We compared Tanium and Microsoft Defender for Endpoint based on our user's reviews in several parameters.
Overall, Tanium is praised for its comprehensive visibility into endpoints, security measures, efficient endpoint management, and powerful analytics capabilities. Users appreciate the top-notch customer service but mention high pricing, complex licensing, and system performance improvements needed. Microsoft Defender for Endpoint stands out for its threat protection, real-time monitoring, and user-friendly interface. Customers also commend customer service and competitive pricing, with positive ROI noted. Areas for enhancement include faster response times and improved documentation for both products.
Features: Tanium's valuable features include comprehensive visibility, effective security measures, efficient endpoint management, and powerful analytics capabilities. On the other hand, Microsoft Defender for Endpoint offers comprehensive threat protection, real-time monitoring and detection, efficient system management and reporting, user-friendly interface, seamless integration with other Microsoft products, and effective incident response capabilities.
Pricing and ROI: The setup cost for Tanium is higher compared to other similar products in the market, requiring additional resources and time. On the other hand, Microsoft Defender for Endpoint has a more positive experience, with a straightforward setup process that doesn't require much effort., Based on user feedback, Tanium has shown positive ROI with improved efficiency, cost savings, enhanced security, and centralized IT management, while Microsoft Defender for Endpoint excels in threat protection, ease of use, and real-time insights.
Room for Improvement: There is room for improvement in both Tanium and Microsoft Defender for Endpoint. Tanium users have requested better system performance, improved documentation and training resources, and more customization options. Microsoft Defender for Endpoint users have provided feedback on areas that could be enhanced.
Deployment and customer support: Based on user reviews, there is variation in the duration required to establish a new tech solution for both Tanium and Microsoft Defender for Endpoint. Some users of Tanium reported spending 3 months on deployment and an additional week on setup, while others needed a week for both. As for Microsoft Defender for Endpoint, some users mentioned the same timeframes for deployment and setup., Users highly praise the customer service of Tanium, citing helpful and responsive assistance from knowledgeable and professional support staff. Customers commend Tanium for their efficient and effective customer service. On the other hand, customers express satisfaction with the customer service of Microsoft Defender for Endpoint, appreciating the support team's ability to address concerns and provide effective solutions. The quality of customer service provided by Microsoft Defender for Endpoint is highly regarded.
The summary above is based on 96 interviews we conducted recently with Tanium and Microsoft Defender for Endpoint users. To access the review's full transcripts, download our report.
"The price is low and quite competitive with others."
"NGAV and EDR features are outstanding."
"he solution is an anti-malware product that integrates well with other vendor products such as firewalls, SIEM, etc. It captures threat intelligence and gives you better visibility. The product also has sandboxing features."
"Fortinet FortiEDR made our clients feel secure and more at ease, knowing that they had an EDR solution that would close the gap in their security posture."
"Forensics is a valuable feature of Fortinet FortiEDR."
"It is a scalable solution...The initial setup of Fortinet FortiEDR was straightforward."
"Ability to get forensics details and also memory exfiltration."
"Exceptions are easy to create and the interface is easy to follow with a nice appearance."
"The patch management is very easy, as it can be done automatically or added to a schedule."
"The EDR feature is most valuable."
"It automatically detects intrusion and malware."
"It's not really visible for the user - which is a benefit."
"It's a Microsoft product; it's easier to deploy this product than other options."
"We use Microsoft Defender for the antivirus."
"Microsoft Defender for Endpoint's most valuable feature is its ease of use."
"The intelligence mechanisms are good."
"The solution is scalable and helps to understand how infrastructure works. It helps to improve the health of the organization."
"The security features are very valuable."
"I like the fact that you can create patching campaigns depending on the area of your network that you want to address first. I like the ability it has to make several campaigns that work in parallel."
"For incident response tasks, all these tasks can get done in minutes with minimal disruption to the end-user."
"I would say Tanium is the best tool for vulnerability management."
"Tanium's most valuable features are patch management, inventory, and distribution software."
"Tanium’s linear-chain architecture is valuable."
"The interrogation piece was the most valuable feature because it was very detailed."
