What Happened When the World Stayed Home?

Our global research study revealed escalating attacks on unsecured endpoints during the quarantine. Drill down into the specific challenges and planned responses IT leaders are taking to strengthen their IT ops and security processes.

Download The Research Report

90% of CXOs reported an increase in cyberattacks since the world stayed home

I can attest to the news that the number of breaches has increased since the WFH economy started.

Alissa Knight Group CEO, Analyst and Former Hacker, Brier & Thorn and Knight Ink
Read Perspective
70% of global IT leaders are prioritizing cybersecurity since the world stayed home

For us, if our business stopped then we could not provide care for our patients and that is just not an option for us.

Mitch Teichman Senior Manager, Client Engineering, VITAS Healthcare
Read Perspective
#1 concern identifying remote endpoints since the world stayed home

Every system, every user is broadening the attack surface. If you don’t know what’s in your organization, someone else will come along and figure it out for you.

Charles Ross Chief Customer Officer, Tanium
Read Perspective
98% of CXOs saw security challenges rise in the first two months of the pandemic

Now people are largely subsisting on their own, in their own perimeter and that perimeter is shared with personal machines. The attack surface has increased massively.

Robin Vann Chief Solution Officer and CTO, RelianceACSN
Read Perspective
93% of global IT leaders delayed security priorities when the world stayed home

Security was an afterthought when bringing systems online. They opened the front door, opened the windows and put up a sign saying they are defenseless.

Charles Ross Chief Customer Officer, Tanium
Read Perspective
43% of IT ops leaders reported patching issues on personal devices

We still can’t reliably do very simple things like patching. We live in a world where 80% efficacy of when I send a patch out is the de facto standard.

Egon Rinderer Global Vice President of Technology & Federal CTO, Tanium
47% of IT ops leaders plan to improve patch processes

It only takes one server or workstation that isn’t patched for a malicious actor to get access to the network and then to move laterally across.

Scott Lowe Managing Director and Founder, EndPointX
Read Perspective
48% of global IT leaders are investing in endpoint management tools

Having that peace of mind – to not have to worry about visibility and control when we were scrambling and worrying about so many other things – was tremendous for my team and the IT organization.

Mitch Teichman Senior Manager, Client Engineering, VITAS Healthcare
Read Perspective
38% of global IT leaders are reducing reliance on VPNs

VPN capacity can impede IT's access to remote devices and throttle the distribution of critical software updates and patches.

Michael Suby Research Vice President, Security & Trust, IDC
Read Perspective

Keys to Success

Brace for the Future and Stay on Budget

With the world staying home, organizations don’t have weeks or months to manage and secure their now-remote endpoints. They need the speed and flexibility of the cloud to adjust their operations – and remediate incidents – at a moment’s notice.

1
Get Control and Visibility Into Your Environments Today

Manage and Secure Your Endpoints in Hours – Not Weeks or Months

Learn How

2
Begin Tool Consolidation Without Adding Infrastructure

With the World's First and Only Zero-Infrastructure Unified Endpoint Solution

Learn How

3
Prepare for Tomorrow Without Paying For It Today

Scale as Your Business Grows. Turn on Capabilities When You Are Ready.

Learn How

  • quote

    Now people are largely subsisting on their own, in their own perimeter, and that perimeter is shared with personal machines. The attack surface has increased massively.

  • quote

    If there was a successful breach against one of the global financial services companies, the impact would be very, very severe. Their reputation is everything to them. After all, they look after everyone’s money. If they were breached, the reputation damage – and the damage to their share price – would be incredible.

  • quote

    Failure was not an option. Certain companies, if they can’t conduct business, then they may not be able to sell what they typically sell. For us, if our business stopped then we could not provide care for our patients, and that is just not an option for us.

  • quote

    Every system, every user, is broadening the attack surface. If you don’t know what’s in your organization, someone else will come along and figure it out for you.

  • quote

    Over the last two decades of my career, I’ve hacked over a hundred networks. More than half of those compromises were the result of me gaining access to the network through an asset the company didn’t know they had.

In Their Words

Global leaders speak frankly about their changing priorities and the need for a unified endpoint management and security solution.

See More PerspectivesTry Tanium Now

Take a Deeper Dive

Access our complete resource library, including papers, analyst reports, videos and briefs. Get advice from global IT leaders who faced major work-from-home disruptions and learn how they are fortifying their enterprise for the next round of threats.

Show me

Prepare for Tomorrow While Addressing Today

Scale As Your Business Needs Shift or Grow

How do you prepare for tomorrow when you’re playing catch-up today? Tanium as a Service offers a fast and easy way to get up and running so that you can address your most immediate challenges.

And, as your business needs shift or grow, our unified, comprehensive approach to endpoint management and security arms you with the ability to simply “turn on” capabilities from a single console.

StartGrowLead
IT OPERATIONS Get visibility into the number and state of your endpoints. Reduce your attack surface with comprehensive endpoint management controls. Manage end user, cloud and on-premises endpoints from a single console.
IT SECURITY Get visibility into the number and state of your endpoints. Fortify endpoints with comprehensive EDR , vulnerability and configuration management. Identify and protect managed and unmanaged devices and detect, respond to and recover from threats and breaches.
Try Tanium request pricing Try Tanium request pricing Try Tanium request pricing

Analysts & Global Leaders Offer Their Insights on Tomorrow

Explore how global leaders plan to strengthen their enterprise, allocate budgets and put endpoint control at the top of their to-do lists, even before workplaces re-open.

Manage and Secure Your Endpoints Today

Don’t Wait Weeks or Even Months to Close Your Security Gaps.

Get up and running in hours with Tanium as a Service – the world’s first and only no-host, zero-infrastructure, cloud-based endpoint management and security platform. Get started today. Contact us to see a live demo, get pricing or request a free trial.