It’s a new beginning! Ermetic is now Tenable Cloud Security.

[On-Demand] Unboxing CNAPPgoat

Find out about our new open-source project designed to modularly provision vulnerable-by-design components in cloud environments.

By Tenable Cloud Security August 23, 2023

Automated Security and Compliance for Kubernetes

Ermetic protects K8s environments and compliance with accuracy and ease, freeing Dev/Ops teams to scale Kubernetes securely

By Tenable Cloud Security August 13, 2023

IMDS: The Gatekeeper to Your Cloud Castles (and How to Keep the Dragons Out)

Watch Lior Zatlavi and Liv Matan's fwd:cloudsec 2023 session

By Tenable Cloud Security August 6, 2023

A Year of NO: Building Organizational IAM Guardrail Policies That Work

Watch the presentation by Ermetic Research Lead Noam Dahan at fwd:cloudsec 2023

By Tenable Cloud Security August 6, 2023

What Cloud Security Pros Say About Ermetic ROI

Find out what cloud security pros are saying about their Ermetic ROI.

By Tenable Cloud Security August 2, 2023

Tenable Cloud Security Platform Demo

Tenable's holistic cloud infrastructure security platform reveals and prioritizes security gaps in AWS, Azure and GCP, and enables you to…

By Tenable Cloud Security July 15, 2023

[On-Demand] Advanced Multicloud IMDS Security

Take a deep dive into the protections offered by different cloud service providers for the IMDS used by computing instances…

By Tenable Cloud Security July 3, 2023

Supplement Your AWS Security with JIT Access and CNAPP

Watch the presentation from AWS re:Inforce 2023!

By Tenable Cloud Security June 25, 2023

Case Study: OrderGrid

Learn how OrderGrid is using Tenable Cloud Security for their IAM zero trust strategy and to keep their security headcount…

By Tenable Cloud Security June 12, 2023

Case Study: Regional Telecom Provider

Find out how this large regional telecommunications provider is using Tenable Cloud Security to protect their AWS & Azure multicloud…

By Tenable Cloud Security June 12, 2023

The Importance of IGA and CIEM in Securing and Governing Identities

Identity Governance and Administration (IGA) and Cloud Identity Entitlement Management (CIEM) tools play essential roles in controlling identity risk and…

By Tenable Cloud Security June 8, 2023

Tenable Cloud Security Just-in-Time Access (JIT)

Tenable Cloud Security offers agentless JIT access as part of its comprehensive Cloud-Native Application Protection Platform for AWS, Azure and…

By Tenable Cloud Security May 28, 2023

[On-Demand] AWS VPC Endpoints Terraform Lab Walkthrough

Join us on a walkthrough of our Terraform lab and learn how to leverage it for your testing needs

By Tenable Cloud Security May 4, 2023

Achieving Least Privilege in GCP

This paper guides organizations either building or migrating applications to the public cloud on the importance of securing IAM data…

By Tenable Cloud Security April 17, 2023

[On-Demand] AWS EC2 IMDS Security – What You Need to Know

Learn how how to implement EC2 IMDS - focusing on the two versions of its API and how they differ

By Tenable Cloud Security March 30, 2023

Cyber Security Lessons from the Emojideploy Azure Vulnerability

Ermetic Sr. Cloud Security Architect Lior Zatlavi discusses the EmojiDeploy vulnerability with Liv Matan, who discovered it.

By Tenable Cloud Security March 21, 2023

Customer Testimonial: Tyler Technologies

Learn how this public sector software enterprise is using Ermetic to save hundreds to thousands of hours in managing permission…

By Tenable Cloud Security March 9, 2023

Customer Testimonial: BarkBox

Discover how Ermetic is enabling this data-driven company to lift the veil on cloud complexity and implement security best practice…

By Tenable Cloud Security February 27, 2023

[On-Demand] JIT Privileged Access Management for Cloud Infrastructure

Learn about leveraging Just-in-Time access to control access to infrastructure and work towards zero standing privileges.

