Fast Endpoint Security Management (at Scale)
Ed Amoroso summarizes a recent technical discussion with Tanium on their advanced platform solution for endpoint security.

Fast Endpoint Security Management (at Scale)

Over a decade ago, I was contacted by David Hindawi about a new peer-to-peer cyber security system his team had developed. Back then, you expected your endpoint security agents to report back securely, privately, and unilaterally to a protected, centralized management station. And this was the period shortly after Napster had exploded – so I was pretty skeptical that a peer-to-peer arrangement would make any practical sense.

And OK – so I was wrong. Several colleagues showed me the lightning fast responses to the system’s endpoint queries, as well as how scalable it appeared to be across a typical enterprise. I remember sitting down and digging through a detailed white paper on the system’s performance and accuracy – and I was quickly sold on the idea. Hindawi’s company, of course, was Tanium, and I’ve been an admirer of their fine solution ever since.

Recently, my friend David Damato, Tanium’s Chief Security Officer, was kind enough to bring me up-to-date on the company’s platform and recent technical advances. I’d known Damato from his incident response days at Mandiant, so it was great to get an update from an industry veteran with a broad perspective on current enterprise security issues and priorities. I’ll try to summarize below what I learned during the discussion:

“As you know from your years of experience in our industry,” he told me, “Tanium literally invented a new way to perform endpoint security and management. Our platform offers security operations teams a level of visibility and control, at speeds and at levels of scale that continue to be unheard of in our industry. And also, as you know, by combining this into one platform, the result is that enterprise total cost of ownership is greatly reduced.”

The Tanium platform includes many different capabilities and functions, but it’s the Tanium Core that resides at the heart of most deployments. This component, which is the first function I remember being so impressed with over a decade ago, allows for questions to be asked in readable English about the deployed base. “Our customers want to query the state of their resources, and they want answers quickly and easily,” Damato explained.

Other supported functions include the ability to build an accurate inventory (Asset), perform compliance scans and checks (Comply), install and remove software at scale (Deploy), find unmanaged and rogue devices (Discover), perform file integrity monitoring (Integrity Monitor), detect relationships and dependencies (Map), distribute and manage patches (Patch), consolidate endpoint agents (Protect), and support investigations (Threat Response).

At the heart of this functionality is Tanium's linear chain model. This peer arrangement allows teams to rethink how they analyze data, respond to incidents, and manage endpoints more generally. “Our customers can receive immediate response to their queries for deployments that might include hundreds of thousands of endpoints,” Damato explained. “And we’ve built the platform to easily integrate into typical workflow processes.”

Certainly, endpoint security has become more crowded since David and his son Orion started the company in 2007. And many vendors such as FireEye offer powerful, scalable platform options for endpoint query support. So, I’m guessing that it is no simple lay-up for any endpoint security vendor to make sales. There are simply too many competing offers for the sales process to be an easy one. That shouldn’t be news to anyone reading this column.

But Tanium has developed into one of those iconic cyber security brands with a platform that has become almost synonymous with the function it supports. One of my graduate students, for example, once told me that she was going to “Tanium” some data that she had collected. I guess this means that the name of the company has been officially verbed – which, I presume, is the ultimate marketing achievement for any organization.

If you’ve not done so already, then set aside time to hear Tanium’s fine story. You might not be as lucky as me to hear directly from their Chief Security Officer. But I’m sure your field representative will be able to answer questions accurately. Ask for a demo, and include anyone on your team who manages or interacts with endpoints. As always, please share with us here your learning. I look forward to hearing from you.

要查看或添加评论,请登录

Edward Amoroso的更多文章

  • Protecting the U.S. Bitcoin Reserve and Stockpile from Cyber Threats

    Protecting the U.S. Bitcoin Reserve and Stockpile from Cyber Threats

    As you no doubt have heard, plans are in place to establish a Strategic Bitcoin Reserve and Digital Asset Stockpile…

    15 条评论
  • Parable of Network Observability

    Parable of Network Observability

    I’d like to discuss here a common problem we see in our work at TAG every day – namely, the deployment of “network…

    23 条评论
  • Parable of the Cyber Industrial Complex

    Parable of the Cyber Industrial Complex

    Preamble In 1961, Eisenhower gave a famous speech that warned of the dangers of the so-called military-industrial…

    34 条评论
  • The Challenges of CISOs Working for Cybersecurity Vendors

    The Challenges of CISOs Working for Cybersecurity Vendors

    (Note to Reader: Normally these reports are available only to TAG Research as a Service (RaaS) subscribers. But with…

    27 条评论
  • Have Uncle Joe Read This Before He Invests in Crypto

    Have Uncle Joe Read This Before He Invests in Crypto

    I’ve been lecturing to my graduate students on the foundations of cryptocurrency and blockchain for years. Starting…

    15 条评论
  • Why TAG is Now Rating Cybersecurity Vendors

    Why TAG is Now Rating Cybersecurity Vendors

    by Edward Amoroso The first time I ever paid attention to an analyst quadrant – fully two decades ago, I found myself…

    11 条评论
  • Predicting the Impact of Trump’s Election on Cyber

    Predicting the Impact of Trump’s Election on Cyber

    Below are seven predictions from our team at TAG for how the recent Trump election of 2024 will impact U.S.

    83 条评论
  • Five Tips for Working CISOs

    Five Tips for Working CISOs

    Our team at TAG has been coaching CISOs for years – and this includes private discussions just about every day of every…

    11 条评论
  • The SEC is Weakening the Cybersecurity Posture of the United States. Here is Why.

    The SEC is Weakening the Cybersecurity Posture of the United States. Here is Why.

    Preface During May and June of 2024, draft versions of this article were shared with Chief Information Security…

    123 条评论
  • Sad Loss Today

    Sad Loss Today

    Several years ago, before the Pandemic, I received a friendly call from a law firm I’d done some business with – and…

    9 条评论

社区洞察

其他会员也浏览了