Jamf Blog

Posts in the Security Category

October 9, 2023 by Jesus Vigo

A holistic approach to security: endpoint protection

Comprehensive endpoint protection provides modern threat landscape protection to your entire fleet of Apple computers and mobile devices, including Windows and Android endpoints. By protecting against new and evolving threats through effective and efficient defense-in-depth strategies, Jamf endpoint security solutions are not only best-of-breed, but their powerful and flexible workflows help organizations like yours to succeed with Apple and mobile devices at work, without compromising data security, user privacy or end-user productivity.

October 6, 2023 by Jesus Vigo

Manage and secure your most vulnerable endpoints: Mobile devices

Managing and securing your most vulnerable endpoints, mobile devices requires more than just MDM or mobile threat defense solutions. Admins need to be able to converge these technologies as part of their existing security strategy to ensure a strong, organizational security posture.

In this blog, learn more about how the integration of macOS and mobile devices is the future but also key to holistic, endpoint protection strategies. Also:

  • Insight into current mobile security challenges and solutions
  • The importance of mobile-specific security measures
  • An overview of holistic endpoint protection
  • And best practices for mobile security policy implementation
October 6, 2023 by Hannah Hamilton

OS upgrades 2023: OS upgrades and security

Apple’s latest operating systems offer new and improved security and privacy features for your device fleet. Read more to learn about these features and how they affect the end user.

October 2, 2023 by Jesus Vigo

What is Mobile Threat Defense (MTD)?

Mobile Threat Defense solutions are all concerned with one thing only: ensuring the security of your mobile devices against malware, network-based attacks and the overall reduction of risk that modern-day security threats pose to the mobile user base.

September 28, 2023 by Hannah Hamilton

Jamf After Dark: Unpacking Black Hat and the security findings report

In this episode of Jamf After Dark, Matt Woodruff, Senior Sales Engineer at Jamf, joins co-hosts Sean Rabbitt and Kat Garbis to discuss his time at Black Hat and the 2023 Security 360: Annual Trends Report.

September 26, 2023 by Haddayr Copley-Woods

Zero-Trust Network Access (ZTNA) with Jamf and Google

In 2020, Jamf joined the BeyondCorp Alliance to further zero-trust initiatives for organizations that use Google products. This JNUC session “Jamf and Google: Leveraging BeyondCorp for Zero Trust Across the Entire Apple Ecosystem” walked attendees through how the Akatsuki IT team extended Zero Trust Network Access (ZTNA) capabilities across their Apple ecosystem.

September 21, 2023 by Haddayr Copley-Woods

The Art of Cryptojacking

The Jamf Threat Labs team recently drew attention in the tech media for uncovering a sly piece of malware that was proliferating unnoticed in the wild. As Jamf Threat Labs pursued its trail, they discovered intriguing insights and went down some fascinating rabbit holes. This fascinating JNUC 2023 presentation walked attendees through a recent Mac malware campaign investigation from start to finish.

September 15, 2023 by Jesus Vigo

What is Mobile Security?

Securing your mobile fleet, while sharing many similarities with desktop computers, may vary vastly depending on variables specific only to mobile technology. In this blog we breakdown some of those factors unique to mobile devices, which include:

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.