By Tenable Cloud Security February 23, 2023

Tenable Cloud Workload Protection (CWP)

Protecting cloud workloads is an essential requirement for compliance and an industry best practice

By Tenable Cloud Security February 21, 2023

Identity First Cloud-Native Application Protection (CNAPP)

To secure your cloud infrastructure you need a comprehensive, integrated lifecycle platform that holistically detects, prioritizes and remediates risk.

By Tenable Cloud Security February 21, 2023

Ermetic on Fauda

Catch Ermetic on the newest season of Fauda on Netflix (season 4).

By Tenable Cloud Security February 14, 2023

Case Study: Bilfinger

Find out how this global European enterprise is using Tenable Cloud Security to see into their Azure & AWS environment…

By Tenable Cloud Security February 7, 2023

[On-Demand] Understanding Attack Tactics to Better Secure Your AWS Environment

Watch us simulate an attack pathway using an open source framework (CloudGoat) that provisions vulnerable infrastructure.

By Tenable Cloud Security January 11, 2023

Tenable Cloud Security Data Sheet

Holistic multicloud protection for infrastructure, identities and workloads.

By Tenable Cloud Security January 10, 2023

Tenable Cloud Security CIEM Data Sheet

Leading cloud identities and entitlements security for AWS, Azure and GCP

By Tenable Cloud Security January 1, 2023

Tenable Cloud Security for Compliance and Access Governance

Audit and enforce compliance with industry standards and best practices

By Tenable Cloud Security December 28, 2022

[On-Demand] Cloud Incident Response with Mitiga

Find out what you need to be conscious of when developing incident response strategies in the cloud

By Tenable Cloud Security December 22, 2022

Ermetic Overview Demo

Holistic security for AWS, Azure and GCP

By Tenable Cloud Security December 19, 2022

AWS re:Invent 2022 – JIT privileged access management for cloud infrastructure

At re:Invent 2022, Lior Zatlavi explained how to automate the creation, enforcement, and governance of developer access while gaining complete…

By Tenable Cloud Security December 6, 2022

Achieving Least Privilege in Azure

This whitepaper guides organizations either building or migrating applications to the public cloud on the importance of securing IAM data…

By Tenable Cloud Security December 1, 2022

Secure Your Cloud with Zero Trust and Least Privilege

Zero Trust calls for not trusting all entities by default, enforcing least privilege and implementing comprehensive security monitoring

By Tenable Cloud Security November 18, 2022

Tenable for Cloud Inventory Management

Tenable is a comprehensive cloud security platform for AWS, Azure and GCP that enables you to proactively reduce your attack…

By Tenable Cloud Security November 9, 2022

Cloud Infrastructure & Compliance: The Top Threats in Financial Services

Financial organizations need robust solutions for cloud security and compliance

By Tenable Cloud Security November 7, 2022

[On-Demand] CyberUnfiltered – The Journey of the Modern CISO with Anand Singh

Anand Singh discusses challenges and discoveries of the modern CISO including emerging threats, key pillars of a good cloud security…

By Tenable Cloud Security November 3, 2022

Shift Left on Cloud Infrastructure Security

Shift Left with IaC Scanning and Remediation in Code

By Tenable Cloud Security October 29, 2022

Secure your multi-account AWS environment using AWS Control Tower with Ermetic

Ermetic integrates with AWS Control Tower to offer operational automation that makes Ermetic cloud security capabilities available for all newly…

By Tenable Cloud Security October 24, 2022

Tenable Cloud Security for Risk Prevention and Remediation

Actionable Intelligence for faster remediation

By Tenable Cloud Security October 7, 2022

[On-Demand] CyberUnfiltered – Deconstructing the Attacker Mindset

Listen in as Igal Gofman and Lior Zatlavi discuss the attacker mindset -- with an unfiltered view from the trenches.

By Tenable Cloud Security October 4, 2022

[Podcast] The Founder Formula: Reasons To Launch A Startup

The Trace3 Founder Formula podcast co-hosts discuss the inner workings of launching Ermetic with Arick Goomanovsky.

