Tanium Primary Use Case

KP
SCCM at Itcinfotech

We use Tanium to deploy applications and for third parties, like Google Chrome which is already in-built in Tanium. We have deployed some packages which we are already using through SCCM, and those packages are what we are using in Tanium to attach those files and make a command line. Installation, uninstallation part, and detection methods are the things that we are using in Tanium.

View full review »
Ed Jarecki - PeerSpot reviewer
Owner/Assistant Vice President at Jarecki Real Estate Investments/ EverView

We use the tool as an infrastructure operational management solution. 

View full review »
SL
CEO

Tanium is primarily used for CMDV (Configuration management database) discovery. Tanium is meant to discover CIs and assets.

View full review »
Buyer's Guide
Tanium
March 2024
Learn what your peers think about Tanium. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
767,667 professionals have used our research since 2012.
Mo Vermeiren - PeerSpot reviewer
Cybersecurity Business & Technology Consultant at Capgemini

It's mainly used by the cybersecurity team for Windows patching and deployment of some software solutions.

View full review »
DH
Head of Cyber Defence at a financial services firm with 1,001-5,000 employees

I use Tanium to run all the security operations, threat intelligence, vulnerability management, threat hunting, red teaming, purple teaming, and everything within the vulnerability management space.

Server message block communication is one of the platform's strengths that tells how quickly it can get all the data. However, when we first deployed it, we were told to remove it immediately because it was causing issues along those lines. Within our system, we use the solution for the instant discovery and visibility aspect instead of using it to scan for vulnerability management. We have another solution for regular scanning. We use Tanium to collect the data from endpoints for the live response functions for looking at anomalous behaviors. When we had a specific targeted attack against it, a specific process was running, and we could identify and stop all of those.

View full review »
NitinKushwaha - PeerSpot reviewer
Product Manager at OakNorth

We use Tanium as an EDR solution for managing end-user devices and servers.

View full review »
Daniel Blackburn - PeerSpot reviewer
IT Operation Services Manager / IT Vendor Coordinator / Change Manager at a healthcare company with 501-1,000 employees

We use the solution for patching and security response. 

View full review »
JD
IT Security Manager at a transportation company with 1,001-5,000 employees

We primarily use the solution for inventory and incident response for the most part.

View full review »
VK
Technical Consultant at Aon Corporation

We also use BigFix. Our primary use case for Tanium is for tool consolidation. Tanium is already equipped with multiple capabilities that BigFix has. These are almost parallel tools, running with similar kinds of capabilities. We are planning to flip to Tanium, which might primarily be used as a management solution. Overall, we use Tanium to interact and discover related queries. It is also used as our system information and event management tool. 

View full review »
DA
Founder at a construction company with 11-50 employees

There are some very compelling use cases. A value proposition.

View full review »
BB
Developer at Xion

We collect end-point data. We use it to make AI models and provide it to customers. I use Tanium’s sensors, collect data, and develop dashboards. The sensors have many data types. If we need different data types, we can write scripts.

View full review »
SC
Threat Intelligence at a university with 10,001+ employees

It's used at an enterprise level to monitor natural behavior and point behavior across the organization.

View full review »
Santiago Mantilla - PeerSpot reviewer
Senior Information Technology Security Consultant at Intelector

Tanium can be deployed on the cloud and on-premise.

View full review »
SB
Sr Manager - Information Security & Researcher at a tech services company with 1,001-5,000 employees

Tanium is used for network security. We can acquire files, detect malicious file-related activities, and process-related activities in our environment.

View full review »
PG
Channel Director at a tech services company with 1-10 employees

Our primary use case of this solution is for endpoint protection and, more particularly, the patching. We are integrators and customers of Tanium and I'm a channel director.

View full review »
Buyer's Guide
Tanium
March 2024
Learn what your peers think about Tanium. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
767,667 professionals have used our research since 2012.