The Cybersecurity Directory

Back to search results

Tanium provides unified endpoint management and security built for the world’s most demanding IT environments. Our breakthrough approach decentralises data collection, aggregation and distribution down to the endpoint, dramatically reducing direct client-to-server communications to deliver transformational scale, speed, and reliability. This is why the world’s most sophisticated organisations –– including nearly half of the Fortune 100, all six branches of the US Armed Forces, and over 70 percent of the top retailers and financial institutions ––trust Tanium to help them confidently manage performance, detect and respond to threats, and ensure compliance across their operations.

Learn more at

Main office address

100 Brook Drive
Green Park

Telephone number

0118 453 9440


Key Products / Services / Sectors (USPs)

Single Platform. Single Agent.

Built for the demands of highly distributed, complex and modern networks.

The power of Tanium’s platform is its unique architecture. Tanium takes a patented approach to endpoint communications called “linear chain”. The platform decentralises data collection, aggregation and distribution down to the endpoint dramatically reducing direct client-to-server communications. Its modern architecture harnesses the intrinsic speed of low-latency LAN traffic which helps reduce inefficiencies caused by bloated databases, overloaded connections and heavy traffic across WAN segments.

Tanium Core Platform

Built for the demands of highly distributed, complex and modern endpoint-era networks, the Tanium architecture turns decentralisation and scale into an advantage.

Unified Endpoint Management

Manage end user, server and cloud endpoints on a single platform. Unified Endpoint Management helps the largest and most demanding organisations manage, inventory, monitor, contextualise and remediate end user, server and cloud endpoints with ultimate visibility and control at scale.

Unified Endpoint Security

Secure endpoints on a single platform. Unified Endpoint Security helps the largest and most demanding organisations identify and protect managed and unmanaged devices, and detect, respond to and recover from threats and breaches – all on a single platform and with ultimate speed, visibility, control and scale.


Backup and disaster recovery

Backup solutions

Incident response

Disaster recovery solutions

Disaster Recovery as a Service (DRaaS)

Penetration testing

Vulnerability scanning

Automated test tools

Web app PEN tests

Mobile app/IoT PEN tests

Social engineering PEN tests

Red Teams

Cybersecurity awareness training programs

On-site training programs

Online training

Interactive training videos


Automated phishing simulations

Cybersecurity consultancy

Compliance assistance

Security assessment, policy help, strategic advise

Information risk assessment

Privacy Impact Assessment services

Security architecture

Digital forensics and investigation services

Security and data protection audit

Network security

Data Loss Prevention (DLP)

Distributed denial of service (DDoS) prevention

Email security

Firewalls and web access firewalls (WAF)

Network segmentation

Security information and event management (SIEM)

Other intrusion detection (Machine Learning / AI based)

Endpoint security solutions

Mobile security


IoT security

Endpoint Detection and Response (EDR)

Network infrastructure controls, e.g. Firewalls, switches, security policy enforcement


URL filters

Security email gateway


Print management and security

Threat intelligence monitoring and detection

Consultancy and advice

User and Entity Behavior Analytics (UEBA)

Security information and event management (SIEM)

Network Traffic Analysis Framework

Web Proxy

Cybersecurity Platform

Phishing detection

Fraud detection

Rogue or Fake Mobile App Detection

Surface, “Deep” and “Dark” Web Monitoring

Social media monitoring

Brand Monitoring

Managed security services (MSSP)

Protective monitoring

Incident response

Vulnerability management

Threat management

Telco security

Security help desk and support

Staff training

Identity and access management

Identity provisioning (IDP)

Data verification

Data orchestration services

Identity hub

Authentication (credential) of citizens

Authentication (credential) of employees and other internal persons

Anti-fraud services, e.g. behavioural monitoring

Attribute provisioning and verification

Identity networks

Identity apps

Privacy and consent management

Privileged access management (PAM)


"The visibility we gained with Tanium was incredibly impressive. Classifying inventory and discovering IoT devices has been made possible."

Ken Athanasiou, Former CISO, AutoNation

"Operating on a global scale provides a lot of challenges when it comes to knowing your environment. For the first time, we've been able to get a fast and accurate picture of our environment with Tanium."

Troels Oerting, Former Group Chief Security Officer, Barclays

"Before Tanium we were always behind the curve with virus definitions. We were always playing catch up. It wasn’t unusual for 5–10% of our devices to be out of compliance with our policy. Once we deployed Tanium, our average went down to less than 1% almost overnight."

Greg Fisbeck, Former Senior Manager of Cyber Security Operations, Whirlpool







Ernst & Young

Main point of contact