Jamf Blog

Posts in the Higher Education Category

May 17, 2024 by Sean Smith

Migrating to Jamf made easy

Discover how simple it is to migrate from an MDM provider that doesn't meet your needs to Jamf Pro. Easily implement your migration project without wiping or reenrolling devices.

May 16, 2024 by Sean Smith

What’s new in Jamf Pro 11.5

Jamf releases Jamf Pro 11.5!

In this blog, you will learn about how the new features and functionalities included in the Jamf Pro 11.5 release.

May 9, 2024 by Jesus Vigo

Defense-in-depth: One size does not fit all

Defense-in-depth security strategies are the key to protecting your enterprise against the modern threat landscape. Continue learning more about closing gaps in security by identifying risks and mitigating them holistically.

April 26, 2024 by Mat Pullen

Jamf Educator gets streamlined updates

We recently made significant updates to the Jamf Educator platform, introducing a redesigned landing page that guides users' journey from Learn to Grow to Share.

April 25, 2024 by Jesus Vigo

Defense-in-depth: Understanding and adapting security for the modern threat landscape

Learn more about closing gaps in security by integrating and layering solutions.

April 23, 2024 by Mat Pullen

Apple TV deployment in schools: enhancing digital classrooms

Learn about the various ways Apple TV and TrilbyTV support education and celebrate learning in the classroom and around the campus. Plus, discover how easy they are to set up, deploy and manage with Jamf.

April 8, 2024 by Aaron Webb

Jamf Connect feature: Limit Application Access for Unmanaged Devices

Strengthening mobile security is critical. Especially for unmanaged devices that lack the management, identity and security controls of managed endpoints. In this blog, learn how Jamf Connect’s newest feature adds a layer of security to protect against unauthorized access and data breaches.

March 12, 2024 by Aaron Webb

Safeguarding against the rise of mobile malware: Actions to take following recent incidents

Learn how the evolving threat landscape finds threat actors increasingly targeting mobile devices to exploit sensitive resources and what steps organizations can take to minimize risks while strengthening their overall security posture.

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.