• Skip to Main Navigation
  • Skip to Main Content
  • Skip to Footer
Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070
Tenable
Platform
Solutions
Why Tenable
Resources
Company
Pricing
contact_icon
English Deutsch Français (France) Español (América Latina) Português (Brasil) Italiano
简体中文 繁體中文 日本語 한국어 العربية
Tenable Product Login
Community & Support
Buy Try

Exposure Management

Manage cyber risk with one platform to find, prioritize and eliminate exposures across your attack surface.
Find out more
AI Security
Cloud Security
OT Security
Vulnerability Management
Hexa AI
Identity Security
Patch Management
Attack Surface Management
Web App Scanning
Security Tool Connectors

View all products

Explore By Use Case

Secure AI
Secure OT/IoT
Exposure Management
Cloud Security
Compliance
Vulnerability Management
Asset Inventory
Highly Secure Environments
Secure Data Centers
Zero-Trust

Explore By Industry

Financial Services
Energy
Healthcare
Technology
Education
Government Defense
Retail
Why choose Tenable
Industry recognition
Customer stories
Tenable vs competitors
Report
Tenable is the one clear leader in Exposure Management
See why
Resource library
Exposure management resources
Blog
Research center
Training and certification
Cybersecurity guide
Customer stories
Find a partner
Resources

Exposure management
resource center

Accelerate your exposure management strategy with practical resources and tools.
Explore
About Tenable
Leadership
Investor relations
Tenable ventures
Awards and recognition
Media room
Careers
Engagement and inclusion
Exposure Management Leadership Council
Platform
Solutions
Why Tenable
Resources
Company
Pricing
contact_icon
English Deutsch Français (France) Español (América Latina) Português (Brasil) Italiano
简体中文 繁體中文 日本語 한국어 العربية
Tenable Product Login
Community & Support
Buy Try
Exposure Management
AI Security
Cloud Security
OT Security
Vulnerability Management
Hexa AI
Identity Security
Patch Management
Attack Surface Management
Web App Scanning
Security Tool Connectors

View all products

Explore By Use Case

Secure AI
Secure OT/IoT
Exposure Management
Cloud Security
Compliance
Vulnerability Management
Asset Inventory
Highly Secure Environments
Secure Data Centers
Zero-Trust

Explore By Industry

Financial Services
Energy
Healthcare
Technology
Education
Government Defense
Retail
Why choose Tenable
Industry recognition
Customer stories
Tenable vs competitors
Report
Tenable is the one clear leader in Exposure Management
See why
Resource library
Exposure management resources
Blog
Research center
Training and certification
Cybersecurity guide
Customer stories
Find a partner
Resources

Exposure management
resource center

Accelerate your exposure management strategy with practical resources and tools.
Explore
About Tenable
Leadership
Investor relations
Tenable ventures
Awards and recognition
Media room
Careers
Engagement and inclusion
Exposure Management Leadership Council
  • Customers
  • North American Healthcare SaaS Company
Case study

North American Healthcare SaaS Company


Our Tenable solution is here to stay for its many capabilities, especially compliance and visibility. We just enabled workload protection and plan to consolidate even more. Eventually, we’ll manage all AWS security through a single pane of glass.

Download the case study
Primary product used

Tenable Cloud Security


The actionable cloud security platform

Reduce risk by rapidly exposing and closing priority security gaps caused by misconfigurations, risky entitlements and vulnerabilities–in one powerful cloud native application protection platform (CNAPP).

Explore this product Request a demo
Location: North America
Industry: Healthcare

Healthcare SaaS company gains compliance with Tenable Cloud Security’s Just-in-Time access

A North American provider of cloud-based healthcare solutions helps organizations enhance patient care and operational efficiency by supporting early detection of health risks — improving reimbursement accuracy and enabling better care coordination. The platform leverages data transparency and automation to reduce unnecessary hospital visits and improve overall clinical outcomes.

Key business needs

  • Ensure ongoing HITRUST compliance with auditable limited access controls to sensitive data in AWS
  • Embed security seamlessly into workflows to improve visibility and expose permissions, misconfigurations, IaC and other risks
  • Implement a highly usable, adoptable solution that boosts security maturity and ROI

Auditable Just-in-Time access in AWS—with user buy-in

As a cloud-based healthcare technology company operating under stringent compliance requirements, the organization had previously earned HITRUST certification. With it came the need for tighter access controls in AWS—ensuring that even authorized users couldn’t access sensitive data continuously—and full auditability of elevated access.

