Académique Documents
Professionnel Documents
Culture Documents
Tanium Architecture
Tanium's patented endpoint communications architecture provides 15-second visibility and control
across every endpoint on the network, and can easily scale to millions of endpoints without requiring
ongoing infrastructure additions.
Slow Response Times, from Hours to Weeks Response Time Measured in Seconds
Fragile Infrastructure = Incomplete Results Resilient Infrastructure = Complete Results
High Cost of Ownership, Expensive to Scale Minimal Cost of Ownership, No Effort to Scale
Device Offline Data Unavailable Complete WAN Traffic LAN Traffic Firewall
DS-TA-072015 1
2015 Tanium, Inc. All rights reserved. Tanium is a registered trademark of Tanium, Inc. All other brands, products, or service names are or may be trademarks or service marks of their respective owners.
Why Speed In Seconds Matter
By decentralizing data collection, aggregation and distribution down to the endpoint, the Tanium Architecture harnesses the intrinsic speed of low-latency
LAN traffic and dramatically reduces direct client-to-server communications, effectively eliminating the crippling inefficiencies caused by bloated databases,
overloaded connections and heavy traffic across WAN segments. With Tanium, security incident response teams can confidently hunt and remediate
advanced threats across millions of endpoints, and IT operations teams can accurately manage and inventory every single global asset within seconds.
Enterprise Ready
Zone Servers enable every roaming machine, as long as they are connected to the Internet, to stay in contact with the Tanium Endpoint Platform,
allowing them to answer any questions or perform targeted actions as if they were on the enterprise network.
Kerberos-based authentication leverages existing Active Directory infrastructure, credentialing and security policies.
Role-based access control (RBAC) regulates access available to different users based on their job responsibility or authority. Users can be limited from
asking questions, executing existing actions, authoring new actions, authoring sensors, creating users or assigning management rights. RBAC can
even be flexibly set to apply for just a select group of machines.
512-bit Elliptic Curve Cryptography is used for queries and actions distributed across the network to prevent man-in-the-middle attacks or other
malicious behavior initiated by compromised endpoints.
System Requirements
Server Requirements1 Client Requirements1
Managed Endpoints Up to 35,000 Up to 150,000 Up to 400,000
Microsoft Windows 2000, XP, Vista,
Hardware Requirements 7, 8 or Windows Server 2000, 2003,
(Tanium Server / Database Server) 2008, 2012
Processor Cores (Physical) 16 / 8 40 / 32 80 / 64 Mac OS X 10.5+ (Intel-only)
Memory 24 GB / 16 GB 128 GB / 64 GB 256 GB / 128 GB Linux (RHEL, CentOS, Fedora,
Disk Space2 400 GB / 1 TB 1.5 TB / 4 TB 3 TB / 10 TB SUSE, Debian and Ubuntu)
Software Requirements Solaris 10 10/09 U8+
Operating System Microsoft Windows Server 2008 R2, 2012 or 2012 R2 IBM AIX 6.1+
Database Version Microsoft SQL Server 2008, 2012 or 2014
1
For more detailed information visit https://kb.tanium.com/System_Requirements
2
Disk space requirements are approximations and actual values may vary depending on usage and use cases
ABOUT TANIUM
Tanium gives the worlds largest enterprises and government organizations the unique power to secure, control and manage millions of endpoints across the
enterprise within seconds. With the unprecedented speed, scale and simplicity of Tanium, security and IT operations teams now have complete and accurate
information on the state of endpoints at all times to more effectively protect against modern day threats and realize new levels of cost efficiency in IT
operations. Visit us at www.tanium.com or follow us on Twitter at @Tanium.
2
2015 Tanium, Inc. All rights reserved. Tanium is a registered trademark of Tanium, Inc. All other brands,products, or service names are or may be trademarks or service marks of their respective owners.