The Tachyon Exchange

Trusted solutions for complete Modern Endpoint Management

Endpoints are hard to manage. Between cyber threats, proliferating devices, a mobile workforce, and our ever-increasing reliance on software, IT Operations has never faced higher stakes or greater expectations. However, by augmenting legacy systems with technology that simplifies, automates, and accelerates everyday tasks, IT Operations can deliver the services every organization wants and needs.

The Tachyon Instruction Management Studio (TIMS) makes it easy to extend and automate Tachyon solutions. Using our SQL-like language (SCALE), community contributors can bundle instruction sets into “Product Packs” for easier sharing with the growing Tachyon Exchange community.

Latest Products Packs

Using 1E Service Catalog Connect (a 1E ServiceNow app), end-users can invoke Windows Servicing Assistant from ServiceNow. That can be from either the ServiceNow Service Catalog, its Service Portal, or from 1E Service Catalog Connect itself (for existing requests). This is an alternative to running WSA from Shopping, and is intended for customers that have end-users that are used to using ServiceNow (instead of Shopping).

We demonstrate Tachyon integration with a number of forensic frameworks, including the Rekall memory forensic framework. Running processes are retrieved and we note that terminated processes are also listed, a…

Scheduled tasks represent a vector for malware as well as the potential for impacting system performance if unnecessary scheduled tasks are running on endpoints.
Operations Products Packs

Using 1E Service Catalog Connect (a 1E ServiceNow app), end-users can invoke Windows Servicing Assistant from ServiceNow. That can be from either the ServiceNow Service Catalog, its Service Portal, or from 1E Service Catalog Connect itself (for existing requests). This is an alternative to running WSA from Shopping, and is intended for customers that have end-users that are used to using ServiceNow (instead of Shopping).

We demonstrate Tachyon integration with a number of forensic frameworks, including the Rekall memory forensic framework. Running processes are retrieved and we note that terminated processes are also listed, a…

Scheduled tasks represent a vector for malware as well as the potential for impacting system performance if unnecessary scheduled tasks are running on endpoints.

Audit and control the use of Chrome extensions from third parties that may install adware and other spyware.
Security Products Packs

We demonstrate Tachyon integration with a number of forensic frameworks, including the Rekall memory forensic framework. Running processes are retrieved and we note that terminated processes are also listed, a capability that would not be available by using conventional Win32 or WMI queries.

Scheduled tasks represent a vector for malware as well as the potential for impacting system performance if unnecessary scheduled tasks are running on endpoints.

Audit and control the use of Chrome extensions from third parties that may install adware and other spyware.

Discover device local accounts that share a common password and find local accounts that have passwords that are trivially discoverable by an attacker.