By Tenable Cloud Security September 20, 2022

BlackHat USA 2022: IAM The One Who Knocks

At BlackHat USA, the Ermetic Research Team presented the hidden risks of managing identities and access in a multicloud environment.

By Tenable Cloud Security September 15, 2022

[On-Demand] Take Action: How to Kick the S3 Bucket Ransomware Threat Caused by Misconfigurations

This workshop outlines the specifics of how ransomware can wreak havoc on misconfigured S3 buckets and offers strategies to reduce…

By Dana Smadja August 23, 2022

Cloud Security Maturity Online Self-Assessment

Do you know how your cloud security maturity measures up?

By Tenable Cloud Security August 4, 2022

[On-Demand] Survey Findings – Cloud Security Maturity

Gain insight into the key findings of an Ermetic-commissioned study on cloud security maturity

By Tenable Cloud Security August 4, 2022

Report: State of Cloud Security Maturity

Survey findings of Osterman Research present the state of cloud security maturity across diverse organizations – and key implications for…

By Tenable Cloud Security August 3, 2022

[On-Demand] Security Through Maturity

Applying the cloud security maturity model framework.

By Tenable Cloud Security July 1, 2022

[On-Demand] Maturing Your Way to Effective Identity Governance

Listen in on this joint IBM-Ermetic webinar exploring the Ermetic cloud Security Maturity Model in detail.

By Tenable Cloud Security June 20, 2022

[On-Demand] Start-up your Cloud Security: Cybersecurity from Founding to Exit

Learn the steps required to ensure your startup is prepared to incorporate cloud security from day one and throughout its…

By Tenable Cloud Security June 19, 2022

Anomaly Detection and Response – Tenable Cloud Security

Automate incident response by quickly finding the signal in the noise

By Tenable Cloud Security June 9, 2022

[On-Demand] Of Birds, Bees — and Cloud Native Controls to Protect your Hive

Hear Google’s former CISO explain why automation is essential to closing cloud security gaps at scale.

By Tenable Cloud Security June 8, 2022

[On-Demand] 5 Ways to Reduce Risk from AWS IAM User Access Keys

Cutting down IAM user access keys risk in AWS can be your quickest security win.

By Tenable Cloud Security June 1, 2022

[Podcast+Video] A Grin Without a Cat: Your Cloud Blast Radius

In this episode of Down the Security Rabbithole Podcast, Arick Goomanovsky joins Rafal Los to talk about the biggest risk…

By Tenable Cloud Security May 30, 2022

[On-Demand] SANS Webcast: Are Cloud Service Provider Tools Enough to Secure Your Identities?

Watch this SANS - Ermetic workshop for an overview of CSP tools.

By Tenable Cloud Security May 21, 2022

[On-Demand] Eliminate GCP IAM Risks

This on-demand webinar provides an introduction to the IAM mechanisms available in GCP. 

By Tenable Cloud Security May 11, 2022

[On-Demand] The Ultimate IAM Comparison of the Top 3 Cloud Providers

This session offers a comparison of the IAM mechanisms available in AWS, Azure and GCP.

By Tenable Cloud Security April 14, 2022

Customer Testimonial: airSlate

The SaaS provider is using Ermetic to centralize security best practices and ensure cloud compliance -- with 60% work hours…

By Tenable Cloud Security April 11, 2022

Cloud Security Maturity Model: Vision, Path, Execution

This whitepaper examines the different variables to consider when designing and implementing a cloud security strategy, including priorities and a…

By Tenable Cloud Security April 5, 2022

[On-Demand] Essentials Workshop: How to manage identities and access risk in AWS and Azure

Understand where AWS and Azure align and differ in handling access management.

By Tenable Cloud Security March 25, 2022

[On-Demand] ISSA Webcast: Going Multicloud

Secure your multicloud! Explore managing identities and privileges risk in both AWS and Azure.

