PwC and Tanium – the company that has “redefined security and systems management” – have unveiled a new form of strategic partnership that will bring together the deep technical security expertise, threat intelligence and consulting practices of PwC with the respected endpoint security and systems management software platform of Tanium.
This collaborative effort represents an important step forward in the battle against cyber and insider threats, empowering businesses and Governments with 15-second visibility into – and control over – all of the globally-distributed endpoints across the organisation.
PwC has been working closely with Tanium for two years now, leveraging the transformative power of near real-time visibility into endpoints in order to detect, contain and remediate targeted intrusions for its global client base.
Through this new partnership, PwC will introduce Tanium Accelerators to its Cyber Security practice, in turn assisting organisations with everything from threat intelligence through to incident response and remediation, data privacy impact assessments and then on to integration consulting.
In today’s world, cyber attacks are happening with greater frequency and sophistication than ever before. The reality is that the majority of the largest organisations around the globe actually lack the ability to see, know and do anything about constant hacking attempts.
The Tanium platform is changing the game, though, affording security and IT operations teams “unprecedented” 15-second line of sight and control over every endpoint. That’s even across the largest and most complex of global networks.
Tanium’s technology – coupled with the breadth of industry expertise PwC already offers – delivers insight into what’s happening on their clients’ computer networks within seconds of starting a search, helping organisations assess, identify and manage the threats and vulnerabilities they face on a daily basis.
Portfolio of Tanium Accelerators
PwC’s portfolio of Tanium Accelerators includes the following:
Threat indicator feeds and signatures for integration into – and deployment via – Tanium (including access to the PwC intelligence team for custom signature requests)
Access to PwC’s custom sensor library and on-demand access to PwC Tanium subject matter experts for bespoke sensor or package development
Remote hunt team and incident response services
Continuous environment analysis to identify evidence of malicious cyber activity and rapid remote response designed to assist in-house teams once a compromise is detected
Consulting and integration
A portfolio of consulting and integration services specifically to help integrate Tanium with business processes across security and IT operations and, in addition, accelerate time to value
Data privacy impact assessments
Proactively identify and address potential privacy issues and obligations in order to maximise RoI while at the same time complying with relevant legislation
Detect, Respond, Resolve
“PwC’s Tanium Accelerator services have already helped the company’s clients better detect, respond to and resolve advanced attacks,” said David Damato, chief security officer at Tanium. “We’re very happy to have formalised our relationship with PwC and bring these services to more global organisations. Having spent years on the front lines of cyber crime investigations for Fortune 500 companies, it’s clear that the combination of PwC’s Cyber Security practice capabilities and Tanium’s platform will bring immense value to end user businesses.”
Kris McConkey, PwC’s cyber security partner, responded: “Given the risk to their businesses from the increasing prevalence of cyber and insider threats, it’s fair to state that cyber security remains one of the leading concerns for today’s CEOs. By combining the expertise of PwC’s global incident response, intelligence and security consulting teams with the speed and flexibility of the Tanium platform, we’re going to be making a genuine and positive difference to the security challenges our clients are facing.”
McConkey concluded: “Organisations now have the ability to act faster and smarter at scale to identify and resolve malicious activity, minimise their attack surface and establish key facts about their environment all within 15 seconds. Bear in mind this is a process that used to take days or even weeks.”