Try our new research platform with insights from 80,000+ expert users

HackerOne vs Tanium comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jul 14, 2024
 

Categories and Ranking

HackerOne
Ranking in Vulnerability Management
42nd
Average Rating
8.6
Number of Reviews
4
Ranking in other categories
Application Security Tools (34th), Bug Bounty Platforms (1st), Penetration Testing Services (2nd), Attack Surface Management (ASM) (12th)
Tanium
Ranking in Vulnerability Management
21st
Average Rating
7.4
Number of Reviews
15
Ranking in other categories
Server Monitoring (11th), Endpoint Protection Platform (EPP) (36th), Endpoint Detection and Response (EDR) (25th)
 

Featured Reviews

VS
Sep 16, 2024
They have streamlined the complete process, which gives a sense of security to the users
I mainly use it for downtime activities, earning extra cash alongside a full-time job, and to get new sales and profits It helps me to get new sales, profits, and other benefits. The main thing I like about HackerOne is that it provides a direct way to contact the program directly without the…
Jun 8, 2023
The solution is limited to a few classes, but it helps discover CIs and assets
Tanium is primarily used for CMDV (Configuration management database) discovery. Tanium is meant to discover CIs and assets It's a good tool, but that's about it. It's like any other discovery tool. It's very detailed, and it will allow you to do hardware and software. I was using it in a very…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It helps me to get new sales, profits, and other benefits."
"Apart from getting all the bug bounty opportunities, we also get the chance to practice in a safe environment, like a demo setup. These features are great for beginners who want to explore bug bounties in the future."
"The most valuable feature of HackerOne is its variety of programs. These programs provide depth into various areas, such as mobile, API, and websites."
"I like the fact that you can create patching campaigns depending on the area of your network that you want to address first. I like the ability it has to make several campaigns that work in parallel."
"Tanium's most valuable features are patch management, inventory, and distribution software."
"The security features are very valuable."
"For incident response tasks, all these tasks can get done in minutes with minimal disruption to the end-user."
"I'm not so familiar with the tool but I like the interaction of the console to the picture. Patching is the primary model I have been focusing on for the last couple of weeks. So I have created a proof of concept environment and have been checking the available features."
"The most valuable features of this solution are the consolidation of all historical data on device endpoints, security drivers, firmware, and Software version gaps."
"I would say Tanium is the best tool for vulnerability management."
"Tanium's most valuable feature is its instant discovery aspect."
 

Cons

"One issue I've experienced is traffic. Many people try to participate when an opportunity with a bounty of around 1,000-15,000 dollars comes up. In this case, the first person to report the vulnerability gets the bounty. If a second person reports the same vulnerability, they are marked as duplicated instead of receiving some recognition. The second person also invested time finding the issue, so I think this can be improved."
"The ability to view the conversation between the triagers and the programs will be really good."
"Response time can be improved. The HackerOne Trust team can be slow to respond sometimes. They're not using AI, which could help reduce the number of duplicate reports."
"They could improve the UI."
"Tanium’s scalability could be improved."
"Tanium's limitations should be improved because although it is a great tool, it is limited to only a few classes during a session."
"The most painful thing is the interface. It's a bit unclear sometimes."
"The reporting could be improved."
"The solution lacks mobility."
"The solution needs to improve the reporting and tracking capabilities."
"The main issues are the network connection because different customers have issues with their networks. It's difficult implementing this type of solution because the network is the main feature in the architecture for these types of solutions. Tanium could improve by creating some network optimization."
 

Pricing and Cost Advice

"The tool is open-source and free for bug bounty hunters."
"The solution is free."
"It's an expensive solution. It would be nice if the cost were lower."
"The product's pricing differs from region to region depending on negotiations and the number of endpoints."
"The solution is expensive but it's a good investment."
"Tanium is a more expensive solution in Latin America than some of the competitors, such as BigFix."
"It is higher than some competitors in the market."
"The solution offers value for money."
"There is an annual license required to use this solution."
report
Use our free recommendation engine to learn which Vulnerability Management solutions are best for your needs.
805,335 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
17%
Manufacturing Company
12%
Financial Services Firm
11%
Comms Service Provider
7%
Financial Services Firm
16%
Government
13%
Computer Software Company
11%
Manufacturing Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What needs improvement with HackerOne?
Response time can be improved. The HackerOne Trust team can be slow to respond sometimes. They're not using AI, which could help reduce the number of duplicate reports.
What is your primary use case for HackerOne?
I use the tool for vulnerability assessment and testing.
What do you like most about Tanium?
Tanium’s linear-chain architecture is valuable.
What is your primary use case for Tanium?
We collect end-point data. We use it to make AI models and provide it to customers. I use Tanium’s sensors, collect data, and develop dashboards. The sensors have many data types. If we need differ...
 

Comparisons

 

Also Known As

HackerOne Assets, HackerOne Pentesting Services, HackerOne Security Assessments, HackerOne Vulnerability Management
No data available
 

Learn More

 

Overview

 

Sample Customers

Zenefits, Adobe, Yelp
JPMorgan Chase, eBay, Amazon, US Bank, MetLife, pwc, Cerner, Delphi, MGM Grand, New York Life
Find out what your peers are saying about HackerOne vs. Tanium and other solutions. Updated: September 2024.
805,335 professionals have used our research since 2012.