Tanium Primary Use Case
MA
Mairajuddin Ahmed
Division Manager, Information Technology at a legal firm with 51-200 employees
Currently, we have around six Fortinet boxes in three locations, but nothing as a cloud service yet.
We are using Kaseya VSA. Kaseya is deployed in the cloud with Office 365. We also have Tanium from the corporate office, which is another tool that is part of Trend Micro.
We manage Tanium by looking at what is happening and report any anomalies to the head office.
Tanium is a mandate from our corporate office. We had to install it so that they can push their applications remotely. For example, we implemented Trend Micro, but nothing was done from our side. We had to install Tanium on the endpoints and then we got Trend Micro up and running on the endpoints through Tanium.
Once we install Tanium, we see that after a certain period of time, Trend Micro has been deployed without our intervention. It is a good tool for remote application deployment. However, Tanium itself has to be deployed manually.
We set a policy to block USB access. The moment a device is being set up on the network, I apply the policy, but it does not come into effect immediately. Sometimes it takes three or four days for it to reflect.
View full review »VK
Vignesh K
Infra Vulnarability Manager at Rezilyens
We primarily use Tanium for patching, focusing on vulnerabilities. Our major goal with Tanium is to patch based on vulnerabilities detected by our other vulnerability tools.
View full review »
The primary use case for Tanium is compliance, patching, and inventory as part of the core functions.
View full review »
Buyer's Guide
Tanium
February 2026
Learn what your peers think about Tanium. Get advice and tips from experienced pros sharing their opinions. Updated: February 2026.
884,371 professionals have used our research since 2012.
Tanium is used for endpoint management, specifically patching and configuration management.
View full review »Tanium is used for heterogeneous endpoint management in general. As a consultant, I work with different customers across multiple industries. Tanium could be useful in finance, education, federal, and I have worked with companies in education, distribution, logistics, manufacturing, and aerospace. Some of them do have Tanium in those situations.
View full review »I use the solution in my company for reporting, software delivery, and patching. The tool is similar to SCCM.
GP
GaborPalatinus
Senior Director of Corporate IT at a tech vendor with 501-1,000 employees
We initially conducted a proof of concept with Tanium, but we ended up using Patch My PC on the Windows side and a plugin called Superman for Jamf on Mac devices. Our environment is highly restrictive with no administrative rights, which led to limitations with some solutions.
View full review »
KP
KAPIL SINGH PAYAL
SCCM at Itcinfotech
We use Tanium to deploy applications and for third parties, like Google Chrome which is already in-built in Tanium. We have deployed some packages which we are already using through SCCM, and those packages are what we are using in Tanium to attach those files and make a command line. Installation, uninstallation part, and detection methods are the things that we are using in Tanium.
I use Tanium to run all the security operations, threat intelligence, vulnerability management, threat hunting, red teaming, purple teaming, and everything within the vulnerability management space.
Server message block communication is one of the platform's strengths that tells how quickly it can get all the data. However, when we first deployed it, we were told to remove it immediately because it was causing issues along those lines. Within our system, we use the solution for the instant discovery and visibility aspect instead of using it to scan for vulnerability management. We have another solution for regular scanning. We use Tanium to collect the data from endpoints for the live response functions for looking at anomalous behaviors. When we had a specific targeted attack against it, a specific process was running, and we could identify and stop all of those.
We use the tool as an infrastructure operational management solution.
View full review »It's mainly used by the cybersecurity team for Windows patching and deployment of some software solutions.
View full review »We use Tanium as an EDR solution for managing end-user devices and servers.
View full review »We use the solution for patching and security response.
View full review »Tanium is primarily used for CMDV (Configuration management database) discovery. Tanium is meant to discover CIs and assets.
View full review »There are some very compelling use cases. A value proposition.
Tanium is used for network security. We can acquire files, detect malicious file-related activities, and process-related activities in our environment.
We primarily use the solution for inventory and incident response for the most part.
View full review »VK
Vikas K
Technical Consultant at Aon Corporation
We also use BigFix. Our primary use case for Tanium is for tool consolidation. Tanium is already equipped with multiple capabilities that BigFix has. These are almost parallel tools, running with similar kinds of capabilities. We are planning to flip to Tanium, which might primarily be used as a management solution. Overall, we use Tanium to interact and discover related queries. It is also used as our system information and event management tool.
View full review »Tanium can be deployed on the cloud and on-premise.
View full review »Our primary use case of this solution is for endpoint protection and, more particularly, the patching. We are integrators and customers of Tanium and I'm a channel director.
It's used at an enterprise level to monitor natural behavior and point behavior across the organization.
View full review »I use Tanium for patching operating systems, upgrading applications, and watching and maintaining Windows endpoints.
View full review »Buyer's Guide
Tanium
February 2026
Learn what your peers think about Tanium. Get advice and tips from experienced pros sharing their opinions. Updated: February 2026.
884,371 professionals have used our research since 2012.


















