Jamf Blog

1947 more articles are waiting for you.

March 24, 2019 by Jamf Threat Labs

CVE-2019-7286 Part II: Gaining PC Control

Following our previous blog post “Analysis and Reproduction of iOS/OSX Vulnerability: CVE-2019-7286” we discussed the details of CVE-2019-7286 vulnerability – a double-free vulnerability that was patched in the previous release of iOS and was actively exploited in the wild. There is no public information about this vulnerability.

March 19, 2019 by Jonathan Locast

Constructing a better blueprint for device management

Read why Colasanti Construction Services chose to arm its field employees with iOS devices and discover how they did it in a secure, efficient manner.

March 14, 2019 by Jeni Asaba

Apple and beauty merge to deliver a better shopping experience

Creator of luxury home and body products, Rituals uses iPad and iPod devices to enhance the shopping experience. Our own Jeni Asaba took off her Jamf "hat" to experience 21st century shopping firsthand.

March 12, 2019 by Sam Weiss

Education use cases for the new Jamf Setup and Jamf Reset apps

From streamlining iPad cart checkout to improving new student orientation, see how these apps are changing the way schools leverage their education technology.

March 8, 2019 by Charles Edge

JNUC 2019 session submission now open!

Want to present at the 2019 Jamf Nation User Conference? We'd love to have you! Read this for guidance and see how to get your idea submitted today.

March 5, 2019 by Kerry Fortman

Apple device deployments for beginners

Want to streamline your Apple device deployments? Read our new guide and see how to automate device enrollments and empower users to simply turn on the device and go.

Delivering ROI through mitigated risk

In the conclusion of our three-part blog series, we examine how Jamf Pro delivers a compelling return on investment (ROI) by mitigating security risks.

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.