Skip to main content

Help us improve the Digital Marketplace - send your feedback

Sapphire

Tenable Vulnerability Management

Risk-based view of your identified vulnerabilities to identify, investigate and prioritise what is most critical.

Managed in the cloud, Tenable Vulnerability Management provides the industry's most comprehensive vulnerability coverage with real-time assessment of your organisation. Built-in prioritization, threat intelligence and real-time insight help you understand your exposures and prioritise remediations

Features

  • Continuous Discovery and Assessment
  • Cloud Platform Analysis
  • Container Security
  • Comprehensive Scan Options
  • Asset Tracking
  • SLA with uptime guarantee
  • Web Application Scanning
  • Vulnerability Reporting
  • Automated Vulnerability Prioritization
  • Built-in Vulnerability Risk Scores

Benefits

  • Customer-friendly, elastic asset licensing
  • SLA with uptime guarantee
  • Integrated container security
  • Accurate asset-based vulnerability tracking
  • Modern Cloud and Mobile Architecture
  • Comprehensive Configuration Auditing
  • Widest Coverage for Vulnerabilities and Compliance Regulations
  • Unified Dashboards View and Experience

Pricing

£11,132.29 a unit a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at katie.smith@sapphire.net. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

8 4 0 3 9 2 3 4 0 6 2 1 2 5 9

Contact

Sapphire Katie Smith
Telephone: 0845 58 27001
Email: katie.smith@sapphire.net

Service scope

Software add-on or extension
No
Cloud deployment model
Public cloud
Service constraints
Tenable VM must be accessed via a web browser
System requirements
  • Browsers: Chrome (40+),Safari (8+), Firefox (38+) IE (11+).
  • Scanners and agents collect data reported by Tenable VM
  • Tenable VM is configured with a regional, specific cloud scanner
  • Users can link Nessus scanners, NNM scanners, Agents

User support

Email or online ticketing support
Email or online ticketing
Support response times
Each case raised with the Helpdesk will be assigned a priority based upon the nature of the issue and the
impact to business. Priority levels define response and escalation times, indicating expected time to
resolution:
P1/1Hr - Application failure or hardware failure
affecting business operation
P2/4Hr - Service, system or hardware failure
where HA or redundant systems are in
use, with potential to affect business
operation
P3/8Hr - Intermittent faults or issues affecting
small minority of users
P4/24Hr - Informational requests; no immediate
business impact
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Standard Support:
• Hardware faults
• General system errors
• Intermittent software faults
• Providing relevant patch information
from manufacturers
• General application configuration
• General advice & guidance
• Product bug fixes via manufacturer

All other required support fall outside the scope of Support and will be charged in addition to the service.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
There are a range of support and training facilities provided to help new users. These range from FOC on-demand training via an online support portal and customers community forums; through to professional services options available both onsite or remote.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Should a customer's account expire or terminate, Tenable will retain the data, as it was at the time of expiration, for no more than 180 days for customers to download their records accordingly. After that time, this data may be deleted and cannot be recovered.
End-of-contract process
Should a customer's account expire or terminate, Tenable will retain the data, as it was at the time of expiration, for no more than 180 days for customers to download their records accordingly. After that time, this data may be deleted and cannot be recovered.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
Yes
Compatible operating systems
  • Linux or Unix
  • MacOS
  • Windows
Designed for use on mobile devices
No
Service interface
Yes
User support accessibility
None or don’t know
Description of service interface
There is a Web Based Administration Interface for the platform. In addition there are Web Based administration consoles for all Vulnerability sensors.
Accessibility standards
None or don’t know
Description of accessibility
Users can access the front end application for the platform.
No access to the backend of the platform is provided to end users.
Accessibility testing
Access to Tenable Vulnerability Management is through a web browser utilising TLS/SSL secure communication. Support is either via phone, or email Sapphire's our dedicated Support Team.
API
Yes
What users can and can't do using the API
Users can easily integrate and automate the sharing of capabilities and vulnerability data, or build on the Tenable VM platform, leveraging a fully documented API set and SDK. There is no extra cost to use these tools to maximize the value of your vulnerability data.
API documentation
Yes
API documentation formats
Other
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Tenable VM has a large number of Dashboard and Reporting capabilities, along with results filtering options available for the purpose of filtering down the resultant vulnerability and configuration data. These filters can be combined in various ways and allows for the organization to quickly filter down to the subset of the data that is pertinent to the task at that time, including filtering based on business context, device profile, or vulnerability details.

Scaling

Independence of resources
Tenable commits to provide 99.95% average uptime with respect to the Cloud Services during each calendar month of the subscription term. http://static.tenable.com/prod_docs/Service_Level_Commitment.pdf

Analytics

Service usage metrics
Yes
Metrics types
Full License Useage metrics are shown within the platform.
Reporting types
Real-time dashboards

Resellers

Supplier type
Reseller providing extra support
Organisation whose services are being resold
Tenable

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least once a year
Penetration testing approach
In-house
Protecting data at rest
Other
Other data at rest protection approach
Tenable uses state-of-the-art container technology to create and segregate customer environments. All customer accounts, vulnerability data and user settings are contained within a container uniquely allocated to each specific customer. Data contained within one container cannot leak or otherwise be intermingled with another container, thus ensuring the privacy, security and independence of each customer environment.
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Tenable VM has the facility to allow users to export their data either via the console or via the API.
Data export formats
  • CSV
  • Other
Other data export formats
  • HTML
  • PDF
Data import formats
  • CSV
  • Other
Other data import formats
  • Nessus/JSON
  • API/Any

