Jamf Blog

Posts in the Compliance Reporter Category

November 28, 2022 by Jesus Vigo

A holistic approach to security: visibility and compliance

What are your endpoints doing that they shouldn’t be (or not doing what they should be)? The symbiotic relationship between visibility and compliance is a delicate, yet powerful one if managed properly. With the proper tooling, organizations can not only deploy secured configurations and roll out policies to enforce secure baselines, but they can also gain deep visibility into each endpoint to verify that each device is operating in alignment with company policies and complying with regulatory requirements.

February 8, 2022 by Jesus Vigo

New product series: Getting to know Compliance Reporter

Gain real-time visibility into your Mac endpoints: from critical processes, network, system and user activity – gather reports of valuable compliance status data to audit security settings, validate system integrity and plan actionable, data-driven remediation workflows to meet complex compliance requirements of regulated industries.

July 28, 2021 by Jesus Vigo

Everything you need to know about FinTech regulations and compliance

The Financial sector has adopted technology and security to provide digital financial services and safeguard data. While the sensitive nature of the data and rapidly changing technological landscape pose unique cybersecurity challenges to IT, we can help you make sense of its complexities in part two of a two part series by identifying the risks, addressing concerns and complying with regulations.

June 2, 2021 by Matthias Wollnik

Jamf boosts security and compliance solutions with the launch of Compliance Reporter

An exciting day in the Mac compliance and security world, Jamf launches Compliance Reporter, providing more visibility into Mac activity for threat hunting purposes and compliance checks.

Browse Blog
by Category:
Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.