Install and upgrade the Tanium Server, Tanium Module Server, and Tanium Zone Server.
Use Tanium without having to install software and maintain virtual or physical servers.
Deploy the Tanium Client to your endpoints.
Ask questions, review results, deploy actions, and administer your endpoints.
Get a complete view of your enterprise inventory by aggregating live asset data with recent data from offline assets.
Identify vulnerabilities and misconfigurations to reduce attack surface and improve security posture.
Enrich third-party security and management tools with accurate and complete endpoint data.
Install, update, or remove software on a flexible set of targets.
Find, report on, and take action against unmanaged endpoints.
Enable unified endpoint management and security by providing centralized policy management.
Understand the administrative realm of your enterprise by visualizing and contextualizing access rights to reduce the attack surface.
Accelerate incident response cycle time by using a collection of sensors and actions to hunt, contain, and remediate threats and vulnerabilities across every endpoint.
Record changes to your critical files and receive alerts when changes are detected.
Generate application and endpoint maps to gain visibility and resiliency in your environment.
Minimize critical security vulnerabilities by automating patch delivery.
Monitor, investigate, and remediate endpoint performance issues.
Enforce security policies to harden your environment and prevent unwanted activity.
Identify sensitive data on endpoints to assist in regulatory compliance, information security, and data privacy.
Detect, react, and recover quickly from attacks and the resulting business disruptions.
Gain visibility into operational health by creating charts that show historical and current data from endpoints.
Implement integration across Tanium products or third-party applications.
Learn Tanium terminology.