Senseon Tech Ltd

Senseon Cloud

Senseon’s multiple threat detection senses work together to detect malicious activity across an organisation’s entire digital estate, covering the gaps that single point solutions create.


  • Threat detection
  • Threat triage
  • Real-time dashboards
  • Threat hunting
  • AI triangulation
  • Threat notification
  • Endpoint response
  • Anomaly Detection


  • Quickly assess risk and impact of cyber threats
  • Easily manage threats
  • Automatically stop threats
  • Quickly understand digital estate
  • Easily access low level data about your IT environment
  • Highly contextualised and actionable alerts
  • Investigate threats efficiently and effectively


£1500 per licence per month

  • Education pricing available
  • Free trial available

Service documents


G-Cloud 11

Service ID

5 3 0 4 0 6 4 3 7 6 3 6 6 5 7


Senseon Tech Ltd

Nicholas Brodie


Service scope

Service scope
Software add-on or extension No
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints Our endpoint agent supports Windows 8.1+, Server 2012 R2+, CentOS 6+, Ubuntu 16.04+, Mac OS 10.12+.
System requirements
  • For typical deployment on AWS - m5.24xlarge
  • For typical deployment on Azure - E32s v3
  • For typical deployment on Google Cloud Platform - n1-highmem-64

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Typically within 30 mins during working hours.
Out of hours support is available upon request.
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support Web chat
Web chat support availability 9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard WCAG 2.1 AA or EN 301 549
Web chat accessibility testing Our provider has performed these tests on our behalf.
Onsite support Yes, at extra cost
Support levels Onboarding and user training provided upon request.
An account manager and a technical account manager will be appointed to each customer.
The Senseon Service Package (monitoring, alerting, and reporting) is available for an additional 20% of the Software Licence cost.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Senseon offers user guides to all users. Senseon provides individual onsite or remote training for an additional cost.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction The retained data can be extracted at the end of the contract at the customer's request.
End-of-contract process An option to extend will be presented. If the contract is not extended the service will be disabled within 7 days of contract end.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install Yes
Compatible operating systems
  • Linux or Unix
  • MacOS
  • Windows
Designed for use on mobile devices No
Service interface Yes
Description of service interface The service interface provides users with the ability to triage cybersecurity threats, visualise cases, manage case workflow, threat hunt and configure the autonomous threat response.
Accessibility standards None or don’t know
Description of accessibility Everything is accessible by tabbing through the interface. The interface is not yet optimised for screenreaders.
Accessibility testing We have done interface testing with products designed to evaluate compliance. Further testing will be completed with users of assistive technologies.
What users can and can't do using the API We do not currently expose the API to customers.
Access to the API including API documentation is available upon request.
API documentation Yes
API documentation formats Open API (also known as Swagger)
API sandbox or test environment No
Customisation available Yes
Description of customisation The analytic detections can be customised - this gives customers (with the appropriate permissions) the ability to add exclusions, change thresholds and manage case scoring.

The autonomous response capability can be configured between manual and automatic modes.


Independence of resources Service resources are isolated to each customer.


Service usage metrics Yes
Metrics types We provide some service usage metrics through the Dashboard and Setting areas of the product.
Reporting types
  • Real-time dashboards
  • Regular reports


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Managed by a third party
Penetration testing frequency At least once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest Encryption of all physical media
Data sanitisation process Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach In-house destruction process

Data importing and exporting

Data importing and exporting
Data export approach Currently, users need to approach Senseon to request a data export from the product.
Data export formats Other
Other data export formats
  • PCAP
  • SQL
Data import formats Other

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks IPsec or TLS VPN gateway
Data protection within supplier network IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability 95% availability.

Account credits will be provided if availability SLAs are not met.
Approach to resilience Information about the architecture of the product is available on request.
Outage reporting We communicate outages to customers by email.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels Only a limited number of Senseon users have access to management interfaces.
Access restriction testing frequency At least once a year
Management access authentication
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information You control when users can access audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information No audit information available
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 ACS Registrars (UKAS accredited body)
ISO/IEC 27001 accreditation date 17/05/2019
What the ISO/IEC 27001 doesn’t cover Marketing, sales, business development and investor relations.
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications
  • Cyber Essentials Plus
  • IT Health Check

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes All of our information security policies comply with ISO27001:2013.
We have rigourous internal audit procedure to ensure that policies are being conformed to and remedial actions are performed if they are not.

Our security governance group includes our senior leadership team and the method and terms of reference of governance are fully documented in our Information Security Management System (ISMS).

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Strict version control discipline, automated configuration management and release processes track each component through its lifetime.

Multiple levels of automated testing, static analysis and manual review provide assurance about the functional correctness of the components including the presence of security vulnerabilities.
Vulnerability management type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach Daily network vulnerability scanning.
Code audits on every commit.
Deploy patches based upon priority but in most circumstances in less than 24hours.
We get information about vulnerabilities from partnerships and threat intelligence.
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach We use antiviruses for endpoint security.
We user our own product to provide endpoint and network monitoring and response.
Response times depend upon the incident and priority. In the case of high priority, high impact issues can be autonomously responded to in a short period of time.
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach Conforms to our policies under 27001:2013.
Tickets are reported through various mechanisms including in-product chat. These are then managed in a ticket management system.
Customers are provided with updates when impacted by incidents.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No


Price £1500 per licence per month
Discount for educational organisations Yes
Free trial available Yes
Description of free trial - 3 week trial
- Threat Reports written by our Threat Analysts
- A dedicated Account Manager and Technical Account Manager

Service documents

Return to top ↑