No more typing reviews! Try our Samantha, our new voice AI agent.

Menlo Secure vs Tanium comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Menlo Secure
Average Rating
9.2
Reviews Sentiment
6.7
Number of Reviews
5
Ranking in other categories
Secure Web Gateways (SWG) (27th), Firewalls (53rd), ZTNA (23rd), Cloud Security Remediation (8th)
Tanium
Average Rating
7.8
Reviews Sentiment
6.2
Number of Reviews
22
Ranking in other categories
Server Monitoring (3rd), Vulnerability Management (23rd), Endpoint Protection Platform (EPP) (19th), Endpoint Detection and Response (EDR) (21st), Unified Endpoint Management (UEM) (6th)
 

Mindshare comparison

While both are Security Software solutions, they serve different purposes. Menlo Secure is designed for Cloud Security Remediation and holds a mindshare of 1.9%.
Tanium, on the other hand, focuses on Endpoint Protection Platform (EPP), holds 2.3% mindshare, down 2.6% since last year.
Cloud Security Remediation Mindshare Distribution
ProductMindshare (%)
Menlo Secure1.9%
Wiz Code30.5%
Seemplicity17.8%
Other49.8%
Cloud Security Remediation
Endpoint Protection Platform (EPP) Mindshare Distribution
ProductMindshare (%)
Tanium2.3%
Microsoft Defender for Endpoint7.8%
CrowdStrike Falcon6.6%
Other83.3%
Endpoint Protection Platform (EPP)
 

Featured Reviews

reviewer2701794 - PeerSpot reviewer
Head Of Bluechip Enterprise at a manufacturing company with 51-200 employees
Provides strong protection and multiple use cases but struggles with market recognition
There aren't specific areas for improvement; however, they're not as well known as the big vendors such as Palo Alto. Menlo Secure is a smaller company with limited resources and funding, which makes it challenging to compete with larger companies such as Palo and Cisco. What can be improved is market awareness and adoption of the technology. When selling it in the channel, regardless of how good the technology might be, success depends more on market adoption and awareness.
MA
Division Manager, Information Technology at a legal firm with 51-200 employees
Centralized policies have improved remote endpoint control and have simplified data visibility
The integration is not simple and easy. It requires experienced users or people who have done the implementation. When certain policies are applied, they do not immediately push the policies. For example, we manage endpoint device USB access. We set a policy to block it, but it does not come into effect immediately. Sometimes it takes three or four days for it to reflect. That is a pain point. I have raised this issue with support as well, but they said that I need to limit the number of devices in the policy. In terms of application deployment, for us, it was seamless.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The solution is invisible to our end users, so it doesn't have any impact on their work or performance."
"This security technology addresses risk and enables people to conduct business without that risk, which is where the ROI is realized."
"Accessing the internet with a proxy from anywhere is the most valuable feature. It ensures that users are only able to browse legitimate websites. If they happen to go to a legitimate website with a malicious payload, the isolation feature will take care of that."
"It has reduced security events to follow up on. While it is not 100%, there has been probably a 90% or more reduction. We were getting hit left, right, and center constantly from people browsing the Internet and hitting bad websites. It was not just bad websites that were stood up to be malicious, but good sites that were compromised."
"We are not aware of a single compromise from the web since implementing the solution."
"We have definitely seen ROI, as we save a ton of money and time because the numerous hits that we were receiving from our security tools prior to implementing them had to all be chased down, dispositioned, and endpoints had to be reimaged."
"For us, the primary goal is protection on the web, and that's extremely important. We're not using any of the other services at this time. The web part is key to the success of the organization. It gives us the ability to protect. It can isolate. It opens the session in an isolated format so that the code isn't running locally. It is running over in the Menlo environment, not in ours. It is not running on the local computer, whereas if you were to go to a normal website, it would run Java or something else on the local machine and potentially execute the malicious code locally. So, it does give us that level of protection."
"Either you have access to something or don't have access to it, and if you do, we can ensure, 100 percent of the time, that there is nothing malicious that is going to impact our system in any way."
"The most valuable features of this solution are the consolidation of all historical data on device endpoints, security drivers, firmware, and Software version gaps."
"I'm not so familiar with the tool but I like the interaction of the console to the picture. Patching is the primary model I have been focusing on for the last couple of weeks. So I have created a proof of concept environment and have been checking the available features."
"The product is granular and can build complex roles compared to other EDR vendors."
"For incident response tasks, all these tasks can get done in minutes with minimal disruption to the end-user."
"The interrogation piece was the most valuable feature because it was very detailed."
"I like the fact that you can create patching campaigns depending on the area of your network that you want to address first."
"Tanium has made the process of detecting threats more proactive with its detection. So, the process is easier and more efficient."
"Tanium is used for endpoint management, specifically patching and configuration management."
 

