Tanium Cloud Workloads for Containerized Environments – Tanium Tech Talks #118
In this episode of Tanium Tech Talks, host Ashley McGlone welcomes Tanium Director of Technical Product Management Tricia Croarkin to explore how organizations can reduce risk in containerized environments using Tanium Cloud Workloads
When it comes to security, containerization can present significant risks due to issues like misconfigurations, vulnerabilities, and data leaks. In fact, the 2023 Cloud-Native Security and Usage Report by Sysdig found that 87% of containers have critical or high-severity vulnerabilities. When these vulnerabilities lead to attacks, the impact is often substantial, with 46% of respondents reporting losing revenue due to a container or Kubernetes security incident, as determined in the 2024 State of Kubernetes security report by RedHat.
In light of this, organizations need real-time visibility and control over their containerized environments to reduce risk and ensure operational resilience. And Tanium now makes this possible through Tanium Cloud Workloads — a purpose-built security tool for containerized applications.
Watch the video to discover how Tanium Cloud Workloads helps organizations monitor and protect their containerized environments. Ashley and Tricia also discuss upcoming features and tips for getting started.
Key takeaways
In this video, Ashley and Tricia outline specific use cases around popular Tanium modules, including:
- Tanium Interact: Query containers across registries
- Tanium Asset: Access new reports for container inventory, including views of your software bill of materials (SBOM), rogue, and privileged containers
- Tanium Comply: Scan for container image vulnerabilities, including the SBOM
- Tanium Enforce: Implement security guardrails with new container policies
- Tanium Reporting: A bonus Cloud Workloads dashboard
Why use Tanium Cloud Workloads?
Tanium Cloud Workloads reduces the risk of deploying and managing containerized applications through real-time registry visibility and vulnerability scanning, runtime container analysis, and Kubernetes runtime policy enforcement.
- Gain instant visibility into clusters and nodes
- Monitor and enforce Kubernetes cluster policies
- Discover vulnerabilities before they reach production – saving time and reducing risk
Noteworthy quotes
It might take [software companies] a while before they realize that that vulnerability exists when something they shipped in a container, but we can find it before they even announce it.
A few years ago, we released the Tanium Container Solution to provide visibility for containerized environments — and the increased visibility was well received. But once we started getting more feedback, we realized that we were missing a lot of great use cases, and we really needed to go back to the drawing board and create a brand-new solution that’s more user-friendly and more robust to allow our customers to see and manage their containerized environments.
This will work for on-prem self-hosted containers or cloud containers, whether it’s a managed orchestrator or an unmanaged orchestrator.