Jamf Blog

Posts in the Government Category

September 29, 2022 by Mignon Wagner

Jamf Cloud

One of the greatest company needs is data security. An organization needs to ensure that its virtual machines are as secure as its physical machines. But for a long time, managing and securing virtualized Macs has been a very difficult and manual process.

August 26, 2022 by Jesus Vigo

iOS + VPN: Data leaks, misconfigurations and what comes next?

VPN software and the data leaks one security researcher detected have kicked off media coverage relating to Apple’s security stance and VPN software is handled in iOS. Are VPNs in iOS broken or is this simply another nail in legacy VPN’s coffin in light of more secure technologies, like ZTNA that better address the challenges of the current threat landscape and modern computing needs?

August 18, 2022 by Jesus Vigo

Security and your organization: Black Hat 2022 survey results

Jamf was on-hand at Black Hat 2022 to meet with customers and discuss the modern security landscape directly with the Security and IT professionals themselves. See what they had to say about the current state of security at their organizations when asked about it in Jamf’s anonymous survey conducted right from the showroom floor.

August 16, 2022 by Jesus Vigo

App Installer Success Story: Zoom

Read about how Jamf’s App Installer technology succeeded in patching Macs throughout Jamf’s organization against a vulnerability recently found within Zoom and classified as high severity. Threat mitigation meets automation.

August 10, 2022 by Hannah Hamilton

What is threat hunting?

The ever-evolving landscape of technology demands a keen eye to keep security vulnerabilities in your sights. How can you ensure that your assets are protected from known threats, bad actors or future attacks waiting to pounce? Enter threat hunting.

June 22, 2022 by Jesus Vigo

What is Endpoint Detection and Response (EDR)?

Endpoint security goes well beyond preventing malware and staying up to date with the latest patches. In fact, employing both of those safety measures doesn’t guarantee that your organization’s devices won’t be targeted by threat actors.

Endpoint detection and response (EDR), on the other hand, provides a powerful yet intuitive solution. This comprises an integrated, layered approach to endpoint security that combats cybersecurity threats through:

  • Continuous monitoring, combined with granular device health metrics
  • Gathering data and analyzing it frequently to determine if issues are detected
  • Deciding whether further investigation is needed or if endpoints should be quarantined and remediated
  • Utilizing behavioral analytics, rules-based responses and advanced machine-learning (ML) technology.
June 16, 2022 by Jesus Vigo

macOS Security Basics Series: The One Where Everyone Read Your Data Because It Wasn’t Encrypted

Encrypting your data may seem like a foreign concept to some users. It may be the stuff of thriller-type novels and spy yarns. But the reality is that encrypting data is a fundamental security control that is built-in into every version of macOS(and iOS for that matter) that serves a singular purpose: keeping unauthorized users from accessing your personal, corporate and privacy data whenever your computer is not in use. As a matter of fact, the benefits combined with a dead simple setup make it a “no brainer” for business and personal users alike, leaving users to wonder why they didn’t enable it sooner.

June 9, 2022 by Jesus Vigo

A History of VPN: Past, Present and Future

Secure connectivity has always been a cornerstone of endpoint security. Enterprise VPN, the long-ruling king of securing communications, faces new challenges that the aging protocol has trouble addressing – both effectively and efficiently – in modern-era computing environments.

In this blog, we discuss:

  • The dawn of VPN
  • What concerns it addressed
  • New challenges and security threats
  • How ZTNA handles legacy & current issues
Browse Blog
by Category:
Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.