Jamf Blog

Posts in the Government Category

Mobile Threat Defense solutions are all concerned with one thing only: ensuring the security of your mobile devices against malware, network-based attacks and the overall reduction of risk that modern-day security threats pose to the mobile user base.

In this blog post, we discuss Mobile Threat Defense and answer the following questions along the way:

  • What is it?
  • How does it work?
  • What are the benefits?

Now, this is not about the best ride at Epcot. In this article, I am going to walk you through using Jamf Protect and Jamf Pro together to create customized remediation workflows. This will allow you to create Security Orchestration, Automation, and Response (SOAR)-like functionality for your Mac fleet by leveraging policies created in Jamf Pro to remediate detections based on Jamf Protect.

Browse Blog
by Category:
Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.