We’re taking another step forward in our mission to help you achieve continuous security and compliance by giving you the ability to have a first-class integration for managing endpoints. 

We are hearing it loud and clear from our regulated workload customers that they run into an issue when evaluating their security and compliance posture. They are using multiple products that each provide their own value — but none of them integrate with each other. Or worse, they communicate in different formats, which necessitates an often manual mapping process. 

For these customers, we’re excited to introduce an integration between the IBM Cloud Security and Compliance Center and Tanium Comply. Now, customers with regulated workloads can deepen their experience by having the ability to view the compliance evaluation results from Tanium from inside the Security and Compliance Center. This is just the first of many steps toward integrating best-of-breed third-parties into the IBM Cloud experience and their integration with the Security and Compliance Center.

Why integrate?

With Tanium Comply, you can extend your organization’s endpoint management capabilities. For example, you can scan for potential vulnerabilities and misconfigurations against industry security standards and vulnerability definitions. When you integrate Tanium Comply with the Security and Compliance Center, you can view all of your IBM Cloud compliance data as well as the Tanium compliance data in one location in the same format. This integration is designed for current or future Tanium customers interested in how easily IBM Cloud can onboard and work with regulated workloads, such as IBM Cloud for Financial Services.

How does it work?

Here is an overview of integration steps to get data flowing from Tanium to the Security and Compliance Center for regulated workload use cases:

  1. By using the Security and Compliance Center, you register your Tanium integration as an instance.
  2. Configure your Tanium instance to send your endpoint management check results by creating a connection.
  3. Associate your Tanium connection with the Security and Compliance Center by defining a scope.
  4. In the background, a secure connection is made between the two services.
  5. On the schedule defined in your connection, Tanium pushes endpoint management checks to the Security and Compliance Center.
  6. The Security and Compliance Center receives and converts the data to match the open source OSCAL format before displaying it in the the UI.
  7. To view your results, go to the scope details page of your Tanium scope in the Security and Compliance Center.

How do I get started?

New to the Security and Compliance Center? Try walking through our step-by-step tutorial to set up posture monitoring. If you’re already using the Security and Compliance Center to monitor your current posture, verify that you have the required permissions, and then get started by registering your Tanium integration. For help walking through what is needed in detail, see the Integrating Tanium documentation.

Have questions or feedback?  

Excellent! We’d love to hear from you. To send feedback, you can open a GitHub issue from a link at the top of any page in the documentation, open a support ticket or reach out directly through email. 

If you’ve made it this far and have more questions about the Security and Compliance Center or Tanium Comply, we’ve got you! Check out our introductory blog on the Security and Compliance Center or take a look at Tanium’s main website for their Comply component.

More from Announcements

IBM Hybrid Cloud Mesh and Red Hat Service Interconnect: A new era of app-centric connectivity 

2 min read - To meet customer demands, applications are expected to be performing at their best at all times. Simultaneously, applications need to be flexible and cost effective, and therefore supported by an underlying infrastructure that is equally reliant, performant and secure as the applications themselves.   Easier said than done. According to EMA's 2024 Network Management Megatrends report only 42% of responding IT professionals would rate their network operations as successful.   In this era of hyper-distributed infrastructure where our users, apps, and data…

IBM named a Leader in Gartner Magic Quadrant for SIEM, for the 14th consecutive time

3 min read - Security operations is getting more complex and inefficient with too many tools, too much data and simply too much to do. According to a study done by IBM, SOC team members are only able to handle half of the alerts that they should be reviewing in a typical workday. This potentially leads to missing the important alerts that are critical to an organization's security. Thus, choosing the right SIEM solution can be transformative for security teams, helping them manage alerts…

IBM and MuleSoft expand global relationship to accelerate modernization on IBM Power 

2 min read - As companies undergo digital transformation, they rely on APIs as the backbone for providing new services and customer experiences. While APIs can simplify application development and deliver integrated solutions, IT shops must have a robust solution to effectively manage and govern them to ensure that response times and costs are kept low for all applications. Many customers use Salesforce’s MuleSoft, named a leader by Gartner® in full lifecycle API management for seven consecutive times, to manage and secure APIs across…

IBM Newsletters

Get our newsletters and topic updates that deliver the latest thought leadership and insights on emerging trends.
Subscribe now More newsletters