Skip to main content

Help us improve the Digital Marketplace - send your feedback

PLANNED LINK LTD

Cyber Security Services - EDR, MDR, XDR, VM

Delivering enterprise-grade, threat-led Cyber Security Services that truly protect our clients. These services are able to deploy and configure a full suite of applications and use cases in your organisation tailored to specific requirements - Supporting: Microsoft, Elastic, Splunk, Tenable, Sophos, Barracuda and more

Features

  • Deployable independent of operating system
  • Available on premise (LAN/WAN) or standalone
  • Deployable on private or public (AWS or Azure) Cloud
  • Fully integrated with SIEM systems
  • Capability to scan removable media-in-situ or via the cloud

Benefits

  • Ingest data from multiple sources
  • Scan directly from the internet
  • Advanced heuristic mutli-scan malware detection
  • Fully customisable, delivery a highly scalable & configurable system

Pricing

£2.50 to £75 a device a month

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tenders@plannedlink.io. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

3 2 7 0 1 5 0 8 1 0 3 0 4 0 9

Contact

PLANNED LINK LTD Christopher Rimmer
Telephone: 07480128616
Email: tenders@plannedlink.io

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints
The organisation (client) should cover any licence fees for proprietary services that are requested as part of the service. If open source software is being used, this will not be required.
System requirements
Licences for any commercial or proprietary application

User support

Email or online ticketing support
Email or online ticketing
Support response times
We endeavor to respond immediately to any commercial or service questions.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Yes
Phone support availability
9 to 5 (UK time), 7 days a week
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), 7 days a week
Web chat support accessibility standard
WCAG 2.1 AA or EN 301 549
Web chat accessibility testing
Conducting regular research with agents, admins and end users who rely on assistive technology to collect feedback and help us prioritise improvements.
Onsite support
Yes, at extra cost
Support levels
We will provide a support service to meet your requirements based on the demands of your programme and the service you need. Specific support levels are agreed for each engagement.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
There are a range of support and training facilities provided to help new users. These range from FOC on-demand training through to professional services onsite; an online support portal and customers community forums.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Should a customer's account expire or terminate, Tenable will retain the data, as it was at the time of expiration, for no more than 180 days for customers to download their records accordingly. After that time, this data may be deleted and cannot be recovered.
End-of-contract process
Should a customer's account expire or terminate, Tenable will retain the data, as it was at the time of expiration, for no more than 180 days for customers to download their records accordingly. After that time, this data may be deleted and cannot be recovered.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • MacOS
  • Windows
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Screen size will limit the usability via the web browser but functionality is the same
Service interface
Yes
User support accessibility
WCAG 2.1 AA or EN 301 549
Description of service interface
Web based console Restfull API
Accessibility standards
WCAG 2.1 AA or EN 301 549
Accessibility testing
Conducting regular research with agents, admins and end users who rely on assistive technology to collect feedback and help us prioritise improvements.
API
Yes
What users can and can't do using the API
Users can natively leverage the tool inline with documentation available from the vendor with our support
API documentation
Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
  • ODF
  • PDF
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
A large number of ingest and filtering options available for the purpose of filtering down the resultant output and configuration data. These filters can be combined in various ways and allows for the organization to quickly filter down to the subset of the data that is pertinent to the task at that time.

Scaling

Independence of resources
We commit to provide 99.95% average uptime with respect to the Cloud Services during each calendar month of the subscription term.

Analytics

Service usage metrics
Yes
Metrics types
A number of different metrics are available on request and vary per vendor
Reporting types
  • Real-time dashboards
  • Reports on request

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Nessus, Tenable, Elastic, Palo Alto, Juniper, Microsoft, Tines, Sophos, Barracuda

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
In-house
Protecting data at rest
Encryption of all physical media
Data sanitisation process
No
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Our service has the facility to allow users to export their data either via the console or via the API
Data export formats
  • CSV
  • Other
Other data export formats
Data Export
Data import formats
  • CSV
  • Other
Other data import formats
Data Import

