Jamf Blog

1965 more articles are waiting for you.

June 2, 2020 by Aisha Baker

Allyship: Jamf will educate, act, support, improve and listen

We, as one Jamf, pledge to be leaders and allies of change by taking intentional action. Read for full details.

May 29, 2020 by Jonathan Locast

Thank you: Jamf Pro earns a 2020 Top Rated Award from TrustRadius

Coming off the back of being included by CRN in their list of 25 Coolest Mobile Device Management And Security Products Of The 2020 Mobile 100, TrustRadius has just awarded Jamf Pro with a 2020 Top Rated Award and we can’t thank TrustRadius and our customers enough.

May 29, 2020 by Chris Miller

Secure testing on iPads with Jamf School Teacher

One of the many challenges teachers face with remote learning is how to securely test students from home. This tutorial shows you how to safely lock your students into an assessment while allowing access to Zoom in order to view their screen.

May 21, 2020 by Matthias Wollnik

Jamf Protect adds malware prevention and unified log forwarding

We heard you and are happy to announce that Jamf Protect has added malware prevention and unified log forwarding.

May 14, 2020 by Garrett Denney

Jamf Security Series: How to harden your Jamf Pro environment

As the standard in Apple Enterprise Management, Jamf solutions are ideal for connecting users to the resources they need, fully managing all Apple devices, and protecting users, devices and networks against threats. With such power, comes great responsibility…here are seven basic recommendations to best secure your Jamf Pro server and underlying infrastructure.

May 14, 2020 by Josh Jagdfeld

Jamf Nation Redeploy Initiative

We’re launching Jamf Nation Redeploy, a global initiative to help organizations with unused Apple devices connect with organizations who have been been greatly impacted by COVID-19. Read more.

May 14, 2020 by Matt Woodruff

Leveraging security benchmarks to defend your organization’s systems and data

When organizations can confidently enforce standardized security requirements and protocols across all endpoints — no matter where they’re located — the risk of a breach or vulnerability drastically diminishes. That’s exactly why security benchmarks and audits exist.

May 9, 2020 by Jamf Threat Labs

Seeing (Mail)Demons? Technique and Triggers

Jamf Threat Labs team researchers provide a deep dive into triggers that have been found in the wild, relating to the MailDemon vulnerability. Also, techniques on how to uncover this critical security threat.

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.