Jamf Blog

Posts in the Security Category

February 13, 2025 by Sean Smith

Using Mac Endpoint Telemetry for Compliance with Regulatory Frameworks

Learn how Jamf's Mac Endpoint Telemetry helps organizations along their compliance path across multiple industries and geographies.

February 5, 2025 by Jesus Vigo

Cyber Essentials Series: Deep dive into Cyber Essentials Plus (CE+)

Continuing our Cyber Essentials blog series, we take a deeper dive into Cyber Essentials Plus (CE+). In this second part, we focus on the assessment process and how Jamf supports organizations to meet the stricter requirements.

January 16, 2025 by Jesus Vigo

Cyber Essentials Series: What it is and why it’s important

NCSC has recently re-branded and re-launched its Device Guidance and Mobile Device Guidance. These settings are far more cost- and time-effective for organisations of all sizes to implement via Mobile Device Management (MDM).

January 8, 2025 by Jesus Vigo

Best Practices: Enterprise Threat Defense

In this blog, discover the best practices for defending your enterprise from modern threats and how the strategies combine to form a defense-in-depth strategy to strengthen device and organizational security postures.

January 3, 2025 by Jesus Vigo

What platforms does Jamf support?

Threats don't sleep. They also don't discriminate against device types or target just one platform. So, why should your enterprise security strategy be any different?

Pro Tip: it shouldn't.

December 19, 2024 by Sam Weiss

Gartner IAM Summit recap

Jamf demonstrates security interoperability at the Gartner IAM conference with other industry leaders.

December 11, 2024 by Jesus Vigo

Moving Target: The Evolving Risks of Enterprise Mobility Recap

Join Jamf and SASIG as we present “Moving Target: The Evolving Risks of Enterprise Mobility.” The webinar highlights the security risks prevalent in organizations that utilize mobile devices. Also, we discuss the challenges to safeguarding devices, users, and business apps, as well as provide key strategies to integrate mobile into your security stack.

November 21, 2024 by Jesus Vigo

What is Vulnerability Prioritization?

Learn about prioritizing vulnerabilities, why it’s critical and what are the key factors that influence vulnerability prioritization in the enterprise.

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.