Jamf Blog

Posts in the Jamf Protect Category

October 24, 2024 by Hannah Hamilton

Jamf wins mobile security solution of the year!

Jamf security solutions are recognized at this year’s Computing Security Awards.

September 11, 2024 by Jesus Vigo

What is Mobile Security? Understanding Mobile Device Security

Securing your mobile fleet, while sharing many similarities with desktop computers, may vary vastly depending on variables specific only to mobile technology. Mobile security requires nuanced approaches to prevent threats specifically targeting smartphones, tablets and mobile computers (laptops), and their users.

August 1, 2024 by Sean Smith

Managing data consumption in aviation

Find out how Jamf helps airlines manage their employees' data consumption — wherever they are located.

June 13, 2024 by Jesus Vigo

How to scale technology in hard hat industries

As manufacturing and hard hat industries approach the next industrial revolution, mobile technologies are poised to drive the transformation. Learn how having Jamf and Apple help this industry transition to the digital age.

April 17, 2024 by Jesus Vigo

Choosing the right IT security partner: How Jamf fulfills your IT security need

Learn how choosing the right partner for your security needs can veritably make or break your cybersecurity plan. Also, gain a better understanding of how Jamf solutions integrate to address the challenges of the modern threat landscape through Trusted Access for top-to-bottom and end-to-end protection of your enterprise.

April 9, 2024 by Haddayr Copley-Woods

2024 Jamf Event: Education recap

The 2024 Jamf Event showed how to transform learning for students, teachers and parents; better protect students; and maintain seamless, secure access.

March 22, 2024 by Jesus Vigo

Zero Trust vs Least Privilege

Zero Trust and the principle of least privilege are components of an enterprises’s security plan that can sometimes be confounded. In this blog, we define both and explain how they work in detail.

January 24, 2024 by Jesus Vigo

Balancing Security + Compliance

Learn about the basics of compliance in cybersecurity and why it is a crucial component of your organization’s security posture. Also, understand how achieving a balance between security and compliance is table stakes for regulated businesses and how critical factors like key regulations, industry standards and best practices, integrated alongside advanced technologies and security tooling, work hand in glove to benefit organizations while minimizing the risk of non-compliance.

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.