Senseon’s multiple threat detection senses work together to detect malicious activity across an organisation’s entire digital estate, covering the gaps that single point solutions create.
- Threat detection
- Threat triage
- Real-time dashboards
- Threat hunting
- AI triangulation
- Threat notification
- Endpoint response
- Anomaly Detection
- Quickly assess risk and impact of cyber threats
- Easily manage threats
- Automatically stop threats
- Quickly understand digital estate
- Easily access low level data about your IT environment
- Highly contextualised and actionable alerts
- Investigate threats efficiently and effectively
£1500 per licence per month
- Education pricing available
- Free trial available
Senseon Tech Ltd
|Software add-on or extension||No|
|Cloud deployment model||
|Service constraints||Our endpoint agent supports Windows 8.1+, Server 2012 R2+, CentOS 6+, Ubuntu 16.04+, Mac OS 10.12+.|
|Email or online ticketing support||Email or online ticketing|
|Support response times||
Typically within 30 mins during working hours.
Out of hours support is available upon request.
|User can manage status and priority of support tickets||No|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||Web chat|
|Web chat support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support accessibility standard||WCAG 2.1 AA or EN 301 549|
|Web chat accessibility testing||Our provider has performed these tests on our behalf.|
|Onsite support||Yes, at extra cost|
Onboarding and user training provided upon request.
An account manager and a technical account manager will be appointed to each customer.
The Senseon Service Package (monitoring, alerting, and reporting) is available for an additional 20% of the Software Licence cost.
|Support available to third parties||Yes|
Onboarding and offboarding
|Getting started||Senseon offers user guides to all users. Senseon provides individual onsite or remote training for an additional cost.|
|End-of-contract data extraction||The retained data can be extracted at the end of the contract at the customer's request.|
|End-of-contract process||An option to extend will be presented. If the contract is not extended the service will be disabled within 7 days of contract end.|
Using the service
|Web browser interface||Yes|
|Application to install||Yes|
|Compatible operating systems||
|Designed for use on mobile devices||No|
|Accessibility standards||None or don’t know|
|Description of accessibility||Everything is accessible by tabbing through the interface. The interface is not yet optimised for screenreaders.|
|Accessibility testing||We have done interface testing with products designed to evaluate compliance. Further testing will be completed with users of assistive technologies.|
|What users can and can't do using the API||
We do not currently expose the API to customers.
Access to the API including API documentation is available upon request.
|API documentation formats||Open API (also known as Swagger)|
|API sandbox or test environment||No|
|Description of customisation||
The analytic detections can be customised - this gives customers (with the appropriate permissions) the ability to add exclusions, change thresholds and manage case scoring.
The autonomous response capability can be configured between manual and automatic modes.
|Independence of resources||Service resources are isolated to each customer.|
|Service usage metrics||Yes|
|Metrics types||We provide some service usage metrics through the Dashboard and Setting areas of the product.|
|Supplier type||Not a reseller|
|Staff security clearance||Other security clearance|
|Government security clearance||Up to Developed Vetting (DV)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||United Kingdom|
|User control over data storage and processing locations||Yes|
|Datacentre security standards||Managed by a third party|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||Another external penetration testing organisation|
|Protecting data at rest||Encryption of all physical media|
|Data sanitisation process||Yes|
|Data sanitisation type||
|Equipment disposal approach||In-house destruction process|
Data importing and exporting
|Data export approach||Currently, users need to approach Senseon to request a data export from the product.|
|Data export formats||Other|
|Other data export formats||
|Data import formats||Other|
|Data protection between buyer and supplier networks||IPsec or TLS VPN gateway|
|Data protection within supplier network||IPsec or TLS VPN gateway|
Availability and resilience
Account credits will be provided if availability SLAs are not met.
|Approach to resilience||Information about the architecture of the product is available on request.|
|Outage reporting||We communicate outages to customers by email.|
Identity and authentication
|User authentication needed||Yes|
|Access restrictions in management interfaces and support channels||Only a limited number of Senseon users have access to management interfaces.|
|Access restriction testing frequency||At least once a year|
|Management access authentication||
Audit information for users
|Access to user activity audit information||You control when users can access audit information|
|How long user audit data is stored for||At least 12 months|
|Access to supplier activity audit information||No audit information available|
|How long system logs are stored for||At least 12 months|
Standards and certifications
|ISO/IEC 27001 certification||Yes|
|Who accredited the ISO/IEC 27001||ACS Registrars (UKAS accredited body)|
|ISO/IEC 27001 accreditation date||17/05/2019|
|What the ISO/IEC 27001 doesn’t cover||Marketing, sales, business development and investor relations.|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||Yes|
|Any other security certifications||
|Named board-level person responsible for service security||Yes|
|Security governance certified||Yes|
|Security governance standards||ISO/IEC 27001|
|Information security policies and processes||
All of our information security policies comply with ISO27001:2013.
We have rigourous internal audit procedure to ensure that policies are being conformed to and remedial actions are performed if they are not.
Our security governance group includes our senior leadership team and the method and terms of reference of governance are fully documented in our Information Security Management System (ISMS).
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||
Strict version control discipline, automated configuration management and release processes track each component through its lifetime.
Multiple levels of automated testing, static analysis and manual review provide assurance about the functional correctness of the components including the presence of security vulnerabilities.
|Vulnerability management type||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Vulnerability management approach||
Daily network vulnerability scanning.
Code audits on every commit.
Deploy patches based upon priority but in most circumstances in less than 24hours.
We get information about vulnerabilities from partnerships and threat intelligence.
|Protective monitoring type||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Protective monitoring approach||
We use antiviruses for endpoint security.
We user our own product to provide endpoint and network monitoring and response.
Response times depend upon the incident and priority. In the case of high priority, high impact issues can be autonomously responded to in a short period of time.
|Incident management type||Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402|
|Incident management approach||
Conforms to our policies under 27001:2013.
Tickets are reported through various mechanisms including in-product chat. These are then managed in a ticket management system.
Customers are provided with updates when impacted by incidents.
|Approach to secure software development best practice||Conforms to a recognised standard, but self-assessed|
Public sector networks
|Connection to public sector networks||No|
|Price||£1500 per licence per month|
|Discount for educational organisations||Yes|
|Free trial available||Yes|
|Description of free trial||
- 3 week trial
- Threat Reports written by our Threat Analysts
- A dedicated Account Manager and Technical Account Manager