Skip to main content

Help us improve the Digital Marketplace - send your feedback

Bytes Software Services

Tenable Identity Exposure

Identify misconfigurations and flaws in your Active Directory environment to eliminate attack paths before they can be exploited. bssgc

Features

  • Predict to reduce risk and eliminate attack paths before attacked
  • Discover underlying issues threatening your Active Directory security
  • Identify dangerous trust relationships
  • Score exposures and prioritize remediations with the Identity Risk Score
  • Catch every change in your Active Directory and Azure AD
  • Make the link between Active Directory changes and malicious actions
  • Unify identities in Active Directory and Azure AD
  • Visualize in-depth attack details
  • Explore MITRE ATT&CK descriptions directly from incident details

Benefits

  • Secure Active Directory and Eliminate Attack Paths
  • Find and fix AD flaws before they become business-impacting issues

Pricing

£0.01 a unit a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tenders@bytes.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

4 5 6 1 7 7 5 3 4 4 9 8 5 6 2

Contact

Bytes Software Services Chris Swani
Telephone: +44 (0) 7951 326815
Email: tenders@bytes.co.uk

Service scope

Software add-on or extension
Yes
What software services is the service an extension to
Also available as an on-premise solution.
Cloud deployment model
Public cloud
Service constraints
Must be accessed via a web browser. System maintenance is automatic and included as part of the subscription.
System requirements
Browser

User support

Email or online ticketing support
Email or online ticketing
Support response times
Tenable offers at no additional cost our "Advanced Support Plan" which includes telephone, chat, email and portal support including an online knowledge base. Our support is available 24 hours a day, 7 days a week, 365 days a year. Details: https://www.tenable.com/support/technical-support/plans
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
Web chat
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
The chat feature is available once a named contact has logged into the support portal.
Web chat accessibility testing
Salesforce provide the chat facility for the community website (including the support function). Please refer to Salesforce documentation for further information.
Onsite support
Yes, at extra cost
Support levels
Advanced, Premier and Elite. Advanced support is included with your suscription cost and users can upgrade to additional plans if they chose to. Details on each plan type: https://www.tenable.com/support/plans
Support available to third parties
Yes

Onboarding and offboarding

Getting started
There are a range of support and training facilities provided to help new users. These range from FOC on-demand training through to professional services onsite; an online support portal and customers community forums.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Should a customer's account expire or terminate, Tenable will retain the data, as it was at the time of expiration, for no more than 21 days for customers to download their records accordingly. After that time, this data may be deleted and cannot be recovered.
End-of-contract process
Should a customer's account expire or terminate, Tenable will retain the data, as it was at the time of expiration, for no more than 21 days for customers to download their records accordingly. After that time, this data may be deleted and cannot be recovered.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
No
Designed for use on mobile devices
No
Service interface
Yes
User support accessibility
None or don’t know
Description of service interface
Accessed via a web-based console
Accessibility standards
None or don’t know
Description of accessibility
Access to Tenable.io is through a web browser utilising TLS/SSL secure communication. Support is either via phone, email or our support portal.
Accessibility testing
Detailed response available https://www.tenable.com/section-508-voluntary-product-accessibility
API
Yes
What users can and can't do using the API
Users can easily integrate and automate the sharing of capabilities and vulnerability data, or build on the Tenable.io platform, leveraging a fully documented API set and SDK. There is no extra cost to use these tools to maximize the value of your vulnerability data.
API documentation
Yes
API documentation formats
Open API (also known as Swagger)
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Customers can build out their own custom dashboards and queries using the inbuilt graphical interface tools to suit the needs of individual or groups within the organisation. Users can customise Indicators of Exposure and Attack with changing trigger points and thresholds and can whitelist objects according to operational requirements.

Scaling

Independence of resources
Tenable Identity Exposure (formerly Tenable.ad) utilises Microsoft Azure platform to institute a stand-alone instance for each customer and uses Azures vertical auto scaling to respond to additional load requirements.

Analytics

Service usage metrics
Yes
Metrics types
License usage. Further information: https://docs.tenable.com/tenableio/vulnerabilitymanagement/Content/Settings/ViewLicenseInformation.htm
Reporting types
Real-time dashboards

Resellers

Supplier type
Reseller (no extras)
Organisation whose services are being resold
Tenable

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
In-house
Protecting data at rest
Other
Other data at rest protection approach
At rest all customer data collected are encrypted using AES-256 encryption.
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Via the console or via API calls
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
Other
Other protection between networks
All customer data is marked with a "container ID", which corresponds to a single customer subscription. This container ID assures that access to a customer’s data is limited to only that customer. All data is encrypted at all times; at rest and in-transit
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Tenable commits to provide 99.95% average uptime with respect to the Cloud Services during each calendar month of the subscription term. If in any calendar month this uptime commitment is not met by Tenable and Customer was negatively impacted, Tenable shall provide, as the sole and exclusive remedy for unavailability or performance degradation of the specific Tenable Cloud Services, a service credit.
Approach to resilience
Tenable uses health and status data to detect and address potential issues in a timely manner, thereby maintaining SLA commitments. Tenable Cloud services are replicated both within and across Azureregions. Should both instances in a region fail (or the region suffers an outage in general), the regional-failover layer (usually using dynamic DNS) will instead direct traffic to the other three regions. Failover is closest-path to the traffic origin.
Outage reporting
Tenable provides a status page customers can view to track the service status in real-time. https://status.tenable.com/

