PLANNED LINK LTD
Tenable Vulnerability Assessment Scanning and Management as a Service
A cloud-based vulnerability management solution
Features
- Automated & Predictive Prioritisation
- Integrated application for Container security & Cloud security
- Integrated application for Active directory security
- Integrated applications for Web Application Scanning
- Integrated applications for Asset tracking
- Documented API and integrated SDK
- SLA with uptime guarantee
- Integrated applications for Comprehensive scan options
Benefits
- Customer-friendly, elastic asset licensing
- SLA with uptime guarantee
- Integrated container and cloud security
- Integrated web application scanning
- Integrated active directory security
- Accurate asset-based vulnerability tracking
- Modern Cloud and Mobile Architecture
- Comprehensive Configuration Auditing
- Widest Coverage for Vulnerabilities and Compliance Regulations
- Unified Dashboards View
Pricing
£19.50 to £30.00 a unit a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at tenders@plannedlink.io.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 14
Service ID
5 1 1 7 5 3 4 0 0 5 3 6 1 4 0
Contact
PLANNED LINK LTD
Christopher Rimmer
Telephone: 07480128616
Email: tenders@plannedlink.io
Service scope
- Service constraints
- Tenable IO must be accessed via a web browser
- System requirements
- Modern Web Browser
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Tenable offers at no additional cost our "Advanced Support Plan" which includes telephone, chat, email and portal support including an online knowledge base. Our support is available 24 hours a day, 7 days a week, 365 days a year. Details: https://www.tenable.com/support/technical-support/plans
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), 7 days a week
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
- Conducting regular research with agents, admins and end users who rely on assistive technology to collect feedback and help us prioritise improvements.
- Onsite support
- Yes, at extra cost
- Support levels
- We will provide a support service to meet your requirements based on the demands of your programme and the service you need. Specific support levels are agreed for each engagement.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- There are a range of support and training facilities provided to help new users. These range from FOC on-demand training through to professional services onsite; an online support portal and customers community forums.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Should a customer's account expire or terminate, Tenable will retain the data, as it was at the time of expiration, for no more than 180 days for customers to download their records accordingly. After that time, this data may be deleted and cannot be recovered.
- End-of-contract process
- Should a customer's account expire or terminate, Tenable will retain the data, as it was at the time of expiration, for no more than 180 days for customers to download their records accordingly. After that time, this data may be deleted and cannot be recovered.
Using the service
- Web browser interface
- Yes
- Using the web interface
- Web based console and Restfull API
- Web interface accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web interface accessibility testing
- Detailed response available https://www.tenable.com/section-508-voluntary-product-accessibility
- API
- Yes
- What users can and can't do using the API
- Users can easily integrate and automate the sharing of capabilities and vulnerability data, or build on the Tenable.io platform, leveraging a fully documented API set and SDK. There is no extra cost to use these tools to maximize the value of your vulnerability data.
- API automation tools
-
- Ansible
- Chef
- OpenStack
- SaltStack
- Terraform
- Puppet
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- ODF
- Command line interface
- No
Scaling
- Scaling available
- Yes
- Scaling type
- Automatic
- Independence of resources
- Tenable commits to provide 99.95% average uptime with respect to the Cloud Services during each calendar month of the subscription term. http://static.tenable.com/prod_docs/Service_Level_Commitment.pdf
- Usage notifications
- Yes
- Usage reporting
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
- Other
- Other metrics
-
- License usage. Further information:
- https://docs.tenable.com/tenableio/vulnerabilitymanagement/Content/Settin
- Gs/ViewLicenseInformation.htm
- Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Nessus, Tenable, Elastic, Palo Alto, Juniper, Microsoft, Tines
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- No
- Equipment disposal approach
- A third-party destruction service
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- Tenable Cloud services are replicated both within and across regions
- Failover is closest-path to the traffic origin
- Backup controls
- Backups are automated as part of the service
- Datacentre setup
- Multiple datacentres with disaster recovery
- Scheduling backups
- Supplier controls the whole backup schedule
- Backup recovery
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- Other
- Other protection between networks
- All customer data is marked with a "container ID", which corresponds to a single customer subscription. This container ID assures that access to a customer’s data is limited to only that customer.
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- Tenable commits to provide 99.95% average uptime with respect to the Cloud Services during each calendar month of the subscription term. If in any calendar month this uptime commitment is not met by Tenable and Customer was negatively impacted, Tenable shall provide, as the sole and exclusive remedy for unavailability or performance degradation of the specific Tenable Cloud Services, a service credit.
- Approach to resilience
- Tenable uses health and status data to detect and address potential issues in a timely manner, thereby maintaining SLA commitments. Tenable Cloud services are replicated both within and across AWS regions. Should both instances in a region fail (or the region suffers an outage in general), the regional-failover layer (usually using dynamic DNS) will instead direct traffic to the other three regions. Failover is closest-path to the traffic origin.
