Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Tanium of the it-sa 365
default Stage Background
Exhibitor
Service

Hall 7 - Booth Number 7-219

Tanium

About us

south_east

Employees

south_east

Actions

south_east

We offer

  • Managed security services
  • Big data Security
  • Cloud (computing) security
  • Hardware security
  • Mobile Device Managment
  • Network security
  • Industrial IT security
  • Threat analysis
  • Business continuity
  • Compliance/GRC (products and services)
  • Computer emergency response team (CERT)
  • High availability
  • Risk analysis and management
  • Security management
  • Anti-spam solutions
  • Data deletion
  • Document management
  • Identity and access management
  • Network access control (NAC)
  • BSI IT baseline protection
Hopfenstraße 8
80335 München
Germany

About us

Tanium, the industry’s only provider of converged endpoint management (XEM), leads the paradigm shift in legacy approaches to managing complex security and technology environments. Only Tanium protects every team, endpoint, and workflow from cyber threats by integrating IT, Compliance, Security, and Risk into a single platform that delivers comprehensive visibility across devices, a unified set of controls, and a common taxonomy for a single shared purpose: to protect critical information and infrastructure at scale. Tanium has been named to the Forbes Cloud 100 list for six consecutive years and ranks on Fortune’s list of the Best Large Workplaces in Technology.

  ... read more

Employees

show more

Keywords

Security risk management

| Risk Management | Performance Management | Monitoring | IT Risk Management | Endpoint Security

Remember Remove
close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.