


Tanium and VMware Carbon Black Cloud compete in the endpoint security category. VMware Carbon Black Cloud seems to have the upper hand due to its innovative threat detection and cloud integration capabilities despite Tanium's strengths in data analytics and incident response.
Features: Tanium offers real-time data collection, comprehensive systems management, and detailed data analytics. VMware Carbon Black Cloud stands out for threat intelligence gathering, behavior analysis, and cloud integration. These features emphasize VMware's security focus through the cloud, while Tanium is centered on broader endpoint management.
Room for Improvement: Tanium can improve its cloud-based capabilities, user interface, and deployment process speed. VMware Carbon Black Cloud might refine its on-premise support options, reporting detail, and pricing structures to enhance overall customer satisfaction.
Ease of Deployment and Customer Service: VMware Carbon Black Cloud offers a straightforward deployment with robust cloud support and adaptable customer service. Tanium may require a more extensive on-premise setup with longer implementation times, though it provides in-depth customer support for complex deployments.
Pricing and ROI: Tanium often has higher initial costs due to on-premise infrastructure demands but delivers strong ROI with extensive capabilities. VMware Carbon Black Cloud presents a lower entry price using a SaaS model, offering quick ROI and scalability with lower upfront investment.
| Product | Mindshare (%) |
|---|---|
| Cortex XDR by Palo Alto Networks | 3.4% |
| Tanium | 2.0% |
| VMware Carbon Black Cloud | 0.4% |
| Other | 94.2% |

| Company Size | Count |
|---|---|
| Small Business | 44 |
| Midsize Enterprise | 20 |
| Large Enterprise | 47 |
| Company Size | Count |
|---|---|
| Small Business | 8 |
| Midsize Enterprise | 3 |
| Large Enterprise | 12 |
| Company Size | Count |
|---|---|
| Small Business | 5 |
| Midsize Enterprise | 4 |
| Large Enterprise | 8 |
Cortex XDR by Palo Alto Networks provides advanced threat detection with AI-driven endpoint protection and seamless integration, ensuring multi-layered security and automatic threat response.
Cortex XDR is designed to safeguard endpoints against malware and suspicious activities. It offers advanced threat detection and response capabilities using behavioral analysis, AI, and machine learning. It seamlessly integrates with security infrastructures, providing endpoint security, firewall integration, and enhanced visibility in both cloud-based and on-premises environments.
What are the key features of Cortex XDR?Organizations in diverse sectors deploy Cortex XDR to protect against malware, leveraging its advanced threat detection capabilities. Its integration with existing security infrastructures appeals to those seeking comprehensive protection in both cloud and on-premises environments, providing enhanced visibility and threat intelligence.
Tanium offers robust endpoint protection, patching, and inventory management, consolidating the functions of tools like BigFix with capabilities in incident response, network security, and cloud or on-premise deployments.
Known for real-time capabilities, Tanium provides detailed analytics, security features, and device management. Users benefit from quick implementation, real-time updates, and patching campaigns. Despite its strengths, integration and custom plugin expansion remain areas to improve, along with data visualization and network optimization. Reporting enhancements and user training could advance its usability, and some UI elements may require updates for clarity and security.
What are the essential features of Tanium?Tanium's deployment spans industries focusing on endpoint protection and compliance, ensuring reliable device and server management in settings where safety and quick adaptation are critical. Organizations use it for application deployment, compliance checks, and integrating it as an EDR solution, enhancing overall security and operational efficiencies.
Fortify Endpoint and Workload Protection
Legacy approaches fall short as cybercriminals update tactics and obscure their actions. Get advanced cybersecurity fueled by behavioral analytics to spot minor fluctuations and adapt in response.
Recognize New Threats
Analyze attackers’ behavior patterns to detect and stop never-before-seen attacks with continuous endpoint activity data monitoring. Don’t get stuck analyzing only what’s worked in the past.
Simplify Your Security Stack
Streamline the response to potential incidents with a unified endpoint agent and console. Minimize downtime responding to incidents and return critical CPU cycles back to the business.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.