HOME NEWS ARTICLES PODCASTS VIDEOS EVENTS JOBS COMMUNITY TECH DIRECTORY ABOUT US
at Financial Technnology Year
Endpoint management and security platform tailored for financial institutions, providing real-time visibility and control over all endpoints. Helps venture capital firms secure sensitive financial data, maintain compliance, and rapidly detect and remediate threats across their technology ecosystem.
Specialized security tools protecting sensitive deal information, portfolio company data, and limited partner communications.
More Cybersecurity Solutions
More Operations and Finance ...
Multi-factor Authentication (MFA) Requires users to verify identity using multiple credentials for critical systems. |
Tanium supports multi-factor authentication (MFA) as part of its platform security practices for endpoint management. | |
Single Sign-On (SSO) Support Allows seamless, secure access to multiple systems using one set of credentials. |
Tanium integrates with SSO providers such as Okta and Microsoft Azure AD, enabling single sign-on support. | |
Role-Based Access Control (RBAC) Assigns system permissions based on job role to enforce least-privilege access. |
Tanium offers granular role-based access control for managing system permissions and enforcing least-privilege access. | |
User Provisioning and De-provisioning Speed Time required to add or revoke user access upon onboarding or departure. |
No information available | |
Privileged User Monitoring Tracks activities of high-access users for early detection of misuse. |
Tanium monitors privileged accounts and their actions, supporting privileged user monitoring. | |
Audit Trail Retention Period Length of time that records of user access and changes are kept. |
No information available | |
Integration With Directory Services Can synchronize with corporate directories (e.g., Active Directory, LDAP). |
Tanium can integrate with directory services (e.g., Active Directory) for user and policy synchronization. | |
Self-Service Password Reset Allows users to securely reset passwords without admin involvement. |
Self-service password reset is supported via integrations; Tanium documentation confirms this feature. | |
Account Lockout Threshold Number of failed login attempts allowed before an account is locked. |
No information available | |
Mandatory Password Expiry Enforces periodic password changes to reduce the risk of compromise. |
Mandatory password expiry policies can be enforced via Tanium's integration with identity providers. |
In-Transit Encryption Utilizes strong cryptographic protocols (e.g., TLS 1.2+) for data moving across networks. |
Tanium encrypts data in transit using TLS 1.2+ in all communications between endpoints and the server. | |
At-Rest Encryption Ensures stored data in databases and file systems is encrypted. |
Tanium stores data at-rest encrypted, described in security whitepapers and compliance statements. | |
End-to-End Encryption for Communications All communication channels (email, messaging, file transfer) support end-to-end encryption. |
No information available | |
Encryption Key Management Automated and audited management of cryptographic keys. |
Tanium provides automated key management for all cryptographic keys, with roles and audit trails. | |
Granularity of Data Encryption Defines whether encryption is file-level, database-level, or field-level. |
No information available | |
Hardware Security Module (HSM) Integration Supports securing keys within HSMs for added protection. |
Hardware Security Module (HSM) integration is available for customers requiring physical key protection. | |
Secure File Sharing Enables secure, encrypted document sharing with third parties or LPs. |
Tanium enables secure document sharing between endpoints with encryption features. | |
Data Loss Prevention (DLP) Monitors and blocks unauthorized data transfers inside and outside the organization. |
Tanium includes robust Data Loss Prevention (DLP) modules to block unauthorized data exfiltration. | |
Real-time Data Encryption Speed The speed at which the system can encrypt or decrypt data in real-time. |
No information available | |
Compliance with Industry Encryption Standards Effectively meets standards such as FIPS 140-2/3 or ISO/IEC 27001. |
Tanium meets FIPS 140-2 and is used by organizations requiring compliance with major industry standards. |
Real-time Threat Detection Ability to identify threats as they occur using AI/ML and signature-based detection. |
Tanium provides real-time threat detection leveraging AI, behavioral analytics, and signature-based methods. | |
Automated Incident Response Workflows System can automatically respond to certain threat types to contain damage. |
Automated incident response workflows can be configured and customized within the Tanium platform. | |
Security Event Log Retention How long security events/logs are retained for forensic analysis. |
No information available | |
Integration with SIEM (Security Information and Event Management) Ability to feed data to SIEM platforms for correlated analysis. |
Tanium integrates natively with leading SIEM solutions (Splunk, QRadar, etc.) to feed threat and event data. | |
Alert Notification Time Maximum time between threat detection and alerting security staff. |
No information available | |
24/7 Monitoring Security monitoring is available at all times, not just business hours. |
24/7 monitoring options are available and typical for enterprise deployments as confirmed in Tanium’s managed services documentation. | |
Customizable Threat Signatures Can create and tune custom detection signatures for sector-specific threats. |
Customizable detection rules and threat signatures for sector-specific threats are mentioned in Tanium documentation. | |
Phishing Detection and Prevention Alerts users and blocks suspicious communications targeting credentials. |
Tanium includes phishing detection/prevention for endpoint email clients and browsers via threat intelligence modules. | |
Incident Response Playbooks Pre-defined, customizable workflows for different incident types. |
