Tenable Vulnerability Management
Risk-based view of your identified vulnerabilities to identify, investigate and prioritise what is most critical.
Managed in the cloud, Tenable Vulnerability Management provides the industry's most comprehensive vulnerability coverage with real-time assessment of your organisation. Built-in prioritization, threat intelligence and real-time insight help you understand your exposures and prioritise remediations
Features
- Continuous Discovery and Assessment
- Cloud Platform Analysis
- Container Security
- Comprehensive Scan Options
- Asset Tracking
- SLA with uptime guarantee
- Web Application Scanning
- Vulnerability Reporting
- Automated Vulnerability Prioritization
- Built-in Vulnerability Risk Scores
Benefits
- Customer-friendly, elastic asset licensing
- SLA with uptime guarantee
- Integrated container security
- Accurate asset-based vulnerability tracking
- Modern Cloud and Mobile Architecture
- Comprehensive Configuration Auditing
- Widest Coverage for Vulnerabilities and Compliance Regulations
- Unified Dashboards View and Experience
Pricing
£11,132.29 a unit a year
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
8 4 0 3 9 2 3 4 0 6 2 1 2 5 9
Contact
Sapphire
Katie Smith
Telephone: 0845 58 27001
Email: katie.smith@sapphire.net
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- Tenable VM must be accessed via a web browser
- System requirements
-
- Browsers: Chrome (40+),Safari (8+), Firefox (38+) IE (11+).
- Scanners and agents collect data reported by Tenable VM
- Tenable VM is configured with a regional, specific cloud scanner
- Users can link Nessus scanners, NNM scanners, Agents
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Each case raised with the Helpdesk will be assigned a priority based upon the nature of the issue and the
impact to business. Priority levels define response and escalation times, indicating expected time to
resolution:
P1/1Hr - Application failure or hardware failure
affecting business operation
P2/4Hr - Service, system or hardware failure
where HA or redundant systems are in
use, with potential to affect business
operation
P3/8Hr - Intermittent faults or issues affecting
small minority of users
P4/24Hr - Informational requests; no immediate
business impact - User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Standard Support:
• Hardware faults
• General system errors
• Intermittent software faults
• Providing relevant patch information
from manufacturers
• General application configuration
• General advice & guidance
• Product bug fixes via manufacturer
All other required support fall outside the scope of Support and will be charged in addition to the service. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- There are a range of support and training facilities provided to help new users. These range from FOC on-demand training via an online support portal and customers community forums; through to professional services options available both onsite or remote.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Should a customer's account expire or terminate, Tenable will retain the data, as it was at the time of expiration, for no more than 180 days for customers to download their records accordingly. After that time, this data may be deleted and cannot be recovered.
- End-of-contract process
- Should a customer's account expire or terminate, Tenable will retain the data, as it was at the time of expiration, for no more than 180 days for customers to download their records accordingly. After that time, this data may be deleted and cannot be recovered.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- Yes
- Compatible operating systems
-
- Linux or Unix
- MacOS
- Windows
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- There is a Web Based Administration Interface for the platform. In addition there are Web Based administration consoles for all Vulnerability sensors.
- Accessibility standards
- None or don’t know
- Description of accessibility
-
Users can access the front end application for the platform.
No access to the backend of the platform is provided to end users. - Accessibility testing
- Access to Tenable Vulnerability Management is through a web browser utilising TLS/SSL secure communication. Support is either via phone, or email Sapphire's our dedicated Support Team.
- API
- Yes
- What users can and can't do using the API
- Users can easily integrate and automate the sharing of capabilities and vulnerability data, or build on the Tenable VM platform, leveraging a fully documented API set and SDK. There is no extra cost to use these tools to maximize the value of your vulnerability data.
- API documentation
- Yes
- API documentation formats
- Other
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Tenable VM has a large number of Dashboard and Reporting capabilities, along with results filtering options available for the purpose of filtering down the resultant vulnerability and configuration data. These filters can be combined in various ways and allows for the organization to quickly filter down to the subset of the data that is pertinent to the task at that time, including filtering based on business context, device profile, or vulnerability details.
Scaling
- Independence of resources
- Tenable commits to provide 99.95% average uptime with respect to the Cloud Services during each calendar month of the subscription term. http://static.tenable.com/prod_docs/Service_Level_Commitment.pdf
Analytics
- Service usage metrics
- Yes
- Metrics types
- Full License Useage metrics are shown within the platform.
- Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Reseller providing extra support
- Organisation whose services are being resold
- Tenable
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
- Other
- Other data at rest protection approach
- Tenable uses state-of-the-art container technology to create and segregate customer environments. All customer accounts, vulnerability data and user settings are contained within a container uniquely allocated to each specific customer. Data contained within one container cannot leak or otherwise be intermingled with another container, thus ensuring the privacy, security and independence of each customer environment.
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Tenable VM has the facility to allow users to export their data either via the console or via the API.
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- HTML
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- Nessus/JSON
- API/Any
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- Tenable commits to provide 99.95% average uptime with respect to the Cloud Services during each calendar month of the subscription term. If in any calendar month this uptime commitment is not met by Tenable and Customer was negatively impacted, Tenable shall provide, as the sole and exclusive remedy for unavailability or performance degradation of the specific Tenable Cloud Services, a service credit.
