Phoenix Software Ltd
Tenable Attack Surface Management (formerly Tenable.asm)
Gain complete visibility into your Internet-connected assets to eliminate blind spots and unknown sources of risk.
Features
- Continuously maps the entire internet
- Discovers connections to internet-facing assets
- Attack Surface Visibility
- Unlimited Top-Level Domains
- Continuous Data Refreshes
- Attack Surface Change Alerts
- Rich Asset Context and Attribution
- Suggested Domains
- Asset Management
- Well Documented API
Benefits
- Largest attack surface map in the world
- Establish attack surface in minutes, with minimal configuration
- 200 fields of metadata and comprehensive filtering
- Up-to-date/view/of/assets/with/daily/bi-weekly/data/refreshes
- Launch scans of newly discovered assets
Pricing
£44.53 a unit
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at ccs@phoenixs.co.uk.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 14
Service ID
4 2 5 5 6 8 7 9 3 3 3 9 6 1 4
Contact
Phoenix Software Ltd
Jonny Scott
Telephone: 01904 562200
Email: ccs@phoenixs.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- Must be accessed via a web browser. System maintenance is automatic and included as part of the subscription.
- System requirements
- https://docs.tenable.com/attack-surface-management/Content/Topics/Welcome/GettingStarted.htm
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- RTO for initial response times varies due to the critical nature, but all within a 24 hour window. Tenable offers at no additional cost our "Advanced Support Plan" which includes telephone, chat, and portal support including an online knowledge base. Our support is available 24 hours a day, 7 days a week, 365 days a year. Details: https://www.tenable.com/support/technical-support/plans
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- The chat feature is available once a named contact has logged into the support portal.
- Web chat accessibility testing
- Salesforce provide the chat facility for the community website (including the support function). Please refer to Salesforce documentation for further information.
- Onsite support
- Yes, at extra cost
- Support levels
- Advanced, Premier and Elite. Advanced support is included with your subscription cost and users can upgrade to additional plans if they chose to. Details on each plan type: https://www.tenable.com/support/plans
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- There are a range of support and training options provided to help new users. These range from FOC on-demand training and ILT through to professional services onsite; online support portal and customers community forums are also available for knowledge sharing.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- Other
- Other documentation formats
-
- CSV
- XML
- End-of-contract data extraction
- Should a customer's account expire or terminate, Tenable will retain the data, as it was at the time of expiration, for no more than 180 days for customers to download their records accordingly. After that time, this data may be deleted and cannot be recovered.
- End-of-contract process
- Should a customer's account expire or terminate, Tenable will retain the data, as it was at the time of expiration, for no more than 180 days for customers to download their records accordingly. After that time, this data may be deleted and cannot be recovered.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- Accessed via a web-based console, user-friendly graphical interface with drill-down capabilities
- Accessibility standards
- None or don’t know
- Description of accessibility
- Access to is through a web browser utilising TLS/SSL secure communication.
- Accessibility testing
- Detailed response available https://www.tenable.com/section-508-voluntary-product-accessibility
- API
- Yes
- What users can and can't do using the API
- Users can easily integrate and automate the sharing of capabilities and vulnerability data, or build on the platform, leveraging a fully documented API set and SDK. There is no extra cost to use these tools to maximize the value of your vulnerability data.
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- Other
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Customer defined queries and alerts.
Scaling
- Independence of resources
- Tenable commits to provide 99.95% average uptime with respect to the Cloud Services during each calendar month of the subscription term. http://static.tenable.com/prod_docs/Service_Level_Commitment.pdf. Currently (April 2022) Tenable Vulnerability Management utilises AWS autoscaling to provide expansion of the service as required
Analytics
- Service usage metrics
- Yes
- Metrics types
- License usage. Further information: https://docs.tenable.com/tenableio/vulnerabilitymanagement/Content/Settings/ViewLicenseInformation.htm
Resellers
- Supplier type
- Reseller (no extras)
- Organisation whose services are being resold
- Tenable
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
- Other
- Other data at rest protection approach
-
Tenable uses state-of-the-art container technology to create and segregate customer environments. All customer accounts, vulnerability data and user settings are contained within a container uniquely allocated to each specific customer. Data contained within one container cannot leak or otherwise be intermingled with another container, thus ensuring the privacy, security and independence of each customer environment.
