Jamf Blog

Posts in the Jamf Data Policy Category

June 17, 2022 by Jesus Vigo

What is Mobile Security?

Securing your mobile fleet, while sharing many similarities with desktop computers, may vary vastly depending on variables specific only to mobile technology. In this blog we breakdown some of those factors unique to mobile devices, which include:

  • Defining what mobile security is
  • Explaining makes mobile endpoint security distinct
  • Discussing common mobile threat types
  • Outlining mobile security solutions
December 20, 2021 by Kelsey Giambruno

Wandera is now Jamf | A Partner guide to delivering a new, unified security brand

Wandera is now part of Jamf. Here's how we're delivering a new, unified security brand.

February 7, 2020 by Alex Wells

What is Adaptive Access and why does it matter in ZTNA?

Adopting adaptive access is important for ensuring that the right users are connecting to sensitive information with secure devices.

April 3, 2018 by Liarna La Porta

What exactly is happening when an app leaks data?

What are app leaks and how do I know if my apps are leaking data?

February 5, 2018 by Joel Windels

What do employees actually do on their work phones?

Let's talk about the most popular apps for iPhone and Android, how they impact data usage and what you can do about it.

Browse Blog
by Category:
Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.