Cyber Hygiene & Preventative Security
EndpointX will deliver cyber hygiene using Tanium, reducing the cyber risk of an organisation by improving the visibility, control and management of all devices as a preventative cyber measure.
This means that the risk of compromise through ransomware, supply chain attacks, and conventional attacks can all be minimised.
Features
- Find and manage all devices in your environment
- Bring all devices under management and store their data
- Find out what state your devices are in
- Patch and update your devices software
- Measure your devices configuration and enforce it
- Measure and resolve vulnerabilities in your devices
- Measure and monitor device performance
- Report in real time the health of your environment
- Measure and report on the cyber risk of your environment
Benefits
- Drastically minimise cyber risk
- Have real up to date reports that are not stale
- Be able to pinpoint and resolve sources of cyber risk
- Manage devices whether they are at a facility or home
- Make sure all devices are patched and configured correctly
- Ensure zero days and emergent vulnerabilities are managed
Pricing
£5 to £20 a device a month
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
2 0 8 5 6 3 2 7 6 8 0 9 5 7 3
Contact
ENDPOINTX LIMITED
Joseph Michael
Telephone: 07429428922
Email: sales@endpointx.com
Service scope
- Software add-on or extension
- Yes
- What software services is the service an extension to
- EndpointX primarily uses Tanium to deliver this
- Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
- No
- System requirements
-
- Tanium licenses for devices in scope and modules required
- Tanium agent installed (can be done with our help)
- AV exclusions for Tanium processes
- Network access from Tanium to managed devices
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Under 24 hours
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- No
- Support levels
-
EndpointX provide support 7-7 Mon-Fri with a “work through” approach – EndpointX will work as long as is required continuously until the issue is resolved.
Priority 1 ("P1")
Service Outage
Tanium platform is not available including the
platform UI not loading, or the impact of actions
performed by Tanium are causing major impact
to business critical systems, including bringing
down business critical applications
Response time - 2 hours 7am-7pm – Monday – Friday
Priority 2 ("P2")
Service Degradation
Tanium platform is available, but responding
intermittently, or some modules unavailable.
Actions performed by Tanium are causing
system degradation downstream. This covers
UI not loading for certain modules, actions taken
by a module not matching expected behaviour,
downstream performance impact on many
endpoints
Response time - 3 hours 7am-7pm – Monday – Friday
Priority 3 ("P3")
General Operational
Questions / Minor
platform impact
Tanium platform available and working, but not
behaving as expected, this covers the
configuration of tanium not performing actions
in the way that is expected, reports not loading
correctly, UI and backed bugs that are not
directly service impacting, and downstream
performance impact on a small number of
endpoints
Response time - 8 hours 9am-5pm Monday - Friday - Support available to third parties
- No
Onboarding and offboarding
- Getting started
- EndpointX provide a get started pack which involves guided set up and configuration, assistance rolling out the Tanium agent, online training and documentation. We make sure that customers are hand held through at least the first 30 days to ensure the product is delivered and working and providing value.
- Service documentation
- No
- End-of-contract data extraction
- EndpointX will provide a full data dump of all data collected in reports in tanium, these can be exported as a csv for the customer to consume and use elsewhere
- End-of-contract process
- At the end of the contract, the agent will be uninstalled from devices that it has been installed on, a data dump provided to the customer, and the environment de-provisioned. Any customer data stored by endpointX or Tanium will be deleted within 30 days
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- None - the Tanium UI is accessible through mobiles and works the same
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 A
- Description of service interface
- Tanium's UI is the service interface and is accessible through the browser
- Accessibility standards
- WCAG 2.1 A
- Accessibility testing
-
Tanium is committed to the highest accessibility standards for our products. To date, Tanium has focused on compliance with U.S. Federal regulations - specifically Section 508 of the Rehabilitation Act of 1998. Tanium has conducted 3rd party accessibility assessments over the course of product development for many years and has most recently completed certification against the WCAG 2.1 / VPAT 2.3 standards for all major product modules in summer 2021. In the recent testing the Tanium Console UI achieved supports or partially supports for all applicable WCAG 2.1 criteria. Tanium can make available any VPAT reports on a module-by-module basis as part of a larger solution planning process for any customer or prospect.
