The Tachyon Exchange

Trusted solutions to real world threats.

The increased volume and sophistication of security threats are outpacing the ability of organizations to investigate and remediate incidents. Unpredictable and urgent demands from IT incidents, security threats and compliance initiatives, relentlessly drives security and operations teams to get more done, faster.

The Tachyon Instruction Management Studio (TIMS) makes it easy to extend and automate Tachyon solutions. Using our SQL-like language (SCALE), community contributors can bundle instruction sets into “Product Packs” for easier sharing with the growing Tachyon Exchange community.

Read more about Tachyon on the 1e.com site | Download TIMS to create your own Product Packs

Latest Product Packs:All Products Packs

Greatly speeds up identification of documents in your entire environment that contains personally identifiable information to assist with GDPR compliance.

A collection of useful Tachyon questions that provides information to simplify common IT management tasks.

Gather key software & hardware inventory data from your network to ensure that any anomalies are quickly identified. Output can be used by AppClarity.

Tools to ensure your Tachyon agents remain healthy and up to date.

Effectivley deal with Wanna-Cry ransomware across your entire environment with ease. Contains both preventative and maintenance counter measures to deploy in real-time.

A collection of commonly used Tachyon questions and instructions. Also useful as an introduction to building your own Product Packs.

Identify all deployments of Apache Struts and help find vulnerability to Struts2 Shock.

Provide up-to-date measures and graphs of the BitLocker status of devices in your network.

Identify expiring security certificates and easily replace them with updates.

Leverage Rekall memory forensics to uncover hidden malware in your organisation.

Provide mitigation for the Escalation of Privilege vulnerability (SA-00075) on Intel AMT devices.

Quarantine selected Windows devices on your network to minimize your security risk.

Search for and optionally replace specific file content across your entire organization, within seconds.

Monitor and control the health of your SCCM server and its clients with ease.

Track software installations over a period of time and indentify bottlenecks in deployments.

A ready-to-use set of questions and instructions to automate common Windows sys admin functions.