Today we see how Tanium Provision can enroll newly-imaged machines into ID and using two methods: Windows Configuration Designer package file Autopilot JSON file.
Vulnerability scanning identifies weaknesses across systems, applications, and networks to help organizations reduce exposure and stay ahead of threats.
Famous Chollima combines BeaverTail and OtterCookie, COLDRIVER deploys three new malware families, and Vidar Stealer 2.0 demonstrates upgraded capabilities.
Astaroth trojan uses GitHub to host malware configurations, TA585 delivers MonsterV2 malware in phishing campaigns, and threat actors exploit Microsoft’s logo in tech support scams.
Today see how Tanium can quickly synchronize device data from multiple tenants. Bring mobile devices in as native Tanium entities Consolidate multiple Intune tenants into a single view Mobile OS support:,,, etc. Two tiers of RBAC for Intune actions New sensors for Intune device data Sync device data to Super fast from time to configure to seeing data Use an Intune account with read-only access for synchronization.
Bring Tanium’s industry leading platform for Autonomous Endpoint Management (AEM) together with Microsoft Intune to unify disparate environments into a single platform, changing the device management game.
In this special edition Tech Talk you will meet a Tanium expert working in the US Federal space as he demonstrates Tanium's Autonomous Endpoint Management experience and how it helps security teams be proactive in securing their environment. Real-time data with actionable insights at speed and scale Extensible and adaptable platform, acting as a force multiplier Advanced intelligence capabilities with generative and agentic AI Alerting on environment security drift “Left of bang” – fixing problems before they are exploited by adversaries.
Customers experience real-time value with Tanium Ask Agent which transforms IT operations and security by automating complex workflows with precision, scale and speed.
Get back time in your IT day, automating processes that previously consumed hours, now with repeatable consistency. Tanium Automate is the workflow component in our Autonomous Endpoint Management suite of features. Automate Playbooks are now more flexible and reusable with both dynamic parameters and launching from dashboards. Launch playbooks from dashboards Integration with Deploy Parameterized playbooks RBAC aware API enabled.
XWorm malware reemerges with ransomware, Microsoft disrupts multiple threats targeting Teams, and Storm-1175 exploits a critical GoAnywhere MFT vulnerability.
Tanium has released jaw-dropping new agentic AI capabilities on the journey of Autonomous Endpoint Management (AEM). Actionable insights and recommendations at your fingertips! Achieve your Tanium goals even faster with assistance from the new Ask Agent: AI agent prompting for Tanium docs, data, and actions Deploy software Summarize dashboards Export executive summary reports RBAC aware Multi-threaded AI sessions And more!
Third-party patch management is a vital security practice that involves identifying, testing, and applying updates to third-party software, including business-critical applications like browsers, plug-ins, and productivity tools, to reduce risk, maintain compliance, and ensure endpoint stability.
Ivanti DSM Software Package Migration with Tanium PIT Crew IDERI 80% time savings on software package migration Ivanti DSM migration to Tanium Deploy Custom sensors, packages, and Single Endpoint.
This week, Tanium’s Cyber Threat Intelligence (CTI) team investigates SystemBC, a large-scale proxy botnet that’s leveraging compromised virtual private server (VPS) infrastructure to support cybercriminal operations, including ransomware and credential theft. Next, the team looks at ShinyHunters—a financially motivated data extortion group that’s now targeting enterprise cloud applications.