Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec

Vulnerability Management Application for iPhone Users

Tenable Network Security : 17 September, 2010  (New Product)
Nessus Vulnerability Scanner from Tenable has been launched as an application for Apple's iPhone and iPod Touch providing mobile users with scanning capability as well as access to vulnerability reports
Tenable Network Security has released an iPhone application for its Nessus Vulnerability Scanner, providing Nessus users the ability to remotely connect to a Nessus server, launch scans and review reports with the Apple iPhone and iPod Touch devices. Tenable is the first vulnerability management vendor to release a mobile application for its customers. The ability to conduct scans and review results remotely from a mobile device provides the flexibility that enterprise IT and security professionals expect from their software and service providers.

The Nessus iPhone application is available at no cost at the iPhone App Store and is located under the productivity category. It allows users to take advantage of the advanced capabilities of the iPhone and iPod Touch user interface.

'I'm proud to announce the release of our inaugural mobile application to support mobile users. Given the popularity of Nessus and the iPhone, we chose to release our first mobile application on the Apple platform," said Ron Gula, CEO of Tenable. 'Our new Nessus iPhone application provides users with an even richer, more personalized experience and greater access to our high-quality product and security research whether they are in the office or on the go.'

Features of the Nessus iPhone application include remote starting, stopping and pausing of network scans as well as the ability to analyze scan results. This mobility allows a security professional who is responding to an incident to quickly log into a Nessus scanner during a meeting to find a host with a given vulnerability, thereby improving the efficiency of the Incident Response process.
Bookmark and Share
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo