Jamf Blog

Posts in the Government Category

February 5, 2025 by Jesus Vigo

Cyber Essentials Series: Deep dive into Cyber Essentials Plus (CE+)

Continuing our Cyber Essentials blog series, we take a deeper dive into Cyber Essentials Plus (CE+). In this second part, we focus on the assessment process and how Jamf supports organizations to meet the stricter requirements.

January 16, 2025 by Jesus Vigo

Cyber Essentials Series: What it is and why it’s important

NCSC has recently re-branded and re-launched its Device Guidance and Mobile Device Guidance. These settings are far more cost- and time-effective for organisations of all sizes to implement via Mobile Device Management (MDM).

January 3, 2025 by Jesus Vigo

What platforms does Jamf support?

Threats don't sleep. They also don't discriminate against device types or target just one platform. So, why should your enterprise security strategy be any different?

Pro Tip: it shouldn't.

Bad actors are hoping you don't know this, but Jamf does. That's why in this blog, we discuss why it's critical for security solutions to support multiple platforms in order to be truly holistic and offer comprehensive protections against existing and evolving threats that target your fleet — not just one type of device on a single platform.

December 12, 2024 by Jesus Vigo

Jamf After Dark: Why Jamf

In this podcast recap, the team sits down to discuss what sets Jamf apart from the competition. From making security a cornerstone of our solutions lineup to the global community of IT and Security professionals of Jamf Nation and much more.

December 4, 2024 by Jesus Vigo

Everything You Need to Know About Jamf Training and Certification

Jamf certifications provide an accurate measure of the knowledge and skills needed to manage and secure Apple devices in the enterprise and at school. Learn about each certification and discover the various learning tools and resources to succeed personally and professionally with Jamf.

November 14, 2024 by Jesus Vigo

Anatomy of an Attack: Atomic Stealer malware

Learn about the cyber kill chain and how to use it to learn more about the threats and threat actors targeting your enterprise. Also, Jamf Threat Labs takes you on a deep dive into the anatomy of an attack, dissecting each phase of an attack by the Atomic Stealer malware.

October 30, 2024 by Jesus Vigo

Why Apple Intelligence and Private Cloud Compute are so different and secure

Learn about the security and privacy controls in Apple Intelligence and how Apple’s revolutionary approach to designing the Private Cloud Compute infrastructure sets it apart from AI models hosted in cloud-based environments. Furthermore, understand how Apple succeeds where others are subject to common data security vulnerabilities and user privacy risks.

October 21, 2024 by Jesus Vigo

Deploying Apple devices in hard hat/manufacturing industries

Manufacturing and hard hat industries benefit greatly from powerful yet easy-to-use Apple devices that transform processes and drive innovation. Learn about how Apple and Jamf help these industries transition business workflows to the digital age.

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.