Skip to main content

Help us improve the Digital Marketplace - send your feedback

Actionable Ltd

Verdict Cyber Security Analysis Service

Verdict Cyber is the latest generation cyber security analysis platform. Verdict is an automated cyber security App Store using analytics including deep learning AI to provide users with the most authoritative cyber security verdict about any file type. Verdict enable experts and beginners to perform file analysis.

Features

  • Rapid deployment for cyber data acquisition
  • File parsing with analytics for open data and Mitre Att&ck
  • Automated Reverse Engineering
  • Automated File Analysis and Reporting
  • Rapid identification of sophisticated attacks utilising AI
  • Enhanced dashboards and visual cues for cyber operations
  • Non-intrusive automated file analysis
  • Automated deployments
  • Adaptive features by adding open and commercial source apps
  • Supports all possible file types

Benefits

  • Ease of integration to existing and future networks and systems
  • Complements other cyber security tools by feeding them file verdicts
  • Low training burden for cyber analysts and any other user
  • Speeds up cyber detection and response processes
  • Reduces customer reliance on multiple cyber security tools
  • Designed in alignment with NIST and Mitre standards
  • Faster than customers building file analysis platform
  • Complement the work of human analysts

Pricing

£500 an instance a week

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at info@actionable.today. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

5 2 0 8 1 8 5 7 5 3 3 2 2 0 7

Contact

Actionable Ltd Martin
Telephone: 0
Email: info@actionable.today

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints
No, technology agnostic.
System requirements
System ingests file provided by the customers

User support

Email or online ticketing support
Email or online ticketing
Support response times
SLA dependent
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
Web chat
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
WCAG 2.1 AA or EN 301 549
Web chat accessibility testing
Continuous improvement testing with various user personas.
Onsite support
Onsite support
Support levels
All support packages are fully tailored to align to customer needs.
Prices start from £15,000.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We provide training on site and remotely delivered.
We provide full user documentation.
We provide self paced video tutorials.
Telephone, email and chat support.
Service documentation
Yes
Documentation formats
  • HTML
  • ODF
  • PDF
End-of-contract data extraction
All customer data exists in their own virtual datacentres.
The data is within the customers designated cloud/platforms.
Our exit and transition process includes assisting with customer data extraction.
End-of-contract process
Our pricing includes removal of data by customer.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
No difference
Service interface
Yes
User support accessibility
WCAG 2.1 AA or EN 301 549
Description of service interface
Sensor management portal and dashboards.
Accessibility standards
WCAG 2.1 AA or EN 301 549
Accessibility testing
System and persona testing.
API
Yes
What users can and can't do using the API
The APIs allow deployment of sensors, stop and start of sensors.
Monitoring and configuration of sensors.
Deployment of Apps including AI.
API documentation
Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
  • PDF
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Dashboards and reports can be created and customised.
Verdict can be configured as necessary for different scenarios.
Verdict is available for multi-cloud, multi-platform scenarios.
Our SLA can be tailored for each customer scenario.

Scaling

Independence of resources
The service is independent, it is hosted in customers cloud tenancies and virtual data centres. The service is not shared with other tenants.

Analytics

Service usage metrics
Yes
Metrics types
Performance, availability and capacity.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
The data is held in and on customer systems there is no requirement
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats
  • JSON format
  • Database variants
  • PDF
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats
  • PCAP
  • JSON
  • Office document formats
  • PDF
  • All executable types supported
  • Log files including CEF
  • Any file type can be supported for analysis

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
99.9%
2% of monthly charge per unplanned outage below threshold.
Approach to resilience
Available on request.
Outage reporting
Email , API, customer dashboard and service portal.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Physical and logical separation of management and tenants.
IP and user role restrictions.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
Yes
Any other security certifications
Cyber Essentials

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
Other
Other security governance standards
Cyber Essentials
Information security policies and processes
Asset management and security policy.
Secure software development policy.
Data handling policy.
Information Security Management Process and Procedures for ISMS.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Our secure software development and configuration management process defines how we create, deploy and maintain the service through its lifetime securely.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
We make use of threat intelligence feeds and attack surface management systems. We make use of automated testing and deployment processes for patching.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
We monitor and or systems internally and externally, we ensure regular penetration testing and make use of security automation for automated case management.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Incident and major incident process defined through Agile ITIL process, managed by service desk on case management system.
Users report incidents to us by web, chat, phone and email.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
Yes
Connected networks
  • Public Services Network (PSN)
  • Police National Network (PNN)
  • NHS Network (N3)
  • Joint Academic Network (JANET)
  • Scottish Wide Area Network (SWAN)
  • Health and Social Care Network (HSCN)
  • Other
Other public sector networks
Compatible with all IP networks

Social Value

Social Value

Social Value

  • Fighting climate change
  • Equal opportunity

Fighting climate change

Actionable measures its carbon footprint and that of its supply chain, and this includes making an assessment and written plan for how each new contract/service can maximise carbon reduction to contribute to net zero, we consider for the organisation as a whole and per project:
1. How we can deliver additional benefits in the performance of the service including working towards net zero.
2. How we can measure and influence staff, suppliers, customers, and communities through the delivery of the service to support environmental protection and improvement.
We implement an action plan which includes multiple activities and measurements which can then also be fedback to the customer’s social value representatives to support their management initiatives.

Equal opportunity

Actionable is a passionate and committed equal opportunities employer. We have several ongoing ways to support this principle. Including; being equal opportunities employer, being signatories to the Armed Forces Covenant, maintaining a public anti-modern slavery statement, being a fund raiser and direct donor to Armed Forces charities which support people from all backgrounds to attain the highest possible levels of achievement made possible with the support of sponsors. We implement policy levers, such as making work accessible through hybrid, and fully remote working practices and more, including ensuring there are little or no barriers to entry such as arbitrary qualifications being necessitated, instead we focus on our commitment to employee’s being trained by us for the role.
We can demonstrate action to identify and tackle inequality in employment, skills and pay in the contract workforce, and as described above support in-work progression which especially helps those those from disadvantaged or minority groups, to move into higher paid work by developing new skills relevant to the service.

Pricing

Price
£500 an instance a week
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
14 days use of the product in public cloud, not including professional services or training.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at info@actionable.today. Tell them what format you need. It will help if you say what assistive technology you use.