Featured White Paper

Frost and Sullivan Stratecast:
Missing Critical Patches: A Cybersecurity Epidemic

We surveyed 200 IT professionals and asked them about their security hygiene best practices. Find out what we learned.

Read the Report


  • Tanium_Asset.png

    Tanium Asset

    Tanium Asset gives operations and IT asset management teams a thorough and up-to-date picture of their endpoint hardware, software, and configuration inventory. This helps organizations make the right decisions about how to deploy their assets most efficiently.


  • tanium-home-hero-bg.jpg

    Tanium Threat Response

    Tanium Threat Response delivers a broad set of capabilities to hunt, detect, investigate, contain, and remediate threats and vulnerabilities with unparalleled speed and scalability.


  • Security Hygiene

    Tanium Integrity Monitor

    Tanium Integrity Monitor simplifies regulatory compliance and makes file integrity monitoring more effective enterprise wide.


  • comply-1.jpg

    Tanium Comply

    Improve security hygiene by transforming security configuration compliance from a labor-intensive, unreliable
    activity that takes weeks to get enterprise-wide results to one that can be performed on-demand


  • tanium-core-datasheet.jpg

    Tanium Core Platform

    Tanium Core Platform provides security and IT operations teams the unique power to secure, control and manage millions of endpoints in seconds.


  • Tanium-Protect.jpg

    Tanium Protect

    Learn how Tanium Protect delivers proactive protection to block malicious attacks on endpoints using native operating system controls at enterprise-scale.


  • resource-thumb-discover.jpg

    Tanium Discover

    Tanium Discover quickly finds unmanaged assets within the enterprise environment, even across the largest global networks, and allows security and IT teams to directly take actions necessary to review, secure and gain control of these assets.


  • Tanium-Endpoint-Platform-Architecture.jpg

    Tanium Endpoint Platform Architecture

    Tanium’s patented endpoint communications architecture provides 15-second visibility and control across every endpoint on the network, and can easily scale to millions of endpoints without requiring ongoing infrastructure additions.


    Read Now
  • Tanium-Connect.jpg

    Tanium Connect

    Tanium Connect enriches third-party security and management tools with accurate and complete endpoint data, providing shared visibility across both security and IT operations teams for better, faster decisions and actions.


    Read Now
  • Tanium-Patch.jpg

    Tanium Patch

    Tanium Patch automates previously time-consuming and error-prone patch management processes across millions of endpoints with unparalleled speed, flexibility and reliability, without requiring an expensive and complex infrastructure to support it.


    Read Now

White Papers



  • IR_Webinar-1.png

    Best Practices for Remediating Recent Security Incidents

    Consider how you recently remediated WannaCry or Petya-related incidents. Did you do more than quarantining impacted systems and killing malware?

    Register to view this webinar on demand where we’ll explore a real-world example, sharing how we remediate incidents at Tanium using Tanium.


  • Investigating_Hunting_for_Anomolies.png

    Best Practices for Investigating and Hunting for Anomalies

    The amount of time an attacker remains within your network directly affects the scope and cost of a breach. As you know, attackers are creative; once in your network, they can remain undetected for months, wreaking havoc along the way. In this webinar, we’ll share real-world examples from the front lines of cyber-hunting, and discuss best practices on how to reduce the mean time to investigate.


    View Now
  • Detecting_Security_Incidents_at_Scale.png

    Best Practices for Detecting Security Incidents at Scale

    Detection is the beginning of your EDR program. Most organizations would like to reduce the amount of time between incident event and alert, as well as broaden the types of malicious activity they can detect on endpoints. In this webinar, Tanium will share tales from the IT security professional’s perspective, and discuss how they’ve focused on these key aspects of detection.


    View Now
  • Compliance_thumb.png

    Addressing Compliance Challenges at the Endpoint with Tanium

    Can you confidently detect changes to any of your enterprise endpoints at any time? Do you feel as if you’re constantly playing catch-up when it comes to measuring and improving your IT risk or compliance posture? Watch this webinar to on-demand to resolve your most compelling endpoint compliance challenges.


  • TIM.jpg

    Introducing Tanium Integrity Monitor

    Are you drowning in a sea of disparate point tools that don’t play nicely together? Is regulatory compliance keeping you up at night? Are you struggling to deploy effective file integrity monitoring enterprise-wide? View this webinar on-demand to learn how to resolve these and other challenges.


