Jamf Blog

Posts in the Jamf Protect Category

January 23, 2023 by Tim Herr

Shore up security with advanced Mac management techniques

Learn about some of the ways that IT admins can use Jamf MDM to improve an organization’s security posture.

January 12, 2023 by Hannah Hamilton

Top security priorities: upgrading IT and data security

IT and security teams are tasked with the hefty responsibilty of securing their organization's data. Without the miracle of an infinite budget, teams have to select tools that give the most security for their buck. This blog post will explore a few investments teams can make to reinforce their security posture while ultimately saving money and resources.

January 9, 2023 by Jesus Vigo

What is telemetry?

Learn about what telemetry is, how it works and why it’s important when actively monitoring your Mac fleet, including how this granular data aids IT and Security teams to determine workflows to identify, hunt, prevent, contain and remediate threats based on actionable data.

January 5, 2023 by Jesus Vigo

What is AI?

Artificial Intelligence (AI) is a vastly misunderstood topic and how it applies to the modern threat landscape sometimes only adds to the confusion. But in this series, we separate fact from science fiction, providing a clearer understanding of what AI is, what it isn’t, and how it’s helping endpoint security better protect your devices against threats, vulnerabilities and novel attacks.

December 8, 2022 by Jonathan Locast

Total cost of ownership: Mac versus PC in the enterprise

If the upfront cost is more, how can Mac be less expensive than a PC? We examine the numbers relating to the total cost of ownership (TCO) of Mac and PC, which takes into account the entire lifecycle of a device — not just the initial cost — putting the“Mac versus PC in the enterprise” myths to bed.

November 28, 2022 by Jesus Vigo

A holistic approach to security: visibility and compliance

What are your endpoints doing that they shouldn’t be (or not doing what they should be)? The symbiotic relationship between visibility and compliance is a delicate, yet powerful one if managed properly. With the proper tooling, organizations can not only deploy secured configurations and roll out policies to enforce secure baselines, but they can also gain deep visibility into each endpoint to verify that each device is operating in alignment with company policies and complying with regulatory requirements.

November 23, 2022 by Jesus Vigo

A holistic approach to security: content filtering and safe internet

Are your users safe on the internet? Whether working on important job-related tasks or taking part in a collaborative team learning effort – online access to critical resources is at the heart of productivity. Counting on websites or ISPs to “police”their own content or filter out the unwanted bad stuff isn’t the answer. Learn about how Jamf content filtering and network threat prevention solutions contribute to a safe internet for all stakeholders.

November 16, 2022 by Tim Herr

Don’t overlook the potential of Mac in healthcare

As explained in our e-book, the future of Mac in healthcare is looking bright, with great security capabilities, employee choice and powerful performance driving adoption.

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.