Bytes Software Services
Tenable Attack Surface Management
Gain complete visibility into your Internet-connected assets to eliminate blind spots and unknown sources of risk. bssgc
Features
- Continuously maps the entire internet
- Discovers connections to internet-facing assets
- Attack Surface Visibility
- Unlimited Top-Level Domains
- Continuous Data Refreshes
- Attack Surface Change Alerts
- Rich Asset Context and Attribution
- Suggested Domains
- Asset Management
- Well Documented API
Benefits
- Launch scans of newly discovered assets
- Categorize assets using 200 fields of metadata and comprehensive filtering
- Largest attack surface map in the world
- Establish your entire attack surface in minutes
- Monitor with an up-to-date view of your assets daily
Pricing
£0.01 a unit
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at tenders@bytes.co.uk.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 14
Service ID
9 7 9 8 3 0 5 9 9 1 0 8 3 3 4
Contact
Bytes Software Services
Chris Swani
Telephone: +44 (0) 7951 326815
Email: tenders@bytes.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- Must be accessed via a web browser. System maintenance is automatic and included as part of the subscription.
- System requirements
- Browser
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Tenable offers at no additional cost our "Advanced Support Plan" which includes telephone, chat, email and portal support including an online knowledge base. Our support is available 24 hours a day, 7 days a week, 365 days a year. Details: https://www.tenable.com/support/technical-support/plans
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- The chat feature is available once a named contact has logged into the support portal.
- Web chat accessibility testing
- Salesforce provide the chat facility for the community website (including the support function). Please refer to Salesforce documentation for further information.
- Onsite support
- Yes, at extra cost
- Support levels
- Advanced, Premier and Elite. Advanced support is included with your suscription cost and users can upgrade to additional plans if they chose to. Details on each plan type: https://www.tenable.com/support/plans
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- There are a range of support and training facilities provided to help new users. These range from FOC on-demand training through to professional services onsite; an online support portal and customers community forums.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Should a customer's account expire or terminate, Tenable will retain the data, as it was at the time of expiration, for no more than 180 days for customers to download their records accordingly. After that time, this data may be deleted and cannot be recovered.
- End-of-contract process
- Should a customer's account expire or terminate, Tenable will retain the data, as it was at the time of expiration, for no more than 180 days for customers to download their records accordingly. After that time, this data may be deleted and cannot be recovered.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- Accessed via a web-based console
- Accessibility standards
- None or don’t know
- Description of accessibility
- Access to Tenable.io is through a web browser utilising TLS/SSL secure communication. Support is either via phone, email or our support portal.
- Accessibility testing
- We don't have this documentation for ASM
- API
- Yes
- What users can and can't do using the API
- Users can easily integrate and automate the sharing of capabilities and vulnerability data, or build on the Tenable.io platform, leveraging a fully documented API set and SDK. There is no extra cost to use these tools to maximize the value of your vulnerability data.
- API documentation
- Yes
- API documentation formats
- Open API (also known as Swagger)
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Customer defined queries and alerts.
Scaling
- Independence of resources
- Tenable commits to provide 99.95% average uptime with respect to the Cloud Services during each calendar month of the subscription term. http://static.tenable.com/prod_docs/Service_Level_Commitment.pdf. Currently (April 2022) Tenable Vulnerability Management utilises AWS autoscaling to provide expansion of the service as required
Analytics
- Service usage metrics
- Yes
- Metrics types
- License usage. Further information: https://docs.tenable.com/tenableio/vulnerabilitymanagement/Content/Settings/ViewLicenseInformation.htm
- Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Reseller (no extras)
- Organisation whose services are being resold
- Tenable
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
- Other
- Other data at rest protection approach
- At rest all customer data collected are encrypted using AES-256 encryption.
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Via the console or via API calls
- Data export formats
-
- CSV
- Other
- Other data export formats
- XLSX, JSON and PDF
- Data import formats
-
- CSV
- Other
- Other data import formats
- XLSX, JSON and PDF
Data-in-transit protection
- Data protection between buyer and supplier networks
- Other
- Other protection between networks
- All customer data is marked with a "container ID", which corresponds to a single customer subscription. This container ID assures that access to a customer’s data is limited to only that customer. All data is encrypted at all times; at rest and in-transit
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- Tenable commits to provide 99.95% average uptime with respect to the Cloud Services during each calendar month of the subscription term. If in any calendar month this uptime commitment is not met by Tenable and Customer was negatively impacted, Tenable shall provide, as the sole and exclusive remedy for unavailability or performance degradation of the specific Tenable Cloud Services, a service credit.
- Approach to resilience
- Tenable uses health and status data to detect and address potential issues in a timely manner, thereby maintaining SLA commitments. Tenable Cloud services are replicated both within and across AWS regions. Should both instances in a region fail (or the region suffers an outage in general), the regional-failover layer (usually using dynamic DNS) will instead direct traffic to the other three regions. Failover is closest-path to the traffic origin.