Customizable incident response playbooks are available through workflow configurators and integrations. | |
Mean Time to Detect (MTTD) Average time between threat occurring and being discovered. |
No information available |
Encrypted Messaging Internal and external chat/messages are encrypted at rest and in transit. |
No information available | |
Secure Video Conferencing Video meetings use encryption and access controls to protect confidentiality. |
No information available | |
Encrypted Email Integration Email solutions support encrypted delivery and attachments. |
No information available | |
Customizable Access Policies for Communications Ability to restrict communication tools usage by user or group. |
No information available | |
Automated Message Retention Policy Controls how long communication records are kept and when they are deleted. |
No information available | |
Message Recall or Revocation Capability to retract messages sent in error. |
No information available | |
Digital Signatures on Communications Ensures authenticity and non-repudiation for critical messages. |
No information available | |
Watermarking Confidential Messages Messages can be automatically watermarked for traceability. |
No information available | |
External Participant Verification Verifies the identity of external recipients in communications. |
No information available | |
Communication Channel Redundancy System supports alternative communication methods in case of outages. |
No information available |
Comprehensive Audit Logs Records all relevant system and user activities for auditing purposes. |
Comprehensive system audit logs are generated and stored for compliance and forensics. | |
Customizable Reporting Dashboards Flexible dashboard tools for real-time monitoring and historical analysis. |
Customizable dashboards are available, enabling filtered and historical reporting. | |
Automated Compliance Reports Generates reports for regulatory and LP compliance needs. |
Automated compliance report generation is available for audits and regulatory reviews. | |
Log Integrity Monitoring Detects if audit logs have been tampered with. |
Tanium implements log integrity monitoring, detecting any tampering of stored logs. | |
API Access to Logs Logs and reports accessible via standard APIs. |
Audit logs and reports can be programmatically accessed through Tanium’s APIs. | |
Alert Customization Users can define thresholds and triggers for alerting. |
Custom alerts and notifications on user-defined thresholds/triggers are part of Tanium’s alerting system. | |
Log Retention Period Set length of time all logs are retained for compliance. |
No information available | |
Anomaly Detection in User Activity Automatically highlights unusual user behavior for investigation. |
Tanium’s analytics suite includes anomaly detection in user activity using AI and heuristics. | |
Scheduled vs Real-time Reporting System can provide both scheduled and real-time reports. |
Scheduled and real-time reporting are core reporting capabilities described in Tanium’s features. | |
Audit Log Search/Filtering Speed Rate at which logs can be queried for specific events. |
No information available |
Compliance Certifications Dashboard Displays current compliance certifications (e.g., SOC 2, ISO 27001). |
Compliance certifications (e.g., SOC 2, ISO 27001) are displayed in management dashboards. | |
GDPR Support Product supports General Data Protection Regulation for EU LPs and companies. |
Tanium is built for regulated environments and is marketed as GDPR compliant. | |
California Consumer Privacy Act (CCPA) Support Compliant with CCPA for handling California data subjects. |
Platform supports CCPA-aligned controls for managing California consumer data privacy. | |
Automated Data Subject Requests Can handle right-to-access, right-to-be-forgotten, and correction requests. |
Automated workflows and APIs allow for responding to data subject requests automatically. | |
Audit-trail for Compliance Actions Proof of compliance actions is logged and accessible. |
All compliance actions are fully logged and accessible for audits. | |
Data Residency Controls Can restrict data storage and processing to certain jurisdictions. |
Tanium enables control over data residency, letting organizations restrict data storage to specific regions/jurisdictions. | |
Policy Change Alerting Alerts administrators when compliance policies change or are updated. |
Administrators are alerted to changes in compliance policy configuration in Tanium. | |
Compliance Report Generation Speed Time required to produce a full compliance report for auditors. |
No information available | |
Customizable Data Retention Policies Allows organizations to define bespoke regulatory retention periods. |
Tanium supports organization-specific retention policies for regulated data. | |
Vendor Risk Assessment Integration Integrates third-party assessments into compliance reporting. |
Vendor assessment data can be imported and tracked for compliance reporting. |
Open API Availability Product offers open APIs for extensibility and automation. |
Tanium offers open APIs for extensibility, integration, and automation. | |
Integration with Document Management Systems Works seamlessly with DMS like Box, Dropbox, SharePoint. |
Tanium integrates with popular document management systems for security and workflow automation. | |
CRM Integration Works with Salesforce and other CRM systems for LP and portfolio tracking. |
CRM integration is possible using Tanium’s standard API connectors. | |
Automated Data Sync Frequency How frequently data is automatically synchronized across platforms. |
No information available | |
Support for SAML/OAuth Connectors Allows secure identity federation across multiple SaaS tools. |
Tanium has built-in support for SAML/OAuth connectors enabling secure federated identity. | |
Marketplace of Pre-Built Integrations Catalog of out-of-the-box plugins and connectors. |
Tanium Marketplace provides pre-built integrations with various IT/security tools. | |
Custom Integration Toolkit Offers SDKs/libraries for custom workflow integration. |
