Infocyte HUNT vs. Tanium

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Infocyte HUNT
Score 10.0 out of 10
N/A
Infocyte HUNT aims to provide an easy-to-use, yet powerful enterprise endpoint security solution. Infocyte HUNT is a threat hunting software/platform designed to limit risk and eliminate dwell time by enabling an organization’s own IT and security professionals to proactively discover malware and persistent threats, active or dormant, that have successfully breached existing defenses. According to the vendor, Infocyte HUNT uses a forensic…N/A
Tanium
Score 8.2 out of 10
N/A
Tanium, headquartered in Emeryville, provides two solution packages: Unified Endpoint Management and Unified Endpoint Security. The vendor states this approach reduces complexity, improves efficiency and closes the gaps between operations and security. Tanium can also be delivered as a service from the vendor.N/A
Pricing
Infocyte HUNTTanium
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Infocyte HUNTTanium
Free Trial
YesNo
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
YesNo
Entry-level Setup FeeOptionalNo setup fee
Additional Details
More Pricing Information
Community Pulse
Infocyte HUNTTanium
Top Pros

No answers on this topic

Top Cons

No answers on this topic

Best Alternatives
Infocyte HUNTTanium
Small Businesses
NinjaOne
NinjaOne
Score 9.2 out of 10
NinjaOne
NinjaOne
Score 9.2 out of 10
Medium-sized Companies
Nmap
Nmap
Score 8.8 out of 10
NinjaOne
NinjaOne
Score 9.2 out of 10
Enterprises
Nmap
Nmap
Score 8.8 out of 10
Citrix Endpoint Management
Citrix Endpoint Management
Score 8.3 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
Infocyte HUNTTanium
Likelihood to Recommend
-
(0 ratings)
8.0
(3 ratings)
User Testimonials
Infocyte HUNTTanium
Likelihood to Recommend
Infocyte
No answers on this topic
Tanium
Tanium is well suited for organizations where enterprise infrastructure has great significance and needs to be properly managed as well as protected. Most organizations depend upon their infrastructure to sustain so Tanium can be a boon for them to sustain in this competitive market. However, Tanium is less appropriate for the traditional offices that don't have or have a less online presence.
Read full review
Pros
Infocyte
No answers on this topic
Tanium
  • It's recognize threat and offering easily.
  • Helps in security management and installing patches.
  • Tanium offers endpoint data precisely, merges many teams and processes effectively.
  • It's protect from all kinds of malicious threat and help you to achieve your task.
Read full review
Cons
Infocyte
No answers on this topic
Tanium
  • One issue is its ring topology, as the data is stored in central hubs and pushed through its peer nodes. If the central hub fails, then the associated node will also result in failure.
  • Another problem is that all Tanium management is on premises requiring the customer to maintain it. If we want ask any help from Tanium support we always get a response like "you are maintaining it yourselves and it's your responsibility.
  • The Tanium User Interface could be improved a bit as, although the tool is rich in performance, a more impressive UI might really attract new customers.
Read full review
Alternatives Considered
Infocyte
No answers on this topic
Tanium
Tanium is always my first choice, so much excellent feedback online from genuine users, easy to use in any system environment, and value for money, so many good things about Tanium stacks up against all the other competitors in the market. Tanium is one of the most reliable and trusted risk and compliance management software.
Read full review
Return on Investment
Infocyte
No answers on this topic
Tanium
  • Enhanced security.
  • Increase in customer trust.
  • Overall increase in company revenue.
Read full review
ScreenShots

Infocyte HUNT Screenshots

Screenshot of Analyze > Summary: Infocyte HUNT displays an overview of potential cyber security threats — objects and hosts. From here, you can drill down into specific threat types (along the left side of the screen).Screenshot of Analyze > Processes: View all the processes running on your endpoints (across your network) and dive into specific processes to understand what resources they're utilizing and if they are in fact a threat.Screenshot of Discover > Target Group: Create and manage multiple "Target Groups" within your network. Discover the hosts on your network and quickly assess what protocols they're using.