Jamf Blog

1959 more articles are waiting for you.

April 9, 2024 by Haddayr Copley-Woods

2024 Jamf Event: Education recap

The 2024 Jamf Event showed how to transform learning for students, teachers and parents; better protect students; and maintain seamless, secure access.

April 8, 2024 by Aaron Webb

Jamf Connect feature: Limit Application Access for Unmanaged Devices

Strengthening mobile security is critical. Especially for unmanaged devices that lack the management, identity and security controls of managed endpoints. In this blog, learn how Jamf Connect’s newest feature adds a layer of security to protect against unauthorized access and data breaches.

April 5, 2024 by Jamf Threat Labs

Infostealers continue to pose threat to macOS users

Jamf Threat Labs dissects ongoing infostealer attacks targeting macOS users. Each with different means of compromising the victim’s Macs but with similar aims: to steal sensitive user data.

April 4, 2024 by Haddayr Copley-Woods

Are 1:1 iPad programs worth it?

In a word: Absolutely. And now we have the data to back it up.

April 3, 2024 by Hannah Hamilton

What is endpoint security?

Keeping your endpoints secure is necessary for data protection. Learn what endpoint security is, what it defends against and tools to use for endpoint protection.

April 2, 2024 by Sean Smith

What’s new in Jamf Pro 11.4

Jamf releases Jamf Pro 11.4! In this blog, you will learn about how the new features and functionalities included in the Jamf Pro 11.4 release.

April 1, 2024 by Lorin Bartlett

Jamf and Oomnitza: Elevating the deskless workforce

Managing mobile devices and their growing complexities shouldn’t be a constant source of stress for organizations. By integrating Oomnitza with Jamf Pro, you can successfully manage devices, collect insight into device health, ensure your tech performs optimally and safeguard your data to support compliance.

March 29, 2024 by Jesus Vigo

A guide to understanding Advanced Endpoint Protection

Learn about Advanced Endpoint Protection, what it is and how its integrated features contribute to a defense-in-depth security strategy that strengthens device and organizational security postures.

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.