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Other
Other protection between networks
All customer data is marked with a "container ID", which corresponds to a single customer subscription. This container ID assures that access to a customer’s data is limited to only that customer.
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
We commit to provide 99.95% average uptime with respect to the Cloud Services during each calendar month of the subscription term.
Approach to resilience
We use health and status data to detect and address potential issues in a timely manner, thereby maintaining SLA commitments. Our Cloud services are replicated both within and across regions.
Outage reporting
Our disaster recovery procedures have several levels and are designed to react to situations that may occur from anywhere between once in five years to once in 50 years. Depending on the scope of the disaster, the recovery procedures vary in time from 60 minutes to 24 hours.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels
Role Based Access Management (RBAC) and Just in time Privileged Access Management (PIM) where any administrative function is required.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
British Assessment Bureau UKAS
ISO/IEC 27001 accreditation date
26/01/24
What the ISO/IEC 27001 doesn’t cover
There are no exclusions
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
Yes
Any other security certifications
  • We have a number of CSTA people on staff
  • We have a number of CSTP people on staff
  • We have a number of CWSA people on staff
  • We have a number of CAST people on staff
  • We have a number of CCP SIRA people on staff

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Our policies were written based on the National Institute of Standards and Technology (NIST) cybersecurity framework, CEB library best practices , SANS institute documents and our own professional experience. Policies are shared with business units and reviewed collectively during internal workshop meetings. Once approved, policies are disseminated to all employees via our internal network portal. Policies are reviewed, revised, and updated on annual basis.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Not all systems require the same amount of development, testing, and approval. Changes to some systems are routine and represent little or no risk. Therefore, to ensure reasonable processing time for routine maintenance and other low risk change requests, and to ensure that more significant, higher impact changes receive the appropriate scrutiny and planning, the following types of changes have been established. These types have corresponding development, testing, and implementation requirements as well as specific approvals necessary to process. Classification of Change Types: Provisioning Configuration Maintenance/ Upkeep Development (existing) Development (new)
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
We perform internal vulnerability scans on a daily, weekly and monthly basis. Discovered vulnerabilities are remediated based on vulnerability management policy. High and Critical vulnerabilities are given priority.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
All systems connected to our corporate environments are configured to send logs to a centralised syslog server configured for further logs analysis.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Notification will be made within 48 hours and not before the initial incident report, containing the basic facts, is completed.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

Planned Link recognises the urgent challenge posed by climate change and is committed to being part of the solution. We are dedicated to reducing our carbon footprint, implementing sustainable practices, and innovating in ways that reduce environmental impact across our operations and product lines. By investing in renewable energy, promoting energy efficiency, and supporting climate-positive initiatives, we aim to contribute to global efforts to mitigate climate change. Our commitment extends beyond compliance to actively engaging with our stakeholders and communities to foster environmental stewardship and resilience.

Covid-19 recovery

The challenges posed by the COVID-19 pandemic, have ensured that Planned Link remains steadfast in its commitment to recovery and resilience. We have actively implemented comprehensive strategies to ensure the safety, health, and well-being of our employees while maintaining operational efficiency. Our approach includes enhancing remote work capabilities, and ensuring all health guidelines are followed meticulously. Our focus has allowed us to foster a sustainable recovery, promoting economic stability, and building a stronger, more resilient future for all.

Tackling economic inequality

Planned link is deeply committed to addressing economic inequality by creating inclusive growth opportunities and fostering a diverse and supportive workplace. We believe in fair compensation, equal access to professional development, and promoting from within to empower our employees and their communities. We are dedicated to investing in underserved areas, supporting small businesses, and collaborating with like-minded partners to drive positive change. By embedding social responsibility into our business model, we strive not only to succeed financially but also to contribute to a more equitable and prosperous society for all

Equal opportunity

Planned Link is steadfast in its commitment to equal opportunity, fostering a workplace environment where diversity is celebrated, and all employees are treated with respect and dignity. We believe that everyone, regardless of their background, gender, race, or orientation, should have equal access to opportunities for growth and advancement.

Wellbeing

Planned Link, firmly believe that employee wellbeing is the cornerstone of our success. We are committed to fostering a supportive and inclusive environment where every team member feels valued, understood, and empowered. We prioritise mental, physical, and emotional health through flexible work policies, and a culture of open communication. Our dedication to wellbeing is not just about enhancing productivity; it's about creating a thriving business where individuals can achieve personal and professional growth. We recognise that a healthy workforce is a happy workforce, and we are steadfast in our commitment to the holistic welfare of our employees

Pricing

Price
£2.50 to £75 a device a month
Discount for educational organisations
Yes
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tenders@plannedlink.io. Tell them what format you need. It will help if you say what assistive technology you use.