"The security should be strong for the cloud. Some applications are on-prem and some are on the cloud. Fortinet should also have strong security for the cloud. There should be more security for the cloud."
"Cannot be used on mobile devices with a secure connection."
"I think cloud security and SASE are areas of concern in the product where improvements are required. The tool's cloud version has to be improved in terms of the security it offers."
"Making the portal mobile friendly would be helpful when I am out of office."
"ZTNA can improve latency."
"The EDR console should have more extensive reporting. You shouldn't need to purchase FortiAnalyzer. It should be included in the EDR part. The security adviser cloud platform could be improved with more options for exclusive or intensive rules for devices."
"FortiEDR could add a separate scanning dashboard. In incident management, we prefer to remove the endpoint system from the environment and scan the system. We typically use Symantec for that, but if we want to use FortiEDR for that, then we need a scanning tab to clarify things."
"The support needs improvement."
"There's a lot of manual effort involved to configure what we need."
"Something that is unique to Microsoft is its licensing model. When you go out and you buy McAfee or Symantec, you know what you're getting out of the box, but with Microsoft, often, when you're looking to achieve a certain set of capabilities, those capabilities are spread across different products. You might try to do something you could do with CrowdStrike, but then find out that you also need to purchase Microsoft Defender for Identity or Microsoft Defender for Azure. You realize that when they talk about what they can offer within the Microsoft platform, it's really the suite of investments. So, sometimes, you may find yourself buying Defender for Endpoint thinking that it matches CrowdStrike, but then you find that Microsoft really needs to sell you something else. One plus one will equal three, but when you have a very concise platform, such as CrowdStrike, you know what you're going to get."
"A concern is ransomware, whether people can penetrate and encrypt my data or steal my credit card/banking information."
"I would like to have a dashboard that shows an overview of the results for the enterprise."
"Sometimes, there are different skews. In a basic skew, they should have basic log analysis without the need to integrate with any third-party or SIEM solutions, like Sentinel. This would make it so much easier for users who don't have log collection or log analysis."
"I would like to see improvements made to how it secures activities on web pages."
"The central management console should be improved because it provides limited options to configure Windows Defender."
"It would be nice to have a paid upgrade that would provide additional screening of the day-to-day activities."
"They could improve the UI."
"The main issues are the network connection because different customers have issues with their networks. It's difficult implementing this type of solution because the network is the main feature in the architecture for these types of solutions. Tanium could improve by creating some network optimization."
"It is not really additional functions, or the features that are needed, rather the complexity would be reduced based on the number of modules required to put together a comprehensive operational security and risk compliance model."
"Tanium's limitations should be improved because although it is a great tool, it is limited to only a few classes during a session."
"The reporting could be improved."
"The most painful thing is the interface. It's a bit unclear sometimes."
"The solution needs to improve the reporting and tracking capabilities."
"I would like to have more integrations and custom plugins to input. Integration is always a big deal in a lot of different environments."
More Microsoft Defender for Endpoint Pricing and Cost Advice →
Microsoft Defender for Endpoint is ranked 1st in Endpoint Detection and Response (EDR) with 182 reviews while Tanium is ranked 26th in Endpoint Detection and Response (EDR) with 15 reviews. Microsoft Defender for Endpoint is rated 8.0, while Tanium is rated 7.4. The top reviewer of Microsoft Defender for Endpoint writes "Eliminates the need to look at multiple dashboards by automatically providing one XDR dashboard to show the security score of each subscription". On the other hand, the top reviewer of Tanium writes "Useful tool for vulnerability management and deploying applications, needing improvement in its OS upgrade". Microsoft Defender for Endpoint is most compared with Symantec Endpoint Security, Intercept X Endpoint, CrowdStrike Falcon, SentinelOne Singularity Complete and Fortinet FortiClient, whereas Tanium is most compared with CrowdStrike Falcon, Microsoft Configuration Manager, Qualys VMDR, ServiceNow Discovery and BigFix. See our Microsoft Defender for Endpoint vs. Tanium report.
See our list of best Endpoint Detection and Response (EDR) vendors and best Endpoint Protection Platform (EPP) vendors.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.