Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Integrates with AirWatch

Organizations have adopted mobile devices as essential part of their business and rely on MDM solutions like AirWatch to track and manage them as well as certain applications that run on them.

Both Nessus and SecurityCenter now integrate with the AirWatch Mobile Device Management (MDM) platform to pull in mobile device information and provide context to vulnerability data. This helps identify vulnerable mobile devices and prioritize the overall risk they pose to the organization. With this integration, Tenable now supports all major MDMs including Microsoft Exchange, Apple Profile Manager, Good for Enterprise, MobileIron, and now AirWatch.

Integration Benefits

The integration with AirWatch extends Tenable’s initiative to bring mobile device visibility and vulnerability assessment together to allow organizations to better capture and prioritize the risk that mobile devices introduce and to improve their overall security and compliance stature.

Tenable and AirWatch customers can connect Tenable solutions to the AirWatch on-premises or cloud-based MDMs and receive mobile device information including number of mobile devices, mobile device types, operating systems (OS), and more to assess risk.

The AirWatch integration identifies mobile devices that could not be captured during an active network security scan because the device was either not connected or was asleep. The integration takes the MDM information to feed Nessus and SecurityCenter’s auditing and security assessment. The information helps answer the following questions:

  • Who and what types of devices are connecting to my network?
  • Are the devices running vulnerable OS?
  • Overall, how many such vulnerable devices connect to my network?
  • Are there unmanaged devices connecting to my network?

AirWatch Background

Acquired in 2013 by VMware for $1.54 billion, AirWatch offers a complete MDM solution for managing mobile devices, applications, and content. It can be purchased as an on-premises or cloud offering and also offered within a suite that includes options such as application management, content management, and email management to name a few.

Configure in 3 Easy Steps

The configuration and setup of this integration is straightforward.

Step1: In the Nessus Policies tab, click “New Policy” and choose the “Mobile Device Scan” icon.

Step2: Enter a policy name, and click "Next".

Step3: Select "AirWatch" from the "Device managers" list, and fill in the required details.

The integration allows Nessus to query the AirWatch API to gather information about all the mobile devices it manages. Using the credentials and the API key, Nessus authenticates to the server to directly query it for device information. This feature does not require any ports be specified in the scan policy. Optionally, communications over SSL can be specified, as well as verifying the SSL certificate.

Resulting Output

The integration results can be viewed in the scan reports. Example excerpts from the reports are shown below highlighting detected vulnerable devices.

Learn more about how Tenable solutions aid in securing your mobile devices and infrastructure and learn more about Nessus.

Reference Gartner’s research “Four Ways to Close the Gap Between Enterprise Mobility and Vulnerability Management” for additional insight on mobile device assessment.

Implement Continuous Monitoring

For even more in-depth monitoring of mobile devices, vulnerabilities, and their interaction with the other assets in your environment, Tenable's SecurityCenter Continuous View provides continuous passive monitoring and log analysis that add additional insight into mobile devices. For example, without even scanning, SC CV identifies which mobile devices are connecting via passive traffic monitoring; it identifies what other systems vulnerable devices are communicating with, what applications they are communicating with, and what users are connecting to vulnerable assets. Learn more about SecurityCenter CV.

Subscribe to the Tenable Blog

Subscribe
Try for Free Buy Now

Try Tenable.io

FREE FOR 60 DAYS

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now and run your first scan within 60 seconds.

Buy Tenable.io

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

$2,190.00

Buy Now

Try for Free Buy Now

Try Nessus Professional Free

FREE FOR 7 DAYS

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy Nessus Professional

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save

Try for Free Buy Now

Try Tenable.io Web Application Scanning

FREE FOR 60 DAYS

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable.io platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now and run your first scan within 60 seconds.

Buy Tenable.io Web Application Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578.00

Buy Now

Try for Free Contact Sales

Try Tenable.io Container Security

FREE FOR 60 DAYS

Enjoy full access to the only container security offering integrated into a vulnerability management platform. Monitor container images for vulnerabilities, malware and policy violations. Integrate with continuous integration and continuous deployment (CI/CD) systems to support DevOps practices, strengthen security and support enterprise policy compliance.

Buy Tenable.io Container Security

Tenable.io Container Security seamlessly and securely enables DevOps processes by providing visibility into the security of container images – including vulnerabilities, malware and policy violations – through integration with the build process.

Learn More about Industrial Security