With the Tanium Core Platform, you can collect information from and deploy actions on all the endpoints in your environment. Install and configure the component servers, the Tanium Console, Tanium Client, Tanium Interact, Tanium Authoring, and Tanium Connect. Then ask questions, consume data, deploy actions, and administer your endpoints.
Perform basic functions such as asking questions, consuming data, and deploying actions across your enterprise.
Get a complete view of your enterprise inventory by aggregating live asset data with recent data from offline assets.
Support continuous compliance goals by proactively performing security checks on operating systems, network configuration, password policy, file permissions, and more.
Integrate Tanium with a SIEM, log analytics tools, threat feeds, or send email notifications.
Install, update, and remove software on a flexible set of targets with minimal infrastructure requirements.
Aggregate actionable and efficient threat detection from multiple sources to automatically detect indicators of compromise.
Find and maintain an inventory of interfaces in your environment.
Accelerate incident response cycle time by using a collection of sensors and actions to hunt, contain and remediate threats and vulnerabilities across every endpoint.
Simplify regulatory compliance and make file integrity monitoring more effective enterprise-wide by consolidating tools, while taking full advantage of the benefits of the Tanium platform.
Define custom workflows and schedule patches based on advanced rules or exceptions built around whitelists, blacklists, dynamic groups, and patch lists.
Keep your network safe from malicious attacks on endpoints using native operating system and third-party controls.
Conduct direct investigation of key forensic and security events on endpoints across the network.
Visualize, understand, and communicate the true state of your organization's security and operational health.