Jamf Blog

Posts in the Jamf Connect Category

February 2, 2023 by Karen Goss

Introducing the Jamf Learning Hub

Check out the new Jamf Learning Hub to find the product technical content you need, when you need it to get the most out of Jamf products and succeed with Apple.

February 1, 2023 by Laurie Mona

Jamf Fundamentals and Jamf Business Plan: Which one is better for your business?

Learn about the Jamf plans that help you manage and secure your Apple devices and see which one is right for your organization.

February 1, 2023 by Kaylee Carlson

Jamf security: simplified.

Jamf has consolidated its Mac endpoint security and Mac authentication offerings into two comprehensive products: Jamf Connect and Jamf Protect. Here’s the breakdown of how we’ve still got you covered— and on more devices!

December 22, 2022 by Thijs Xhaflaire

How-to: Granting local admin permissions with Microsoft Forms and Power Automate

In this step-by-step guide we will show how to use Microsoft Forms and Microsoft Power Automate to streamline and manage local administrator permissions within a managed macOS fleet.

November 29, 2022 by Laurie Mona

How to deploy new technology in healthcare organizations

Learn how to successfully deploy Apple technology in your healthcare organization with enterprise secure, consumer simple management and security solutions from Jamf.

November 17, 2022 by Jesus Vigo

A holistic approach to security: Identity and Access Management (IAM)

Identity and Access Management (IAM) extends far beyond the simple notion of authenticating users. While that is certainly a central point, modern work environments require changes to IT infrastructure for users to remain safe while being productive from any device, over any network while physically being anywhere. That’s where the modernized IAM workflows coupled with first- and third-party integrations are critical to extending access through greater flexibility while enhancing security for all stakeholders.

November 15, 2022 by Jesus Vigo

A holistic approach to security: endpoint protection

Comprehensive endpoint protection provides modern threat landscape protection to your entire fleet of Apple endpoints and mobile devices. By protecting against new and evolving threats through effective and efficient defense-in-depth strategies, Jamf endpoint security solutions are not only best-of-breed, but their powerful and flexible workflows help organizations like yours to succeed with Apple at work without compromising data security, user privacy or end-user productivity.

November 10, 2022 by Jesus Vigo

A holistic approach to security: Zero Trust Network Access (ZTNA)

Zero Trust Network Access, part of Jamf Connect, provides modern threat landscape protection to your entire fleet of macOS, iOS/iPadOS, Android and Windows endpoints, extending secure remote access and “Zero Trust” technology to organizational resources and data – granting access only to endpoints and users that meet your requirements – all others are denied, by default.

Jamf endpoint security and mobile threat defense solutions offer detection, prevention and remediation capabilities that extend protections across your entire desktop and mobile fleet, protecting devices and empowering users while keeping data secure and maintaining privacy.

Browse Blog
by Category:
Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.