Verdict Cyber Security Analysis Service
Verdict Cyber is the latest generation cyber security analysis platform. Verdict is an automated cyber security App Store using analytics including deep learning AI to provide users with the most authoritative cyber security verdict about any file type. Verdict enable experts and beginners to perform file analysis.
Features
- Rapid deployment for cyber data acquisition
- File parsing with analytics for open data and Mitre Att&ck
- Automated Reverse Engineering
- Automated File Analysis and Reporting
- Rapid identification of sophisticated attacks utilising AI
- Enhanced dashboards and visual cues for cyber operations
- Non-intrusive automated file analysis
- Automated deployments
- Adaptive features by adding open and commercial source apps
- Supports all possible file types
Benefits
- Ease of integration to existing and future networks and systems
- Complements other cyber security tools by feeding them file verdicts
- Low training burden for cyber analysts and any other user
- Speeds up cyber detection and response processes
- Reduces customer reliance on multiple cyber security tools
- Designed in alignment with NIST and Mitre standards
- Faster than customers building file analysis platform
- Complement the work of human analysts
Pricing
£500 an instance a week
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
5 2 0 8 1 8 5 7 5 3 3 2 2 0 7
Contact
Actionable Ltd
Martin
Telephone: 0
Email: info@actionable.today
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- No, technology agnostic.
- System requirements
- System ingests file provided by the customers
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- SLA dependent
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
- Continuous improvement testing with various user personas.
- Onsite support
- Onsite support
- Support levels
-
All support packages are fully tailored to align to customer needs.
Prices start from £15,000. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
We provide training on site and remotely delivered.
We provide full user documentation.
We provide self paced video tutorials.
Telephone, email and chat support. - Service documentation
- Yes
- Documentation formats
-
- HTML
- ODF
- End-of-contract data extraction
-
All customer data exists in their own virtual datacentres.
The data is within the customers designated cloud/platforms.
Our exit and transition process includes assisting with customer data extraction. - End-of-contract process
- Our pricing includes removal of data by customer.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- No difference
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- Description of service interface
- Sensor management portal and dashboards.
- Accessibility standards
- WCAG 2.1 AA or EN 301 549
- Accessibility testing
- System and persona testing.
- API
- Yes
- What users can and can't do using the API
-
The APIs allow deployment of sensors, stop and start of sensors.
Monitoring and configuration of sensors.
Deployment of Apps including AI. - API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
Dashboards and reports can be created and customised.
Verdict can be configured as necessary for different scenarios.
Verdict is available for multi-cloud, multi-platform scenarios.
Our SLA can be tailored for each customer scenario.
Scaling
- Independence of resources
- The service is independent, it is hosted in customers cloud tenancies and virtual data centres. The service is not shared with other tenants.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Performance, availability and capacity.
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- The data is held in and on customer systems there is no requirement
- Data export formats
-
- CSV
- ODF
- Other
- Other data export formats
-
- JSON format
- Database variants
- Data import formats
-
- CSV
- ODF
- Other
- Other data import formats
-
- PCAP
- JSON
- Office document formats
- All executable types supported
- Log files including CEF
- Any file type can be supported for analysis
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
99.9%
2% of monthly charge per unplanned outage below threshold. - Approach to resilience
- Available on request.
- Outage reporting
- Email , API, customer dashboard and service portal.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
-
Physical and logical separation of management and tenants.
IP and user role restrictions. - Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- Cyber Essentials
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- Cyber Essentials
- Information security policies and processes
-
Asset management and security policy.
Secure software development policy.
Data handling policy.
Information Security Management Process and Procedures for ISMS.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Our secure software development and configuration management process defines how we create, deploy and maintain the service through its lifetime securely.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- We make use of threat intelligence feeds and attack surface management systems. We make use of automated testing and deployment processes for patching.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- We monitor and or systems internally and externally, we ensure regular penetration testing and make use of security automation for automated case management.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
Incident and major incident process defined through Agile ITIL process, managed by service desk on case management system.
Users report incidents to us by web, chat, phone and email.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
-
- Public Services Network (PSN)
- Police National Network (PNN)
- NHS Network (N3)
- Joint Academic Network (JANET)
- Scottish Wide Area Network (SWAN)
- Health and Social Care Network (HSCN)
- Other
- Other public sector networks
- Compatible with all IP networks
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Equal opportunity
Fighting climate change
Actionable measures its carbon footprint and that of its supply chain, and this includes making an assessment and written plan for how each new contract/service can maximise carbon reduction to contribute to net zero, we consider for the organisation as a whole and per project:
1. How we can deliver additional benefits in the performance of the service including working towards net zero.
2. How we can measure and influence staff, suppliers, customers, and communities through the delivery of the service to support environmental protection and improvement.
We implement an action plan which includes multiple activities and measurements which can then also be fedback to the customer’s social value representatives to support their management initiatives.Equal opportunity
Actionable is a passionate and committed equal opportunities employer. We have several ongoing ways to support this principle. Including; being equal opportunities employer, being signatories to the Armed Forces Covenant, maintaining a public anti-modern slavery statement, being a fund raiser and direct donor to Armed Forces charities which support people from all backgrounds to attain the highest possible levels of achievement made possible with the support of sponsors. We implement policy levers, such as making work accessible through hybrid, and fully remote working practices and more, including ensuring there are little or no barriers to entry such as arbitrary qualifications being necessitated, instead we focus on our commitment to employee’s being trained by us for the role.
We can demonstrate action to identify and tackle inequality in employment, skills and pay in the contract workforce, and as described above support in-work progression which especially helps those those from disadvantaged or minority groups, to move into higher paid work by developing new skills relevant to the service.
Pricing
- Price
- £500 an instance a week
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- 14 days use of the product in public cloud, not including professional services or training.