Jamf Blog

Posts in the Jamf Protect Category

May 14, 2020 by Matt Woodruff

Leveraging security benchmarks to defend your organization’s systems and data

When organizations can confidently enforce standardized security requirements and protocols across all endpoints — no matter where they’re located — the risk of a breach or vulnerability drastically diminishes. That’s exactly why security benchmarks and audits exist.

May 5, 2020 by Sam Weiss

Let your data work for you with Jamf and Splunk

See how you can build better and more informational reporting dashboards with Jamf and Splunk.

April 13, 2020 by Jaron Bradley

Detecting Insecure Application Updates on macOS

Applications, such as software updaters, are still using the AuthorizationExecuteWithPrivileges API against Apple’s recommendation and do so. Recent research has shown that this can be leveraged by attackers to compromise endpoints in real-world scenarios. Jamf has been busy investigating how security teams can monitor for malicious use of this API. Let us show you how.

April 9, 2020 by Matthias Wollnik

Recap of Objective by the Sea v3.0

Last month, the third annual "Objective by the Sea" (OBTS) conference was held in Maui and Jamf had multiple speakers. Read our recap of this great conference.

April 2, 2020 by Josh Stein

Mitigating the risks of AuthorizationExecuteWithPrivileges and software installers

Software installers are a critical part of every organization’s software deployment. See how you can leverage them securely and responsibly.

March 23, 2020 by Dean Hager

At Jamf, we are here to help

We are committed to doing everything we can to ensure that your business, school or healthcare organization can continue to operate as smoothly as possible.

March 23, 2020 by Daniel Weber

How to empower a remote workforce: Part 3 — Ongoing support

Today, more organizations than ever before are examining their remote employee and work-from-home policies — be it for health, employee retention or employee productivity reasons. In the conclusion of our three-part blog series, we show you how to fully support permanent and temporarily remote employees.

March 20, 2020 by Daniel Weber

How to empower a remote workforce: Part 2 — Resource access

In today’s climate, more organizations than ever before are examining their remote employee and work-from-home policies — be it for health, employee retention or employee productivity reasons. In part two of our three-part blog series, we show you how to securely connect users to resources through zero-trust access.

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.