Jamf Blog

1965 more articles are waiting for you.

March 18, 2024 by Sean Rabbitt

Introducing privilege elevation in Jamf Connect

Learn about how privilege elevation, a new feature of Jamf Connect, helps organizations balance the end user’s needs with administrative oversight without compromising device or credential security while permitting IT and Security teams to “work smarter, not harder”.

March 18, 2024 by Mat Pullen

Data residency and security reporting in Jamf Safe Internet

Data residency and security reporting have come to Jamf Safe Internet! Read this blog to learn what this means for educational customers and how to configure privacy settings that help admins use student data effectively.

March 15, 2024 by Katie John

Microsoft + Jamf: Shared Device Mode update

One of the benefits Microsoft and Jamf’s partnership yields is Shared Device Mode, aiding frontline workers relying on shared iOS and iPadOS devices to work more efficiently by integrating identity and security solutions to provide just-in-time conditional access workflows. Read our blog for the latest update on when Jamf and Microsoft will deliver Shared Device Mode to meet customers’ unique needs.

March 15, 2024 by Hannah Hamilton

Zero trust network architecture best practices

Zero trust helps organizations secure their company resources, even from outside the network perimeter. Learn what zero trust is, why your organization needs it and about Zero Trust Network Access.

March 13, 2024 by Hannah Hamilton

What is threat prevention?

Attackers are always threatening your cybersecurity. Read this blog to learn what threat prevention is, some types of threats and how to defend against them.

March 12, 2024 by Haddayr Copley-Woods

What is application management?

Application management is a vital part of effective device and security management in business. But how can it enhance productivity, security, and user satisfaction? And how does an Apple admin keep all of these cards in the air?

March 12, 2024 by Aaron Webb

Safeguarding against the rise of mobile malware: Actions to take following recent incidents

Learn how the evolving threat landscape finds threat actors increasingly targeting mobile devices to exploit sensitive resources and what steps organizations can take to minimize risks while strengthening their overall security posture.

March 8, 2024 by Mat Pullen

Empowering parents, protecting children: understanding the SCOPE Act in schools

Children are increasingly exposed to the digital world. Ensuring their safety and well-being online has become a major concern for parents and educators alike. In response to these challenges, lawmakers have introduced the Securing Children Online through Parental Empowerment (SCOPE) Act, aimed at providing tools and resources to safeguard children's online experiences.

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.