We compared Tanium and Microsoft Defender for Endpoint based on our user's reviews in several parameters.
Overall, Tanium is praised for its comprehensive visibility into endpoints, security measures, efficient endpoint management, and powerful analytics capabilities. Users appreciate the top-notch customer service but mention high pricing, complex licensing, and system performance improvements needed. Microsoft Defender for Endpoint stands out for its threat protection, real-time monitoring, and user-friendly interface. Customers also commend customer service and competitive pricing, with positive ROI noted. Areas for enhancement include faster response times and improved documentation for both products.
Features: Tanium's valuable features include comprehensive visibility, effective security measures, efficient endpoint management, and powerful analytics capabilities. On the other hand, Microsoft Defender for Endpoint offers comprehensive threat protection, real-time monitoring and detection, efficient system management and reporting, user-friendly interface, seamless integration with other Microsoft products, and effective incident response capabilities.
Pricing and ROI: The setup cost for Tanium is higher compared to other similar products in the market, requiring additional resources and time. On the other hand, Microsoft Defender for Endpoint has a more positive experience, with a straightforward setup process that doesn't require much effort., Based on user feedback, Tanium has shown positive ROI with improved efficiency, cost savings, enhanced security, and centralized IT management, while Microsoft Defender for Endpoint excels in threat protection, ease of use, and real-time insights.
Room for Improvement: There is room for improvement in both Tanium and Microsoft Defender for Endpoint. Tanium users have requested better system performance, improved documentation and training resources, and more customization options. Microsoft Defender for Endpoint users have provided feedback on areas that could be enhanced.
Deployment and customer support: Based on user reviews, there is variation in the duration required to establish a new tech solution for both Tanium and Microsoft Defender for Endpoint. Some users of Tanium reported spending 3 months on deployment and an additional week on setup, while others needed a week for both. As for Microsoft Defender for Endpoint, some users mentioned the same timeframes for deployment and setup., Users highly praise the customer service of Tanium, citing helpful and responsive assistance from knowledgeable and professional support staff. Customers commend Tanium for their efficient and effective customer service. On the other hand, customers express satisfaction with the customer service of Microsoft Defender for Endpoint, appreciating the support team's ability to address concerns and provide effective solutions. The quality of customer service provided by Microsoft Defender for Endpoint is highly regarded.
The summary above is based on 96 interviews we conducted recently with Tanium and Microsoft Defender for Endpoint users. To access the review's full transcripts, download our report.
"I like FortiClient EMS. FortiEDR has a lot of great features like lockdown mode, remote wipes, and encryption. I can set malware outbreak policies and controls for detecting abnormalities. You can also simulate phishing attacks."
"Ability to get forensics details and also memory exfiltration."
"Fortinet FortiEDR made our clients feel secure and more at ease, knowing that they had an EDR solution that would close the gap in their security posture."
"Fortinet is very user-friendly for customers."
"Fortinet FortiEDR's firewalling, rule creation, monitoring, and inspection profiles are great."
"It notifies us if there's any suspicious file on any PC. If any execution or similar kind of thing is happening, it just alerts us. It doesn't only alert. It also blocks the execution until we allow it. We check whether the execution is legitimate or not, and then approve it or keep it blocked. This gives us a little bit of control over this mechanism. Fortinet FortiEDR is also very straightforward and easy to maintain."
"The main thing is that I feel safe. Because the processes that have been used to get a handle on the attackers are much better than other competitors"
"NGAV and EDR features are outstanding."
"The main features of this solution are that it handles everything by itself and is well integrated."
"What I found most valuable in Microsoft Defender for Endpoint is that it's out-of-the-box, which brings more value to the customer. The technical support for the product is also one of the best parts, because it's good, in terms of the product knowledge of the technical engineers."
"The scalability is good."
"The features I have found most valuable are the ransomware and malware protection. The solution detects malware live and whenever it detects suspicious activity, it quarantines it."
"Defender is stable, I haven't had any problems with viruses when using it, and it's easy to update."
"It's effective against most types of infection, and the firewall is perfect for protection."
"One of the main features is the solution is very light on resources and we do not have any problems with it."
"It's very easy to scale because it comes built-in with Windows 10, and you just need to enable it. This can be done on scale using group policies or through Endpoint Manager on cloud or Intune."
"I would say Tanium is the best tool for vulnerability management."
"I like the tool's incident response and security patching."
"I'm not so familiar with the tool but I like the interaction of the console to the picture. Patching is the primary model I have been focusing on for the last couple of weeks. So I have created a proof of concept environment and have been checking the available features."
"The most valuable features of this solution are the consolidation of all historical data on device endpoints, security drivers, firmware, and Software version gaps."
"The solution is scalable and helps to understand how infrastructure works. It helps to improve the health of the organization."
