room for Improvement: Okta Platform can enhance its real-time threat detection, expand its vulnerability management capabilities, and offer more detailed security analytics. Tenable Cloud Security could improve ease of integration with external apps, streamline its deployment process, and offer more flexible pricing options.
Ease of Deployment and Customer Service: Okta Platform is praised for straightforward deployment and responsive customer support, aiding quick onboarding. Tenable Cloud Security, though more complex, benefits from detailed documentation and professional training, making its setup demanding but powerful.
Pricing and ROI: Okta Platform offers competitive setup costs, resulting in quicker ROI through effective identity management. Tenable Cloud Security requires higher upfront investment, delivering high ROI via advanced security features. Despite Tenable’s higher costs, its enhanced security measures provide value.
We have our dashboard to log in via Okta Workforce Identity.
It has saved approximately 50 to 80 percent of our time.
We have seen a 60% reduction in password reset help desk tickets.
They are very supportive; they just open a ticket, and they support us very professionally.
We had an issue a couple of years ago that was swiftly resolved by the support team, showing their efficiency.
We had an issue with the Okta Workforce Identity dashboard once in 2023 when we had an outage, but it recovered in a few minutes.
With Element, if you need a feature, you can discuss it with them, and if implementation is possible, you will have that feature within a month or two, depending on complexity.
The scalability part of Okta Customer Identity is fine, there is no blocker and we can upgrade whenever we need.
Okta Workforce Identity is a stable product.
There are no doubts regarding the stability of Okta Customer Identity.
In situations where there was a platform issue, they fixed it immediately and provided a complete explanation for the occurrence.
If there was a fingerprint option, then only the person who has already added their fingerprint on their mobile phone could access it.
Since we started using it in 2019, we have observed numerous enhancements to increase security.
Integration with Active Directory servers, Cisco routers, and switches is not currently available.
Adding capabilities for the scanner to automatically pick up changes and add assets automatically would be valuable.
The only complaint I hear in the market is from resellers that Tenable management team in Brazil doesn't play fair with the channel and resellers.
Despite the cost, it's cheaper than the potential financial loss from a security breach.
Okta Customer Identity is considered cheaper compared to other tools in the market, such as IBM and CyberArk products.
The price of Okta Customer Identity is acceptable.
One of its most valuable features is its easy integration with various applications through its extensive application directory, offering hundreds or thousands of applications ready to configure.
It offers around eight thousand five hundred out-of-the-box connectors, providing an edge over other tools.
For the end user, it is beneficial as they do not have to remember a password or keep the password on a post-it for different applications; they just authenticate once to access several services and service providers.
The automatic integration capabilities, particularly with DNS, Azure, and AWS, are extremely valuable.
Perhaps the best functionalities are related to promoting a deeper analysis of the environment where applications are running in terms of creating a double armor of security to block threats that may come in the cloud with Tenable Cloud Security.
The best features Tenable Cloud Security offers in my experience are automatic scanning, frequent scanning, and automatic finding, which I find valuable.
| Product | Market Share (%) |
|---|---|
| Okta Platform | 7.9% |
| Tenable Cloud Security | 0.8% |
| Other | 91.3% |

| Company Size | Count |
|---|---|
| Small Business | 36 |
| Midsize Enterprise | 21 |
| Large Enterprise | 44 |
| Company Size | Count |
|---|---|
| Small Business | 5 |
| Midsize Enterprise | 2 |
| Large Enterprise | 5 |
Okta Platform provides comprehensive identity and access management, featuring Active Directory Sync, user management, and app auto-provisioning. It ensures security through single sign-on and adaptive multi-factor authentication.
Okta Platform offers advanced integration capabilities, allowing seamless connection with in-house and cloud applications. Security features are robust, incorporating multi-factor authentication and SSO to prevent unauthorized access. Users benefit from its ease of use and the ability to integrate and manage numerous applications effectively. While generally praised, users note areas for improvement, such as high costs and complex setups. Better integrations with on-premises systems and third-party tools are desired along with enhanced error logging and reporting features.
What are Okta's key features?Companies across industries implement Okta to secure user authentication and streamline onboarding processes. It supports access management for both on-premises and cloud applications, synchronizing directories and facilitating SaaS services. Organizations benefit from reduced credential management complexity and improved IT infrastructure compliance.
Tenable Cloud Security is a comprehensive solution designed to help organizations secure their cloud environments across various platforms, including AWS, Azure, and Google Cloud. It offers continuous visibility, compliance management, and threat detection to ensure that cloud infrastructure and applications are protected from vulnerabilities and misconfigurations.
Tenable Cloud Security exemplifies a comprehensive Cloud-Native Application Protection Platform (CNAPP) by providing a unified solution that covers the entire cloud security lifecycle, from development to runtime. This platform is designed to address vulnerabilities, misconfigurations, threats, and compliance risks across multi-cloud environments, making it an essential tool for organizations adopting cloud-native architectures. In practice, Tenable Cloud Security integrates security into the development process through its shift-left approach, particularly with Infrastructure as Code (IaC) security. This ensures that security measures are embedded early in the development lifecycle, allowing teams to identify and mitigate vulnerabilities before they reach production. Once in production, the platform continues to provide real-time visibility into cloud environments, enabling continuous monitoring and proactive threat detection.
The solution's comprehensive protection spans various aspects of cloud security, including the identification and remediation of misconfigurations, automated compliance management, and advanced threat intelligence. By automating these processes, Tenable Cloud Security reduces the manual effort required to manage cloud security, freeing up resources for more strategic initiatives.
What are the key features of Tenable Cloud Security?
What are the benefits of using Tenable Cloud Security?
Tenable Cloud Security is particularly valuable in industries with stringent regulatory requirements, such as finance, healthcare, and retail. For example, in the financial sector, it helps organizations ensure compliance with regulations like PCI-DSS while safeguarding sensitive data across cloud environments.
In summary, Tenable Cloud Security is a robust CNAPP solution that integrates security throughout the cloud lifecycle, providing comprehensive protection and operational efficiency for cloud-native environments.
We monitor all Identity and Access Management as a Service (IDaaS) (IAMaaS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.