To meet this requirement, the team sought a way to grant time-limited, as-needed elevated access for employees working in AWS, along with the ability to audit all activity.

Their AWS environment included two primary accounts: a legacy account managed by a service provider and a newer, internally managed account supporting cloud growth, with multiple sub-accounts and data stored in EC2.

Having already implemented Azure Privileged Identity Management (PIM) in their Microsoft environment, the team aimed to replicate that kind of automated, role-based control in AWS.

User adoption, however, was essential. The team needed a solution that AWS users would readily accept. While evaluating familiar tools like Azure PIM, a turning point came during a security event where they discovered Tenable’s Just-in-Time (JIT) access capability. The team immediately recognized it as a strong fit for their AWS security and compliance objectives.

JIT, Permissions, CSPM & IaC in action

The healthcare cloud security team deployed Tenable Cloud Security in their AWS growth account, beginning with JIT access and expanding to additional use cases.

Use Case: Just-in-Time access for sensitive resources

Tenable’s temporary elevated access capability enabled the organization to meet HITRUST requirements while improving usability. It integrated easily with AWS Identity Center and aligned with their use of AWS Organizations. Internal users now elevate access through Tenable to reach sensitive workloads or PII—faster and more smoothly than the identity tool used in their other cloud environment. To streamline the experience, Tenable JIT was deployed via Microsoft Teams, allowing requests and approvals directly within the app. All elevated access is logged, including user, approver, timestamp, account, and role.

JIT access spans more than ten AWS sub-accounts, including QA, Dev, Staging, and production environments with PII. Users elevate access by selecting a role—such as power user (generated through Tenable’s custom role feature), identity group-level eligibility, or read-only. Inappropriate requests are automatically blocked. Sensitive resources require approval and are limited to two hours; less sensitive ones are pre-approved and capped at eight.

The team applies Tenable’s least privilege recommendations based on actual usage, adding permissions only when necessary.

Workflow:

  • One-step approval by one of three authorized approvers
  • Requests for services like Lambda, S3, or DynamoDB are auto-approved or manually reviewed based on sensitivity
  • The AWS infrastructure lead reviews the request and Tenable findings, then collaborates with a security analyst to approve appropriate access

Implementing Tenable JIT has helped the team maintain compliance, adopt best practices, and advance toward a zero-trust security model.

Use Case: Role-Based identity and permissions management

Building on their Just-in-Time access controls, the security engineering team uses Tenable to manage role-based permissions with a least-privilege approach from the start. The platform automatically flags unused permissions—such as roles granting access to 300 services when only 12 are actively used—enabling the team to tighten access controls and reduce unnecessary exposure. With a lean team, staying on top of permissions can be a challenge. Tenable helps streamline this effort by identifying permissions risk insights early that are passed to developers for remediation.

Use Case: Cloud Security Posture Management (CSPM)

The cloud operations team had previously used another CSPM tool but found Tenable significantly more insightful. “Tenable Cloud Security gave us deeper visibility and exposed permissions risks we hadn’t seen before, such as admin access granted in Dev via a domain-joined role.” The team now accesses AWS exclusively through Tenable, which has become central to their daily operations. Tenable’s platform is integrated with JIRA to help track and manage security issues. As the cloud infrastructure lead noted, “It’s the first dashboard I check every morning.”

Use Case: Infrastructure as Code (IaC) scanning

The DevOps and engineering teams integrated Tenable into their CI/CD pipeline to scan both CloudFormation and custom-built Infrastructure as Code (IaC) templates before deployment. Previously, they had limited visibility into IaC risks until after resources were built—making remediation more time-consuming and disruptive. Now, Tenable flags issues early in the development process, with alerts set for findings above low severity. Developers quickly adopted the tool, incorporating it into their workflow to avoid costly rework. As the team noted, “Now, using Tenable’s IaC capabilities, our developers are confident in the security of their builds.”

Stronger visibility, ROI and standardization on Tenable

The company is seeing clear benefits from Tenable Cloud Security:

ROI. By replacing their prior CSPM tool, they saved over $10,000/year, with more savings expected as they grow AWS usage, expanding to new AWS Organizations accounts.

Onboarding and customer support. Onboarding took just one to two days, with single sign-on integration the most involved step. Since deployment, issues have been rare—and when they arise, Tenable typically responds within 24 hours. Regular bi-weekly check-ins maintain alignment and ensure ongoing support. Noted the team, “Some vendors set you up and come back only at renewal time. Tenable customer support is probably the best I've seen.”

