How We Track Mean Time to Patch (4-part blog series)

This is the third of our four-part blog series exploring how we use the Tanium platform in our own organization. In this installment, SecOps Engineer Greg Pothier shares how to use Tanium and Splunk together to deliver patch management data, which CSOs and other security leaders can tap to assess risk potential. How useful would...

Bank of America Merrill Lynch Honors Tanium for Innovation in Enterprise Technology

We are honored to share that Bank of America Merrill Lynch (BofAML) has recognized Tanium for its innovation in enterprise technology, and was chosen as this year’s sole recipient of this distinction at their 8th annual Technology Innovation Summit held in Silicon Valley this week. BofAML selected Tanium as a standout among all enterprise tech...

Is Business as Usual Possible in the Cloud?

I am privileged to have been part of two massive IT transformations in my career. At VMware, I partnered with enterprises as they embarked upon a once-in-a-generation transformation to virtual machines and then to the private cloud. I was personally involved in launching the VMware vCloud Director private cloud platform and saw some of the...

With Importance Comes Duty

Fortune Magazine recently named Tanium one of the 25 most important private companies of 2016, recognizing the most influential private enterprises for their “prodigious revenues or assets, their social currency, their deep connection to our daily lives and their disruptive impact.” It’s an honor to be included among such an impressive list of companies challenging...

Hunting for Rogue PowerShell Profiles

During the earliest phases of an intrusion, attackers typically move to establish persistence on at least a subset of compromised systems. This might be to ensure that they can easily regain access to the victim environment, such as via a backdoor, or to keep other forms of malicious code running, such as a keystroke logger....

Our Design Journey

When I signed on as Chief of Design and User Experience, I was drawn to Tanium’s philosophy of customer-driven innovation, because it holistically aligns with the principles of user-centered design. I love working in industries that are early on the design curve. When I started as a UX Designer at Google Analytics, metrics were for...

A Platform for Change

Everyone has a budget they have to live within. Unfortunately, many IT Security leaders already have their hands tied — no matter the line item number — because they’ve committed the majority of their annual budgets to prevention technologies such as antivirus and intrusion protection systems, tools that no one believes actually work anymore. Procurement inertia has become as...

Only the Beginning

“There are three existential threats that can put us out of business today,” a CEO recently told me. “Meteors, nuclear war, and cybersecurity.” From boardrooms to living rooms, each of us feels the impact of data breaches. At Tanium, we know firsthand that point solutions, anti-virus tools, and strategies steeped in “hoping for the best”...

Assessing What Matters in an EDR Solution

Looking back at 2015, it’s hard to dispute that the security industry has been flooded with Endpoint Detection and Response (EDR) products. Walk the sponsor floor at any conference or sample the white papers and marketing pitches from any vendor web site, and you’ll see the same claims repeated ad nauseam: “Prevent, Detect, and Respond”...

The Time to Change Federal Cybersecurity is Now

This week, Federal CIO Tony Scott is expected to release a public report on ideas submitted from industry, government and academia to the American Council for Technology and Industry Advisory Council (ACT-IAC), a public-private partnership, for how agencies can stay ahead of and recover from cyber attacks. The report is a milestone in the race...