Identity and authentication

User authentication needed
Yes
User authentication
Other
Other user authentication
Local account, SAML and LDAP authentication
Access restrictions in management interfaces and support channels
User accounts are assigned roles that dictate the level of access a user has in Tenable Identity Exposure. You can change the role of a user account at any time, as well as disable the account.
Access restriction testing frequency
At least once a year
Management access authentication
Other
Description of management access authentication
Role Based Access Control is supported throughout the Tenable Identity Exposure solution.

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
Less than 1 month
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
Schellman Compliance, LLc.
ISO/IEC 27001 accreditation date
12/07/2023
What the ISO/IEC 27001 doesn’t cover
The accreditation is to cover Tenable's ISMS program, which governs all locations worldwide.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
Yes
Any other security certifications
https://www.tenable.com/trust/assurance

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
Other
Other security governance standards
Tenable's policies were written based on the National Institute of Standards and Technology (NIST) cybersecurity framework, CEB library best practices , SANS institute documents and Tenable's own professional experience. Policies are shared with business units and reviewed collectively during internal workshop meetings.
Information security policies and processes
Tenable's policies were written based on the National Institute of Standards and Technology (NIST) cybersecurity framework, CEB library best practices , SANS institute documents and Tenable's own professional experience. Policies are shared with business units and reviewed collectively during internal workshop meetings. Once approved, policies are disseminated to all employees via our internal network protal. Policies are reviewed, revised, and updated on annual basis.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
"Not all systems require the same amount of development, testing, and approval. Changes to some systems are routine and represent little or no risk. Therefore, to ensure reasonable processing time for routine maintenance and other low risk change requests, and to ensure that more significant, higher impact changes receive the appropriate scrutiny and planning, the following types of changes have been established. These types have corresponding development, testing, and implementation requirements as well as specific approvals necessary to process. Classification of Change Types:
Provisioning
Configuration
Maintenance/ Upkeep
Development (existing)
Development (new)"
Vulnerability management type
Undisclosed
Vulnerability management approach
Tenable does internal vulnerability scans on a daily, weekly and monthly basis. Penetration tests are done annually. Discovered vulnerabilities are remediated based on vulnerability management policy. High and Critical vulnerabilities are given priority.
Protective monitoring type
Undisclosed
Protective monitoring approach
All application logs, audit logs, syslog, and any other textual logs are captured and transmitted immediately to a 3rd party logging system. Additionally, all changes and actions are monitored on the platform. Alerts are generated when certain actions or conditions are met. Alerts are sent using our alerting and notification system.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Notification will be made within 48 hours and not before the initial incident report, containing the basic facts, is completed. Notification will be sent to the data breach contact notification on file. Notification will be by email.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

Fighting climate change

Fighting climate change

We take our environmental management and the impact we have on the environment very seriously. We have environmental policies in place and hold the ISO14001 accreditation. Our environmental assessments are conducted annually by an external Lead ESOS Assessor; they are signed-off by the board and compliance reported to the regulator (the Environment Agency). Our environmental policy is published on our website at https://www.bytes.co.uk/company/sustainability/environmental.
Bytes achieved carbon net zero in March 2022 through approved carbon offsetting schemes. We are always seeking to reduce our impact on the environment. We aim to minimise waste, reduce pollutants and use renewable materials. Our offices have recycling facilities for cans, plastic and paper. We aim to reduce our office printing to zero within the next few years.
An Environmental Steering Committee has been established to coordinate environmental activities and drive change.
To drastically reduce our emissions, we have switched to renewable energy. Our Head Office has reached our first milestone of using a specialist 100% renewable electricity provider. We are also exploring options to install solar panels on our Headquarters building.
Other environmental initiatives include installing electric vehicle charging points and encouraging staff to commute to work without the car (setting up a car share network and installing secure cycle parking).
We produce a SECR (Streamlined Energy and Carbon Reporting) report that details the companies energy consumption and carbon emissions. This report is produced annually by an independent assessor.
This report provides details of our emissions in Scope 1, 2 and 3 categories. It details the activities previously taken to reduce emissions and also recommendations for further improvements.
For scope 1,2 and 3 emissions we aim to reduce these by 50% by 2025-2026 from our 2021 baseline.
We aim to be Net Zero by 2040, covering our own operational emissions.

Pricing

Price
£0.01 a unit a year
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tenders@bytes.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.