Usability and prioritization. A smooth user experience and prioritized insights are streamlining operations. Said the infrastructure head, “Tenable presents information well, breaking down alert severity and open findings, and provides a clear work path. It puts what’s important at the top and guides us, sparing the need to go into accounts and figure out what to trim.”

Security maturity and DevOps collaboration. The company has grown very fast. Noted the team, “Many in the organization now realize that security is a business requirement. Putting Tenable’s prioritized findings and remediation in front of DevOps has been very useful to pursuing our security goals.”

Summed up by the lead security engineer: “Our Tenable solution is here to stay for its many capabilities, especially compliance and visibility. We just enabled workload protection and plan to consolidate even more. Eventually, we’ll manage all AWS security through a single pane of glass.”

Back to Top

  • Tenable Cloud Security

Related customer case studies

Complete Genomics


Read case study

Aidoc


Read case study

IntelyCare


Read case study

Explore all case studies ›

Your exposure ends here.

Partners

  • Become a partner
  • Find a partner
  • Partner portal
  • Partner programs

Resources

  • Services
  • Technical support
  • Training and certifications
  • Product documentation
  • Customer community
  • Tenable Trust

Company

  • About us
  • Executive team
  • Newsroom
  • Investor relations

Connect

  • Contact us
  • Try our product
  • Chat with sales
  • Meet us at an event
  • Join us
  • Privacy policy
  • Do not sell/share my personal information
  • Legal
  • 508 compliance

© 2026 Tenable®, Inc. All rights reserved

Tenable One

Request a demo

The world’s leading AI-powered exposure management platform.

Thank You

Thank you for your interest in Tenable One.
A representative will be in touch soon.

Debug:
Form ID: 7469
Form Name: one-eval
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: one-eval-form-wrapper
Confirmation Class: one-eval-confirmform-modal
Simulate Success

Tenable One Cloud Exposure

Request a demo

Close cloud exposure with the actionable cloud security platform.

Thank You

Thank you for your interest in Tenable One Cloud Exposure.
A representative will be in touch soon.

Debug:
Form ID: 10155
Form Name: tenable-cs
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: tenable-cs-form-wrapper
Confirmation Class: tenable-cs-confirmform-modal
Simulate Success

Tenable Security Center

Request a demo

Identify and prioritize vulnerabilities based on risk to your business. Managed on premises.

Thank You

Thank you for your interest in Tenable Security Center.
A representative will be in touch soon.

Debug:
Form ID: 3504
Form Name: tenable-sc-eval
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: tenable-sc-eval-form-wrapper
Confirmation Class: tenable-sc-eval-confirmform-modal
Simulate Success

Tenable Patch Management

Request a demo

Streamline security and IT collaboration and shorten the mean time to remediate with automation.

Thank You

Thank you for your interest in Tenable Patch Management.
A representative will be in touch soon.

Debug:
Form ID: 13149
Form Name: patch-mgmt
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: patch-mgmt-form-wrapper
Confirmation Class: patch-mgmt-confirmform-modal
Simulate Success

Tenable Enclave Security

Request a demo

Know, expose and close IT and container vulnerabilities.

Thank You

Thank you for your interest in Tenable Enclave Security.
A representative will be in touch soon.

Debug:
Form ID: 12543
Form Name: enclave
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: enclave-form-wrapper
Confirmation Class: enclave-confirmform-modal
Simulate Success

Tenable One Attack Surface Management

Request a demo

Gain visibility into your internet-connected assets to eliminate blind spots and unknown sources of risk.

Thank You

Thank you for your interest in Tenable One Attack Surface Management.
A representative will be in touch soon.

Debug:
Form ID: 6937
Form Name: asm-eval
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: asm-eval-form-wrapper
Confirmation Class: asm-eval-confirmform-modal
Simulate Success

Tenable One AI Exposure

Request a demo

See, secure, and manage how your teams use AI platforms.

Thank You

Thank you for your interest in Tenable One AI Exposure.
A representative will be in touch soon.

Debug:
Form ID: 14854
Form Name: ai-exposure
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: ai-exposure-form-wrapper
Confirmation Class: ai-exposure-confirmform-modal
Simulate Success

Tenable One OT Exposure

Request a demo

Close OT exposure with the unified security solution for converged OT/IT environments.

Thank You

Thank you for your interest in Tenable One OT Exposure.
A representative will be in touch soon.

Debug:
Form ID: 3879
Form Name: ot-eval
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: ot-eval-form-wrapper
Confirmation Class: ot-eval-confirmform-modal
Simulate Success

Tenable One Identity Exposure

Request a demo

Close identity exposure with the essential solution for the identity-intelligent enterprise.

