Skip to content

SUCCESS STORY

How Tanium helped the United States Navy succeed

“The Navy is joined by its fellow military branches — the Army, Air Force and Marine Corps — in taking new, innovative approaches to secure and manage their endpoints. As cyber threats advance at rapid speed, these agencies are staying a step ahead of attackers and continually hardening their networks, while simultaneously managing IT at a much lower cost. We’re proud to help our nation’s Armed Forces achieve their cyber defense goals."

Ralph Kahn

Vice President of Federal
Tanium

Proud to help our nation's armed forces achieve their cyber defense goals

When it comes to cybersecurity, moving fast is crucial. Organizations need to be able to execute changes across their IT environment in seconds, even if that environment has millions of endpoints. The U.S. Department of Defense clearly recognizes this and is taking steps to make sure its IT teams have this capability.

Audit-ready in minutes, not months

Prior to Tanium, the Navy would spend months preparing compliance audits because existing technology could not collect accurate data across the millions of endpoints on the network. Now, the process takes minutes.

Separating signal from noise

One of the hardest things for a cyber defender is separating the noise from the signals indicating a serious attack. With Tanium's unprecedented visibility and speed, the Navy’s cyber defenders can now immediately spot intrusions that require their attention.

Attracting top talent

Some of the nation’s top tech talent has historically resisted coming into government because of its bureaucratic perception. Navy cyber teams are bucking this trend as they seek out best-in-class technology, adopting innovative solutions.

CASE STUDY

Navy cyber defenders gain unprecedented control over their network with Tanium

The United States Navy would spend months preparing compliance audits with tools that could not quickly provide accurate, comprehensive data of all endpoints. Tanium allowed the cyber defenders to scan their entire network, detect intrusions and automatically remediate them within minutes.