A privately held endpoint security and systems management company based out of California, Tanium has been recognized as one of the top 10 private cloud companies in the world on Forbe’s annual Cloud 100.

With over 27.6 million endpoints secured worldwide and over 50% of the Fortune 100 utilizing their products, Tanium’s Unified Endpoint Security replaces legacy endpoint protection tools with a streamlined and scalable solution.

Scroll down to learn more about Tanium’s family of products and services.

Endpoint Protection Overview

Contact our sales team to learn more about Tanium’s security product and service offerings.

Tanium’s family of products and services:

Tanium Core

The Tanium Platform

Unified endpoint management and security for unparalleled speed, visibility and control as proven in top organizations

Tanium as a Service

All the power of the Tanium Platform managed and delivered from the cloud

IT Operations

Tanium Asset

Hardware and software inventory and usage tracking

Tanium Map

Application component, dependency, and relationship mapping

Tanium Deploy

Operating system and application installation, update and removal

Tanium Patch

Operating system and application patch management

Tanium Discover

Unmanaged hardware and software discovery

Tanium Performance

End user experience management

Risk and Security

Tanium Comply

Vulnerability management and configuration compliance

Tanium Reveal

Sensitive data discovery and management

Tanium Integrity Monitor

Operating system, application and log file monitoring for compliance

Tanium Threat Response

Threat detection, investigation, and response

Tanium Enforce

Policy configuration management

Tanium Solutions

Unified Endpoint Management (UEM), includes:

  • Asset Discovery and Inventory
  • Software Management
  • Performance Monitoring
  • Patch Management
  • Configuration Management

Unified Endpoint Security (UES), includes:

  • Asset Discovery and Inventory
  • Endpoint Detection and Response
  • Endpoint Protection
  • Data Risk and Privacy
  • Vulnerability and Configuration Management