Tanium and VMware Carbon Black Cloud are leading cybersecurity solutions. VMware Carbon Black Cloud has an upper hand in ease of use and deployment, while Tanium's thorough security features stand out.
Features: Tanium provides extensive endpoint management, real-time data provisioning, and deep security capabilities. VMware Carbon Black Cloud offers straightforward threat detection, powerful response tools, and user-friendly interface.
Room for Improvement: Tanium could improve its user learning curve, reduce resource intensity, and streamline its deployment process. VMware Carbon Black Cloud needs better integration with third-party tools, fewer false positives, and enhanced customer service responsiveness.
Ease of Deployment and Customer Service: Tanium’s challenging deployment demands more time and expertise but is backed by strong customer service. VMware Carbon Black Cloud excels in quicker, simpler deployment, but its customer service can be more responsive.
Pricing and ROI: Tanium has high setup costs but provides good long-term ROI due to its comprehensive capabilities. VMware Carbon Black Cloud also has higher initial costs that are justified by its effective threat prevention leading to favorable ROI.
Product | Market Share (%) |
---|---|
Tanium | 2.3% |
VMware Carbon Black Cloud | 0.2% |
Other | 97.5% |
Company Size | Count |
---|---|
Small Business | 4 |
Midsize Enterprise | 3 |
Large Enterprise | 10 |
Company Size | Count |
---|---|
Small Business | 5 |
Midsize Enterprise | 4 |
Large Enterprise | 7 |
Tanium Endpoint Platform reduces security risk, improves agility & increases efficiency, a fundamentally new approach to endpoint security's threat detection, indicent response, vulnerability assessment and configuration compliance & with management's software distribution, asset utilization, asset inventory and patch management.
Fortify Endpoint and Workload Protection
Legacy approaches fall short as cybercriminals update tactics and obscure their actions. Get advanced cybersecurity fueled by behavioral analytics to spot minor fluctuations and adapt in response.
Recognize New Threats
Analyze attackers’ behavior patterns to detect and stop never-before-seen attacks with continuous endpoint activity data monitoring. Don’t get stuck analyzing only what’s worked in the past.
Simplify Your Security Stack
Streamline the response to potential incidents with a unified endpoint agent and console. Minimize downtime responding to incidents and return critical CPU cycles back to the business.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.