Cons

"Menlo Secure is a smaller company with limited resources and funding, which makes it challenging to compete with larger companies such as Palo and Cisco."
"Currently, I don't have a good way to see which of my rules are being used in the access control lists."
"Currently, I don't have a good way to see which of my rules are being used in the access control lists. I have numerous entries, but are they all still needed? A report that would show me my list of who is allowed and whether we're actually using it would be useful because I can then go clean up my list. It would be easier to manage. We would eliminate the vulnerability of unused services."
"The user monitoring could still be improved."
"In the best of all worlds, we wouldn't have to make any exceptions. However, that is a big ask because a lot of that depends on how websites are constructed. For example, there are some very complex, application-oriented sites that we end up making exceptions for. It is really not that big an issue for us to make the exceptions. We feel like we are doing that without a huge impact on our security posture, but we do have to make some exceptions for complex sites, e.g., mostly SaaS-type sites and applications."
"We are now transitioning to another solution. The main reason for that is that managing all of the exceptions and troubleshooting all of the issues our users have had connecting to the internet has become too significant in terms of workload, compared to what we hope we will have with another solution."
"We are now transitioning to another solution. The main reason for that is that managing all of the exceptions and troubleshooting all of the issues our users have had connecting to the internet has become too significant in terms of workload, compared to what we hope we will have with another solution."
"In the best of all worlds, we wouldn't have to make any exceptions. For example, there are some very complex, application-oriented sites that we end up making exceptions for."
"I would like to have more integrations and custom plugins to input."
"Tanium’s scalability could be improved."
"When working with Tanium, there are some older devices that haven't been patched for a long time, and certain patches are not included in Tanium. I have to search outside to download patches, create bundles, and then perform the task."
"The most painful thing is the interface. It's a bit unclear sometimes."
"The solution can give a lot of false positives."
"The problem or challenge is a pre-sales and go-to strategy for the SMB market delivered through a channel or model. It's very convoluted and vague, which leads to some confusion about the various types of modules, and the device-to-seat cost is extremely difficult to calculate."
"Tanium's limitations should be improved because although it is a great tool, it is limited to only a few classes during a session."
"The performance could improve in future releases. We have had performance issues in specialized web environments, but overall I think the problems are less than 2% of the computer systems being used."
 

Pricing and Cost Advice

"We save a ton of money and time. Previously, the numerous hits that we were receiving from our security tools, prior to implementing them, had to all be chased down, dispositioned, and endpoints had to be reimaged. It was just a ton of effort to do all that. That is where the savings from time and money come in."
"It is appropriately priced for what they're doing for us. Considering the protection provided, I feel their pricing is spot-on."
"The solution is expensive. It's more expensive than the solution I previously used. Compared with the other cloud-based solutions, it's very competitive."
"It is higher than some competitors in the market."
"Tanium is a more expensive solution in Latin America than some of the competitors, such as BigFix."
"It's an expensive solution. It would be nice if the cost were lower."
"The product's pricing differs from region to region depending on negotiations and the number of endpoints."
"The solution is expensive but it's a good investment."
"The solution offers value for money."
"There is an annual license required to use this solution."
report
Use our free recommendation engine to learn which Cloud Security Remediation solutions are best for your needs.
885,789 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Manufacturing Company
14%
Retailer
10%
Computer Software Company
9%
Construction Company
9%
Financial Services Firm
15%
Government
11%
Manufacturing Company
9%
Healthcare Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business8
Midsize Enterprise3
Large Enterprise12
 

Questions from the Community

What needs improvement with Menlo Security Secure Web Gateway?
There aren't specific areas for improvement; however, they're not as well known as the big vendors such as Palo Alto. Menlo Secure is a smaller company with limited resources and funding, which mak...
What is your primary use case for Menlo Security Secure Web Gateway?
People are mainly using it for zero trust web access. Menlo Secure is built from the ground up to provide zero basic access, and by doing it that way, it has multiple use cases. For example, it man...
What advice do you have for others considering Menlo Security Secure Web Gateway?
Secure file sharing and data protection is not exactly what Menlo Secure is designed to do. While it can handle some of these functions, people typically choose another technology for those specifi...
What needs improvement with Tanium?
While there is always room for improvement, I am pleased with Tanium.
What is your primary use case for Tanium?
The primary use case for Tanium ( /products/tanium-reviews ) is compliance, patching, and inventory as part of the core functions.
What advice do you have for others considering Tanium?
For smaller companies, Tanium is quite a big investment, and one needs to have a considerable setup to make it economically viable. I would recommend it to others with a similar use case. The solut...
 

Also Known As

Menlo Security Web Security, Menlo Web Security
Tanium Inc Cloud, Tanium XEM
 

Overview

 

Sample Customers

Information Not Available
JPMorgan Chase, eBay, Amazon, US Bank, MetLife, pwc, Cerner, Delphi, MGM Grand, New York Life