Jamf Blog

Posts in the Enterprise Category

July 27, 2021 by Justin Clark

What is Title Editor?

What is Jamf's Title Editor? Built on the Kinobi technology, create and maintain your own titles with Jamf's Title Editor, located in the Patch Management feature area of your Jamf Pro environment.

July 19, 2021 by Haddayr Copley-Woods

Onboarding and offboarding for beginners: start off on the right foot!

Learn about why you should consider the employee experience from their first day of work to their last, as well as the best way to do it.

July 14, 2021 by Evan O'Malley

How Apple technology is enabling your employees in the modern workplace

With no immediate way back to a pre-pandemic workplace, future ways of working are based in hybrid models, offering flexibility. But what does this mean for your business, employees and future technology?

June 7, 2021 by Sam Weiss

Jamf + Lookout: Defending against mobile device threats

Our partner Lookout announces a new integration to expand the capabilities of their platform and the reach of Jamf Pro. With this partnership, organizations can deploy and provision iOS devices while protecting them against mobile threats.

June 2, 2021 by Josh Stein

Stop potential AirDrop transfer data leaks with Jamf Protect

Jamf Protect can centralize Unified Logging data to allow for filtering and better searches. One use-case is detecting outbound AirDrop transfers and logging them to prevent possible data leaks.

May 27, 2021 by Adam Mahmud

Jamf Single Login: Empower frontline workers on shared iOS and iPadOS devices

Over the last three years, Jamf Setup and Jamf Reset have become synonymous with improved end-user experience. Today, the next iteration is here with the Single Login workflow.

May 26, 2021 by Cayla Curtis

Why you need both IAM and MDM in today’s ‘WFA’ world

Technology Alliances Manager from Ping Identity, Cayla Curtis, goes into detail about the new Ping Identity integration for Jamf in this guest blog.

May 24, 2021 by Jaron Bradley

Zero-Day TCC bypass discovered in XCSSET malware

A zero-day discovery allows an attacker to bypass Apple’s TCC protections which safeguard privacy. By leveraging an installed application with the proper permissions set, the attacker can piggyback off that donor app when creating a malicious app to execute on victim devices, without prompting for user approval.

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.