Jamf Blog

Posts in the Jamf Protect Category

March 31, 2023 by Jesus Vigo

Top security challenges and how to overcome them: Compliance regulations

Discover the top challenges affecting IT and Security teams when it comes to successfully handling regulatory compliance, including assessing risks to endpoints and processes, implementing frameworks to best harden devices and overcoming the challenges of maintaining cyber security compliance by securely sharing telemetry data and developing automated workflows.

March 24, 2023 by Haddayr Copley-Woods

What is Mobile Application Management (MAM)?

BYOD devices must be usable, secure, and private. And to meet all of these requirements, Apple administrators cannot depend on Mobile Application Management (MAM) alone. They need Apple-first Mobile Device Management (MDM) and endpoint protection purpose-built for Apple.

March 17, 2023 by Thijs Xhaflaire

Integrating Jamf Protect with Microsoft Sentinel

Jamf Protect now integrates with Microsoft Sentinel—learn about the benefits and features of this integration in this blog.

March 10, 2023 by Jesus Vigo

A holistic approach to security: endpoint protection

Comprehensive endpoint protection provides modern threat landscape protection to your entire fleet of Apple endpoints and mobile devices. By protecting against new and evolving threats through effective and efficient defense-in-depth strategies, Jamf endpoint security solutions are not only best-of-breed, but their powerful and flexible workflows help organizations like yours to succeed with Apple at work without compromising data security, user privacy or end-user productivity.

February 27, 2023 by Jesus Vigo

ChatGPT’s evil sibling? Meet DAN.

Based on OpenAI’s ChatGPT, DAN is the jailbroken version of the advanced chatbot technology that operates free from policy constraints…but is this a good thing for the advancement of AI technology or does it further complicate matters relating to mainstream adaptability in our everyday world?

February 21, 2023 by Jesus Vigo

AI + ML: what it means for IT and InfoSec

Artificial Intelligence and Machine Learning are both advanced technologies that can do far more to help us work smarter, not harder than we can possibly contemplate. What the future holds is anyone’s guess, but the burning question we look at today is: how do they impact IT and InfoSec and the roles of the individuals tasked with securely managing endpoints?

February 15, 2023 by Haddayr Copley-Woods

Misconceptions about mobile BYOD

Worried about what Bring Your Own Device (BYOD) might mean for your organization . . . or yourself? Read on to see us debunk some common myths about BYOD.

February 13, 2023 by Jesus Vigo

Telemetry series: Full automation and correlation

Part three of the blog series on telemetry goes to the next level, specifying what administrators can do with the granular data collected from endpoints within their infrastructure. Particularly how this data is useful when detecting suspicious and unknown threats that may lurk undetected, as well as how pairing telemetry data with security solutions can enhance efficiency and your security posture through automation.

Browse Blog
by Category:
Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.