Install and upgrade the Tanium Server, Tanium Module Server, and Tanium Zone Server.
Deploy the Tanium Client to your endpoints.
Ask questions, review results, deploy actions, and administer your endpoints.
Get a complete view of your enterprise inventory by aggregating live asset data with recent data from offline assets.
Identify vulnerabilities and misconfigurations to reduce attack surface and improve security posture.
Enrich third-party security and management tools with accurate and complete endpoint data.
Install, update, or remove software on a flexible set of targets.
Aggregate actionable and efficient threat detection from multiple sources to automatically detect indicators of compromise.
Find, report on, and take action against unmanaged endpoints.
Accelerate incident response cycle time by using a collection of sensors and actions to hunt, contain and remediate threats and vulnerabilities across every endpoint.
Record changes to your critical files and receive alerts when changes are detected.
Generate application and endpoint maps to gain visibility and resiliency in your environment.
Minimize critical security vulnerabilities by automating patch delivery.
Enforce security policies to harden your environment and prevent unwanted activity.
Identify sensitive data on endpoints to assist in regulatory compliance, information security, and data privacy.
Detect, react, and recover quickly from attacks and the resulting business disruptions.
Conduct direct investigation of key forensic and security events on endpoints across the network.
Gain visibility into operational health by creating charts that show historical and current data from endpoints.
Implement third-party integrations for multiple Tanium products.
Learn Tanium terminology.