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Tenable commits to provide 99.95% average uptime with respect to the Cloud Services during each calendar month of the subscription term. If in any calendar month this uptime commitment is not met by Tenable and Customer was negatively impacted, Tenable shall provide, as the sole and exclusive remedy for unavailability or performance degradation of the specific Tenable Cloud Services, a service credit.
Approach to resilience
Tenable uses health and status data to detect and address potential issues in a timely manner, thereby maintaining SLA commitments. Tenable Cloud services are replicated both within and across AWS regions. Should both instances in a region fail (or the region suffers an outage in general), the regional-failover layer (usually using dynamic DNS) will instead direct traffic to the other three regions. Failover is closest-path to the traffic origin.
Outage reporting
Tenable disaster recovery procedures have several levels and are designed to react to situations that may occur from anywhere between once in five years to once in 50 years. Depending on the scope of the disaster, the recovery procedures vary in time from 60 minutes to 24 hours.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Other
Other user authentication
Users can also be authenticated via SAML compliant SSO platform.
Access restrictions in management interfaces and support channels
User accounts are assigned roles that dictate the level of access a user has in Tenable Vulnerability Management. You can change the role of a user account at any time, as well as disable the account.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Other
Description of management access authentication
Users can also be authenticated via SAML compliant SSO platform.

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
Yes
CSA STAR accreditation date
2019_11_22
CSA STAR certification level
Level 1: CSA STAR Self-Assessment
What the CSA STAR doesn’t cover
https://cloudsecurityalliance.org/star/registry/tenable-inc/
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
Yes
Any other security certifications
SOC2

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
Other
Other security governance standards
Tenable's policies were written based on National Institute of Standards and Technology (NIST) cybersecurity framework, CEB library best practices, SANS institute documents and Tenable's own professional experience. Policies are shared with business units and reviewed collectively during internal workshop meetings. Policies are reviewed, revised, and updated on annual basis.
Information security policies and processes
Tenable's policies were written based on the National Institute of Standards and Technology (NIST) cybersecurity framework, CEB library best practices , SANS institute documents and Tenable's own professional experience. Policies are shared with business units and reviewed collectively during internal workshop meetings. Once approved, policies are disseminated to all employees via our internal network protal. Policies are reviewed, revised, and updated on annual basis.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Not all systems require the same amount of development, testing, and approval. Changes to some systems are routine and represent little or no risk. Therefore, to ensure reasonable processing time for routine maintenance and other low risk change requests, and to ensure that more significant, higher impact changes receive the appropriate scrutiny and planning, the following types of changes have been established. These types have corresponding development, testing, and implementation requirements as well as specific approvals necessary to process. Classification of Change Types:
Provisioning
Configuration
Maintenance/ Upkeep
Development (existing)
Development (new)
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Internal vulnerability assessments are ideally conducted weekly. Vulnerability management assessments include, but are not limited to, workstations, servers, cloud instances, networks, labs, internet-facing services, Tenable products, and third-party products.

Internal penetration tests are conducted quarterly. Tenable's internal penetration testing team performs assessments to identify risks that require mitigation. Our internal penetration testing methodologies follow the standards from NIST 800-115 and the PTES Technical Guidelines.

External 3rd party Penetration tests are also done annually for our cloud-based offerings and can be provided to customers, upon request, under an NDA agreement."
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
All application logs, audit logs can be are captured and transmitted immediately to a 3rd party logging system.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Notification will be made within 48 hours and not before the initial incident report, containing the basic facts, is completed. Notification will be sent to the data breach contact notification on file. Notification will be by email.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Equal opportunity
  • Wellbeing

Fighting climate change

e make sure that we recycle where we can and take appropriate modes of transport to get to clients. Our offices in Darlington and Glasgow are easily accessible by public transport meaning that many of our colleagues go to an office by these means. For other colleagues, we offer remote working, and colleagues are able to attend an office when they need We are pricing our services to encourage customers to prefer remote access and remote working where possible. One of Sapphire staff is undertaking a part time PHD studying the carbon consequences of cyber crime and it’s mitigation which is inclusive of Sapphire customers and partners.

Covid-19 recovery

We have encouraged our staff back to office working especially in the SOC which runs 24*7 shift patterns. We have recently engaged in local communities by hiring space in local charity buildings for company meetings as in house face to face meetings. We have performed pro-bono work with charities to check their security status and help them move onwards from Covid in the face of increased cyber attacks on charities.

Equal opportunity

We have an Equal Opportunities policy which everyone in Sapphire adheres to. We are currently at 29% of females in our organisation, a number that has grown over the last few months. Our recruitment processes allow us to interview the best people for the roles we have available, and we insist on 50:50 short-lists for all roles. We value the views of others and see as a strength our openness to challenge. We employ military reservists, and are supportive of their overseas deployment commitments on behalf of HM Government. Recently we have signed documentation to join the NCSC Cyber First scheme to help young people especially women and girls to join the ranks of cyber professionals. We also mentor young people who are keen to move into cyber at some stage in their career.

Wellbeing

We take the wellbeing of our colleagues seriously; we offer an Employee Assistance Programme, have health cover, a pension scheme and Life Cover. We also provide opportunities for colleagues to Give Back to local projects/schemes and they can use a day a year to do this.

Pricing

Price
£11,132.29 a unit a year
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at katie.smith@sapphire.net. Tell them what format you need. It will help if you say what assistive technology you use.