The Tachyon Exchange

Trusted solutions to real world threats.

The increased volume and sophistication of security threats are outpacing the ability of organizations to investigate and remediate incidents. Unpredictable and urgent demands from IT incidents, security threats and compliance initiatives, relentlessly drives security and operations teams to get more done, faster.

The Tachyon Instruction Management Studio (TIMS) makes it easy to extend and automate Tachyon solutions. Using our SQL-like language (SCALE), community contributors can bundle instruction sets into “Product Packs” for easier sharing with the growing Tachyon Exchange community.

Read more about Tachyon on the site | Download TIMS to create your own Product Packs

Latest Product Packs:All Products Packs

Scenario There are often situations where you want to be able to notify users by sending a message to them through Tachyon, or potentially displaying an interactive dialogue to the user and then capturing a…

Scenario Managing which machines are ready for Windows 10 and ensuring the best path to get to Window 10 for each device in your environment can be a challenge.  Having a tool like Tachyon with…

Managing and applying restore points requires a complex combination of PowerShell and the vssadmin tool to manage shadow storage. This process is unified into a single set of instructions

Determine the status of an endpoint – i.e. has the mitigation patch been applied, is it active for either/or Meltdown and Spectre, and does the CPU have microcode support for Spectre and PCID support for…

LAPS – the Local Administrator Password Solution – is a Microsoft framework that allows system administrators to remove shared local administrator passwords from their estate and replace them with a randomly assigned complex password that…

This includes scenarios where a successful attacker could: Impersonate the ME/SPS/TXE, thereby impacting local security feature attestation validity. Load and execute arbitrary code outside the visibility of the user and operating system. Cause a system…

Graph response speed endpoint perception for

Identifies machines likely to be impacted by BadRabbit cryptoware malware by looking for indicators of compromise    

Find and manage files as well as manage permissions

Useful instructions for IT Management

Gathers hardware and software details for importing to AppClarity Web

This Product Pack contain instructions related to Tachyon Agent diagnostics and configuration.

Identifies systems that could be effected by the Linux CVE-2017-7494 vulnerability