  • comply-1.jpg

    Introducing Tanium Comply

    By providing enterprise-wide visibility and control in seconds, Tanium is already one of the best ways to fix troublesome security hygiene issues. With the latest Tanium Product Module – Tanium Comply – organizations can realize a new level of effective security hygiene.


  • getting-it-right.jpg

    The Importance of Getting It Right: The Tanium Duo Working Behind-the-Scenes of USA Network’s Hit Show, Mr. Robot

    Register to hear cybersecurity experts and Mr. Robot technical consultants Andre McGregor and Ryan Kazanciyan as they discuss their role in helping infuse reality into the “stranger than fiction” hacks featured in Mr. Robot. More importantly, they’ll shed some light on how many of the exploits featured in the show can easily be prevented and remediated using Tanium. Both Ryan and Andre discuss their work on the show – and divulge how Mr. Robot’s dystopian fantasy serves as an important platform for awareness and change.


  • its-time-to-rethink-security.jpg

    Addressing Cybersecurity Challenges in Retail with Speed and Scale

    Retailers face a unique set of cybersecurity challenges – sensitive information, including card data and personal information, remain lucrative targets for criminals. Legacy applications, a diverse set of systems, and geographically dispersed networks introduce complexity that contributes to the challenges facing retailers. Register to view the on-demand webinar to learn more about how important it is for retail organizations to have real-time visibility and control.


    Register to View On-Demand
  • Fedscoop-Webinar-Thumb.png

    Secure and Manage Millions of Endpoints in Seconds

    Real-time identification of your network endpoints has become an essential capability in discovering vulnerabilities and ensuring network security, but a recent survey of executives from more than 1,500 leading global organizations found that 98% of respondents indicated their organization was unable to track all devices and users on their network. Of those respondents, only 10% stated that they were regularly updated with information about the types of cybersecurity threats facing their organizations. View this webinar on-demand to find out how federal agencies can have instant visibility and control over all of their endpoints with unprecedented speed and scale.


    Register to View On-demand
  • The-Accountability-Gap-thumbnail.jpg

    The Accountability Gap: Cybersecurity & Building a Culture of Responsibility

    Nasdaq & Tanium recently launched a report, “The Accountability Gap: Cybersecurity & Building a Culture of Responsibility” – based upon research conducted at Goldsmiths, University of London. This project was able to identify an organizations cybersecurity vulnerability by assessing awareness & readiness of a number of capability areas including Cyber Literacy, Risk Appetite, Threat Intelligence, Legislation & Regulation, Network Resilience, Response, and Behavior. View this on-demand webinar to better understand how to address the vulnerability gap within your organization.


  • SOC-of-One.png

    A SOC of One – IOC Hunting at Scale with Minimal Resources

    In today’s challenging threat environment, a key advantage is the ability to do more with minimal resources, in terms of both people and time. Register to view this on-demand webinar, “A SOC of One – IOC Hunting at Scale with Minimal Resources”. You’ll see a live demonstration of how you can do more with less, geared specifically for the unique demands of Government, Healthcare and Education.


  • webinar-protect-poster.jpg

    Introducing Tanium Protect

    View this on-demand webinar to learn how Tanium Protect delivers policies and actions to manage native operating-system protections at enterprise-scale – thus reducing the cost and complexity of endpoint security. Combined with Tanium IOC Detect, Protect empowers customers to seamlessly move from investigating their environment to taking proactive action to protect against threats.


  • webinar-thumb-critical-role.jpg

    Critical Role of IT Operations Teams in Cybersecurity

    Much is made of the emergence and importance of the CISO role to proactively counter the many cybersecurity threats that organizations face today – and the CISO and their teams are incredibly important. However, IT ops, endpoint admins, and server admins play an equally critical role.


  • palo-alto-networks-and-tanium1.jpg

    Palo Alto & Tanium: Malicious Behavior Detection at Scale

    Palo Alto Networks and Tanium are bridging the cybersecurity gaps between the endpoint and the network. Watch this webinar to learn how our solution aligns endpoint and threat intelligence across the organization, providing fast and effective detection and response against targeted and never seen before attacks.


  • webinar-tanium-endpoint-security-lifecycle.jpg

    Tanium: Rethinking the Endpoint Security Lifecycle

    Learn how Tanium is rethinking the endpoint security lifecycle to dramatically accelerate detection, investigation, remediation and ongoing enforcement of security. See our new forensics module in action, which helps organizations quickly and completely understand the origin, scope and cause of a cyber attack across millions of endpoints in 15-seconds.


