Jamf Blog

Posts in the Government Category

May 17, 2024 by Sean Smith

Migrating to Jamf made easy

Discover how simple it is to migrate from an MDM provider that doesn't meet your needs to Jamf Pro. Easily implement your migration project without wiping or reenrolling devices.

May 9, 2024 by Jesus Vigo

Defense-in-depth: One size does not fit all

Defense-in-depth security strategies are the key to protecting your enterprise against the modern threat landscape. Continue learning more about closing gaps in security by identifying risks and mitigating them holistically.

April 25, 2024 by Jesus Vigo

Defense-in-depth: Understanding and adapting security for the modern threat landscape

Learn more about closing gaps in security by integrating and layering solutions.

April 17, 2024 by Jesus Vigo

Choosing the right IT security partner: How Jamf fulfills your IT security need

Learn how choosing the right partner for your security needs can veritably make or break your cybersecurity plan. Also, gain a better understanding of how Jamf solutions integrate to address the challenges of the modern threat landscape through Trusted Access for top-to-bottom and end-to-end protection of your enterprise.

April 8, 2024 by Aaron Webb

Jamf Connect feature: Limit Application Access for Unmanaged Devices

Strengthening mobile security is critical. Especially for unmanaged devices that lack the management, identity and security controls of managed endpoints. In this blog, learn how Jamf Connect’s newest feature adds a layer of security to protect against unauthorized access and data breaches.

March 29, 2024 by Jesus Vigo

A guide to understanding Advanced Endpoint Protection

Learn about Advanced Endpoint Protection, what it is and how its integrated features contribute to a defense-in-depth security strategy that strengthens device and organizational security postures.

March 22, 2024 by Jesus Vigo

Zero Trust vs Least Privilege

Zero Trust and the principle of least privilege are components of an enterprises’s security plan that can sometimes be confounded. In this blog, we define both and explain how they work in detail.

March 18, 2024 by Sean Rabbitt

Introducing privilege elevation in Jamf Connect

Learn about how privilege elevation, a new feature of Jamf Connect, helps organizations balance the end user’s needs with administrative oversight without compromising device or credential security while permitting IT and Security teams to “work smarter, not harder”.

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.