Jamf Blog

Posts in the Security Category

January 19, 2023 by Hannah Hamilton

Top security priorities: end-user security awareness

In the next part of our top security priorities blog series, we discuss how to improve end-user security awareness from onboarding to offboarding.

January 12, 2023 by Hannah Hamilton

Top security priorities: upgrading IT and data security

IT and security teams are tasked with the hefty responsibilty of securing their organization's data. Without the miracle of an infinite budget, teams have to select tools that give the most security for their buck. This blog post will explore a few investments teams can make to reinforce their security posture while ultimately saving money and resources.

January 9, 2023 by Jesus Vigo

What is telemetry?

Learn about what telemetry is, how it works and why it’s important when actively monitoring your Mac fleet, including how this granular data aids IT and Security teams to determine workflows to identify, hunt, prevent, contain and remediate threats based on actionable data.

January 5, 2023 by Jesus Vigo

What is AI?

Artificial Intelligence (AI) is a vastly misunderstood topic and how it applies to the modern threat landscape sometimes only adds to the confusion. But in this series, we separate fact from science fiction, providing a clearer understanding of what AI is, what it isn’t, and how it’s helping endpoint security better protect your devices against threats, vulnerabilities and novel attacks.

January 3, 2023 by Dean Hager

In 2023, let’s focus on balance.

Jamf CEO Dean Hager takes a look at lessons we learned in 2022— and predicts how we can apply those lessons in 2023 for a successful year, even during difficult times.

December 29, 2022 by Haddayr Copley-Woods

How to find the right content filtering solution

Content filtering is a must for K-12 schools. In many places, it's the law. But how do you find the right one for your students from the dizzying array of content filters available?

December 28, 2022 by Haddayr Copley-Woods

Holistic approach to security blog series: integrated digital security

This blog series covers how every aspect of device management: from inventory management to zero-touch deployment, can shore up (or tear down) your organization's security posture.

December 8, 2022 by Jonathan Locast

Total cost of ownership: Mac versus PC in the enterprise

If the upfront cost is more, how can Mac be less expensive than a PC? We examine the numbers relating to the total cost of ownership (TCO) of Mac and PC, which takes into account the entire lifecycle of a device — not just the initial cost — putting the“Mac versus PC in the enterprise” myths to bed.

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.