By Tenable Cloud Security March 23, 2022

Millennium Live | Cloud Security with Ermetic

MillenniumLive interviews Arick Goomanovsky, Co-founder & CBO at Ermetic, to find out how we are leading the way to secure…

By Tenable Cloud Security March 21, 2022

[On-Demand] Eliminate Azure IAM Risks: How to Leverage Native Azure Tools and Automation to Pursue Least Privilege

Using access permissions analysis, RBAC and native tools in Azure toward least privilege.

By Tenable Cloud Security March 20, 2022

[On-Demand] ISACA Webinar: Tame that Overprivileged Cloud

Learn from Ermetic’s CBO about best practices for mitigating access risks in AWS and Azure.

By Tenable Cloud Security March 19, 2022

Tenable Cloud Infrastructure Entitlement Management (CIEM) Demo

See Tenable Cloud Security in action! Tenable is the most comprehensive and accurate solution for managing human and service identities…

By Tenable Cloud Security March 18, 2022

[On-Demand] TAG Cyber Virtual Panel: Developing a Cloud Infrastructure Security Plan

Watch this panel of industry experts share advice on prioritizing cloud infrastructure security projects.

By Tenable Cloud Security March 10, 2022

ESG Report: The Crucial Role of Entitlements for Effective Cloud Security

This whitepaper examines the challenges and describe what to look for in a solution that fully incorporates CIEM fora more…

By Tenable Cloud Security March 10, 2022

[On-Demand] Cloud Compliance Achievement Unlocked. Now What?

This webinar looks at standards compliance and custom policies as strategic to your cloud security.

By Tenable Cloud Security February 16, 2022

[On-Demand] Forrester Webinar: Securing Your Cloud – What’s Identity Governance Got to Do with It?

Get Andras Cser's take on why cloud entitlements are the linchpin to reducing the attack surface.

By Tenable Cloud Security February 2, 2022

Infographic: Misconfigurations Leading to AWS S3 Ransomware Exposure

Our recent research mapped out scenarios in which a permissions combination could enable ransomware on a bucket.

By Tenable Cloud Security January 19, 2022

Protect Your AWS Environment From the Patching Log4j Vulnerability

A brief demonstration of some of the strategic lessons overlooked by enterprises dealing with the recently reported Log4j vulnerability.

By Tenable Cloud Security January 10, 2022

[On-Demand] DevOps.com Webinar: How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case Study

How organizations govern access and achieve least privilege by analyzing permissions in the cloud.

By Tenable Cloud Security January 9, 2022

[On-Demand] Azure Security Hangout: Address The Hidden Risk of Managing IAM in The Cloud

Learn how to analyze access permissions and exercise least privilege in Azure.

By Tenable Cloud Security January 8, 2022

10 Steps to Eliminating Access Risks in AWS

The 10 steps to determining the access open to a single user or application.

By Tenable Cloud Security January 4, 2022

Customer Testimonial: Fintech

Find out how one Fintech organization leverages Ermetic to manage cloud security and simplify the complexity of cloud entitlements.

By Tenable Cloud Security January 3, 2022

On-Demand: AWS Pen Testing Workshop

How might attackers act at each stage of an AWS environment attack? What can you do to uncover it?

By Tenable Cloud Security December 22, 2021

[On-Demand] Webinar: Cloud Infrastructure Entitlement Management and the Gartner Hype

Dive into why Gartner featured CIEM in this year’s Cloud Security and IAM hype cycles.

By Tenable Cloud Security December 17, 2021

Customer Testimonial: IntelyCare

Find out how this healthcare staffing and scheduling SaaS platform is using Ermetic to reduce risk and automate least privilege.

By Tenable Cloud Security December 14, 2021

[Podcast] Cloud Identity Governance – Understanding Challenges

Find out about cloud identity and access challenges -- and the impact of neglecting entitlements.

By Tenable Cloud Security November 26, 2021

[On-Demand] Webinar: Ask Me Anything! Fireside Chat with Atlassian CISO, Adrian Ludwig

Prepare to delight in this chat with Atlassian CISO Adrian Ludwig and Ermetic CEO/Co-Founder, Shai Morag.

