The Tachyon Exchange
Trusted solutions to real world threats.
The increased volume and sophistication of security threats are outpacing the ability of organizations to investigate and remediate incidents. Unpredictable and urgent demands from IT incidents, security threats and compliance initiatives, relentlessly drives security and operations teams to get more done, faster.
The Tachyon Instruction Management Studio (TIMS) makes it easy to extend and automate Tachyon solutions. Using our SQL-like language (SCALE), community contributors can bundle instruction sets into “Product Packs” for easier sharing with the growing Tachyon Exchange community.
Read more about Tachyon on the 1e.com site | Download TIMS to create your own Product Packs
Remove unwanted software immediately using the power of 1E's AppClarity asset management solution.
Easily control the deployment of software in your estate leveraging 1E's Nomad solution
Greatly speeds up identification of documents in your entire environment that contains personally identifiable information to assist with GDPR compliance.
A collection of useful Tachyon questions that provides information to simplify common IT management tasks.
Gather key software & hardware inventory data from your network to ensure that any anomalies are quickly identified. Output can be used by AppClarity.
Tools to ensure your Tachyon agents remain healthy and up to date.
Identify all deployments of Apache Struts and help find vulnerability to Struts2 Shock.
Provide up-to-date measures and graphs of the BitLocker status of devices in your network.
Identify expiring security certificates and easily replace them with updates.
Provide mitigation for the Escalation of Privilege vulnerability (SA-00075) on Intel AMT devices.
Quarantine selected Windows devices on your network to minimize your security risk.
Identifies systems that could be affected by the Linux CVE-2017-7494 (SambaCry) vulnerability.
A collection of commonly used Tachyon questions and instructions. Also useful as an introduction to building your own Product Packs.
Search for and optionally replace specific file content across your entire organization, within seconds.
Monitor and control the health of your SCCM server and its clients with ease.
Effectivley deal with Wanna-Cry ransomware across your entire environment with ease. Contains both preventative and maintenance counter measures to deploy in real-time.