Jamf Blog

Posts in the Security Category

April 3, 2024 by Hannah Hamilton

What is endpoint security?

Keeping your endpoints secure is necessary for data protection. Learn what endpoint security is, what it defends against and tools to use for endpoint protection.

March 29, 2024 by Jesus Vigo

A guide to understanding Advanced Endpoint Protection

Learn about Advanced Endpoint Protection, what it is and how its integrated features contribute to a defense-in-depth security strategy that strengthens device and organizational security postures.

March 26, 2024 by Jesus Vigo

End-user computing considerations and challenges

In this blog, learn about end-user computing (EUC), as we define what EUC is, discuss what to consider and explain some challenges to implementing it in your enterprise.

March 22, 2024 by Jesus Vigo

Zero Trust vs Least Privilege

Zero Trust and the principle of least privilege are components of an enterprises’s security plan that can sometimes be confounded. In this blog, we define both and explain how they work in detail.

March 20, 2024 by Hannah Hamilton

Navigating the complex world of IT security: how unified security simplifies protection

Securing your organization is a difficult task. Choosing the right software solutions can help. Learn how a unified security platform makes security easier.

March 18, 2024 by Sean Rabbitt

Introducing privilege elevation in Jamf Connect

Learn about how privilege elevation, a new feature of Jamf Connect, helps organizations balance the end user’s needs with administrative oversight without compromising device or credential security while permitting IT and Security teams to “work smarter, not harder”.

March 18, 2024 by Mat Pullen

Data residency and security reporting in Jamf Safe Internet

Data residency and security reporting have come to Jamf Safe Internet! Read this blog to learn what this means for educational customers and how to configure privacy settings that help admins use student data effectively.

March 15, 2024 by Hannah Hamilton

Zero trust network architecture best practices

Zero trust helps organizations secure their company resources, even from outside the network perimeter. Learn what zero trust is, why your organization needs it and about Zero Trust Network Access.

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.