At rest all customer data collected are encrypted using AES-256 encryption. - Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Via the console or via API calls
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- JSON
- XLSX
- Data import formats
- Other
- Other data import formats
- None
Data-in-transit protection
- Data protection between buyer and supplier networks
- Other
- Other protection between networks
-
All customer data is marked with a "container ID", which corresponds to a single customer subscription. This container ID assures that access to a customer’s data is limited to only that customer. All data is encrypted at all times; at rest and in-transit
All customer data in motion is encrypted using TLS v1.2 with a 4096-bit key. This includes browser, API and intra-application communication. - Data protection within supplier network
- Other
- Other protection within supplier network
-
At rest all customer data collected are encrypted using AES-256 encryption.
Tenable uses state-of-the-art container technology to create and segregate customer environments. All customer accounts, vulnerability data and user settings are contained within a container uniquely allocated to each specific customer. Data contained within one container cannot leak or otherwise be intermingled with another container, thus ensuring the privacy, security and independence of each customer environment.
Availability and resilience
- Guaranteed availability
- Tenable commits to provide 99.95% average uptime with respect to the Cloud Services during each calendar month of the subscription term. If in any calendar month this uptime commitment is not met by Tenable and Customer was negatively impacted, Tenable shall provide, as the sole and exclusive remedy for unavailability or performance degradation of the specific Tenable Cloud Services, a service credit.
- Approach to resilience
- Tenable uses health and status data to detect and address potential issues in a timely manner, thereby maintaining SLA commitments. Tenable Cloud services are replicated both within and across Azureregions. Should both instances in a region fail (or the region suffers an outage in general), the regional-failover layer (usually using dynamic DNS) will instead direct traffic to the other three regions. Failover is closest-path to the traffic origin.
- Outage reporting
- Tenable Attack Surface Management disaster recovery procedures have several levels and are designed to react to situations that may occur from anywhere between once in five years to once in 50 years. Depending on the scope of the disaster, the recovery procedures vary in time from 60 minutes to 24 hours.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Other
- Other user authentication
- Username and password with optional 2-factor authentication. Multi-factor authentication is either supported by the SAML broker (such as Ping, Duo, etc.), or SMS one-time codes through the built-in integration with Twillo.
- Access restrictions in management interfaces and support channels
- User accounts are assigned roles that dictate the level of access a user has in Tenable Identity Exposure. You can change the role of a user account at any time, as well as disable the account.
- Access restriction testing frequency
- At least once a year
- Management access authentication
- Other
- Description of management access authentication
- User accounts are assigned roles that dictate the level of access a user has in Tenable Web App scanning. You can change the role of a user account at any time, as well as disable the account.
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Schellman Compliance, LLc.
- ISO/IEC 27001 accreditation date
- 12/04/2020
- What the ISO/IEC 27001 doesn’t cover
- The accreditation is to cover Tenable's ISMS program, which governs all locations worldwide.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- See: https://www.tenable.com/trust/assurance
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- ISO/IEC 27001
- Other
- Other security governance standards
- Policies written based on the National Institute of Standards and Technology (NIST) cybersecurity framework, CEB library best practices, SANS institute documents and Tenable's own professional experience.
- Information security policies and processes
- Tenable's Information Security and associated policies incorporate industry accepted standards and frameworks including ISO 27001, COBIT, NIST 800-53, and CSA.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
Not all systems require the same amount of development, testing, and approval. Changes to some systems are routine and represent little or no risk. Therefore, to ensure reasonable processing time for routine maintenance and other low risk change requests, and to ensure that more significant, higher impact changes receive the appropriate scrutiny and planning, the following types of changes have been established. These types have corresponding development, testing, and implementation requirements as well as specific approvals necessary to process. Classification of Change Types:
Provisioning
Configuration
Maintenance/ Upkeep
Development (existing)
Development (new) - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
Internal vulnerability assessments are conducted weekly. Vulnerability management assessments include, but are not limited to, workstations, servers, cloud instances, networks, labs, internet-facing services, Tenable products, and third-party products.
Internal penetration tests are conducted quarterly. Tenable's internal penetration testing team performs assessments to identify risks that require mitigation. Our internal penetration testing methodologies follow the standards from NIST 800-115 and the PTES Technical Guidelines.