By Tenable Cloud Security November 12, 2021

Misconfigurations Leading to AWS S3 Ransomware Exposure

Our research revealed high potential for ransomware penetration when not using AWS mitigation controls.

By Tenable Cloud Security October 7, 2021

Customer Testimonial: Latch

Find out how they use Tenable Cloud Security for AWS to automate least privilege for new services.

By Tenable Cloud Security August 18, 2021

[On-Demand] Webinar: Cloud Native Security, Explained

Explore new tactics for securing cloud computing in Azure with Tanya Janca of We Hack Purple.

By Tenable Cloud Security July 6, 2021

Achieving Least Privilege in AWS

Securing identities and data in the cloud is extremely challenging, and many organizations get it wrong. Yet recent events have…

By Tenable Cloud Security June 15, 2021

[On-Demand] Workshop: How to Eliminate AWS IAM Risk

Join Ermetic architect Lior Zatlavi to unpack analyzing access permissions and pursuing least privilege in AWS.

By Tenable Cloud Security May 13, 2021

Ermetic Case Study: MOHARA

Find out how MOHARA is using Ermetic to build cloud security into client projects including fintech.

By Tenable Cloud Security May 4, 2021

Ermetic Case Study: IntelyCare

Find out how this healthcare innovator is using Ermetic to automate risk remediation & least privilege.

By Tenable Cloud Security April 25, 2021

Ermetic Case Study: Latch

Find out how Latch is using Ermetic to improve their security posture.

By Tenable Cloud Security April 11, 2021

Ermetic Case Study: Kikapay

Find out how Kikapay leverages Ermetic to be confident that their security profile is sufficient.

By Tenable Cloud Security April 8, 2021

Ermetic Case Study: Aidoc

Find out how Aidoc is using Ermetic to roadmap action on IAM & configuration risks.

By Tenable Cloud Security April 4, 2021

Business Case Study by TAG Cyber

Find out why you should take a new approach to handling your cloud security posture.

By Tenable Cloud Security February 28, 2021

Why Managing Cloud Entitlements is Nearly Impossible & How to Do It

Why it is a priority to get a grip on your cloud identities and privileges, and what Ermetic offers in…

By Tenable Cloud Security January 28, 2021

Shai Morag Shares Insights into the World of Poker and Cybersecurity

Shai Morag, Ermetic Co-Founder and CEO, having an interview with Michael Matias of 20 Minute Leaders about the growth of…

By Tenable Cloud Security January 24, 2021

Implementing Identity-Centric Controls in Cloud Infrastructure

Alan Shimel from Digital Anarchist speaks with Ermetic CMO Amy Ariel about what we are seeing in the current business…

By Tenable Cloud Security January 23, 2021

Trends, Entitlements and the Cloud

Edward Amoroso from TAG Cyber sits down with Ermetic Co-Founder and CBO Arick Goomanovsky to discuss security trends, risk and…

By Tenable Cloud Security January 20, 2021

Ermetic AWS Value Case Study – Latch

Find out how Latch is using Ermetic to automate least privilege in their AWS environment.

By Tenable Cloud Security January 9, 2021

Ermetic AWS Value Case Study – IntelyCare

Find out how IntelyCare used Ermetic to automate AWS IAM risk analysis & remediate in minutes.

By Tenable Cloud Security January 9, 2021

Governing identities and managing entitlements in the public cloud

Katie Teitler from TAG Cyber sits down with Or Priel, VP Product at Ermetic to discuss "identities" (both human and…

By Tenable Cloud Security January 4, 2021

Ermetic Case Study: AppsFlyer

Find out how Ermetic helped AppsFlyer gain control by governing identities and access entitlements.

By Tenable Cloud Security December 20, 2020

A New Paradigm for Least Privilege

We are approaching a tipping point where the scale and flexibility of cloud environments may be too much to deal…

By Tenable Cloud Security May 21, 2020
Skip to content