Skip to content

Threat Response In Real Life - Tanium Tech Talks #66

In this video, learn from a digital forensics and incident response professional how they use Tanium Threat Response in real life.

Module Deep Dive

Key takeaways for Tanium Threat Response:

  • Enable security teams to collaborate and accelerate
  • Live endpoint investigation of activity past and present
  • Interactive hunting of IOCs (indicators of compromise)
  • Zero in on files by name, hash, and magic number
  • Quarantine risky endpoints in real-time

Learn more:

Ashley McGlone

Technology strategist, joined Tanium in 2017, host of Tanium Tech Talks, enjoys advocating for customers, getting in the weeds of tech, and retro licorice.

Tanium Subscription Center

Get Tanium digests straight to your inbox, including the latest thought leadership, industry news and best practices for IT security and operations.

SUBSCRIBE NOW