External 3rd party Penetration tests are also done annually for our cloud-based offerings and can be provided to customers, upon request, under an NDA agreement. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- All application logs, audit logs, syslog, and any other textual logs are captured and transmitted immediately to a 3rd party logging system. Additionally, all changes and actions are monitored on the platform. Alerts are generated when certain actions or conditions are met. Alerts are sent using our alerting and notification system.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
Information Security Incident Management follows NIST frameworks, US-CERT guidelines and best practices.
Notification will be made within 48 hours and not before the initial incident report, containing the basic facts, is completed. Notification will be sent to the data breach contact notification on file. Notification will be by email.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Fighting climate change
Effective stewardship of the environment with activities that deliver additional environmental benefits in the performance of the contract including working towards net zero greenhouse gas emissions.
We can support customers environmental goals by providing annual carbon emissions on contract and reduction plans.
We will run free of charge sustainability infrastructure reviews for customers to understand how they can reduce carbon emissions of their IT services.
We are working towards 2040 Net-Zero GreenHouseGas emissions.
Since 2021 we have been Carbon Neutral with Gold Standard Certified carbon credits - partner Ecologi.
By 2026 we aimed to reduce Scope 1 and 2 emissions by 50% from a 20/21 baseline year and which we have now achieved.
By 2030 we aim to reduce all of our emissions (including Scope 3) by 50% this is from a 22/23 baseline year.
Achievement of 2030 50% reduction targets (based on last FY) would mean a minimum carbon reduction of 142tCO2e per year for the public sector.
We record and monitor our usage/ conversion to carbon emissions monthly and progress is published annually on the website in accordance with PPN06/21 and SECR guidelines. We are ISO14001 certified, and our targets are currently being verified by SBTi.
Overall, the business:
-Generates solar energy (85%) with REGO renewable purchased energy.
-Zero waste to landfill waste management
-Minimises travel emissions by 60%
-Uses water wisely – reduced by 15%
Influence staff, suppliers, customers and communities through the delivery of the contract to support environmental protection and improvement.
We work hard to influence others and change behaviours to help fight climate change.
Workforce:
-Sustainability inductions
-Sustainability training
-Staff campaigns
-Volunteering opportunities
-Family woodland tree planting
Suppliers:
-Supply-chain reviews
-Sustainability training
-Blogs/ media content
-Sustainability training
Customers:
-Sustainability Infrastructure Review
-Hardware Carbon-Assessments
-Circular-Economy support
-Sustainability trainingCovid-19 recovery
COVID-19
Help local communities to manage and recover from the impact of COVID-19 with activities in the delivery of the contract which:
Create employment, re-training and other return to work opportunities for those left unemployed by COVID-19, particularly new opportunities in high growth sectors.
- Phoenix Employability Outreach Programme - Unique access to Microsoft Career Essentials programme
Support organisations and businesses to manage and recover from the impacts of COVID-19, including where new ways of working are needed to deliver services.
-Phoenix Small Business Digital Skills Outreach programme – webinars supporting cyber security, accessibility and licensing.
-Phoenix VCSE Digital Skills Outreach Programme – webinars supporting cyber security, accessibility and licensing.
Support the physical and mental health of people affected by COVID-19, including reducing the demand on health and care services.
-Phoenix Digital Skills Outreach Programme – Supporting people to access services services online e.g NHS app and Banking apps.
Examples of our working with London and Quadrant Housing Association to deliver befriending calls for tenants who were lonely and isolated as a result of Covid19.
We have also worked with Liverpool City Council to promote employability courses to those left unemployed by Covid-19 and who are now in employment.
We provided free of charge IT service desk to 15 charities during the pandemic and have worked closely with them to support them with returning to full operation again.Tackling economic inequality
Tackling economic inequality
Create new businesses, new jobs and new skills with activities that, in the delivery of the contract:
Create opportunities for entrepreneurship and help new, small organisations to grow, supporting economic growth and business creation.
-60% of our supply chain are SME’s
-We are signatories and adhere to the Prompt Payment Code
-Host Dragons Den SME supply chain sessions for new suppliers to showcase their services for our customers.
Create employment opportunities particularly for those who face barriers to employment and/or who are located in deprived areas.
