We performed a comparison between Microsoft Defender Vulnerability Management and Tanium based on real PeerSpot user reviews.
Find out in this report how the two Vulnerability Management solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The solution helps identify threats and vulnerabilities."
"The product’s most valuable features are compliance, recommendations, and inventories."
"The solution is up-to-date and helps prevent zero-day attacks."
"One valuable feature is the Microsoft Security Scorecard."
"The product's stability is very high...The scalability of the product is amazing."
"Tanium's most valuable feature is its instant discovery aspect."
"I would say Tanium is the best tool for vulnerability management."
"The product is granular and can build complex roles compared to other EDR vendors."
"The interrogation piece was the most valuable feature because it was very detailed."
"I'm not so familiar with the tool but I like the interaction of the console to the picture. Patching is the primary model I have been focusing on for the last couple of weeks. So I have created a proof of concept environment and have been checking the available features."
"Tanium has made the process of detecting threats more proactive with its detection. So, the process is easier and more efficient."
"The solution is scalable and helps to understand how infrastructure works. It helps to improve the health of the organization."
"I like the tool's incident response and security patching."
"The technical support takes too much time to resolve tickets."
"It is challenging to extract and customize reports from the system."
"The setup phase of the product is not that easy and needs a person to have a certain level of expertise."
"Integration can be improved."
"The general support could be improved."
"The solution needs to improve the reporting and tracking capabilities."
"They could improve the UI."
"Any movement into a SaaS solution has challenges since the processes and data flows are not well defined. Hence, you need to build it at the same time."
"The main issues are the network connection because different customers have issues with their networks. It's difficult implementing this type of solution because the network is the main feature in the architecture for these types of solutions. Tanium could improve by creating some network optimization."
"Tanium’s scalability could be improved."
"The solution can give a lot of false positives."
"It is not really additional functions, or the features that are needed, rather the complexity would be reduced based on the number of modules required to put together a comprehensive operational security and risk compliance model."
"Most of the time, agent-relative issues have to be more equipped with self-healing features. At times, the agent is there, but for some reason, it doesn't report a status. It gives certain problems that are obviously agent-based."
More Microsoft Defender Vulnerability Management Pricing and Cost Advice →
Microsoft Defender Vulnerability Management is ranked 22nd in Vulnerability Management with 5 reviews while Tanium is ranked 18th in Vulnerability Management with 15 reviews. Microsoft Defender Vulnerability Management is rated 8.2, while Tanium is rated 7.4. The top reviewer of Microsoft Defender Vulnerability Management writes "The vulnerability assessment is very accurate because it runs directly into the vulnerability database". On the other hand, the top reviewer of Tanium writes "Useful tool for vulnerability management and deploying applications, needing improvement in its OS upgrade". Microsoft Defender Vulnerability Management is most compared with Qualys VMDR, Tenable Nessus, Rapid7 InsightVM, Tenable Vulnerability Management and Tenable Security Center, whereas Tanium is most compared with CrowdStrike Falcon, Microsoft Defender for Endpoint, Microsoft Configuration Manager, Qualys VMDR and ServiceNow Discovery. See our Microsoft Defender Vulnerability Management vs. Tanium report.
See our list of best Vulnerability Management vendors.
We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.