Jamf Blog

Posts in the Jamf Connect Category

February 27, 2024 by Hannah Hamilton

Jamf After Dark: Platform SSO vs good old SSO we all know

Join co-hosts Kat Garbis and Sean Rabbitt to learn about Platform Single Sign-On (SSO) and Jamf Connect.

January 24, 2024 by Jesus Vigo

Balancing Security + Compliance

Learn about the basics of compliance in cybersecurity and why it is a crucial component of your organization’s security posture. Also, understand how achieving a balance between security and compliance is table stakes for regulated businesses and how critical factors like key regulations, industry standards and best practices, integrated alongside advanced technologies and security tooling, work hand in glove to benefit organizations while minimizing the risk of non-compliance.

December 21, 2023 by Kaylee Carlson

Jamf to archive NoMAD open-source projects

By the end of December 2023, multiple NoMAD projects will become read-only and will no longer be maintained.

December 14, 2023 by Haddayr Copley-Woods

What is the ROI of BYOD for business?

What is the percentage of companies allowing BYOD?

In the US alone, 83% of companies have a Bring Your Own Device (BYOD) program of some kind, according to Zippia. But is BYOD cost-effective? Read on to learn more.

December 13, 2023 by Laurie Mona

Jamf After Dark: Microsoft Ignite

Jamf After Dark podcast hosts Kat Garbis and Sean Rabbitt discuss the Microsoft Ignite conference with Katie John and Steve Wood of Jamf.

October 16, 2023 by Braden Newell

Mitigating social engineering attacks

Social engineering is a common (and costly) attack that plagues organizations today. This blog discusses techniques to add to your defense-in-depth strategy to help defend against these nefarious threats.

October 11, 2023 by Laurie Mona

JBC: Achieving More with Enhanced Efficiency

In this episode of the Jamf Breakfast Club, co-hosts Dr. Emily McRoberts-Froese and Ashley Arends of Jamf welcome Jon Griffey and Stephen L. Johnson of Texas A & M University to discuss their success with the consolidation of their Apple Device Management platform.

October 9, 2023 by Jesus Vigo

A holistic approach to security: endpoint protection

Comprehensive endpoint protection provides modern threat landscape protection to your entire fleet of Apple computers and mobile devices, including Windows and Android endpoints. By protecting against new and evolving threats through effective and efficient defense-in-depth strategies, Jamf endpoint security solutions are not only best-of-breed, but their powerful and flexible workflows help organizations like yours to succeed with Apple and mobile devices at work, without compromising data security, user privacy or end-user productivity.

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.