- The Phoenix Employability Outreach Programme provide unique access to Microsoft Career Essentials digital literacy programme, career talks and employability advice.
Create employment and training opportunities, particularly for people in industries with known skills shortages or in high growth sectors.
-Graduate work placements
-Phoenix Employability Outreach Programme - Unique access to Microsoft Career Essentials programme for certifications to skill up for roles in the IT sector.
-We work with our supply-chain to create job roles with shared apprenticeship heads and promotion to permanent employment.
Support educational attainment relevant to the contract, including training schemes that address skills gaps and result in recognised qualifications.
-Apprenticeships whereby we aim for c.10 graduating apprentices and all are moved into permanent employment with Phoenix.
-Skills City Bootcamp where we deliver career talks and provide projects to 19+ year olds seeking to upskill for employment in the technology sector.
Influence staff, suppliers, customers and communities through the delivery of the contract to support employment and skills opportunities in high growth sectors.
-Our programmes are delivered in partnership with our customers, supply chain and workforce, including Career talks, mentoring and IT challenge activities.Equal opportunity
Equal opportunity
Reduce the disability employment gap with activities that:
Demonstrate action to increase the representation of disabled people in the contract workforce.
-We are certified Disability Confident Employers (level 2).
-We provide Digital Accessibility training for all staff so we can communicate with each other and our customers in an inclusive manner.
-We are exploring the use of the Voluntary Reporting Framework for understanding the disability makeup of the workforce.
Tackling workforce inequalities with activities that demonstrate action to identify and tackle inequality in employment, skills and pay in the contract workforce.
- We focus on ensuring an inclusive and unbiased recruitment strategy, with unconscious-bias training, blind recruitment processes, and reviewing language and placement of advertisements.
-All staff trained receive mandatory EDI training annually.
Various initiatives include
-Signatories of the Race at Work Charter,
-Disability Confident Committed Employer
-Signatories of the Armed Forces Covenant
-Gender-Neutral toilets
-Prayer room
-Milk-pumping room
-Sponsor York Pride
-We have specific policies for Menopause, and LGBTQ+.
-We have established an Accessibility-Centre-of-Excellence to display the latest technology
-We monitor our workforce statistics and report on them:
Gender 65% male /35% female (industry-average 20%)
Ethnicity 5.6% (local-area 3.9%)
Staff turnover 12.3% (industry-average 13.2%)
Using the Voluntary Reporting Framework, we are working on what and how we can report metrics around disabled people in the workforce, including those with hidden disabilities.
We have been recertified as a Great Place to Work™ and UK's Best Workplaces™ for Women.Wellbeing
Wellbeing
The mental health and well-being (MHWB) of our staff is of the utmost importance to us and our MHWB Policy aims to provide a working environment that promotes and supports the MHWB of all employees.
Activities that demonstrate action to support the health and wellbeing, including physical and mental health, in the contract workforce at Phoenix include:
-We utilise different resources not least those from Mental Health at Work Commitment, NHS Every Mind Matters, and the MIND employer toolkit to improve our employee MHWB programme.
-All our staff heavily discounted private health insurance includes mental wellness. Plan members access a range of health treatments including face to face counselling and cognitive behaviour therapy.
-Phoenix invests in the St Johns Ambulance Mental Health First Aid training course to ensure we have MH first aiders in the business and the skills to address MH in the workplace.
-The new challenges the pandemic has raised, on our employee’s MHWB, has led to the creation of a staff network group who meet monthly, to ensure that all we do and say truly covers all aspects of MHWB.
-All employees are given a monthly wellbeing hour to take for their own personal time and are also supported with monthly tea and toast sessions discussing and normalising MHWB topics.
We influence staff, suppliers, customers and communities through the delivery of the contract to support health and wellbeing, including physical and mental health.
-We provide Digital Accessibility training for all staff so we can communicate with each other and our customers in an inclusive manner.
-We have established an Accessibility-Centre-of-Excellence to display the latest technology to the workforce, supply chain and our customers
-We deliver digital accessibility training to customers
-We are sponsors of the Neurodiversity Awards
Pricing
- Price
- £44.53 a unit
- Discount for educational organisations
- No
- Free trial available
- No
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at ccs@phoenixs.co.uk.
Tell them what format you need. It will help if you say what assistive technology you use.