Jamf Blog

1984 more articles are waiting for you.

April 22, 2020 by Daniel Weber

Jamf and Cisco deliver better enterprise tools

See how Jamf integrates with Cisco Security Connector, Cisco Identity Services Engine (ISE) and Cisco Fast Lane to deliver a modern, protected device experience.

April 20, 2020 by Jamf Threat Labs

You’ve got (0-click) mail!

Jamf identifies zero-click threats that target vulnerable iOS devices, compromising them through the Mail app. Read more about this threat and how to protect your Apple mobile fleet against it effectively.

April 17, 2020 by Daniel Weber

Jamf Now or Jamf Pro: Which is right for you?

See the Apple management differences of Jamf Now and Jamf Pro, and discover which solution is best suited to help you address your unique goals and requirements.

April 16, 2020 by Hans Doornbos

Endless Learning Possibilities Inside and Outside the Modern Digital Classroom

We show how Jamf School can assist in providing the best learning experience for all students using Apple technology in the classroom or remote.

April 15, 2020 by Jonathan Locast

No office, no problems

Switching to a remote workforce is tough, but this company is built on it. Read Tumlinson electric's story about how Apple, PlanGrid and Jamf Now allow them to thrive with no office.

April 15, 2020 by Kevin Snook

My first Jamf referral

What’s your Jamf story? Kevin Snook's started in an upstairs party room of a bar in San Francisco.

April 14, 2020 by Jeni Asaba

JNUC Diversity Sponsorship: Apply today!

If you’ve been there, you know the Jamf Nation User Conference (JNUC) is special. If you haven’t, now's your chance! For the fifth year in a row, we’re excited to offer the JNUC Diversity Sponsorship program to JNUC attendees. Learn about how to apply today.

April 13, 2020 by Jaron Bradley

Detecting Insecure Application Updates on macOS

Applications, such as software updaters, are still using the AuthorizationExecuteWithPrivileges API against Apple’s recommendation and do so. Recent research has shown that this can be leveraged by attackers to compromise endpoints in real-world scenarios. Jamf has been busy investigating how security teams can monitor for malicious use of this API. Let us show you how.

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.