Tenable Identity Exposure (formerly Tenable.ad)
Identify misconfigurations and flaws in your Active Directory environment to eliminate attack paths before they can be exploited.
Features
- Predict what matters to reduce risk
- eliminate attack paths before attackers exploit them
- Discover underlying issues threatening your Active Directory security
- Identify dangerous trust relationships
- Score exposures and prioritize remediation's with Identity Risk Score
- Catch every change in Active Directory and AzureAD
- Make the link between Active Directory changes and malicious actions
- Unify identities in Active Directory and Azure AD
- Visualize in-depth attack details
- Explore MITRE ATT&CK descriptions directly from incident details
Benefits
- Secure Active Directory and Eliminate Attack Paths
- Find and fix AD flaws before they become business-impacting issues
Pricing
£23.14 a licence
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
8 3 1 5 7 6 0 1 2 2 0 6 7 7 6
Contact
INTEGRITY360 LIMITED
Davide Poli
Telephone: 02083721000
Email: bidreviewboard@integrity360.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- System Requirements: https://docs.tenable.com/general-requirements/Content/PDF/TenableGeneralRequirements.pdf
- System requirements
- Must be accessed via a web browser.
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- RTO for initial response times varies due to the critical nature, but all within a 24 hour window.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- The chat feature is available once a named contact has logged into the support portal.
- Web chat accessibility testing
- Salesforce provide the chat facility for the community website (including the support function). Please refer to Salesforce documentation for further information.
- Onsite support
- Yes, at extra cost
- Support levels
-
Advanced, Premier and Elite. Advanced support is included with your suscription cost and users can upgrade to additional plans if they chose to. Details on each plan type: https://www.tenable.com/support/plans
Yes. Tenable offers at no additional cost our "Advanced Support Plan" which includes telephone, chat, and portal support including an online knowledge base. Our support is available 24 hours a day, 7 days a week, 365 days a year. Details: https://www.tenable.com/support/technical-support/plans - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- There are a range of support and training options provided to help new users. These range from FOC on-demand training and ILT through to professional services onsite; online support portal and customers community forums are also available for knowledge sharing.
- Service documentation
- Yes
- Documentation formats
- Other
- Other documentation formats
- CSV
- End-of-contract data extraction
- Should a customer's account expire or terminate, Tenable will retain the data, as it was at the time of expiration, for no more than 180 days for customers to download their records accordingly. After that time, this data may be deleted and cannot be recovered.
- End-of-contract process
- Should a customer's account expire or terminate, Tenable will retain the data, as it was at the time of expiration, for no more than 180 days for customers to download their records accordingly. After that time, this data may be deleted and cannot be recovered.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Linux or Unix
- MacOS
- Windows
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- User-friendly graphical interface with drill-down capabilities
- Accessibility standards
- None or don’t know
- Description of accessibility
- Detailed response available https://www.tenable.com/section-508-voluntary-product-accessibility
- Accessibility testing
- Access to is through a web browser utilising TLS/SSL secure communication.
- API
- Yes
- What users can and can't do using the API
- Users can easily integrate and automate the sharing of capabilities and vulnerability data, or build on the platform, leveraging a fully documented API set and SDK. There is no extra cost to use these tools to maximize the value of your vulnerability data.
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- Other
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Customers can build out their own custom dashboards and queries using the inbuilt graphical interface tools to suit the needs of individual or groups within the organisation. Users can customise Indicators of Exposure and Attack with changing trigger points and thresholds and can whitelist objects according to operational requirements.
Scaling
- Independence of resources
- Tenable commits to provide 99.95% average uptime with respect to the Cloud Services during each calendar month of the subscription term. http://static.tenable.com/prod_docs/Service_Level_Commitment.pdf. Currently (April 2022) Tenable Vulnerability Management utilises AWS autoscaling to provide expansion of the service as required
Analytics
- Service usage metrics
- Yes
- Metrics types
- License usage. Further information: https://docs.tenable.com/tenableio/vulnerabilitymanagement/Content/Settings/ViewLicenseInformation.htm
- Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Tenable
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Encryption of all physical media
- Other
- Other data at rest protection approach
- Tenable Vulnerability Management uses state-of-the-art container technology to create and segregate customer environments. All customer accounts, vulnerability data and user settings are contained within a container uniquely allocated to each specific customer. Data contained within one container cannot leak or otherwise be intermingled with another container, thus ensuring the privacy, security and independence of each customer environment.
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Via the console or via API calls
- Data export formats
- CSV
- Data import formats
- Other
- Other data import formats
-
- None - adding data to the Tenable platform can
- Only be done through integrations with 3rd party technologies
Data-in-transit protection
- Data protection between buyer and supplier networks
- IPsec or TLS VPN gateway
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- Tenable commits to provide 99.95% average uptime with respect to the Cloud Services during each calendar month of the subscription term. If in any calendar month this uptime commitment is not met by Tenable and Customer was negatively impacted, Tenable shall provide, as the sole and exclusive remedy for unavailability or performance degradation of the specific Tenable Cloud Services, a service credit.
- Approach to resilience
- Tenable uses health and status data to detect and address potential issues in a timely manner, thereby maintaining SLA commitments. Tenable Cloud services are replicated both within and across AWS regions. Should both instances in a region fail (or the region suffers an outage in general), the regional-failover layer (usually using dynamic DNS) will instead direct traffic to the other three regions. Failover is closest-path to the traffic origin.
- Outage reporting
- Tenable Vulnerability Management disaster recovery procedures have several levels and are designed to react to situations that may occur from anywhere between once in five years to once in 50 years. Depending on the scope of the disaster, the recovery procedures vary in time from 60 minutes to 24 hours.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Other
- Other user authentication
- Username and password with optional 2-factor authentication. Multi-factor authentication is either supported by the SAML broker (such as Ping, Duo, etc.), or SMS one-time codes through the built-in integration with Twillo.