    View Now


  • resource-trace-demo.png

    Tanium Trace Overview

    Learn how Tanium Trace, part of Tanium Threat Response, helps incident response teams take an initial lead, filter and visualize forensic data to quickly piece together the puzzle about what happened on an endpoint in a given timeframe, and identify other comprised systems enterprise-wide in seconds.


    View Now
  • Tanium-Endpoint-Platform-Overview-resource.jpg

    Tanium Endpoint Platform Overview

    Learn how Tanium empowers security and IT operations teams with the unique power to secure, control and manage millions of endpoints with unprecedented speed, simplicity and scale.


    View Now

Case Studies

  • Barclays_Case_study.jpg

    Barclays Case Study

    Learn how Barclays improved IT Operations and Security with the Tanium Communications Architecture.

    Case Study

  • whirpool-tile-resources.jpg

    Whirlpool Corporation Case Study

    Learn how Whirlpool Corporation, the number one selling appliance manufacturer, leverages Tanium to integrate with existing security solutions and address security hygiene consistently.

    Case Study

  • autonation-tile.jpg

    AutoNation Case Study

    Learn how AutoNation, the world’s largest automotive retailer, leverages Tanium to secure endpoints faster and address security hygiene consistently.

    Case Study

  • godaddy.jpg

    GoDaddy Case Study

    GoDaddy leaders share how Tanium helps them remove malware and isolate and remediate network outages.

    Case Study

Solution Briefs

  • tanium-windows10-migration.jpg

    Tanium for Windows 10 Migration

    With potentially tens of thousands, or even hundreds of thousands, of endpoints in an organization, finding an approach to Windows 10 migration which can scale and minimize user disruption is critical. Find out how your Windows 10 project teams can leverage the Tanium Platform to enable cost-effective migration at scale.

    Solution Brief

  • servicenow-tile.jpg

    Tanium & ServiceNow

    ServiceNow and Tanium improve visibility and control of endpoints, enabling this valuable information to be collected automatically. Organizations can respond to threats quickly by joining Tanium’s endpoint visibility and control with ServiceNow workflows, automation, and orchestration.

    Solution Brief

  • edr-tile-1.jpg

    Detection and Response

    Solving detection and response with just another point tool, won’t help you hunt and detect for threats fully. You need to consider how to detect, investigate, remediate and enforcement. Find out why in this solution brief.

    Solution Brief

  • it-asset-tile.jpg

    IT Asset Visibility

    Getting visibility to your IT assets effectively can take hours or weeks. When you need to make an important decision based on IT assets, how can you do that on a moment’s notice? Find out it’s possible in this solution brief.

    Solution Brief

  • it-ops-tile.jpg

    IT Ops Management

    You and your team’s job is a lot more than just patching. Find out how Tanium can help you and your team be more efficient and consistent and managing day-to-day operational efforts in this solution brief.

    Solution Brief

  • retail-img.jpg


    Retailers have specific needs around security and operations management software. You also have to comply with PCI, SOX, etc. Find out how Tanium helps Retailers in this solution brief.

    Solution Brief

  • financial-img.jpg

    Financial Services

    10 out of the 10 top banks chose Tanium. Find out how Tanium helps Financial Institutions in this solution brief.

    Solution Brief

  • healthcare.jpg


    Healthcare organizations are trying to remove legacy and complex IT infrastructure, while maintaining compliance with HIPAA and Hi-Tech. Find out how Tanium helps the healthcare industry in this solution brief.

    Solution Brief

  • new-palo-tile.jpg

    Tanium & Palo Alto Networks

    Tanium and Palo Alto Networks have teamed together to ensure Find out how in this solution brief.

    Solution Brief

  • Tanium-for-Cloud-Migration-and-Management.jpg

    Tanium for Cloud Migration and Management

    Migration to cloud is an expensive, time consuming process. Download the solution brief to learn how Tanium provides critical insight and identifies opportunities to rationalize and secure infrastructure before and after migrating to the cloud.

    Solution Brief

  • M_and_A.png

    Tanium for Mergers & Acquisitions

    Tanium can help accelerate the due diligence process and reduce risk through identifying synergies, rationalizing assets, and containing threats. Download the solution brief, “Increase M&A Value By Gaining Visibility, Control And Reducing Risk” to learn more.

    Solution Brief