- Outage reporting
- Tenable.io disaster recovery procedures have several levels and are designed to react to situations that may occur from anywhere between once in five years to once in 50 years. Depending on the scope of the disaster, the recovery procedures vary in time from 60 minutes to 24 hours.
Identity and authentication
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google apps)
- Access restrictions in management interfaces and support channels
- Role Based Access Management (RBAC) and Just in time Privileged Access Management (PIM) where any administrative function is required.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Username or password
- Devices users manage the service through
-
- Dedicated device over multiple services or networks
- Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- British Assessment Bureau UKAS
- ISO/IEC 27001 accreditation date
- 26/01/24
- What the ISO/IEC 27001 doesn’t cover
- There are no exclusions
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
-
- We have a number of CSTA people on staff
- We have a number of CSTP people on staff
- We have a number of CWSA people on staff
- We have a number of CAST people on staff
- We have a number of CCP SIRA people on staff
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Tenable's policies were written based on the National Institute of Standards and Technology (NIST) cybersecurity framework, CEB library best practices , SANS institute documents and Tenable's own professional experience. Policies are shared with business units and reviewed collectively during internal workshop meetings. Once approved, policies are disseminated to all employees via our internal network protal. Policies are reviewed, revised, and updated on annual basis.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
Not all systems require the same amount of development, testing, and approval. Changes to some systems are routine and represent little or no risk. Therefore, to ensure reasonable processing time for routine maintenance and other low risk change requests, and to ensure that more significant, higher impact changes receive the appropriate scrutiny and planning, the following types of changes have been established. These types have corresponding development, testing, and implementation requirements as well as specific approvals necessary to process. Classification of Change Types:
Provisioning
Configuration
Maintenance/ Upkeep
Development (existing)
Development (new) - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- Tenable does internal vulnerability scans on a daily, weekly and monthly basis. Penetration tests are done annually. Discovered vulnerabilities are remediated based on vulnerability management policy. High and Critical vulnerabilities are given priority.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- All systems connected to Tenable's corporate environments are configured to send logs to a centralised syslog server configured for further logs analysis.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Notification will be made within 48 hours and not before the initial incident report, containing the basic facts, is completed.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- No
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
- Our datacentres demonstrate their commitment to adhering to the EU Code of Conduct for Energy Efficient Data Centres through rigorous assessments and compliance measures. Each Cloud hosting provider provides documentation on their sustainability journey
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Planned Link recognises the urgent challenge posed by climate change and is committed to being part of the solution. We are dedicated to reducing our carbon footprint, implementing sustainable practices, and innovating in ways that reduce environmental impact across our operations and product lines. By investing in renewable energy, promoting energy efficiency, and supporting climate-positive initiatives, we aim to contribute to global efforts to mitigate climate change. Our commitment extends beyond compliance to actively engaging with our stakeholders and communities to foster environmental stewardship and resilience.Covid-19 recovery
The challenges posed by the COVID-19 pandemic, have ensured that Planned Link remains steadfast in its commitment to recovery and resilience. We have actively implemented comprehensive strategies to ensure the safety, health, and well-being of our employees while maintaining operational efficiency. Our approach includes enhancing remote work capabilities, and ensuring all health guidelines are followed meticulously. Our focus has allowed us to foster a sustainable recovery, promoting economic stability, and building a stronger, more resilient future for all.Tackling economic inequality
Planned link is deeply committed to addressing economic inequality by creating inclusive growth opportunities and fostering a diverse and supportive workplace. We believe in fair compensation, equal access to professional development, and promoting from within to empower our employees and their communities. We are dedicated to investing in underserved areas, supporting small businesses, and collaborating with like-minded partners to drive positive change. By embedding social responsibility into our business model, we strive not only to succeed financially but also to contribute to a more equitable and prosperous society for allEqual opportunity
Planned Link is steadfast in its commitment to equal opportunity, fostering a workplace environment where diversity is celebrated, and all employees are treated with respect and dignity. We believe that everyone, regardless of their background, gender, race, or orientation, should have equal access to opportunities for growth and advancement.Wellbeing
Planned Link, firmly believe that employee wellbeing is the cornerstone of our success. We are committed to fostering a supportive and inclusive environment where every team member feels valued, understood, and empowered. We prioritise mental, physical, and emotional health through flexible work policies, and a culture of open communication. Our dedication to wellbeing is not just about enhancing productivity; it's about creating a thriving business where individuals can achieve personal and professional growth. We recognise that a healthy workforce is a happy workforce, and we are steadfast in our commitment to the holistic welfare of our employees
Pricing
- Price
- £19.50 to £30.00 a unit a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Nessus Home (free) is limited to 6 IP addresses and the inability to perform compliance checks.
- Link to free trial
- https://www.tenable.com/products/tenable-io/evaluate
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at tenders@plannedlink.io.
Tell them what format you need. It will help if you say what assistive technology you use.