- Access restrictions in management interfaces and support channels
- User accounts are assigned roles that dictate the level of access a user has in Tenable Vulnerability Management. You can change the role of a user account at any time, as well as disable the account.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Username or password
- Other
- Description of management access authentication
- Role Based Access Control is supported throughout the Tenable Identity Exposure solution.
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Schellman Compliance, LLc.
- ISO/IEC 27001 accreditation date
- 12/07/2023
- What the ISO/IEC 27001 doesn’t cover
- The accreditation is to cover Tenable's ISMS program, which governs all locations worldwide.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
-
- SOC2 Type2
- See: https://www.tenable.com/trust/assurance
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- ISO/IEC 27001
- Other
- Other security governance standards
- Tenable's policies were written based on the NIST cybersecurity-framework, CEB library best practices , SANS institute documents. Policies are shared with business units and reviewed collectively during internal meetings. Once approved, policies are disseminated to all employees via our internal network portal. Policies are reviewed, revised, updated annually.
- Information security policies and processes
- Tenable's Information Security and associated policies incorporate industry accepted standards and frameworks including ISO 27001, COBIT, NIST 800-53, and CSA.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Not all systems require the same amount of development, testing, and approval. Changes to some systems are routine and represent little or no risk. Therefore, to ensure reasonable processing time for routine maintenance and other low risk change requests, and to ensure that more significant, higher impact changes receive the appropriate scrutiny and planning, the following types of changes have been established. These types have corresponding development, testing, and implementation requirements as well as specific approvals necessary to process. Classification of Change Types:
Provisioning
Configuration
Maintenance/ Upkeep
Development (existing)
Development (new) - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
Internal vulnerability assessments are conducted weekly. Vulnerability management assessments include, but are not limited to, workstations, servers, cloud instances, networks, labs, internet-facing services, Tenable products, and third-party products.
Internal penetration tests are conducted quarterly. Tenable's internal penetration testing team performs assessments to identify risks that require mitigation. Our internal penetration testing methodologies follow the standards from NIST 800-115 and the PTES Technical Guidelines.
External 3rd party Penetration tests are also done annually for our cloud-based offerings and can be provided to customers, upon request, under an NDA agreement. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- All application logs, audit logs, syslog, and any other textual logs are captured and transmitted immediately to a 3rd party logging system. Additionally, all changes and actions taken in the AWS consoles are logged using CloudWatch. Alerts are generated when certain actions or conditions are met. Alerts are sent using our alerting and notification system.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Notification will be made within 48 hours and not before the initial incident report, containing the basic facts, is completed. Notification will be sent to the data breach contact notification on file. Notification will be by email.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
Fighting climate change
We believe good governance at all levels is necessary to drive corporate responsibility, which in turn promotes the long-term interests of our stockholders and strengthens our Board of Directors and management accountability. As a part of its primary duty overseeing our corporate strategy, our Board of Directors also oversees how environmental and social issues may impact the long-term interests of our stockholders and stakeholders. At Tenable, we stress that corporate responsibility is part of every employee’s job because achieving operational excellence is intrinsically tied to how responsibly we run our business.Covid-19 recovery
Tenable has always embraced a distributed workforce and has long empowered our employees to work remotely. We’ve invested in a technology infrastructure that enables our employees to work securely and effectively from any location in the world, and have practiced doing so for some time. Our globally distributed and remote teams have developed deep muscle memory in delivering with agility and speed. In moments like these, transparent communication is more critical than ever. Tenable has invested extensive time in internal and executive communications such as increased “all hands” meetings. The company prides itself on open, transparent, and continuous communication with employees. When the pandemic began unfolding, Tenable launched weekly company-wide meetings led by the CEO and featuring a changing lineup of guest speakers to discuss everything from our evolving strategy in an uncertain global environment to new benefits to how to work from home effectively. These meetings always include Q&A and employees have the option to pre-submit their questions online or ask them live during the meeting. Lastly, the company has recently reimagined its intranet, using user behavior data and our annual engagement survey results to focus more sharply on the information employees need to execute on Tenable’s vision and strategy.Tackling economic inequality
Tenable promotes and supports employee development and organizational effectiveness by providing high-quality learning and development programs. These programs are designed to meet individual, team, and organizational needs and objectives. We strive to enhance learning and development programs to create a better workplace environment and to build a better Tenable. As we work together to build a better Tenable, we aim to incentivize our employees by aligning a portion of their compensation with the overall success of Tenable’s business. All new hires are given an equity grant and there is broad employee participation in Tenable’s Employee Stock Purchase Plan.Equal opportunity
At Tenable, we seek to cultivate a diverse and inclusive workforce and environment to achieve exceptional business results. When we value and celebrate differences, we drive more innovation and grow closer to our customers, partners, and communities. We strive to be a career destination where employees from all backgrounds are welcome and empowered, treated with fairness and respect, presented with opportunities to make a difference, and provided opportunities to grow. We undertake numerous efforts to increase diversity in our employee population and to foster a culture of fairness and belonging through a number of measures in our recruiting, engagement, retention, and outreach practices. Our dedicated Diversity & Inclusion Council and Employee Resource Groups – along with our committed leaders and managers – strive to attract and hire employees who bring broad diversity of background, thought, and style into the company and foster a sense of inclusion to make them want to stay. In addition to our global talent acquisition team receiving a diversity sourcing and recruiting certification, we have hired a DE&I leader to help spearhead these initiatives.
Pricing
- Price
- £23.14 a licence
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- Nessus Home (free) is limited to 6 IP addresses and the inability to perform compliance checks.
- Link to free trial
- https://www.tenable.com/products/tenable-io/evaluate