SDKs and documentation are provided to develop custom integrations. | |
Real-time Integration Monitoring Notifies when integrations fail or are at risk. |
Real-time integration monitoring available to alert when integrations fail or are impacted. | |
Versioning and Backward Compatibility Ensures integration APIs remain available across product upgrades. |
APIs maintain reliable versioning with backward compatibility as part of Tanium’s developer features. | |
Granular Integration Permissions Permissions for integrations can be defined by user or group. |
Granular permissions can be set on who can authorize and manage integrations. |
Automated Backups Scheduled, automatic backups of all critical data. |
Automated, scheduled backups are a core resilience feature of Tanium. | |
Backup Frequency How often backups are taken. |
No information available | |
Recovery Point Objective (RPO) Maximum acceptable age of files in backup, indicating potential data loss time window. |
No information available | |
Recovery Time Objective (RTO) Maximum acceptable time to restore systems after a failure. |
No information available | |
Encrypted Backups All backup data is encrypted during storage and transit. |
Backups are encrypted at-rest and during transit, as described in Tanium's security documentation. | |
Geo-Redundant Backup Storage Backups are replicated in multiple data centers or regions. |
Geo-redundant storage is utilized to support disaster recovery and high availability. | |
Disaster Recovery Playbooks Pre-defined procedures for different disaster scenarios. |
Pre-defined disaster recovery playbooks are included for rapid recovery from incidents. | |
Backup Restore Testing Frequency How often backup restores are tested for integrity. |
No information available | |
Granular Restore Capability Can restore individual files, folders, or full systems. |
Granular restore capabilities offered, enabling restoration at the file, folder, or system level. | |
Automated Failover Support Enables seamless transition to backup systems automatically. |
Automated failover between primary and backup systems is part of business continuity features. |
Context-aware Access Controls Adapts access policies based on user location, device, or time. |
No information available | |
User Activity Feedback System provides immediate visual/audible feedback for security events (e.g., successful login, warning for suspicious activity). |
Immediate user feedback for security-related actions is a UI feature in Tanium. | |
Security Warnings/Explainability Clear and actionable security warnings for users. |
Clear security warnings and explainability are included in the Tanium UI. | |
Adaptive User Training Prompts In-app security learning for users when risky behaviors are detected. |
Tanium can prompt adaptive training for users based on detected risky behaviors (via integrations). | |
Minimal Security Task Completion Time Low latency for users performing security actions (e.g., reviewing access requests). |
No information available | |
Accessibility Support in Secure Workflows Features and workflows accessible to all users, including those with impairments. |
Accessibility is addressed in workflow design and user portal as part of Tanium’s enterprise offering. | |
Integrated Secure Approval Processes Enables approvals for sensitive actions within secured workflows. |
Approval workflows for sensitive actions are supported within Tanium's secure workflows. | |
Session Timeout Configuration Customizable length before automatic user logout due to inactivity. |
No information available | |
Mobile Security Features Appropriate controls and protections for mobile users. |
Tanium includes mobile security controls for device protection and secure mobile access. | |
Frictionless Delegated Access Temporarily delegate access securely and efficiently. |
Delegated access for sensitive workflows is possible and managed securely. |
Third-party Risk Assessment Automation Automates evaluation and scoring of third-party risk. |
Automation for third-party vendor risk assessments is available via Tanium’s risk and compliance modules. | |
Vendor Access Control Restricts and monitors vendor/outsourced IT access to systems and data. |
Detailed controls restrict and monitor vendor IT access to the system and financial data. | |
Continuous Vendor Security Monitoring Monitors ongoing risk from vendors (e.g., dark web exposure, breaches). |
Continuous monitoring of vendor risk (including breach intelligence) is advertised as part of Tanium’s features. | |
Vendor Security Questionnaire Management Centralizes collection and review of security documentation from vendors. |
Vendor questionnaires and document workflows are centralized within Tanium’s vendor modules. | |
Vendor Breach Notification Speed Time between vendor-reported security incidents and notifications to your firm. |
No information available | |
Vendor Data Segmentation Ensures vendor access is limited to specific, well-defined areas and data sets. |
Tanium enables data segmentation for vendors so that access is limited to pre-approved data sets. | |
Automated Vendor Offboarding Instant removal of vendor access once a contract ends. |
Automated vendor offboarding processes enable instant access removal upon contract completion. | |
Vendor Cost Monitoring Tracks and manages the cost of vendor cybersecurity services. |
Vendor cost tracking and management dashboards are available for cybersecurity services. | |
Vendor Contract Compliance Flags Alerts for upcoming expirations, lacking attestations, or non-compliance. |
Contract compliance and alerting for vendors is available within Tanium’s vendor management module. | |
Portfolio Company Security Guidance Tools Provides tools or frameworks for portfolio companies to follow security best practices. |
Portfolio security toolkits are often included to enable best practice implementation at portfolio companies. |
This data was generated by an AI system. Please check
with the supplier. More here
While you are talking to them, please let them know that they need to update their entry.