Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

"BYOD - Bring Your Own Devastation - Taking On the Mobile Threat" Webcast: Recording and Q&A

Jack Daniel and I recently presented the "BYOD - Bring Your Own Devastation - Taking On the Mobile Threat" webcast. This was part 3 in the “Vulnerabilities Exposed” webcast series, and there will be a final session delivered on November 12th.

If you missed the webcast or would like to re-watch it, view the recording.

View Recording

Q&A

Here are responses to questions we received during the webcast.

Will the slides be available for download?

  • Yes, click here to view the presentation slides.

Do you have a resource that walks through setting up the mobile device scan in Nessus?

Does the Nessus mobile device scan require a certain version of ActiveDirectory?

  • Nessus can currently integrate Exchange 2010 or later (via Active Directory).

What level of rights are needed for the user to connect to Exchange and retrieve the phone synchronization info?

  • Domain administrator level privileges are required.

Does Tenable have any integration with the AirWatch MDM?

  • AirWatch MDM is not currently supported, however, our developers are constantly researching additional platforms to support.

Does Nessus have, or anticipate developing, scanners for performing SCAP or compliance scans on mobile devices?

  • We do not currently have SCAP or other compliance auditing files available for mobile devices or mobile device management platforms.

Tenable BYOD/Mobile Resources

Webcast Recordings and Q&A

If you missed any of the previous webcasts in the "Vulnerabilities Exposed" series, view the recordings and read the Q&A.

"Vulnerabilities Exposed" Part 4 – Communicating Vulnerabilities to Management: Making the Rubber Meet the Road

The last webcast in the series will be held on November 12th at 2 pm EST. Jack, Renaud Deraison (Tenable's Chief Research Officer and creator of Nessus), and I will discuss how to detect and prioritize vulnerabilities, and then communicate them to the right people in your organization to get, and keep, issues resolved. Register today!

Subscribe to the Tenable Blog

Subscribe
Try for Free Buy Now

Try Tenable.io Vulnerability Management

FREE FOR 60 DAYS

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now and run your first scan within 60 seconds.

Buy Tenable.io Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

Try Nessus Professional Free

FREE FOR 7 DAYS

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.