Skip to main content

Help us improve the Digital Marketplace - send your feedback

Grant Thornton UK LLP

Grant Thornton - Vulnerability Scanning

A range of Vulnerability Management capabilities including internal and external vulnerability scanning, Cloud and Container Security Assessments, wireless security assessments, and compliance scanning. We help clients identify vulnerabilities, misconfigurations and compliance issues within their networks and help them tighten their cyber exposure before their business is disrupted.

Features

  • Automated external SaaS scanner diagnosing, monitoring and triaging network vulnerabilities
  • Internal network scanner deployed to ensure maximum data security
  • Wireless security assessment offering visibility of all network airspace devices
  • Continuous detection of open devices on your network
  • Cloud Security Assessment addresses security of your cloud migration
  • Monitor multi- and hybrid environment for misconfigurations and compliance issues
  • Container Security Assessment identifies security vulnerabilities and hardens your containers
  • Compliance scanning
  • Prebuilt compliance checks for CIS, NESA, HIPAA or PCI
  • In-depth threat intelligence on risk criticality

Benefits

  • Pinpoint critical vulnerabilities and compliance issues requiring immediate attention
  • Highlight key risks
  • Leverage real-time threat information to identify threats to your network
  • Prioritised remediation actions for you to focus on high-priority risks
  • Zero false positives to distract you from the real issues
  • Personalised service delivered by team of Cyber Security experts

Pricing

£1,350 to £1,500 a transaction a day

  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at publicsector.bids@uk.gt.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

9 6 1 9 7 5 6 6 1 6 0 9 8 9 1

Contact

Grant Thornton UK LLP Public sector bids team
Telephone: 0207 728 3311
Email: publicsector.bids@uk.gt.com

Service scope

Software add-on or extension
No
Cloud deployment model
Private cloud
Service constraints
None
System requirements
None

User support

Email or online ticketing support
Email or online ticketing
Support response times
Best endeavours
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
The vulnerability scanning is conducted remotely by Grant Thornton's team, our team are available to provide email support 9-5 UK business hours
Support available to third parties
No

Onboarding and offboarding

Getting started
No customer training is required. The Grant Thornton team will work with the client to understand the context of your business and the full scope of the vulnerability scanning exercise.

Our solution will pinpoint critical vulnerabilities requiring immediate attention by correlating real-time threat information against any known vulnerabilities across your networks and IT assets. Our Vulnerability Assessment Report provides a detailed view of your technical risk status and includes a prioritised list of remediation actions allowing you to take the appropriate steps to mitigate the risks
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
All scan data is provided at the end of the scanning exercise in the form of a detailed Vulnerability Assessment Report. We do not store any residual client data.
End-of-contract process
At the end of a contract, all scan data is provided in the form of a detailed Vulnerability Assessment Report. We do not store any residual client data.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
No
Service interface
No
User support accessibility
None or don’t know
API
No
Customisation available
No

Scaling

Independence of resources
Through proactive capacity management, reserving 80% capacity for peak loads

Analytics

Service usage metrics
Yes
Metrics types
We can provide statistics and data from the various vulnerability scans
Reporting types
Reports on request

Resellers

Supplier type
Reseller providing extra support
Organisation whose services are being resold
Outpost24

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least every 6 months
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
Physical access control, complying with another standard
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
All scan data is provided at the end of the scanning exercise in the form of a detailed Vulnerability Assessment Report.
Data export formats
Other
Other data export formats
PDF
Data import formats
Other
Other data import formats
N/A

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Our Vulnerability scans are conducted at a time that is agreed in advance with the client.
Approach to resilience
Available on request
Outage reporting
In the unlikely event we are unable to conduct vulnerability scanning at the agreed time, we will notify the client via email or telephone to arrange an alternative time.

Identity and authentication

User authentication needed
Yes
User authentication
Username or password
Access restrictions in management interfaces and support channels
Only authorised GT personnel will have access to our vulnerability scanning solution
Access restriction testing frequency
At least every 6 months
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
No audit information available
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
Lloyds Risk Quality Assurance
ISO/IEC 27001 accreditation date
28/06/2015
What the ISO/IEC 27001 doesn’t cover
Audit and Tax services
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
  • ISO/IEC 27001
  • Other
Other security governance standards
We have been certified under the Cyber Essentials Plus scheme by a CREST (Council of Registered Ethical Security Testers) approved organisation
Information security policies and processes
Grant Thornton operate a framework of Information Systems (IS) Security policies. These policies include a risk assessment for threats to Information Security. The policies are published internally for the guidance of all employees and reviewed on a quarterly basis.

We employ a full-time IS Security Manager, who is responsible for the co-ordination of our IS Security policies, network, data security and incident management. Any updates are processed through out Change and Release Management (CARM) process. They are also reviewed and proved by the National Director of Information Systems

We have been certified under the Cyber Essentials Plus scheme by a CREST (Council of Registered Ethical Security Testers) approved organisation.

Grant Thornton maintains ongoing compliance with the ISO27001:2013 certification for Information Security Management Systems

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Grant Thornton have implemented a Change and Release Management (CARM) process, based on the ITIL Service standard that complies with best practice.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
The external network is subject to monthly vulnerability testing, or in response to specific threats, using a CREST accredited third party. Where a high-level vulnerability is identified, the Incident Management process is utilized to quickly resolve the issue and identify any security breaches. The results of each scan are recorded within the IS Service desk system and reviewed by the senior IS Managers to organise the resolution of any identified issues. All remediation is conducted through the Change And Release Management (CARM) process.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
All network events are recorded for use as part of an investigation in the event of an incident. Systems administrators monitor firewall and security software for alerts and respond accordingly. Network logs are maintained as part of the IS Security controls and the Document Management System logs all account activity within an audit log that is inviolate which can only be accessed by the systems administrator.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Incident Management procedures have been implemented as part of both the ISO 20000 and 27001 certifications. All people can report Information Security incidents through the IS Service desk or Grant Thornton House main reception which is supported by the Grant Thornton facilities provider on a 24-hour basis.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

Fighting climate change

Fighting climate change

Our environmental actions will focus on our three major carbon sources:

1) Business travel

2) Waste generation and disposal of non-recyclable waste; and

3) Gas usage for heating offices, electricity use, air-conditioning and IT.

METHOD

For each call off from the framework we will propose, as a minimum, to:

- identify specific targets an individual client (or collaboration of AOs) has and how they can be integrated into our work

- agree our approach collaboratively: does the project require significant co-location and/or travel, or can the project be completed via remote or hybrid working? Our default is to reduce unnecessary travel and emissions to the minimum feasible and we will suggest ways for doing so that will not reduce quality or delivery

- use local capability to reduce travel and commute time: we have 27 offices across the UK and will use suitably qualified local teams wherever practical

Pricing

Price
£1,350 to £1,500 a transaction a day
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
Upon request we can provide a sample of our Vulnerability Assessment reports

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at publicsector.bids@uk.gt.com. Tell them what format you need. It will help if you say what assistive technology you use.