Jack Daniel and I recently presented the "BYOD - Bring Your Own Devastation - Taking On the Mobile Threat" webcast. This was part 3 in the “Vulnerabilities Exposed” webcast series, and there will be a final session delivered on November 12th.
If you missed the webcast or would like to re-watch it, view the recording.
Here are responses to questions we received during the webcast.
- Yes, click here to view the presentation slides.
- Yes, refer to the "Detecting Mobile Device Vulnerabilities Using Nessus" video.
- Nessus can currently integrate Exchange 2010 or later (via Active Directory).
What level of rights are needed for the user to connect to Exchange and retrieve the phone synchronization info?
- Domain administrator level privileges are required.
- AirWatch MDM is not currently supported, however, our developers are constantly researching additional platforms to support.
Does Nessus have, or anticipate developing, scanners for performing SCAP or compliance scans on mobile devices?
- We do not currently have SCAP or other compliance auditing files available for mobile devices or mobile device management platforms.
Tenable BYOD/Mobile Resources
- Documentation: Nessus 5.0 and Mobile Device Scanning
- Blog Post: Detecting Mobile Devices Vulnerabilities Using Nessus
- Blog Post: Mobile Devices, Your Network, and Passive Sniffing with PVS
- Tenable Videos: Mobile Device Detection
- Whitepaper: Tackling the Mobile Device Challenge with Tenable
- FAQs: Nessus Mobile Devices
Webcast Recordings and Q&A
If you missed any of the previous webcasts in the "Vulnerabilities Exposed" series, view the recordings and read the Q&A.
- Part 1: “Reducing Your Patch Cycle to Less Than 5 Days”
- Part 2: “Addressing the Security Challenges of Virtualization”
"Vulnerabilities Exposed" Part 4 – Communicating Vulnerabilities to Management: Making the Rubber Meet the Road
The last webcast in the series will be held on November 12th at 2 pm EST. Jack, Renaud Deraison (Tenable's Chief Research Officer and creator of Nessus), and I will discuss how to detect and prioritize vulnerabilities, and then communicate them to the right people in your organization to get, and keep, issues resolved. Register today!