Coming October 25: PeerSpot Awards will be announced! Learn more
Julia Frohwein - PeerSpot reviewer
Senior Director of Delivery at PeerSpot (formerly IT Central Station)
  • 0
  • 33

What needs improvement with Tanium?

Please share with the community what you think needs improvement with Tanium.

What are its weaknesses? What would you like to see changed in a future version?

PeerSpot user
7 Answers
Santiago Mantilla - PeerSpot reviewer
Senior Information Technology Security Consultant at a tech services company with 1-10 employees
Top 5
29 May 22

The main issues are the network connection because different customers have issues with their networks. It's difficult implementing this type of solution because the network is the main feature in the architecture for these types of solutions. Tanium could improve by creating some network optimization.

Mo Vermeiren - PeerSpot reviewer
Cybersecurity Business & Technology Consultant at Capgemini
Real User
Top 20
31 March 22

The most painful thing is the interface. It's a bit unclear sometimes. The user interface also has to be more secure. If the end users are trying to patch a whole set of machines, they should be warned that it's going to be a deployment on the huge environment.

Sr Manager - Information Security & Researcher at a tech services company with 1,001-5,000 employees
Real User
Top 5Leaderboard
29 September 21

The performance could improve in future releases. We have had performance issues in specialized web environments, but overall I think the problems are less than 2% of the computer systems being used.

IT Security Manager at a transportation company with 1,001-5,000 employees
Real User
09 April 21

The solution can give a lot of false positives. It's an aspect of the solution that could be looked at and worked on. If you deploy all the threat intelligence rules that come with it, you may spend a lot of time suppressing some of the false positives as some of them are very vague. You'll have the indicators due to the fact that you can suppress by hash or by pass or by command and parents process. However, that information is often very limited. You may get an alert for common language image load which can be a hacker technique, however, it's also a normal process between valid Microsoft processes, between the Msiexec, or some sort of system process. It's frustrating that there's not enough data - at least that I've found - to be able to determine whether something is a false positive or true positive. Whether it should be suppressed or whether you should let it go, the number of false positives you may have to deal with, if you enable all of these sources, could be over a hundred thousand. The scalability can be challenging, depending on a company's setup. The ability to calculate risk with one query would be useful. In other words, to be able to combine known vulnerabilities on an asset with known threats that are targeting that vulnerability from Intel. Being able to determine some way or another, which processes you prefer would be ideal. There should be more access to automated processes. Somehow you should be able to determine the business value of that asset and be able to have a true risk meaning and a true way to bubble up these high-value, high-risk assets. They need to get more attention. The solution needs some sort of risk engine that takes into account threat vulnerability and business value.

Channel Director at a tech services company with 1-10 employees
Real User
22 July 20

Our biggest issue with the solution is its lack of mobility. Also, when it comes to deploying the SaaS, it's more difficult to deploy on-prem.

Technical Consultant at Aon Corporation
Real User
15 July 20

Tanium comes with multiple models, so definitely the threat protection is the primary opportunity area my organization is looking for. It is going to be primarily used for event collection, which is being fed into our centralized tools for tracing any kind of vulnerability or any kind of uneven situation.

Find out what your peers are saying about Tanium, Microsoft, ServiceNow and others in Server Monitoring. Updated: September 2022.
632,611 professionals have used our research since 2012.
Threat Intelligence at a university with 10,001+ employees
Real User
11 March 19

* I would like to have more integrations and custom plugins to input. Integration is always a big deal in a lot of different environments. * Custom modules would be nice. * Visualization of data could be added to it. * Making the initial process easier always helps.

Related Questions
Apr 04, 2022
Hi peers, I'm looking for a comparison study between Microsoft Defender for Endpoint and Tanium EDR solutions (with all the pros and cons) .  Can you please share the pros and cons of these products? I appreciate the help! 
See 1 answer
Chief Information Security Officer at a construction company with 10,001+ employees
04 April 22
I don't. I prefer Cynet to both of them.
Avigail Sugarman - PeerSpot reviewer
Community Manager at PeerSpot (formerly IT Central Station)
Jun 28, 2014
I'm interested to hear Pros and Cons of the most popular solutions? What are your experiences with Oracle Enterprise Manager, Catchpoint vs. others?
2 out of 5 answers
26 June 14
Hi Russell, Sorry for the delay got stuck up with some other work. Will send you the list by tomorrow. Regards; Surya
PeerSpot user
Sales at CA Technologies
26 June 14
Why not read what these four customers have to say about Nimsoft Monitor. 1. 2. 3. 4. regards, Franco
Related Solutions
Download Free Report
Download our free Server Monitoring Report and find out what your peers are saying about Tanium, Microsoft, ServiceNow, and more! Updated: September 2022.
632,611 professionals have used our research since 2012.