Vulnerability Management For Mobility
Vulnerability Management For Mobility
1 Vulnerability
Management for
Mobility
5 From the Gartner Files:
Four Ways to Close
the Gap Between
Vulnerability Management for
Mobility
Enterprise Mobility and
Vulnerability
Management
9 About Tenable Network Identify Mobility Risk through Mobile Device Visibility and Vulnerability Assessment
Security
• The deployment and management of mobile To address these concerns, enterprises should
devices lies in the network operations team, include mobile device assessment (MDM)
and security teams may not be involved in as part of their vulnerability management
the decision process. As a result, the business offering. However, there is no single template
drivers for mobile devices may outweigh for mobile device vulnerability assessment since
security concerns. organizations have various types of mobile devices,
various ways of managing these devices, and
• Mobile devices connect and disconnect from the mobile devices themselves are sensitive to
the corporate network ad-hoc. Because of security software installed. As a result, choosing
this, they may not be visible to traditional a vulnerability assessment solution that addresses
vulnerability scans. these needs and that works with existing IT
investments is critical to provide the maximum
• With Bring Your Own Device (BYOD) flexibility and fullest visibility of mobile risk.
deployments any operating system or
application may be running on the mobile The following research outlines how vulnerability
device, adding another layer of complexity. management solutions are capturing the risk
from mobility, what technologies are used to
The proliferation of mobile devices has increased assess mobile devices, and which vulnerability
the volume of threats and vulnerabilities that management vendors offer the broadest coverage.
target these devices. Organizations must consider
a holistic approach to bring together mobile device
visibility and vulnerability assessment.
Of the vendors evaluated, Tenable Network 2. Provide detailed mobile device information,
Security offers one of the broadest mobile device including serial number, model, version,
assessment coverage that includes: timestamp of last connection, and the user
• Assess, select and implement the most suitable The purpose of this research is to provide
best practice for your organization from the four possible alternative approaches and best
ones presented in this research for integrating practices to plug this gap and consolidate VA and
mobile devices into the vulnerability management for mobile and traditional devices.
management workflow.
Analysis
• Make mobile device assessment capabilities a
Vulnerability management has grown and
core requirement for vulnerability assessment
evolved over the past decade, with standardized
product selection.
workflows, a shared terminology and a number of
4
EMM systems, with a shorter history and • Deep security assessments are possible due to
experience in commercial environments, have direct system access.
rapidly entered the enterprise space. Unlike
traditional endpoint protection platforms, EMM • Detailed vulnerability findings and asset
tools have focused on managing and securing inventory data are directly integrated into
enterprise mobile devices by enabling them, rather enterprise vulnerability and risk metrics and
than locking them down. As the buying center for reporting.
EMM tools is usually closer to IT operations than
IT security, VA support has not been the focus of • Bidirectional integration occurs — the app
EMM tools so far. can be directly managed by the security
organization.
VA vendors have slowly begun adding capabilities
to bridge this gap, with ActiveSync and EMM Challenges
integration the most widely encountered features,
and a few maverick vendors providing direct • It requires the installation and management of
assessment methods. By integrating mobile device a local agent application, and this challenge
management (MDM) technology with vulnerability is compounded as the number and variety of
management, the security organization regains mobile devices increases.
visibility and oversight back over the rapidly
growing population of mobile-based assets. This • It’s Android only; iOS’s security model severely
allows mobile devices to be included in risk limits the necessary functionality.
metrics and reporting, as well as enabling the
assessment and management of mobile device • Mobile devices must be able to connect back
vulnerabilities by the IT security organization. to the VA management interface, necessitating
either an external service to be exposed on the
5
perimeter, or a cloud-based model providing a • It permits at least a partial view into security-
centralized public management point. relevant mobile device data, without the need
to gain access to every mobile endpoint.
• It requires access to mobile endpoints by
involvement of both the mobile management • Vulnerability findings and asset inventory data
and VM teams. are directly integrated into vulnerability and
risk metrics and reporting.
• There is currently only a limited selection of
available solutions offering this capability. Challenges
Appendix
Table 1. Vendor Options
Vulnerability Manager
Rapid7 Nexpose * **
Tenable Nessus/ X4 X X
SecurityCenter
Secunia CSI/PSI X1
Qualys **
* Rapid7 offers a SaaS mobile security solution called Mobilisafe. There are
plans to integrate Mobilisafe with Nexpose
** Via integration with Cisco Sourcefire
1
Android agent
2
BlackBerry BES; MobileIron is being planned
3
McAfee EVM integrates with McAfee Enterprise Mobility Management via
McAfee ePO
4
Good for Enterprise
Source: Gartner (April 2014)
VM Vulnerability management
Gartner Research Note G00260857, Oliver Rochford Dionisio Zumerle,
30 April 2014
9
In 2014 Tenable was selected as a Red Herring Top 100 North America
award winner. The company was also named Best Vulnerability
Management Solution at the SC Magazine Europe awards. Tenable has
been selected as a Deloitte Technology Fast 500 Company every year
since 2009.
Our Mission
Tenable founders Ron Gula, Renaud Deraison, and Jack Huffard build
technology that secures and protects any device from threats on the
Internet – malicious software, hackers, viruses, and more. Tenable
wants its customers and every company to have access to the latest
and best technology that will ensure they stay connected, online, and
in business.
Vulnerability Management for Mobility is published by Tenable Network Security. Editorial content supplied by Tenable Network Security is independent of Gartner analysis. All
Gartner research is used with Gartner’s permission, and was originally published as part of Gartner’s syndicated research service available to all entitled Gartner clients.
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved. The use of Gartner research in this publication does not indicate Gartner’s endorsement of Tenable Network
Security’s products and/or strategies. Reproduction or distribution of this publication in any form without Gartner’s prior written permission is forbidden. The information
contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. The
opinions expressed herein are subject to change without notice. Although Gartner research may include a discussion of related legal issues, Gartner does not provide legal advice
or services and its research should not be construed or used as such. Gartner is a public company, and its shareholders may include firms and funds that have financial interests in
entities covered in Gartner research. Gartner’s Board of Directors may include senior managers of these firms or funds. Gartner research is produced independently by its research
organization without input or influence from these firms, funds or their managers. For further information on the independence and integrity of Gartner research, see “Guiding
Principles on Independence and Objectivity” on its website, http://www.gartner.com/technology/about/ombudsman/omb_guide2.jsp.