- Approach to resilience
- Tenable uses health and status data to detect and address potential issues in a timely manner, thereby maintaining SLA commitments. Tenable Cloud services are replicated both within and across AWS regions. Should both instances in a region fail (or the region suffers an outage in general), the regional-failover layer (usually using dynamic DNS) will instead direct traffic to the other three regions. Failover is closest-path to the traffic origin.
- Outage reporting
- Tenable disaster recovery procedures have several levels and are designed to react to situations that may occur from anywhere between once in five years to once in 50 years. Depending on the scope of the disaster, the recovery procedures vary in time from 60 minutes to 24 hours.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Other
- Other user authentication
- Users can also be authenticated via SAML compliant SSO platform.
- Access restrictions in management interfaces and support channels
- User accounts are assigned roles that dictate the level of access a user has in Tenable Vulnerability Management. You can change the role of a user account at any time, as well as disable the account.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Other
- Description of management access authentication
- Users can also be authenticated via SAML compliant SSO platform.
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- Yes
- CSA STAR accreditation date
- 2019_11_22
- CSA STAR certification level
- Level 1: CSA STAR Self-Assessment
- What the CSA STAR doesn’t cover
- https://cloudsecurityalliance.org/star/registry/tenable-inc/
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
- SOC2
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- Tenable's policies were written based on National Institute of Standards and Technology (NIST) cybersecurity framework, CEB library best practices, SANS institute documents and Tenable's own professional experience. Policies are shared with business units and reviewed collectively during internal workshop meetings. Policies are reviewed, revised, and updated on annual basis.
- Information security policies and processes
- Tenable's policies were written based on the National Institute of Standards and Technology (NIST) cybersecurity framework, CEB library best practices , SANS institute documents and Tenable's own professional experience. Policies are shared with business units and reviewed collectively during internal workshop meetings. Once approved, policies are disseminated to all employees via our internal network protal. Policies are reviewed, revised, and updated on annual basis.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Not all systems require the same amount of development, testing, and approval. Changes to some systems are routine and represent little or no risk. Therefore, to ensure reasonable processing time for routine maintenance and other low risk change requests, and to ensure that more significant, higher impact changes receive the appropriate scrutiny and planning, the following types of changes have been established. These types have corresponding development, testing, and implementation requirements as well as specific approvals necessary to process. Classification of Change Types:
Provisioning
Configuration
Maintenance/ Upkeep
Development (existing)
Development (new) - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Internal vulnerability assessments are ideally conducted weekly. Vulnerability management assessments include, but are not limited to, workstations, servers, cloud instances, networks, labs, internet-facing services, Tenable products, and third-party products.
Internal penetration tests are conducted quarterly. Tenable's internal penetration testing team performs assessments to identify risks that require mitigation. Our internal penetration testing methodologies follow the standards from NIST 800-115 and the PTES Technical Guidelines.
External 3rd party Penetration tests are also done annually for our cloud-based offerings and can be provided to customers, upon request, under an NDA agreement." - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- All application logs, audit logs can be are captured and transmitted immediately to a 3rd party logging system.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Notification will be made within 48 hours and not before the initial incident report, containing the basic facts, is completed. Notification will be sent to the data breach contact notification on file. Notification will be by email.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Equal opportunity
- Wellbeing
Fighting climate change
e make sure that we recycle where we can and take appropriate modes of transport to get to clients. Our offices in Darlington and Glasgow are easily accessible by public transport meaning that many of our colleagues go to an office by these means. For other colleagues, we offer remote working, and colleagues are able to attend an office when they need We are pricing our services to encourage customers to prefer remote access and remote working where possible. One of Sapphire staff is undertaking a part time PHD studying the carbon consequences of cyber crime and it’s mitigation which is inclusive of Sapphire customers and partners.Covid-19 recovery
We have encouraged our staff back to office working especially in the SOC which runs 24*7 shift patterns. We have recently engaged in local communities by hiring space in local charity buildings for company meetings as in house face to face meetings. We have performed pro-bono work with charities to check their security status and help them move onwards from Covid in the face of increased cyber attacks on charities.Equal opportunity
We have an Equal Opportunities policy which everyone in Sapphire adheres to. We are currently at 29% of females in our organisation, a number that has grown over the last few months. Our recruitment processes allow us to interview the best people for the roles we have available, and we insist on 50:50 short-lists for all roles. We value the views of others and see as a strength our openness to challenge. We employ military reservists, and are supportive of their overseas deployment commitments on behalf of HM Government. Recently we have signed documentation to join the NCSC Cyber First scheme to help young people especially women and girls to join the ranks of cyber professionals. We also mentor young people who are keen to move into cyber at some stage in their career.Wellbeing
We take the wellbeing of our colleagues seriously; we offer an Employee Assistance Programme, have health cover, a pension scheme and Life Cover. We also provide opportunities for colleagues to Give Back to local projects/schemes and they can use a day a year to do this.
Pricing
- Price
- £11,132.29 a unit a year
- Discount for educational organisations
- No
- Free trial available
- No