We use the tool as an infrastructure operational management solution.
Tanium Inc Cloud
Tanium IncExternal reviews
External reviews are not included in the AWS star rating for the product.
A scalable solution that helps to understand how infrastructure works
What is our primary use case?
What is most valuable?
The solution is scalable and helps to understand how infrastructure works. It helps to improve the health of the organization.
What needs improvement?
Any movement into a SaaS solution has challenges since the processes and data flows are not well defined. Hence, you need to build it at the same time.
What do I think about the stability of the solution?
I would rate the solution's stability a ten out of ten.
What do I think about the scalability of the solution?
I would rate the product's scalability a ten out of ten.
How was the initial setup?
The product's setup is easy but depends on the environment. The tool's deployment took three months to complete.
What's my experience with pricing, setup cost, and licensing?
The solution offers value for money.
What other advice do I have?
I would rate the product an eight out of ten. You need to know about your environment and if you are in a legacy environment, then you need to plan methodically.
A useful solution that can be used within the threat-hunting and vulnerability-management space
What is our primary use case?
I use Tanium to run all the security operations, threat intelligence, vulnerability management, threat hunting, red teaming, purple teaming, and everything within the vulnerability management space.
Server message block communication is one of the platform's strengths that tells how quickly it can get all the data. However, when we first deployed it, we were told to remove it immediately because it was causing issues along those lines. Within our system, we use the solution for the instant discovery and visibility aspect instead of using it to scan for vulnerability management. We have another solution for regular scanning. We use Tanium to collect the data from endpoints for the live response functions for looking at anomalous behaviors. When we had a specific targeted attack against it, a specific process was running, and we could identify and stop all of those.
What is most valuable?
Tanium's most valuable feature is its instant discovery aspect. You can have a look and see the processes running on the machine when looking for specific indicators. We use the solution within the threat-hunting and vulnerability-management space.
What needs improvement?
Tanium’s scalability could be improved. When we first deployed Tanium to Bank of America, it caused a massive contention issue on the network due to the size of the network and the amount of traffic coming back from SMB.
For how long have I used the solution?
We first used Tanium in 2016 at Bank of America.
What do I think about the stability of the solution?
Initially, we had some problems with the contention of the traffic, and the solution kept crashing. However, after a bit, it wasn't too bad.
What do I think about the scalability of the solution?
Tanium's scalability was good once we got to it working properly on the smaller things. It was pretty good once it was optimized and used within the wider business. My organization has a huge infrastructure with over 20,00,000 switches and 3,00,000 servers within the business.
I rate Tanium an eight or nine out of ten for scalability.
How was the initial setup?
The initial setup of Tanium was very hard due to the size of the network of Bank of America. When you put out the initial bit, the amount of traffic coming back wasn't tunneled correctly, and it caused contention in various areas. We've got so many other technologies running within it, and it's a very, very complex environment.
We did the deployment in small bits. There was an initial three-month deployment, but that wasn't complete. Since Bank of America is across 29 countries and is absolutely huge, it involved breaking it down into logical business areas. The solution's overall deployment took over 12 months.
What other advice do I have?
We don't have a full-scale deployment per se. We're looking at the threat module within Tanium Threat Response in my current place.
Tanium is a very useful product. You've got to have the right use cases for it, but the visibility of things it gives you and the response time is really, really beneficial.
Overall, I rate Tanium an eight out of ten.
Tanium Cloud Platform offers instance deployments managed by PKI to enhance our security compliance
* Provisioning, removing and protecting user roles can be defined in its Identity & Access management console at granular levels.
* Since our customer data is directly loaded into the Tanium platform, we can use its analytics dashboard to generate metrics, customer usage info & other metadata attributes.
* Tanium infrastructure supports multiple data hosting regions, thereby improving resiliency & recovery management of our customer data.
* All our new implementation & endpoint configurations are easily modified in the Tanium cloud platform's cloud-native infrastructure.
* Tanium agent scans through our entire cloud infrastructure and provides visibility without any additional costs.
* Since all endpoints are under Tanium's dedicated pipeline, we can utilize the parameters from our pre-existing data source connections.
* Auto-remediation feature effectively removes all malicious entities found after the endpoint investigation scan.
* So far, we are satisfied with the services offered by Tanium for our cloud-native application deployments.
* It enhances the security compliance standards of our customer data through PKI (Public Key Infrastructure) & adhering to major regulations such as GDPR, HIPPA, PCI and VPAT standards.
* Administration of the endpoints is seamless thanks to its endpoint intelligence & end-to-end patching services enables us to identify network vulnerabilities & regulates comprehensive patching solution.
* Its predefined templates allow us to deploy applications that are used frequently & by enabling continuous monitoring, we can easily recognize threats that are targetting all these applications.
* We can also store our logs on dedicated server instances so that our log history won't get tampered with when there is an internal threat attempt.
Awesome tool for a single pane of glass end user monitoring and management
Breeeze for managing servers
Total control with admin to push patches and force install
Easy to push packages (Updates ) OTA
Must for managing large infra as it takes to much time to do these tasks manually
no more getting downtime windows, can push updates via tanium without logging into the server