Welcoming Maggie Wilderotter and Anthony Belfiore to Our Board

We’re entering our tenth year as a company. A decade ago, the very idea of Tanium was impossible for most enterprise IT teams to imagine: a platform that could provide accurate and up-to-date information about the state of every endpoint on a network in seconds, across the largest networks, up to many millions of endpoints....

Assessing What Matters in an EDR Solution

Looking back at 2015, it’s hard to dispute that the security industry has been flooded with Endpoint Detection and Response (EDR) products. Walk the sponsor floor at any conference or sample the white papers and marketing pitches from any vendor web site, and you’ll see the same claims repeated ad nauseam: “Prevent, Detect, and Respond”...

Reducing Risk during Mergers & Acquisitions

A checklist to create cross-company visibility of all systems Mergers and acquisitions activity among the world’s largest companies has been on the upswing since 2014 with Dow and DuPont making headlines last week as the latest blockbuster merger, following names like Starwood and Marriott and AT&T and DirecTV. Acquiring companies face a long list of...

How to Get to the Root of Certificate Security Risks

News recently broke about Dell shipping a self-signed root Certificate Authority (CA) certificate and its private key on a wide range of Windows-based systems. This provided an opportunity for attackers to use the CA to generate bogus certificates for popular websites, and subsequently intercept traffic to and from those sites on open networks (like a...