It’s a new beginning! Ermetic is now Tenable Cloud Security.

Cloud Security Maturity Model: Vision, Path, Execution

This whitepaper examines the different variables to consider when designing and implementing a cloud security strategy, including priorities and a roadmap.

ESG Report: The Crucial Role of Entitlements for Effective Cloud Security

This whitepaper examines the challenges and describe what to look for in a solution that fully incorporates CIEM fora more effective CSPM strategy.

10 Steps to Eliminating Access Risks in AWS

The 10 steps to determining the access open to a single user or application.

Misconfigurations Leading to AWS S3 Ransomware Exposure

Our research revealed high potential for ransomware penetration when not using AWS mitigation controls.

Achieving Least Privilege in AWS

Securing identities and data in the cloud is extremely challenging, and many organizations get it wrong. Yet recent events have proven that the risks associated with compromise of identities and credentials cannot be taken lightly.

Why Managing Cloud Entitlements is Nearly Impossible & How to Do It

Why it is a priority to get a grip on your cloud identities and privileges, and what Ermetic offers in full-stack granular visibility, context and mitigation to help you assess and remediate access risk.

A New Paradigm for Least Privilege

We are approaching a tipping point where the scale and flexibility of cloud environments may be too much to deal with, resulting in increased exposure to risk as even a single access-related incident due to an over-privileged account or a misconfigured cloud storage bucket may have severe consequences.

Skip to content