Jamf Blog

Posts in the Jamf Protect Category

December 8, 2022 by Jonathan Locast

If the upfront cost is more, how can Mac be less expensive than a PC? We examine the numbers relating to the total cost of ownership (TCO) of Mac and PC, which takes into account the entire lifecycle of a device — not just the initial cost — putting the“Mac versus PC in the enterprise” myths to bed.

November 28, 2022 by Jesus Vigo

What are your endpoints doing that they shouldn’t be (or not doing what they should be)? The symbiotic relationship between visibility and compliance is a delicate, yet powerful one if managed properly. With the proper tooling, organizations can not only deploy secured configurations and roll out policies to enforce secure baselines, but they can also gain deep visibility into each endpoint to verify that each device is operating in alignment with company policies and complying with regulatory requirements.

November 23, 2022 by Jesus Vigo

Are your users safe on the internet? Whether working on important job-related tasks or taking part in a collaborative team learning effort – online access to critical resources is at the heart of productivity. Counting on websites or ISPs to “police”their own content or filter out the unwanted bad stuff isn’t the answer. Learn about how Jamf content filtering and network threat prevention solutions contribute to a safe internet for all stakeholders.

October 14, 2022 by Jesus Vigo

Your investigation into a security incident is only as good as the forensic data you collect. If that’s off, the entire incident response process will be a waste of time since it may not paint a complete picture of what happened and where. Enter Aftermath, the lightweight tool that knows where to look, helping you gather as much relevant data from the endpoint as quickly as possible to neutralize threats.

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.