Try our new research platform with insights from 80,000+ expert users

Tanium Primary Use Case

VK
Infra Vulnarability Manager at Rezilyens

We primarily use Tanium for patching, focusing on vulnerabilities. Our major goal with Tanium is to patch based on vulnerabilities detected by our other vulnerability tools.

View full review »
reviewer2696286 - PeerSpot reviewer
Architect at a government with 10,001+ employees
The primary use case for Tanium is compliance, patching, and inventory as part of the core functions. View full review »
GP
Senior Director of Corporate IT at a tech vendor with 501-1,000 employees
We initially conducted a proof of concept with Tanium, but we ended up using Patch My PC on the Windows side and a plugin called Superman for Jamf on Mac devices. Our environment is highly restrictive with no administrative rights, which led to limitations with some solutions. View full review »
Buyer's Guide
Tanium
June 2025
Learn what your peers think about Tanium. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
861,170 professionals have used our research since 2012.
NitinKushwaha - PeerSpot reviewer
Product Manager at OakNorth

We use Tanium as an EDR solution for managing end-user devices and servers.

View full review »
KP
SCCM at Itcinfotech

We use Tanium to deploy applications and for third parties, like Google Chrome which is already in-built in Tanium. We have deployed some packages which we are already using through SCCM, and those packages are what we are using in Tanium to attach those files and make a command line. Installation, uninstallation part, and detection methods are the things that we are using in Tanium.

View full review »
reviewer2213730 - PeerSpot reviewer
Head of Cyber Defence at a financial services firm with 1,001-5,000 employees

I use Tanium to run all the security operations, threat intelligence, vulnerability management, threat hunting, red teaming, purple teaming, and everything within the vulnerability management space.

Server message block communication is one of the platform's strengths that tells how quickly it can get all the data. However, when we first deployed it, we were told to remove it immediately because it was causing issues along those lines. Within our system, we use the solution for the instant discovery and visibility aspect instead of using it to scan for vulnerability management. We have another solution for regular scanning. We use Tanium to collect the data from endpoints for the live response functions for looking at anomalous behaviors. When we had a specific targeted attack against it, a specific process was running, and we could identify and stop all of those.

View full review »
reviewer1320009 - PeerSpot reviewer
Founder at a construction company with 11-50 employees

There are some very compelling use cases. A value proposition.

View full review »
Ed Jarecki - PeerSpot reviewer
Owner/Assistant Vice President at Jarecki Real Estate Investments/ EverView

We use the tool as an infrastructure operational management solution. 

View full review »
Mo Vermeiren - PeerSpot reviewer
Cybersecurity Business & Technology Consultant at Capgemini

It's mainly used by the cybersecurity team for Windows patching and deployment of some software solutions.

View full review »
Daniel Blackburn - PeerSpot reviewer
IT Operation Services Manager / IT Vendor Coordinator / Change Manager at a healthcare company with 501-1,000 employees

We use the solution for patching and security response. 

View full review »
reviewer2206665 - PeerSpot reviewer
CEO

Tanium is primarily used for CMDV (Configuration management database) discovery. Tanium is meant to discover CIs and assets.

View full review »
reviewer1581882 - PeerSpot reviewer
Sr Manager - Information Security & Researcher at a tech services company with 1,001-5,000 employees

Tanium is used for network security. We can acquire files, detect malicious file-related activities, and process-related activities in our environment.

View full review »
reviewer1493466 - PeerSpot reviewer
IT Security Manager at a transportation company with 1,001-5,000 employees

We primarily use the solution for inventory and incident response for the most part.

View full review »
VK
Technical Consultant at Aon Corporation

We also use BigFix. Our primary use case for Tanium is for tool consolidation. Tanium is already equipped with multiple capabilities that BigFix has. These are almost parallel tools, running with similar kinds of capabilities. We are planning to flip to Tanium, which might primarily be used as a management solution. Overall, we use Tanium to interact and discover related queries. It is also used as our system information and event management tool. 

View full review »
Santiago Mantilla - PeerSpot reviewer
Senior Information Technology Security Consultant at Intelector

Tanium can be deployed on the cloud and on-premise.

View full review »
reviewer1374876 - PeerSpot reviewer
Channel Director at a tech services company with 1-10 employees

Our primary use case of this solution is for endpoint protection and, more particularly, the patching. We are integrators and customers of Tanium and I'm a channel director.

View full review »
ThreatIn8e74 - PeerSpot reviewer
Threat Intelligence at a university with 10,001+ employees

It's used at an enterprise level to monitor natural behavior and point behavior across the organization.

View full review »
BB
Developer at Xion

We collect end-point data. We use it to make AI models and provide it to customers. I use Tanium’s sensors, collect data, and develop dashboards. The sensors have many data types. If we need different data types, we can write scripts.

View full review »
Buyer's Guide
Tanium
June 2025
Learn what your peers think about Tanium. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
861,170 professionals have used our research since 2012.