Jamf Blog

Posts in the Jamf Protect Category

February 15, 2023 by Haddayr Copley-Woods

Misconceptions about mobile BYOD

Worried about what Bring Your Own Device (BYOD) might mean for your organization . . . or yourself? Read on to see us debunk some common myths about BYOD.

February 13, 2023 by Jesus Vigo

Telemetry series: Full automation and correlation

Part three of the blog series on telemetry goes to the next level, specifying what administrators can do with the granular data collected from endpoints within their infrastructure. Particularly how this data is useful when detecting suspicious and unknown threats that may lurk undetected, as well as how pairing telemetry data with security solutions can enhance efficiency and your security posture through automation.

February 9, 2023 by Haddayr Copley-Woods

Securing modern healthcare

It seems as if every day in the past weeks has seen a headline about a breach in another healthcare organization. How did we get here? What can healthcare organizations do about it?

February 2, 2023 by Karen Goss

Introducing the Jamf Learning Hub

Check out the new Jamf Learning Hub to find the product technical content you need, when you need it to get the most out of Jamf products and succeed with Apple.

February 1, 2023 by Kaylee Carlson

Jamf security: simplified.

Jamf has consolidated its Mac endpoint security and Mac authentication offerings into two comprehensive products: Jamf Connect and Jamf Protect. Here’s the breakdown of how we’ve still got you covered— and on more devices!

January 30, 2023 by Jesus Vigo

What is (ML) Machine Learning in Security?

In this blog series on AI, we delve into a subset of this technology called Machine Learning (ML) and how it’s designed to effectively “learn” from all manner of resources available to grow its understanding and skills. In the case of cybersecurity, ML can be taught to increase the security posture of your endpoints – and your organization’s overall network – by monitoring, identifying, hunting, detecting and remediating against known and unknown threats as part of Deep Learning practices.

January 27, 2023 by Jesus Vigo

Telemetry series: Collection and Storage (SIEM)

Part two of the blog series on telemetry explores the data-gathering and storage aspects of collecting rich telemetry data. Also, exploring what options are available to organizations to meet their needs, as well as some useful tips to consider when preparing to work with granular data and how to leverage it into actionable tasks, such as how it can inform management workflows.

January 23, 2023 by Tim Herr

Shore up security with advanced Mac management techniques

Learn about some of the ways that IT admins can use Jamf MDM to improve an organization’s security posture.

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.