Censys Attack Surface Management
Censys provides a comprehensive profile of your organisation’s known and unknown IT assets on the internet, including services, hosts, websites, storage buckets and cloud accounts; all in real-time. By continuously scanning the IPv4 network space, Censys is able to identify mismanaged cloud configurations, expiring certificates and other security vulnerabilities.
Features
- Continuous discovery of unknown Internet assets: services, websites, storage buckets
- Comprehensive inventory of Internet assets regardless of location or account.
- Investigative tools to understand organisational dependencies; respond to new threats
- Risk engine to identify Internet-facing misconfigurations, risks, and compliance failures
- Security Information and Event Management (SIEM), VM and ticketing integrations
- IPv4 and IPv6 scanning to identify unsanctioned, mismanaged cloud services
- Automatic protocol detection for service detection on unknown ports
- Largest publicly searchable X.509 certificate repository
- Real-time detection in a simple online dashboard
Benefits
- Discover Potential Unknown Assets, eliminate security blindspots
- Continually check Internet assets for misconfigurations and security weaknesses
- Uncover potentially unknown and misconfigured cloud services, projects, and accounts
- Check compliance for your organisation by investigating potential weaknesses
- Understanding the latest security vulnerabilities that affect your environment
- Understand every Internet asset’s attack surface, ownership, history, and configuration,
- Aids the transition of assets to managed cloud accounts
- Immediately respond to new Internet threats and security vulnerabilities
- Prevent security vulnerabilities from mergers and acquisitions (M&A)
- Empower defenders with visibility into their attack surface and insights
Pricing
£46,000 a unit a year
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
1 0 4 9 5 4 9 4 3 0 5 5 6 4 3
Contact
EVERYCLOUD SECURITY LIMITED
Paul Richards
Telephone: 02078872824
Email: contracts@everycloud.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
-
A valid internet connection is required to access the service through a supported browser (Safari, Chrome, Edge).
No hardware requirements. - System requirements
-
- Valid internet connection
- Supported browser (Safari, Chrome, Edge)
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Sev4 (Critical / Total Service Failure): <8 Business Hours;
Sev3 (Major Service Issues / Some Service Failures): < 2 Business Hours;
Sev2 (Service Issues - No Failures): <1 Hour First Response;
Sev1 (Minor Issues / Questions): <1 Hour - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- No
- Web chat support
- No
- Onsite support
- No
- Support levels
-
Basic ticketing support provided via online customer portal. Submissions available 24/7, support responses available 9-5 Mon-Fri.
Support times:
Sev4 (Critical / Total Service Failure): <8 Business Hours;
Sev3 (Major Service Issues / Some Service Failures): < 2 Business Hours;
Sev2 (Service Issues - No Failures): <1 Hour First Response;
Sev1 (Minor Issues / Questions): <1 Hour - Support available to third parties
- No
Onboarding and offboarding
- Getting started
- Censys can provide full implementation services including online training to allow for the full use of the service.
- Service documentation
- Yes
- Documentation formats
- HTML
- End-of-contract data extraction
- Censys does not store private user data.
- End-of-contract process
- At the end of the contract, customers can either continue the service by contracting into a renewal or they can cease to the service by terminating the contract, at which point access to the platform is revoked.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- The Censys ASM interface is accessed through a web browser and logged into using administrator username and password authentication. Once in the platform, the user can view details of all the discovered IT assets in a comprehensive dashboard – each of which can be viewed in a more detailed page. The service is designed to be a responsive web application which can scale according to device settings.
- Accessibility standards
- None or don’t know
- Description of accessibility
- Responsive webpage user interface. No interference with users' device accessibility settings.
- Accessibility testing
- Thorough testing completed by internal quality assurance teams as well as external testing completed by customers and other external users.
- API
- Yes
- What users can and can't do using the API
- Censys API's can be used to manipulate the ASM data to allow for data input and output.
- API documentation
- Yes
- API documentation formats
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- No
Scaling
- Independence of resources
- Each customer has a unique tenant hosted with in a Google Cloud Platform workspace so any demand is spread across the GCP servers across the globe.
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Reseller (no extras)
- Organisation whose services are being resold
- Censys
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- No
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Other
- Other data at rest protection approach
- Data at rest is protected as per Google's Data at Rest policies.
- Data sanitisation process
- No
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Censys does not store private user data.
- Data export formats
- Other
- Other data export formats
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- No published service guarantees.
- Approach to resilience
- Information available upon request.
