Customer is solely responsible and fully liable for acquiring, using, licensing or distributing all hardware, software, content, packages, products, data, or other material. Customer's combination of the Licensed Software with other hardware, software, content, packages, products, data, or other material may result in a combination of intellectual property rights for which Customer is solely responsible. It is Customer's responsibility to determine if a combination of the Licensed Software with other hardware, software, content, packages, products, data, or other material conforms with the intellectual property rights provided to Customer by any third party.
With the Tanium Core Platform, you can collect information from and deploy actions on all the endpoints in your environment. Install and configure the component servers, the Tanium Console, Tanium Client, Tanium Interact™, Tanium Authoring, and Tanium Connect™. Then ask questions, consume data, deploy actions, and administer your endpoints.
Perform basic functions such as asking questions, consuming data, and deploying actions across your enterprise.
Support continuous compliance goals by proactively performing security checks on operating systems, password permissions, files, and more.
Integrate Tanium with a SIEM, log analytics tools, threat feeds, or send email notifications.
Find and maintain an inventory of assets in your environment.
Aggregate actionable and efficient threat detection from multiple sources to automatically detect indicators of compromise.
Accelerate incident response cycle time by using a collection of sensors and actions to hunt, contain and remediate threats and vulnerabilities across every endpoint.
Simplify regulatory compliance and make file integrity monitoring more effective enterprise-wide by consolidating tools, while taking full advantage of the benefits of the Tanium platform.
Define custom workflows and schedule patches based on advanced rules or exceptions built around whitelists, blacklists, dynamic groups, and patch lists.
Keep your network safe from malicious attacks on endpoints using native operating system and third-party controls.
Conduct direct investigation of key forensic and security events on endpoints across the network.
Visualize, understand, and communicate the true state of your organization's security and operations health.