Average Ratings 1 Rating
Average Ratings 1 Rating
Description
Symantec Ghost Solution Suite is a distinguished software program designed for the imaging and deployment of desktops, laptops, tablets, and servers. It enables swift and seamless transitions to the latest operating systems, facilitates custom configurations, and allows for software deployment across various hardware platforms and operating systems. When migrating to any version of Windows, numerous factors must be taken into account. Our network of 123 million sensors captures thousands of threat incidents every second from 157 countries, successfully blocking an impressive 142 million threats on a daily basis. Leverage insights from the largest civilian threat network globally to bolster your defense strategies. The GSS Agent, which includes DAgent and ADLAgent, necessitates an active network connection and requires a minimum of 10 MB of disk space, with additional system prerequisites aligning with those of the host operating system. It’s worth noting that these agents are essential for maximizing the functionality of the Ghost Solution Suite.
Description
Enabling the world’s largest enterprises to oversee and safeguard their essential networks is our mission. Our innovative data model facilitates the rapid collection of new, on-the-spot data within mere seconds, empowering customers, partners, and Tanium to swiftly enhance functionalities on this adaptable platform. With our patented architecture, we can gather and disseminate data to millions of endpoints in a matter of seconds, all without the need for extensive infrastructure. This approach allows for informed decision-making directly at the data generation source: the endpoint itself. Our agent is designed to utilize minimal resources and bandwidth, easily fitting onto the firmware of even the smallest chips. You can broaden your capabilities without increasing Tanium’s operational footprint. We believe that the most effective way for our clients to grasp the full scope of our services is through a live demonstration of our platform in action. Orion Hindawi, the co-founder and CEO of Tanium, will lead you through an interactive keyboard tutorial to showcase the functionality of Tanium and the strength of the platform, enabling you to locate every IT asset you possess in real-time. This hands-on experience illustrates the practical benefits of our technology, ensuring that users can make the most of their IT management strategies.
API Access
Has API
API Access
Has API
Integrations
Armis
Avalor
BeyondCorp Enterprise
Blink
Chronicle SOAR
Cynerio
Expel
Filigran
Google Digital Risk Protection
JupiterOne
Integrations
Armis
Avalor
BeyondCorp Enterprise
Blink
Chronicle SOAR
Cynerio
Expel
Filigran
Google Digital Risk Protection
JupiterOne
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Broadcom
Founded
1991
Country
United States
Website
www.broadcom.com/products/endpoint-management/ghost-solutions-suite
Vendor Details
Company Name
Tanium
Country
United States
Website
www.tanium.com
Product Features
IT Management
Capacity Monitoring
Compliance Management
Event Logs
Hardware Inventory
IT Budgeting
License Management
Patch Management
Remote Access
Scheduling
Software Inventory
User Activity Monitoring
IT Service
Contract Management
IT Asset Management
Incident Management
Knowledge Management
Release Management
Self Service Portal
Service Catalog
Service Reporting
Ticket Management
Product Features
IT Security
Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting
Network Security
Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning
System Monitoring
Alerts / Notifications
Antivirus Management
Data Backup / Recovery
Device Monitoring
Inventory Management
Patch Management
Policy-based Automation
Remote Monitoring
Reporting / Analytics
Risk Analysis
Server Monitoring
Service Configuration Management