Skip to main content

Help us improve the Digital Marketplace - send your feedback

Actionable Ltd

Cyber Security Network Sensor

REACH CYBER provides the latest generation cyber security network sensor. Using analytics and AI to not only protect and detect cyber breaches, but also provide the right data you need to identify vulnerabilities and attack vectors.

The platform incorporates the REACH data acquisition engine for precision cyber data analytics.

Features

  • Rapid deployment for cyber data acquisition from network traffic
  • Data parsing with analytics for open data and Mitre readiness
  • Distributed data storage
  • Distributed search across unlimited global sensors
  • File analysis, extraction and reporting
  • Rapid identification of sophisticated attacks utilising AI
  • Identifies data exfiltration
  • Identifies sensitive data for GDPR and other compliance regimes
  • Enhanced dashboards and visual cues for cyber operations
  • Non-intrusive monitoring of all network types

Benefits

  • Ease of integration to existing and future networks
  • Complements other cyber security tools by feeding them correct data
  • Low training burden for cyber analysts
  • Reduces data transit requirements reducing network load
  • Speeds up cyber detection and response processes
  • Reduces customer reliance on multiple cyber security tools
  • Designed in alignment with NIST and Mitre standards

Pricing

£70 a device a day

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at info@actionable.today. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

2 6 8 8 4 5 5 0 3 9 9 7 2 4 6

Contact

Actionable Ltd Martin
Telephone: 0
Email: info@actionable.today

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints
No, technology agnostic.
System requirements
Uses network full packet data capture

User support

Email or online ticketing support
Email or online ticketing
Support response times
SLA dependent
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
Web chat
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
WCAG 2.1 AA or EN 301 549
Web chat accessibility testing
Continuous improvement testing with various user personas.
Onsite support
Onsite support
Support levels
All support packages are fully tailored to align to customer needs.
Prices start from £15,000.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We provide training on site and remotely delivered.
We provide full user documentation.
We provide self paced video tutorials.
Telephone, email and chat support.
Service documentation
Yes
Documentation formats
  • HTML
  • ODF
  • PDF
End-of-contract data extraction
All customer data exists in their own virtual datacentres.
The data is within the customers designated cloud/platforms.
Our exit and transition process includes assisting with customer data extraction.
End-of-contract process
Our pricing includes removal of data by customer.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
No difference
Service interface
Yes
User support accessibility
WCAG 2.1 AA or EN 301 549
Description of service interface
Sensor management portal and dashboards.
Accessibility standards
WCAG 2.1 AA or EN 301 549
Accessibility testing
System and persona testing.
API
Yes
What users can and can't do using the API
The APIs allow deployment of sensors, stop and start of sensors.
Monitoring and configuration of sensors.
Deployment of Apps including AI.
API documentation
Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
  • PDF
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Dashboards can be created and customised.
Sensors can be configured as necessary for different scenarios.
Sensors are available for multi-cloud, multi-platform scenarios.
Our SLA can be tailored for each customer scenario.

Scaling

Independence of resources
The service is independent, it is hosted in customers cloud tenancies and virtual data centres. The service is not shared with other tenants.

Analytics

Service usage metrics
Yes
Metrics types
Performance, availability and capacity.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
The data is held in and on customer systems there is no requirement
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats
  • JSON format
  • Database variants
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats
  • PCAP
  • JSON

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
99.9%
2% of monthly charge per unplanned outage below threshold.
Approach to resilience
Available on request.
Outage reporting
Email , API, customer dashboard and service portal.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Physical and logical separation of management and tenants.
IP and user role restrictions.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
Yes
Any other security certifications
Cyber Essentials

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
Other
Other security governance standards
Cyber Essentials
Information security policies and processes
Asset management and security policy.
Secure software development policy.
Data handling policy.
Information Security Management Process and Procedures for ISMS.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Our secure software development and configuration management process defines how we create, deploy and maintain the service through its lifetime securely.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
We make use of threat intelligence feeds and attack surface management systems. We make use of automated testing and deployment processes for patching.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
We monitor and or systems internally and externally, we ensure regular penetration testing and make use of security automation for automated case management.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Incident and major incident process defined through Agile ITIL process, managed by service desk on case management system.
Users report incidents to us by web, chat, phone and email.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
Yes
Connected networks
  • Public Services Network (PSN)
  • Police National Network (PNN)
  • NHS Network (N3)
  • Joint Academic Network (JANET)
  • Scottish Wide Area Network (SWAN)
  • Health and Social Care Network (HSCN)
  • Other
Other public sector networks
Compatible with all IP networks

Social Value

Social Value

Social Value

  • Fighting climate change
  • Equal opportunity

Fighting climate change

Actionable measures its carbon footprint and that of its supply chain, and this includes making an assessment and written plan for how each new contract/service can maximise carbon reduction to contribute to net zero, we consider for the organisation as a whole and per project:
1. How we can deliver additional benefits in the performance of the service including working towards net zero.
2. How we can measure and influence staff, suppliers, customers, and communities through the delivery of the service to support environmental protection and improvement.
We implement an action plan which includes multiple activities and measurements which can then also be fedback to the customer’s social value representatives to support their management initiatives.

Equal opportunity

Actionable is a passionate and committed equal opportunities employer. We have several ongoing ways to support this principle. Including; being equal opportunities employer, being signatories to the Armed Forces Covenant, maintaining a public anti-modern slavery statement, being a fund raiser and direct donor to Armed Forces charities which support people from all backgrounds to attain the highest possible levels of achievement made possible with the support of sponsors. We implement policy levers, such as making work accessible through hybrid, and fully remote working practices and more, including ensuring there are little or no barriers to entry such as arbitrary qualifications being necessitated, instead we focus on our commitment to employee’s being trained by us for the role.
We can demonstrate action to identify and tackle inequality in employment, skills and pay in the contract workforce, and as described above support in-work progression which especially helps those those from disadvantaged or minority groups, to move into higher paid work by developing new skills relevant to the service.

Pricing

Price
£70 a device a day
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
14 days use of the product in public cloud, not including professional services or training.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at info@actionable.today. Tell them what format you need. It will help if you say what assistive technology you use.