Jamf Blog

Posts in the Security Category

June 18, 2025 by Jesus Vigo

ZTNA vs VPN. MacOS Security Basics: The One About Being the Best

Get a ringside seat to VPN vs. ZTNA. Determine which is the champion to best secure modern endpoints and network traffic.

June 13, 2025 by Matt Taylor

From custom to built-in: how telemetry simplifies macOS auditing

Learn how to get deep insight into your fleet out of the box with Jamf's Mac Endpoint Telemetry feature.

June 9, 2025 by Jesus Vigo

Overcoming Mac security threats in the enterprise

Learn why proactive threat defense, cross-platform parity and compliance alignment are essential to securing Mac in today’s enterprise.

May 28, 2025 by Iulia Arghir

Jamf’s network relay service for mobile

Jamf's network relay service is available as a Release Candidate (RC) on Apple mobile platforms. Read on to learn more.

May 28, 2025 by Jesus Vigo

What is Mobile Security? Understanding Mobile Device Security

Mobile devices are essential to modern work but pose serious risks if unmanaged – security must be integrated, proactive and equal to that of traditional endpoints.

May 20, 2025 by Jesus Vigo

Jamf After Dark: Security in Edu

A fireside chat discussing rising cyber threats targeting Edu data and operations. Also, the challenges of balancing limited budgets against compliance needs and secure identity-driven systems.

May 15, 2025 by Matt Taylor

Log and audit external storage devices with Mac telemetry from Jamf

Capture detailed hardware metadata for greater management of removable storage devices to enhance compliance and aid in security investigations across your Mac fleet.

May 14, 2025 by Haddayr Copley-Woods

The macOS Security Compliance Project: Jamf’s foundation for IT compliance standards

Discover how Jamf uses the macOS Security Compliance Project (mSCP) to align its IT compliance benchmarks with Apple.

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.