Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Blog

Subscribe

"BYOD - Bring Your Own Devastation - Taking On the Mobile Threat" Webcast: Recording and Q&A

Jack Daniel and I recently presented the "BYOD - Bring Your Own Devastation - Taking On the Mobile Threat" webcast. This was part 3 in the “Vulnerabilities Exposed” webcast series, and there will be a final session delivered on November 12th.

If you missed the webcast or would like to re-watch it, view the recording.

View Recording

Q&A

Here are responses to questions we received during the webcast.

Will the slides be available for download?

  • Yes, click here to view the presentation slides.

Do you have a resource that walks through setting up the mobile device scan in Nessus?

Does the Nessus mobile device scan require a certain version of ActiveDirectory?

  • Nessus can currently integrate Exchange 2010 or later (via Active Directory).

What level of rights are needed for the user to connect to Exchange and retrieve the phone synchronization info?

  • Domain administrator level privileges are required.

Does Tenable have any integration with the AirWatch MDM?

  • AirWatch MDM is not currently supported, however, our developers are constantly researching additional platforms to support.

Does Nessus have, or anticipate developing, scanners for performing SCAP or compliance scans on mobile devices?

  • We do not currently have SCAP or other compliance auditing files available for mobile devices or mobile device management platforms.

Tenable BYOD/Mobile Resources

Webcast Recordings and Q&A

If you missed any of the previous webcasts in the "Vulnerabilities Exposed" series, view the recordings and read the Q&A.

"Vulnerabilities Exposed" Part 4 – Communicating Vulnerabilities to Management: Making the Rubber Meet the Road

The last webcast in the series will be held on November 12th at 2 pm EST. Jack, Renaud Deraison (Tenable's Chief Research Officer and creator of Nessus), and I will discuss how to detect and prioritize vulnerabilities, and then communicate them to the right people in your organization to get, and keep, issues resolved. Register today!

Related Articles

Cybersecurity News You Can Use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Tenable Vulnerability Management trials created everywhere except UAE will also include Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose your subscription option:

Buy Now

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Tenable Vulnerability Management trials created everywhere except UAE will also include Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose your subscription option:

Buy Now