Jamf Blog

Posts in the Jamf Threat Defense Category

August 1, 2022 by Michael Covington

Key insights from Verizon Mobile Security Index 2022

Mobile security expert Michael Covington outlines important takeaways from Verizon's new report on workplace transformation and the modern threat environment.

June 17, 2022 by Jesus Vigo

What is Mobile Security?

Securing your mobile fleet, while sharing many similarities with desktop computers, may vary vastly depending on variables specific only to mobile technology. In this blog we breakdown some of those factors unique to mobile devices, which include:

May 5, 2022 by Jesus Vigo

What is Mobile Threat Defense (MTD)?

Mobile Threat Defense solutions are all concerned with one thing only: ensuring the security of your mobile devices against malware, network-based attacks and the overall reduction of risk that modern-day security threats pose to the mobile user base.

In this blog post, we discuss Mobile Threat Defense and answer the following questions along the way:

  • What is it?
  • How does it work?
  • What are the benefits?
May 4, 2022 by Jesus Vigo

10 things to know about Mi:RIAM: threat machine learning engine.

Machine Learning is not just a buzzword, but a truly helpful technology that works to supercharge your organization’s security solutions by using algorithms and statistical models to analyze data, like the volume and complexity of a cyberattack in real-time – even stopping data breaches before they can occur.

March 1, 2022 by Jesus Vigo

Gartner identifies Jamf Threat Defense as critical to preventing malicious threats on mobile devices

In Gartner’s Market Guide for Mobile Threat Defense, the consulting firm identifies the need for organizations to improve their overall security hygiene by incorporating a mobile-focused threat defense solution to strengthen their mobile security posture through minimized risk and malicious threat prevention.

February 17, 2022 by Jesus Vigo

New product series: Getting to know Jamf Threat Defense

Detect and remediate a broad range of security threats including vulnerabilities, malware and questionable applications while continually assessing mobile endpoint and network risks. By combining security policies and sophisticated network protection with the detection of risky configurations, you can enforce comprehensive protection of your devices, users and apps, keeping them all safe in real-time.

December 20, 2021 by Kelsey Giambruno

Wandera is now Jamf | A Partner guide to delivering a new, unified security brand

Wandera is now part of Jamf. Here's how we're delivering a new, unified security brand.

April 16, 2021 by Becci Velzian

Phishing Scam uses WhatsApp and Telegram to target Australian diplomats.

An identity phishing scam used popular apps to target Australian senior diplomats.

Browse Blog
by Category:
Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.