As new products and features are continuously delivered, Tanium will conduct testing to identify potential gaps in compliance with accessibility guidelines. Tanium is committed to making best efforts to address any gaps quickly, as is feasible, given the severity of the issue and scope of the changes. These objectives are factored into the ongoing delivery schedule of features and releases with our existing resources. - API
- Yes
- What users can and can't do using the API
- Most features in Tanium can be managed through the API - data of any kind can be collected from the API, as well as the service itserlf being orchestrated by the API
- API documentation
- Yes
- API documentation formats
- HTML
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
- The service can be customised in line with requirements, so using the tanium agent to collect any data from your devices is possible, however customisation is locked behind users passing certifications to ensure security of customer environments
Scaling
- Independence of resources
- Each customer will be designated at least 0.5 full headcount at a minimum, or higher based on scale - this means that we dedicate time and heads to an account to ensure the quality of service for a customer is not diminished based on demand
Analytics
- Service usage metrics
- Yes
- Metrics types
- EndpointX will provide regular reports based on real time data from our standard health & hygiene reporting packs to customer. EndpointX can also assist with creation of in tool reports to match customer needs, or to create jobs to send required data to external reporting tools
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Tanium
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- Less than once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Tanium has a fully fledged API gateway for the export of data, complete with pre-configured destinations for common outputs like elasticsearch, splunk or configurable endpoints for http and smb file share locations. Data is also exportable via the UI to csv for use in excel or local scripts
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- Json
- Database formats - SQL etc
- Elasticsearch / splunk database writes
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- Critical Tanium Cloud system components, including audit evidence and logging records, are replicated across multiple Availability Zones, which enables the goal of being available with 99.9+% uptime. Frequent backups are maintained and monitored, allowing for recoverability. Customers retain ownership of, and control classification of their data, where it is stored, used, and applicable retention policies.
- Approach to resilience
- Critical Tanium Cloud system components, including audit evidence and logging records, are replicated across multiple Availability Zones, which enables the goal of being available with 99.9+% uptime. Frequent backups are maintained and monitored, allowing for recoverability. Customers retain ownership of, and control classification of their data, where it is stored, used, and applicable retention policies.
- Outage reporting
- Tanium has a management dashboard (not public), but will expose an API and email alerts to manage if the service is down or degraded
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Identity federation with existing provider (for example Google Apps)
- Access restrictions in management interfaces and support channels
-
EndpointX configures Tanium to have strict role based access controls, limiting users to:
1. seeing only what they need to see in terms of the devices applicable - i.e. "only my devices"
2. limiting users to only being able to do what they need to - e.g. patch but not vulnerability management
3. limiting users to least privilege of what they need to do - i.e. admins are not logged in with an admin account except for escalation or change purposes - Access restriction testing frequency
- At least every 6 months
- Management access authentication
- Identity federation with existing provider (for example Google Apps)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- Cyber essentials plus
- Information security policies and processes
- EndpointX manages security by primarily ensuring that no customer data leaves the tanium application and as such no customer data should touch the endpointX network. endpointX services are managed through a zero trust dashboard, and all services are protected by MFA. All access to tanium environments managed by endpointX are protected by enterprise standard IDP and IAM, as well as being logged and audited in depth.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Tanium itself is a saas cloud application and as such is ephemeral and will update in line with their release procedures - however any configuration in place is protected by a change management process, that will align to customer's requirements
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- As endpointX and Tanium provide vulnerability management services, so too they provide constant pen testing, vulnerability disclosure, along with swift resolution actions. Tanium as an application is patched at least once a month and more if out of band patches are necessary. Vulnerabilities on the platform are collected either by community disclosure or in house, and external vulnerabilities are consumed from scaprepo
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Tanium monitors all cloud instances for indicators of compromise using its security stack and alerts customers instantly in case of a breach or compromise. Incidents are responded to within 24 hours
- Incident management type
- Supplier-defined controls
- Incident management approach
-
EndpointX has 3 pre-defined priorities for events based on the severity of the impact, which have separate processes assigned to them.
Users can report incidents via JIRA to us, and they will then be tracked against SLAs and resolution targets.
endpointX will provide quarterly reporting on performance against incident resolution
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
WellbeingWellbeing
The cyber resilience of the government and health service is paramount for safeguarding the wellbeing of citizens in the United Kingdom. With the increasing digitization of essential services and medical records, robust cybersecurity measures are essential to protect sensitive information from malicious actors. A breach in either sector could compromise personal data, disrupt critical services, or even endanger lives. By fortifying cyber defenses, the government and health service ensure continuity of vital operations, maintain public trust, and uphold the integrity of healthcare systems. Ultimately, a resilient cyber infrastructure contributes to the overall safety and prosperity of citizens, promoting peace of mind and societal stability.
Pricing
- Price
- £5 to £20 a device a month
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- EndpointX and Tanium offer a "try Tanium" cloud based service that offers a 14 day trial version of Tanium to test and verify the benefits of the service
- Link to free trial
- https://try.tanium.com/