The Tachyon Exchange

Trusted solutions for complete Modern Endpoint Management

Endpoints are hard to manage. Between cyber threats, proliferating devices, a mobile workforce, and our ever-increasing reliance on software, IT Operations has never faced higher stakes or greater expectations. However, by augmenting legacy systems with technology that simplifies, automates, and accelerates everyday tasks, IT Operations can deliver the services every organization wants and needs.

The Tachyon Instruction Management Studio (TIMS) makes it easy to extend and automate Tachyon solutions. Using our SQL-like language (SCALE), community contributors can bundle instruction sets into “Product Packs” for easier sharing with the growing Tachyon Exchange community.

Latest Products Packs

We demonstrate Tachyon integration with a number of forensic frameworks, including the Rekall memory forensic framework. Running processes are retrieved and we note that terminated processes are also listed, a capability that would not be available by using conventional Win32 or WMI queries.

Scheduled tasks represent a vector for malware as well as the potential for impacting system performance if unnecessary scheduled tasks are running on endpoints.

Audit and control the use of Chrome extensions from third parties that may install adware and other spyware.
Operations Products Packs

We demonstrate Tachyon integration with a number of forensic frameworks, including the Rekall memory forensic framework. Running processes are retrieved and we note that terminated processes are also listed, a capability that would not be available by using conventional Win32 or WMI queries.

Scheduled tasks represent a vector for malware as well as the potential for impacting system performance if unnecessary scheduled tasks are running on endpoints.

Audit and control the use of Chrome extensions from third parties that may install adware and other spyware.

Per-user software installs represent a potentially unaudited threat. Being able to track such installs, along with the user(s) associated with them, can be very useful.
Security Products Packs

We demonstrate Tachyon integration with a number of forensic frameworks, including the Rekall memory forensic framework. Running processes are retrieved and we note that terminated processes are also listed, a capability that would not be available by using conventional Win32 or WMI queries.

Scheduled tasks represent a vector for malware as well as the potential for impacting system performance if unnecessary scheduled tasks are running on endpoints.

Audit and control the use of Chrome extensions from third parties that may install adware and other spyware.

Discover device local accounts that share a common password and find local accounts that have passwords that are trivially discoverable by an attacker.