Thank You

Thank you for your interest in Tenable One Identity Exposure.
A representative will be in touch soon.

Debug:
Form ID: 4178
Form Name: ad-eval
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: ad-eval-form-wrapper
Confirmation Class: ad-eval-confirmform-modal
Simulate Success

Why Tenable

See Tenable in action

Want to see how Tenable can help your team find and fix critical cyber weaknesses that put your business at risk? Complete this form to get a custom quote or demo.

Thank you for subscribing!

Debug:
Form ID: 13427
Form Name: why-compare-form
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: why-compare-form-form-wrapper
Confirmation Class: why-compare-form-confirmform-modal
Simulate Success

SLCGP

Learn How Tenable Helps Achieve SLCGP Cybersecurity Plan Requirements

Tenable solutions help fulfill all SLCGP requirements. Connect with a Tenable representative to learn more.

Thank You

You should receive a confirmation email shortly and one of our Sales Development Representatives will be in touch. Route any questions to [email protected].

Debug:
Form ID: 10616
Form Name: slcgp
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: slcgp-form-wrapper
Confirmation Class: slcgp-confirmform-modal
Simulate Success

Subscribe

Cybersecurity news you can use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.

Thank you for subscribing!

Debug:
Form ID: 3971
Form Name: blog-subscribe
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: blog-subscribe-form-wrapper
Confirmation Class: blog-subscribe-confirmform-modal
Simulate Success

Try for free

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Web App Scanning.


Buy now

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.


Number of assets

100

Choose your subscription

Buy now

Please contact us or a Tenable partner.

Thank You

Thank you for your interest in Tenable Vulnerability Management.
A representative will be in touch soon.

Debug:
Form ID: 3174
Form Name: vm
Form Class: c-form c-form--mkto js-mkto-no-css js-form-hanging-label
Form Wrapper ID: vm-form-wrapper
Confirmation Class: vm-confirmform-modal
Simulate Success

Try for free

Try Tenable Web App Scanning

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable One Exposure Management platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Your Tenable Web App Scanning trial also includes Tenable Vulnerability Management.

Buy now

Buy Tenable Web App Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

FQDNs

5
$3,578
Buy now

Please contact us or a Tenable partner.

Thank You

Thank you for your interest in Tenable Web App Scanning.
A representative will be in touch soon.

Debug:
Form ID: 3258
Form Name: was
Form Class: c-form c-form--mkto js-mkto-no-css js-form-hanging-label
Form Wrapper ID: was-form-wrapper
Confirmation Class: was-confirmform-modal
Simulate Success

Try for free

Try Tenable Nessus Professional free

Tenable Nessus is the most comprehensive vulnerability scanner on the market today. Fill out the form below to continue with a Nessus Pro trial.

Buy now

Buy Tenable Nessus Professional

Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year.


Select your license

Buy a multi-year license and save more.

Add support and training

Buy now
Renew an existing license
Find a reseller

*VAT incl.

Try for free

Try Tenable Nessus Expert free

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Already have Tenable Nessus Professional? Upgrade to Nessus Expert free for 7 days.

Buy now

Buy Nessus Expert


Select your license

Buy a multi-year license and save more.

Add support and training

Buy now
Renew an existing license
Find a reseller

With Advanced Support for Nessus Pro, your teams will have access to phone, Community, and chat support 24 hours a day, 365 days a year. This advanced level of technical support helps to ensure faster response times and resolution to your questions and issues.

Advanced Support Plan Features

Phone Support

Phone support 24 hours a day, 365 days a year, available for up to ten (10) named support contacts.

Chat Support

Chat support available to named support contacts, accessible via the Tenable Community is available 24 hours a day, 365 days a year.

Tenable Community Support Portal

All named support contacts can open support cases within the Tenable Community. Users can also access the Knowledge Base, documentation, license information, technical support numbers, etc.; utilize live chat, ask questions to the Community, and learn about tips and tricks from other Community members.

Initial Response Time

P1-Critical: < 2 hr
P2-High: < 4 hr
P3-Medium: < 12 hr
P4-Informational: < 24 hr

Support Contacts

Support contacts must be reasonably proficient in the use of information technology, the software they have purchased from Tenable, and familiar with the customer resources that are monitored by means of the software. Support contacts must speak English and conduct support requests in English. Support contacts must provide information reasonably requested by Tenable for the purpose of reproducing any Error or otherwise resolving a support request.