Detailed device data: It provides a rich set of information for each discovered device, including hostname, MAC and IP addresses, operating system, open ports, and historical data like first and last seen timestamps. This allows for better asset management and informed decisions. Review collected by and hosted on G2.com.
On-premise management: By default, Tanium Discover requires on-premise infrastructure management, which adds complexity for some users. This can be a burden for organizations that prefer cloud-based solutions Review collected by and hosted on G2.com.
Tanium discover helps to scan the network to uncover any asset that might been overlooked or forgotten. It also identifies whether the discover host is onboarded to tanium already. It has various level of scanning method that is suitable for all kind of environment. Review collected by and hosted on G2.com.
High learning curve as you might unintentional discover certain network you don't want to see. Example user's home network. You will have to whitelist user's home ip address range to prevent tanium discover from scanning it. Review collected by and hosted on G2.com.
Explore the clients with location and manageable scans could be run for all categories Review collected by and hosted on G2.com.
Yet to explore and make complete use of discover Review collected by and hosted on G2.com.
There are some important points which I like most about Tanium Cloud:
Real-Time Visibility
Endpoint Management
Security Capabilities
Scalability
Speed and Performance
Comprehensive IT Operations
Unified Platform
Adaptability to Remote Work Review collected by and hosted on G2.com.
There are not many, but a few important things that were problematic for Tanium Cloud
1. Constant TSE errors for Windows Machine
2. Vulnerability database is not timely updated
3. Patch Management issues with Ubuntu servers Review collected by and hosted on G2.com.
* Endpoint tooling configurations are less tedious, and Tanium takes care of the availability & security management.
* Provisioning, removing and protecting user roles can be defined in its Identity & Access management console at granular levels.
* Since our customer data is directly loaded into the Tanium platform, we can use its analytics dashboard to generate metrics, customer usage info & other metadata attributes.
* Tanium infrastructure supports multiple data hosting regions, thereby improving resiliency & recovery management of our customer data.
* All our new implementation & endpoint configurations are easily modified in the Tanium cloud platform's cloud-native infrastructure. Review collected by and hosted on G2.com.
* We have recently started using the Tanium platform for one of our new customer requirements.
* Tanium agent scans through our entire cloud infrastructure and provides visibility without any additional costs.
* Since all endpoints are under Tanium's dedicated pipeline, we can utilize the parameters from our pre-existing data source connections.
* Auto-remediation feature effectively removes all malicious entities found after the endpoint investigation scan.
* So far, we are satisfied with the services offered by Tanium for our cloud-native application deployments. Review collected by and hosted on G2.com.
It allows us to have a holistic view of issues (end user, performance, hardware resources, etc.) and even retains historical information that can then be used to report on and proactively stop events from reoccurring in the future. Review collected by and hosted on G2.com.
Not so much a downside, more of a comment that to get the best out of Tanium Performance and using it to its full potential, you should really invest in the Tanium environment and product suite Review collected by and hosted on G2.com.
One of the best thing about Tanium is that it meets many requirements as an endpoint security tool. It has various modules to help us in achieving what we want- be it reports for analysis or deploying any patch or upgrade. Review collected by and hosted on G2.com.
It is a bit complex for people who are to cyber security stream and are using Tanium as a first tool for hand on experience on endpoint security. Review collected by and hosted on G2.com.
The ease of configuring patching schedules
Total control with admin to push patches and force install
Easy to push packages (Updates ) OTA
Must for managing large infra as it takes to much time to do these tasks manually Review collected by and hosted on G2.com.
Nothing that I dislike, All good at the moment Review collected by and hosted on G2.com.
Tanium is like a swiss army knife for endpoint and network management and security. Review collected by and hosted on G2.com.
Tanium can be expensive, but they are top notch and you can negotiate significant discounts. Review collected by and hosted on G2.com.
Tanium tool was well designed user friendly tool. Segregated module wise for Infrastructure needs. Very easy to schedule & install patches and also for agent installations/uninstallation. I recommend this tool for al the IT infrastructure Review collected by and hosted on G2.com.
Upgrades of Tool might get little confused using the UI Review collected by and hosted on G2.com.