Jamf Blog

Posts in the Enterprise Category

December 12, 2023 by Aaron Webb

AI in the workplace: balancing benefits and security

Artificial intelligence (AI) is an inevitable part of our future lives, whether at home or at work. In this blog, we'll go over what AI in the workplace looks like, including its benefits and challenges.

November 30, 2023 by Jesus Vigo

Streamline device redeployment workflows with Return to Service Command

It's never been simpler to redeploy devices or sanitize shared ones in a secure, efficient manner while ensuring they are reenrolled with your MDM solution, ready for new users. Learn more about how Apple’s Return to Service Command helps IT achieve this quickly and easily.

November 27, 2023 by Ric Lucero

Drive efficiency in manufacturing with mobile technology for deskless workers.

Innovative manufacturers are empowering workers with mobile technology, one of the ways to boost productivity in your deskless workforce. To better understand the roadmap to success, Jamf insiders share what manufacturers need to think about when they introduce mobile devices to their employees.

November 1, 2023 by Jesus Vigo

What platforms does Jamf support?

Threats don't sleep. They also don't discriminate against device types or target just one platform. So, why should your enterprise security strategy be any different?

Pro Tip: it shouldn't.

Bad actors are hoping you don't know this, but Jamf does. That's why in this blog, we discuss why it's critical for security solutions to support multiple platforms in order to be truly holistic and offer comprehensive protections against existing and evolving threats that target your fleet - not just one type of device on a single platform.

October 26, 2023 by Ben Arent

Protecting infrastructure with device trust

With an increase in sophisticated attacks targeting engineers, securing and protecting access to critical infrastructure is becoming increasingly important. Read on to see how teams are using Jamf Pro and Teleport to enforce access to only trusted devices.

October 26, 2023 by Adam Mahmud

iOS 17 and iPadOS 17 for frontline workers

iOS 17 and iPadOS 17 offer new features that make work easier for frontline workers. Read this blog to find out how Declarative Device Management and Return to Service keep devices up to date and ready for action.

October 19, 2023 by Cristiana Pana

Device and identity management: Jamf and Google at Pennylane

The Jamf and Google partnership facilitates a smooth onboarding experience for many organizations. See how our partnership has enabled Pennylane's swift growth to continue without a hitch.

October 18, 2023 by Jesus Vigo

What is a Whaling phishing attack and how to prevent it

Threats impacting your cybersecurity defenses continue to grow and evolve from one type of form to another. Advanced Persistent Threats (APT) and converged threat types were already difficult to detect, and now existing threats, like Whaling, are getting supercharged by AI to become more efficient and scalable. In this blog, we delve into Whaling Phishing attacks:

  • What Whaling attacks are?
  • How do they impact cybersecurity?
  • Provide examples of real-world attacks
  • Breakdown the anatomy of a Whaling attack
  • and discuss the different ways to prevent them
Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.