Tanium provides unified endpoint management and security built for the world’s most demanding IT environments. Our breakthrough approach decentralises data collection, aggregation and distribution down to the endpoint, dramatically reducing direct client-to-server communications to deliver transformational scale, speed, and reliability. This is why the world’s most sophisticated organisations –– including nearly half of the Fortune 100, all six branches of the US Armed Forces, and over 70 percent of the top retailers and financial institutions ––trust Tanium to help them confidently manage performance, detect and respond to threats, and ensure compliance across their operations.
Learn more at www.tanium.com.
Share
Main office address
100 Brook Drive
Green Park
Reading
RG2 6UU
Key Products / Services / Sectors (USPs)
Single Platform. Single Agent.
Built for the demands of highly distributed, complex and modern networks.
The power of Tanium’s platform is its unique architecture. Tanium takes a patented approach to endpoint communications called “linear chain”. The platform decentralises data collection, aggregation and distribution down to the endpoint dramatically reducing direct client-to-server communications. Its modern architecture harnesses the intrinsic speed of low-latency LAN traffic which helps reduce inefficiencies caused by bloated databases, overloaded connections and heavy traffic across WAN segments.
Tanium Core Platform
Built for the demands of highly distributed, complex and modern endpoint-era networks, the Tanium architecture turns decentralisation and scale into an advantage.
Unified Endpoint Management
Manage end user, server and cloud endpoints on a single platform. Unified Endpoint Management helps the largest and most demanding organisations manage, inventory, monitor, contextualise and remediate end user, server and cloud endpoints with ultimate visibility and control at scale.
Unified Endpoint Security
Secure endpoints on a single platform. Unified Endpoint Security helps the largest and most demanding organisations identify and protect managed and unmanaged devices, and detect, respond to and recover from threats and breaches – all on a single platform and with ultimate speed, visibility, control and scale.
Services
Backup and disaster recovery
Backup solutions
Incident response
Disaster recovery solutions
Disaster Recovery as a Service (DRaaS)
Penetration testing
Vulnerability scanning
Automated test tools
Web app PEN tests
Mobile app/IoT PEN tests
Social engineering PEN tests
Red Teams
Cybersecurity awareness training programs
On-site training programs
Online training
Interactive training videos
Quizzes
Automated phishing simulations
Cybersecurity consultancy
Compliance assistance
Security assessment, policy help, strategic advise
Information risk assessment
Privacy Impact Assessment services
Security architecture
Digital forensics and investigation services
Security and data protection audit
Network security
Data Loss Prevention (DLP)
Distributed denial of service (DDoS) prevention
Email security
Firewalls and web access firewalls (WAF)
Network segmentation
Security information and event management (SIEM)
Other intrusion detection (Machine Learning / AI based)
Endpoint security solutions
Mobile security
Anti-malware
IoT security
Endpoint Detection and Response (EDR)
Network infrastructure controls, e.g. Firewalls, switches, security policy enforcement
Sandboxes
URL filters
Security email gateway
VPN
Print management and security
Threat intelligence monitoring and detection
Consultancy and advice
User and Entity Behavior Analytics (UEBA)
Security information and event management (SIEM)
Network Traffic Analysis Framework
Web Proxy
Cybersecurity Platform
Phishing detection
Fraud detection
Rogue or Fake Mobile App Detection
Surface, “Deep” and “Dark” Web Monitoring
Social media monitoring
Brand Monitoring
Managed security services (MSSP)
Protective monitoring
Incident response
Vulnerability management
Threat management
Telco security
Security help desk and support
Staff training
Identity and access management
Identity provisioning (IDP)
Data verification
Data orchestration services
Identity hub
Authentication (credential) of citizens
Authentication (credential) of employees and other internal persons
Anti-fraud services, e.g. behavioural monitoring
Attribute provisioning and verification
Identity networks
Identity apps
Privacy and consent management
Privileged access management (PAM)
Company insight
Testimonials
"The visibility we gained with Tanium was incredibly impressive. Classifying inventory and discovering IoT devices has been made possible."
Ken Athanasiou, Former CISO, AutoNation
"Operating on a global scale provides a lot of challenges when it comes to knowing your environment. For the first time, we've been able to get a fast and accurate picture of our environment with Tanium."
Troels Oerting, Former Group Chief Security Officer, Barclays
"Before Tanium we were always behind the curve with virus definitions. We were always playing catch up. It wasn’t unusual for 5–10% of our devices to be out of compliance with our policy. Once we deployed Tanium, our average went down to less than 1% almost overnight."
Greg Fisbeck, Former Senior Manager of Cyber Security Operations, Whirlpool
Clients
Partners
PwC
DXC
Computacenter
Accenture
Ernst & Young
Main point of contact
Email: UKPS@tanium.com