Skip to main content

Help us improve the Digital Marketplace - send your feedback

Redinet Ltd

Tenable.io Vulnerability Management

Managed in the cloud and powered by Tenable Nessus, Tenable Vulnerability Management provides the industry's most comprehensive vulnerability coverage with real-time continuous assessment of your organization. Built-in prioritization, threat intelligence and real-time insight help you understand your exposures and proactively prioritize remediations.

Features

  • Vulnerability Scanning
  • Asset Discovery
  • Risk-Based Priority Ratings
  • Extensive Dashboard
  • Discover, Asses and Prioritise Vulnerabilities

Benefits

  • Lightweight Agent
  • Find and Fix Vulnerabilities Before Attacks Happen
  • Prioritize Vulnerabilities
  • Respond Faster to Disrupt Attacks

Pricing

£30 a licence a year

  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at mike.beeson@redinet.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

1 0 7 1 5 3 2 8 5 6 5 8 3 5 5

Contact

Redinet Ltd Mike Beeson
Telephone: 020 8249 7000
Email: mike.beeson@redinet.co.uk

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Tenable.io can be used as a standalone service or integrated into our Managed Detection and Response services.
Cloud deployment model
Public cloud
Service constraints
Must be accessed via a web browser
System requirements
  • Will run on any operating system
  • Will also work agentless with other devices

User support

Email or online ticketing support
Yes, at extra cost
Support response times
We target our service desk with a One-Hour valid first response. Our first response is based on an engineer responding with an action and not an automated response. Our support team are targeted on a number of Key Performance Indicators. We are committed to providing buyers with the highest level of support possible. Examples of these is, Telephone pickup KPI which is within 10 seconds and consistently averages at 93%, well above our target of 85%. First Response to Tickets within One-hour SLA averages at 97%, which is above our target of 94%. These are reviewed on a quarterly basis.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Redinet offer support to fit the needs of our clients. Standard Business Hours are, Monday to Friday, 8am to 6pm. We also provide support outside of these hours (up to 24/7) to fit the needs of all business and can be tailored as required. Our SLA for first response is 1-hour for a valid response from an engineer who has been assigned to the ticket. Support package costs can be discussed on a per customer basis dependant on required levels
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Redinet would setup the online portal and user access. We can also help to deploy the agents out to all of the devices and provide training on how to manage the system.
Service documentation
No
End-of-contract data extraction
Should a customer's account expire or terminate, Tenable will retain the data, as it was at the time of expiration, for a period of time for customers to download their records accordingly. After that time, this data may be deleted and cannot be recovered.
End-of-contract process
Should a customer's account expire or terminate, Tenable will retain the data, as it was at the time of expiration, for a period of time for customers to download their records accordingly. After that time, this data may be deleted and cannot be recovered.

Once this is done we would then fill out a customer leavers form as part of our ISO27001 policies for any accounts on our knowledgebase and billing platforms are closed down.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
Yes
Compatible operating systems
  • Linux or Unix
  • MacOS
  • Windows
Designed for use on mobile devices
No
Service interface
Yes
User support accessibility
None or don’t know
Description of service interface
It is an online portal to manage the service and configuration policies
Accessibility standards
None or don’t know
Description of accessibility
Access to Tenable.io is through a web browser utilising TLS/SSL secure communication. Support is either via phone, email or our support portal.
Accessibility testing
N/A
API
Yes
What users can and can't do using the API
Using standard API connectors. More detail can be found at https://developer.tenable.com/reference/navigate
API documentation
Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
There are large numbers of filtering options within the platform to customise the experience and data in various priorities.

Scaling

Independence of resources
Tenable commits to provide a 99.95% Production Uptime with respect to the Hosted Services during each calendar month of the subscription term.

Analytics

Service usage metrics
Yes
Metrics types
You can view data about application versions, end of support applications, applications that are vulnerable
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra support
Organisation whose services are being resold
Tenable

Staff security

Staff security clearance
Other security clearance
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
In-house
Protecting data at rest
Other
Other data at rest protection approach
Data is stored on encrypted media using at least one level of AES-256 encryption.
Data sanitisation process
No
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Tenable IO has the facility to allow users to export their data either via the console or via APIs
Data export formats
CSV
Data import formats
Other
Other data import formats
N/A

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Other
Other protection between networks
All customer data is marked with a "container ID", which corresponds to a single customer subscription. This container ID assures that access to a customer’s data is limited to only that customer.
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Tenable commits to provide a 99.95% Production Uptime with respect to the Hosted Services during each calendar month of the subscription term. If Tenable fails to perform the Hosted Services in accordance with the Service Level Commitment, then Customer may request a Service Level Credit in accordance with this SLA. Service Level Credits shall be Customer’s sole and exclusive remedy for unavailability or performance degradation of the specific Hosted Services.
Approach to resilience
Tenable also focuses on the availability and reliability of the Tenable Vulnerability Management service because poor security controls can create problems that, while not a risk to customers’ data, can affect the service availability. Tenable implements and enforces measures to make Tenable Vulnerability Management highly available, guarded against attacks or simple faults and outages, and always usable for our customers.
This service is supplied across multiple datacentres and regions so offers resilience by the Vendor
Outage reporting
Service uptime and availability is available on demand on the Tenable website using a public dashboard

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
We can define the IP addresses that can access the web interface
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
BSI Assurance UK Limited
ISO/IEC 27001 accreditation date
27/01/2023
What the ISO/IEC 27001 doesn’t cover
We made the decision to cover everything we do under our certificate. We don't cover other businesses with our accreditation.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Redinet have an Information Security Group and we are ISO27001 accredited.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Formal change management process. If changes are requested to the infrastructure these would go through the project team to make sure that changes are thought about to avoid risk.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Tenable does internal vulnerability scans on a daily, weekly and monthly basis. Penetration tests are done annually. Discovered vulnerabilities are remediated based on vulnerability management policy. High and Critical vulnerabilities are given priority.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
We have MDR & threat hunting services but these are a separate service. We respond within an hour to isolate and mitigate.
Incident management type
Supplier-defined controls
Incident management approach
If there is a support contract in place with us users would be able to respond to incidents via our service desk and have incident management processes as part of our ISO27001 accreditation.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

As a business we have an environmental policy in place.

Covid-19 recovery

We have always been flexible with staff with working from home and since the Covid-19 pandemic we have increased the opportunity for flexible working. We give staff the freedom to ensure they can work from home as and when required. We support local business with sponsorships to help the community around us.

Tackling economic inequality

We have run apprentice programs for students doing IT and Security courses at College. We also have continual improvement programs to continue to upskill internal staff with our strategic Vendor partnerships.

Equal opportunity

At Redinet we have an inclusion policy to ensure that we give as many people the right opportunity as possible.

Wellbeing

We regularly run charitable events and team building in conjunction with mental health initiatives. We have employee healthcare services in place that incorporates mental health and wellbeing services to be used.

Pricing

Price
£30 a licence a year
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
We can supply a 30 day trial

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at mike.beeson@redinet.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.