Jamf Blog

Posts in the Enterprise Category

April 22, 2024 by Hannah Hamilton

Jamf After Dark: Is good enough, good enough?

Co-hosts Kat Garbis and Sean Rabbitt welcome Jamf Sales Engineers Marcus Ransom and Kyle Randall to explore IT admins’ “good enough” security and management configurations — and why they aren’t actually good enough.

April 18, 2024 by Haddayr Copley-Woods

How declarative device management transforms Apple MDM

Apple's declarative device management (DDM) is a relative newcomer to MDM. But in only three years, it has become a cornerstone of modern Apple management. You can expect DDM's impact to grow ever more transformative.

April 17, 2024 by Jesus Vigo

Choosing the right IT security partner: How Jamf fulfills your IT security need

Learn how choosing the right partner for your security needs can veritably make or break your cybersecurity plan. Also, gain a better understanding of how Jamf solutions integrate to address the challenges of the modern threat landscape through Trusted Access for top-to-bottom and end-to-end protection of your enterprise.

April 9, 2024 by Haddayr Copley-Woods

2024 Jamf Event: Commercial recap

The 2024 Jamf Event for commercial markets discussed developments in moving toward Trusted Access and much more.

April 8, 2024 by Aaron Webb

Jamf Connect feature: Limit Application Access for Unmanaged Devices

Strengthening mobile security is critical. Especially for unmanaged devices that lack the management, identity and security controls of managed endpoints. In this blog, learn how Jamf Connect’s newest feature adds a layer of security to protect against unauthorized access and data breaches.

April 2, 2024 by Sean Smith

What’s new in Jamf Pro 11.4

Jamf releases Jamf Pro 11.4!

In this blog, you will learn about how the new features and functionalities included in the Jamf Pro 11.4 release.

March 29, 2024 by Jesus Vigo

A guide to understanding Advanced Endpoint Protection

Learn about Advanced Endpoint Protection, what it is and how its integrated features contribute to a defense-in-depth security strategy that strengthens device and organizational security postures.

March 26, 2024 by Jesus Vigo

End-user computing considerations and challenges

In this blog, learn about end-user computing (EUC), as we define what EUC is, discuss what to consider and explain some challenges to implementing it in your enterprise.

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.