"The security features are very valuable."
"Tanium's most valuable feature is its instant discovery aspect."
"For incident response tasks, all these tasks can get done in minutes with minimal disruption to the end-user."
"We'd like to see more one-to-one product presentations for the distribution channels."
"FortiEDR can be improved by providing more detailed reporting."
"I haven't seen the use of AI in the solution."
"It takes about two business days for initial support, which is too slow in urgent situations."
"There's room for improvement in the quick response time and technical support for integration issues, especially when dealing with multiple vendors."
"The solution is not stable."
"We find the solution to be a bit expensive."
"The dashboard isn't easy to access and manage."
"It makes your Surface devices hot. It is resource-intensive. It strains your CPU, not more than other file scanners around, but it also does a lot more. When you are transmitting files or data, it is continuously scanning the traffic and analyzing it bit by bit to see what's going on, and that, of course, is costly in terms of CPU. It is CPU intensive, and if you are on battery, it drains your battery fast. That's the only drawback that it has."
"There are some areas in the proactive threats that are just overwhelming the SOC, so we've had to turn those off until we can figure out how to filter out the false positives."
"Integrating this with third-party systems has some complexity involved."
"I had some cases a while back and told an agent my issue. When I called the next day, I had to explain everything again to a different person, so I found it annoying to repeat myself all over."
"My main issue with the tool is that there are too many menus. This causes a steep learning curve for those without training or unfamiliar with Defender for Endpoint. From an end-user perspective, the solution is there on the machine and does its job; it works seamlessly. However, as a security professional dealing with it behind the scenes, the learning curve can be steep, but not too steep. Still, it has taken some of my analysts up to a month to get familiar with the product."
"I would like to see online updates for patches for this solution. I would also like to see online information about what is trending in the market in terms of spams, viruses, or trojans. It takes some time to understand how this solution works. A few things are unclear at the beginning, such as whether it actually restricts the virus or spam at the initial stage, or when there is a security update, how will we come to know and how will it get synchronized. It would be really helpful if there is some kind of knowledge base in the form of video, audio, or document that can explain in a user-friendly way the setup, features, risks, and process to mitigate the risks. Currently, I have installed endpoint security for every individual system. I could not install it like other endpoint solutions where we have a server and a client. It would be really helpful if Microsoft Windows Defender has a server-client based model so that I can save some bandwidth when it downloads or uploads features. It will be helpful if we have a LAN-based or WAN-based controlling system."
"I personally haven't experienced any pain points, but some of my coworkers feel that it isn't secure enough."
"Integration with third-party vendors could be better. It would be better if it integrates with other protection solutions or other products outside of Microsoft. Nowadays, anti-virus protection doesn't really have to be planned as overall protection for your environment in terms of security. There are really different avenues that bad actors can take to wreak havoc on your machine."
"The solution lacks mobility."
"We had some issues with the solution's OS upgrade."
"It is not really additional functions, or the features that are needed, rather the complexity would be reduced based on the number of modules required to put together a comprehensive operational security and risk compliance model."
"They could improve the UI."
"The most painful thing is the interface. It's a bit unclear sometimes."
"Most of the time, agent-relative issues have to be more equipped with self-healing features. At times, the agent is there, but for some reason, it doesn't report a status. It gives certain problems that are obviously agent-based."
"The main issues are the network connection because different customers have issues with their networks. It's difficult implementing this type of solution because the network is the main feature in the architecture for these types of solutions. Tanium could improve by creating some network optimization."
"The performance could improve in future releases. We have had performance issues in specialized web environments, but overall I think the problems are less than 2% of the computer systems being used."
More Microsoft Defender for Endpoint Pricing and Cost Advice →
Microsoft Defender for Endpoint is ranked 1st in Endpoint Protection Platform (EPP) with 182 reviews while Tanium is ranked 36th in Endpoint Protection Platform (EPP) with 15 reviews. Microsoft Defender for Endpoint is rated 8.0, while Tanium is rated 7.4. The top reviewer of Microsoft Defender for Endpoint writes "Eliminates the need to look at multiple dashboards by automatically providing one XDR dashboard to show the security score of each subscription". On the other hand, the top reviewer of Tanium writes "Useful tool for vulnerability management and deploying applications, needing improvement in its OS upgrade". Microsoft Defender for Endpoint is most compared with Symantec Endpoint Security, Intercept X Endpoint, SentinelOne Singularity Complete and CrowdStrike Falcon, whereas Tanium is most compared with CrowdStrike Falcon, Microsoft Configuration Manager, Qualys VMDR, ServiceNow Discovery and Tenable Security Center. See our Microsoft Defender for Endpoint vs. Tanium report.
See our list of best Endpoint Protection Platform (EPP) vendors and best Endpoint Detection and Response (EDR) vendors.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.