Skip to main content

Help us improve the Digital Marketplace - send your feedback

SECON CYBER SECURITY LTD

Vulnerability Scanning as a Service

Secon's Vulnerability Scanning as a Service, helps find security vulnerabilities by scanning your digital assets. Our centralised dashboard helps to prioritise remediation based on criticality and risk of exploitation. Threat intelligence feeds, help to identify new vulnerabilities exploited in the wild, thereby ensuring that the security posture is kept intact.

Features

  • End to end service includes Design, Planning and Deployment.
  • Secure cloud based solution.
  • Scanning support for networks assets, servers, endpoints and web applications.
  • Risk based on demand scanning with Threat Intelligence.
  • Scheduled scans with flexibility on scanning frequency.
  • Network and Agent Based scanning.
  • Monthly service reviews and reports.
  • Leverages market leading vulnerability scanning tool Tenable.io.

Benefits

  • Effective and efficient way to identify security risks.
  • Single dashboard captures scan results for all assets.
  • Easy to administer and manage vulnerability scanning.
  • Flexible consumption model.
  • Cloud based solution means minimal on-premise footprint.
  • Reporting to help demonstrate compliance.

Pricing

£50 to £350 a unit a month

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at frameworks@seconcyber.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

6 4 7 7 6 1 4 1 3 8 1 4 5 7 4

Contact

SECON CYBER SECURITY LTD Hasit Purohit
Telephone: +447741 550 366
Email: frameworks@seconcyber.com

Planning

Planning service
Yes
How the planning service works
Secon's planning covers the onboarding of the Vulnerability Scanning as a Service, which involves the following stages:

1) Mobilise – Kick-off, planning and scheduling, set-up communication, clarify dependencies.

2) Deploy – Set-up scanning platform and schedule scans on required assets.

3) Activate – Enable the service, set-up user access, provide knowledge transfer and documentation.

4) Operate – Handover to Secon's Security Operations service.
Planning service works with specific services
Yes
Hosting or software services the planning service works with
Vulnerability Scanning as a Service

Training

Training service provided
No

Setup and migration

Setup or migration service available
Yes
How the setup or migration service works
Secon assists with setting up and migrating the cloud service. This is achieved by discovering the current set up, designing the required solution and deploying the cloud service, including helping to enable the required features, functions and necessary configuration.
Setup or migration service is for specific cloud services
Yes
List of supported services
Vulnerability Scanning as a Service

Quality assurance and performance testing

Quality assurance and performance testing service
Yes
How the quality assurance and performance testing works
At Secon, we have a robust internal quality management process, where our solutions have undergone testing and validation before any deployment. We review each stage of the delivery process with all parties concerned. We additionally have an approver process, when progressing from one phase to the next to ensure all issues are identified and resolved. We strive towards achieving a high quality standard by practicing a continuous improvement approach, throughout the organisation.

Security testing

Security services
Yes
Security services type
  • Security strategy
  • Security risk management
  • Security design
  • Cyber security consultancy
  • Security testing
  • Security incident management
  • Security audit services
Certified security testers
No

Ongoing support

Ongoing support service
Yes
Types of service supported
  • Hosting or software provided by your organisation
  • Hosting or software provided by a third-party organisation
How the support service works
Secon provides support for the Vulnerability Scanning as a Service,via telephone and email on a 24*7 *365 basis. This support covers the cloud service, log collectors, and user dashboards.

Service scope

Service constraints
Secon's Vulnerability Scanning as a Service, is provided remotely and is supported by our SOC 24*7*365.

User support

Email or online ticketing support
Email or online ticketing
Support response times
Secon’s user support is covered 24*7*365 and response times are based on priority ranging from 30 minutes to 4 hours.
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Support levels
Secon's support is available 24*7*365 for Vulnerability Scanning as a Service clients. Clients are assigned a Service Manager as a single point of contact.

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
British Assessment Bureau
ISO/IEC 27001 accreditation date
28/07/2023
What the ISO/IEC 27001 doesn’t cover
N/A
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Social Value

Social Value

Social Value

  • Equal opportunity
  • Wellbeing

Equal opportunity

Secon Cyber recognises that it is essential to provide equal opportunities to all persons without discrimination. Secon Cyber has an equal opportunity policy that sets out the organisation's position on equal opportunity in all aspects of employment, including recruitment and promotion, giving guidance and encouragement to employees at all levels to act fairly and prevent discrimination on the grounds of sex, race, marital status, part-time and fixed term contract status, age, sexual orientation or religion.

Wellbeing

Secon Cyber provides private health insurance and practices a home working policy.
Secon Cyber strives to offer benefits that meet the diverse needs of all its employees, emphasising accessibility and support for everyone. Whether working from home, the office, or navigating health-related challenges, Secon Cyber is committed to creating an environment that upholds the wellbeing of all its employees.

Pricing

Price
£50 to £350 a unit a month
Discount for educational organisations
Yes

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at frameworks@seconcyber.com. Tell them what format you need. It will help if you say what assistive technology you use.