Orion Hindawi argues that enterprise security fails not due to advanced threats but from poor endpoint visibility and control, emphasizing that Tanium’s peer-to-peer architecture solves scale and real-time response where hub-and-spoke systems fail. He reveals that 8 of the top 10 breached companies in the past year adopted Tanium post-breach to regain endpoint visibility. The discussion covers Tanium’s 5-year engineering effort to rebuild endpoint management from the ground up, its dual value in security and IT operations, and the challenge of managing Apple devices in enterprise environments.
Why listen
You get a rare, detailed founder account of how rethinking system topology from first principles solved a critical scalability problem in endpoint management that incumbents ignored.
Key takeaways
01Most major breaches stem not from undetectable attacks but from inability to act on known indicators due to poor endpoint visibility.
02Tanium’s peer-to-peer architecture replaces legacy hub-and-spoke models, enabling real-time scanning and response across hundreds of thousands of endpoints.
03Enterprise endpoint management is broken on mobile and IoT; Tanium is working with Intel and Qualcomm to embed its communication layer directly into chips.
Best for
enterprise security professionalsIT operations leaderssoftware architects building at scale