Jamf Blog

Posts in the Security Category

November 3, 2022 by Jesus Vigo

A holistic approach to security: Trusted Access

Jamf is uniquely positioned by offering solutions for device management, identity integration workflows and endpoint security. Because these are all from the same vendor, powered by the same platform, and designed to work together, we can achieve an amazing outcome: Trusted Access.

October 25, 2022 by Isaac

Implementing Center for Internet Security (CIS) controls from the Jamf Marketplace

Is your organization focused on security? Does the task of reviewing various security controls, deciding which apply to you and then implementing them seem like a monumental task? Read on to see how CIS Control Enforcement — available in the Jamf Marketplace from Mann Consulting — can help you implement CIS controls for your organization with little overhead.

October 20, 2022 by Danny Porter

Jamf and Red Canary: Working Together for Expert Level Security

Learn about how the partnership between Jamf and Red Canary can accelerate the security of your organization’s Apple fleet, helping your IT and Security teams to work smarter, not harder to identify, detect and remediate threats to your devices, users and data.

October 14, 2022 by Jesus Vigo

Get to know Aftermath: Jamf’s open-source incident response tool

Your investigation into a security incident is only as good as the forensic data you collect. If that’s off, the entire incident response process will be a waste of time since it may not paint a complete picture of what happened and where. Enter Aftermath, the lightweight tool that knows where to look, helping you gather as much relevant data from the endpoint as quickly as possible to neutralize threats.

October 10, 2022 by Hannah Hamilton

Passkeys: Replace passwords with a safer sign-in method

Passwords, move over. Passkeys streamline the authentication process without the burden of password management, all while providing next-generation account security.

October 5, 2022 by Jesus Vigo

How to keep your CISO happy with automation

In this session, we'll discuss hardening a system, patch management and maintenance. Also, how to meet (or exceed) defined timelines through the use of a variety of automation tools that all work through Jamf Pro.

Learn how Get Well went from a company that took 8+ months to update our fleet to Big Sur, to less than 45 days to upgrade to Monterey. We also discuss how we keep our software updated regularly, the messaging we send to employees and the tools we use and provide to them to help us achieve those goals.

October 5, 2022 by Jamf Threat Labs

Jamf Threat Labs identifies macOS Archive Utility vulnerability

Jamf Threat Labs recently discovered a new macOS vulnerability in Archive Utility that could lead to the execution of an unsigned and unnotarized application without displaying security prompts to the user, by using a specially crafted archive. We reported our findings to Apple on May 31, 2022, and in macOS Monterey 12.5. Apple patched the vulnerability on July 20, 2022, assigning it CVE-2022-32910.

September 29, 2022 by Mignon Wagner

Save time and secure resources with Cloud automations

One of the greatest company needs is data security. An organization needs to ensure that its virtual machines are as secure as its physical machines. But for a long time, managing and securing virtualized Macs has been a very difficult and manual process.

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.