- Outage reporting
- Email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Only administrators have access to the service interface.
- Access restriction testing frequency
- At least once a year
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- Between 6 months and 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- Between 6 months and 12 months
- How long system logs are stored for
- Between 6 months and 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- AICPA SOC-2
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- AICPA SOC-2
- Information security policies and processes
- All staff have a defined managerial policy to follow and policy enforcement is ensured by regular training and company updates to all staff.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Automated auditing tools as part of software development lifecycle. All data throughout the service is regularly vulnerability assessed for any potential security impacts.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Weekly vulnerability scans are run to detect and remediate for any new patches.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Ongoing monitoring of the solution and operations. Any compromises are flagged to the relevant departments, services can be suspended on a single tenant basis dependant on the severity of the compromise. Severe compromises are acted upon immediately for resolution as soon as possible.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Incidents can be reported by users by phone, support email or submitting a ticket via the online portal. The incident will be raised to the relevant department dependant on the type of incident. Any remediation will be actioned as soon as possible and the reporting user will be informed and updated on a regular basis and once remediation is complete.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Fighting climate change
-
Fighting climate change
EveryCloud are committed to conducting business in a manner which causes minimal damage to the environment. EveryCloud encourages proactiveness by employees in respect of this commitment and all managers are required to consider any reasonable suggestions made by employees, whose aim is to minimise the environmental impact of the company’s activities. We support this by using more virtual meetings, minimising the requirement to travel, striving for a paperless office, and promoting the cycle to work initiative. - Covid-19 recovery
-
Covid-19 recovery
EveryCloud are committed to helping local communities to manage and recover from the impact of COVID-19 by undertaking a range of activities around the ‘return to work’ process for our employees. Offering various opportunities for work experience to local universities and colleges in the area and the use of apprenticeships to address gaps within the current workplace. EveryCloud supports an employee-led volunteering initiative to tackle loneliness in the elderly community by hosting afternoon teas and providing a social space for the local community three times a year and allowing employees time for volunteering in local schools and with photography projects. - Equal opportunity
-
Equal opportunity
EveryCloud have a Trustee on the Board of Greater Sport which is a charity focused on changing lives through sport and physical activity uniting communities and creating more equal and inclusive places to enable the community to come together to lead happier, healthier and more fulfilled lives.
Through our Board of Directors EveryCloud are a regular judge for the Northern Power Women Awards and sit on the Northern Power Women Board which is dedicated to accelerating gender equality and social mobility. EveryCloud also has a director presence on the Inclusive Companies Awards supporting organisations to create more inclusive workplaces. Specialising in male advocacy for gender balance; and equity for ethnic minorities. Inclusive Companies exists to challenge the lack of diverse representation within UK based organisations and to assist employers in fostering a truly inclusive environment within which they recognise and value the differences of each employee.
Through our partnership with Everton Football Club we support Everton in the Community’s launch of an innovative education STEAM programme for schools across Merseyside – combining football with robots for schools to engage and motivate young people from disadvantaged areas and transform the way children learn about technology by donating ipads. - Wellbeing
-
Wellbeing
EveryCloud is committed to providing a working environment which promotes and maintains the health and wellbeing of its staff and all other personnel engaged in work on projects. EveryCloud recognises the importance of investing in the health and welfare of its staff by providing a physical and social environment which is conducive to teaching, learning, living, and working. The company will foster an ethos associated to fairness, inclusion & respect towards all our employees and have an appointed employee to oversee the wellbeing within the work place. EveryCloud have committed to the ‘Six Standards within The Mental Health at Work Commitment’ which we follow to improve and support the mental health of our employees.
EveryCloud is committed to raising awareness of mental health and encouraging healthy discussion by boosting employee’s knowledge and skills so they can better manage their mental health and improve their ability to support that of others. Mental health is embedded in our induction and training, and all staff are given information on how best to manage mental health; support is available as per our Mental Health at Work Policy. EveryCloud has an appointed Mental Health Champion who is committed to regularly organising company events, promoting healthy eating and changing the way that our employees think and act about mental health.
EveryCloud has a healthy work hours policy and supports a full campaign to allow staff to take lunch breaks and allows additional time out of the working day to attend all family and volunteering events. Staff are encouraged to take their full annual leave entitlement and to avoid working at weekends with time in lieu given for attendance of events outside of working hours.
Pricing
- Price
- £46,000 a unit a year
- Discount for educational organisations
- No
- Free trial available
- No