- Outage reporting
- Tenable Attack Surface Management disaster recovery procedures have several levels and are designed to react to situations that may occur from anywhere between once in five years to once in 50 years. Depending on the scope of the disaster, the recovery procedures vary in time from 60 minutes to 24 hours.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- User accounts are assigned roles that dictate the level of access a user has in Tenable Attack Surface Management. You can change the role of a user account at any time, as well as disable the account.
- Access restriction testing frequency
- At least once a year
- Management access authentication
- Other
- Description of management access authentication
- User accounts are assigned roles that dictate the level of access a user has in Tenable Attack Surface Management. You can change the role of a user account at any time, as well as disable the account.
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Schellman Compliance, LLc.
- ISO/IEC 27001 accreditation date
- 12/07/2023
- What the ISO/IEC 27001 doesn’t cover
- The accreditation is to cover Tenable's ISMS program, which governs all locations worldwide.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
- https://www.tenable.com/trust/assurance
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- Tenable's policies were written based on the National Institute of Standards and Technology (NIST) cybersecurity framework, CEB library best practices , SANS institute documents and Tenable's own professional experience. Policies are shared with business units and reviewed collectively during internal workshop meetings.
- Information security policies and processes
- Tenable's policies were written based on the National Institute of Standards and Technology (NIST) cybersecurity framework, CEB library best practices , SANS institute documents and Tenable's own professional experience. Policies are shared with business units and reviewed collectively during internal workshop meetings. Once approved, policies are disseminated to all employees via our internal network protal. Policies are reviewed, revised, and updated on annual basis.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
"Not all systems require the same amount of development, testing, and approval. Changes to some systems are routine and represent little or no risk. Therefore, to ensure reasonable processing time for routine maintenance and other low risk change requests, and to ensure that more significant, higher impact changes receive the appropriate scrutiny and planning, the following types of changes have been established. These types have corresponding development, testing, and implementation requirements as well as specific approvals necessary to process. Classification of Change Types:
Provisioning
Configuration
Maintenance/ Upkeep
Development (existing)
Development (new)" - Vulnerability management type
- Undisclosed
- Vulnerability management approach
- Tenable does internal vulnerability scans on a daily, weekly and monthly basis. Penetration tests are done annually. Discovered vulnerabilities are remediated based on vulnerability management policy. High and Critical vulnerabilities are given priority.
- Protective monitoring type
- Undisclosed
- Protective monitoring approach
- All application logs, audit logs, syslog, and any other textual logs are captured and transmitted immediately to a 3rd party logging system. Additionally, all changes and actions taken in the AWS consoles are logged using CloudWatch. Alerts are generated when certain actions or conditions are met. Alerts are sent using our alerting and notification system.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Notification will be made within 48 hours and not before the initial incident report, containing the basic facts, is completed. Notification will be sent to the data breach contact notification on file. Notification will be by email.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
We take our environmental management and the impact we have on the environment very seriously. We have environmental policies in place and hold the ISO14001 accreditation. Our environmental assessments are conducted annually by an external Lead ESOS Assessor; they are signed-off by the board and compliance reported to the regulator (the Environment Agency). Our environmental policy is published on our website at https://www.bytes.co.uk/company/sustainability/environmental.
Bytes achieved carbon net zero in March 2022 through approved carbon offsetting schemes. We are always seeking to reduce our impact on the environment. We aim to minimise waste, reduce pollutants and use renewable materials. Our offices have recycling facilities for cans, plastic and paper. We aim to reduce our office printing to zero within the next few years.
An Environmental Steering Committee has been established to coordinate environmental activities and drive change.
To drastically reduce our emissions, we have switched to renewable energy. Our Head Office has reached our first milestone of using a specialist 100% renewable electricity provider. We are also exploring options to install solar panels on our Headquarters building.
Other environmental initiatives include installing electric vehicle charging points and encouraging staff to commute to work without the car (setting up a car share network and installing secure cycle parking).
We produce a SECR (Streamlined Energy and Carbon Reporting) report that details the companies energy consumption and carbon emissions. This report is produced annually by an independent assessor.
This report provides details of our emissions in Scope 1, 2 and 3 categories. It details the activities previously taken to reduce emissions and also recommendations for further improvements.
For scope 1,2 and 3 emissions we aim to reduce these by 50% by 2025-2026 from our 2021 baseline.
We aim to be Net Zero by 2040, covering our own operational emissions.
Pricing
- Price
- £0.01 a unit
- Discount for educational organisations
- No
- Free trial available
- No
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at tenders@bytes.co.uk.
Tell them what format you need. It will help if you say what assistive technology you use.