Jamf Blog

Posts in the Higher Education Category

June 27, 2019 by Haddayr Copley-Woods

Top 5 ‘objections’ to mobile device management (MDM)

Jamf lays to rest a few worries that end users and IT pros have about mobile device management.

June 26, 2019 by Kat Garbis

Apple device security misconceptions (and how to get ahead of them)

Security is a top priority for any IT admin, no matter which platform(s) they are supporting. Read this for a tutorial on Apple device security.

June 12, 2019 by Haddayr Copley-Woods

The importance of student device choice when preparing for the modern workplace

Preparing today's students for tomorrow's workplaces should include Mac.

June 7, 2019 by Haddayr Copley-Woods

The influence of student device choice on the modern workplace

Businesses eager to recruit and retain the next generation tech-savvy employee would do well to offer them Mac.

July 17, 2018 by Daniel Weber

Why the device management solution you choose matters

Read this blog for a tutorial on device management models — best-of-breed versus unified endpoint management (UEM) — and discover which is right for your commercial, K-12 or higher education environment.

July 9, 2018 by Daniel Weber

How to implement the CIS benchmark for better iOS security

See how to successfully follow the Center for Internet Security (CIS) recommendations for securing iPad and iPhone devices.

April 5, 2018 by Jeni Asaba

Introducing iPad as a modern tool for success

See how Maryville University is succeeding and saving with Apple School Manager and a 1-to-1 iPad program.

January 23, 2018 by Kerry Fortman

Mobile device management for Apple: What it is and how to get the most out of it

Whether you’re just getting started with Apple devices or have been implementing mobile device management (MDM) strategies for years, enjoy a review of the basics and discover new IT workflows for your environment.

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.