Jamf Blog

Posts in the Jamf Data Policy Category

August 31, 2022 by Haddayr Copley-Woods

Why companies block streaming on mobile

You don’t want your company to invade employee privacy or act as Big Brother. But companies do need to control mobile data usage for business devices. Restricting web access to some degree enhances mobile data security and controls costs. It also protects employees.

June 17, 2022 by Jesus Vigo

What is Mobile Security?

Securing your mobile fleet, while sharing many similarities with desktop computers, may vary vastly depending on variables specific only to mobile technology. In this blog we breakdown some of those factors unique to mobile devices, which include:

December 20, 2021 by Kelsey Giambruno

Wandera is now Jamf | A Partner guide to delivering a new, unified security brand

Wandera is now part of Jamf. Here's how we're delivering a new, unified security brand.

February 7, 2020 by Alex Wells

What is Adaptive Access and why does it matter in ZTNA?

Adopting adaptive access is important for ensuring that the right users are connecting to sensitive information with secure devices.

April 3, 2018 by Liarna La Porta

What exactly is happening when an app leaks data?

What are app leaks and how do I know if my apps are leaking data?

February 5, 2018 by Joel Windels

What do employees actually do on their work phones?

Let's talk about the most popular apps for iPhone and Android, how they impact data usage and what you can do about it.

Browse Blog
by Category:
Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.