Jamf Blog

Posts in the Small Business Category

April 17, 2024 by Jesus Vigo

Choosing the right IT security partner: How Jamf fulfills your IT security need

Learn how choosing the right partner for your security needs can veritably make or break your cybersecurity plan. Also, gain a better understanding of how Jamf solutions integrate to address the challenges of the modern threat landscape through Trusted Access for top-to-bottom and end-to-end protection of your enterprise.

April 8, 2024 by Aaron Webb

Jamf Connect feature: Limit Application Access for Unmanaged Devices

Strengthening mobile security is critical. Especially for unmanaged devices that lack the management, identity and security controls of managed endpoints. In this blog, learn how Jamf Connect’s newest feature adds a layer of security to protect against unauthorized access and data breaches.

April 2, 2024 by Sean Smith

What’s new in Jamf Pro 11.4

Jamf releases Jamf Pro 11.4!

In this blog, you will learn about how the new features and functionalities included in the Jamf Pro 11.4 release.

March 29, 2024 by Jesus Vigo

A guide to understanding Advanced Endpoint Protection

Learn about Advanced Endpoint Protection, what it is and how its integrated features contribute to a defense-in-depth security strategy that strengthens device and organizational security postures.

March 22, 2024 by Jesus Vigo

Zero Trust vs Least Privilege

Zero Trust and the principle of least privilege are components of an enterprises’s security plan that can sometimes be confounded. In this blog, we define both and explain how they work in detail.

March 12, 2024 by Aaron Webb

Safeguarding against the rise of mobile malware: Actions to take following recent incidents

Learn how the evolving threat landscape finds threat actors increasingly targeting mobile devices to exploit sensitive resources and what steps organizations can take to minimize risks while strengthening their overall security posture.

March 6, 2024 by Jesus Vigo

Crisis Control: Close security gaps with incident response and recovery

Risk vectors can be mitigated and attack surfaces hardened against threats. But security gaps happen. With a robust incident response and recovery plan, gaps can be minimized so that known threats are prevented and unknown threats can be detected proactively before they can become something worse.

February 23, 2024 by Jesus Vigo

14 things you need to know about IT security compliance

Learn about IT and security compliance, answering critical questions about their differences, similarities and more importantly, how best practices help your organization develop their IT security compliance plan.

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.