Jamf Blog

Posts in the Zero-Trust Cloud Security Category

November 29, 2022 by Laurie Mona

How to deploy new technology in healthcare organizations

Learn how to successfully deploy Apple technology in your healthcare organization with enterprise secure, consumer simple management and security solutions from Jamf.

November 17, 2022 by Jesus Vigo

A holistic approach to security: Identity and Access Management (IAM)

Identity and Access Management (IAM) extends far beyond the simple notion of authenticating users. While that is certainly a central point, modern work environments require changes to IT infrastructure for users to remain safe while being productive from any device, over any network while physically being anywhere. That’s where the modernized IAM workflows coupled with first- and third-party integrations are critical to extending access through greater flexibility while enhancing security for all stakeholders.

November 10, 2022 by Jesus Vigo

A holistic approach to security: Zero Trust Network Access (ZTNA)

Zero Trust Network Access, part of Jamf Private Access, provides modern threat landscape protection to your entire fleet of macOS, iOS/iPadOS, Android and Windows endpoints, extending secure remote access and “Zero Trust” technology to organizational resources and data – granting access only to endpoints and users that meet your requirements – all others are denied, by default.

Jamf endpoint security and mobile threat defense solutions offer detection, prevention and remediation capabilities that extend protections across your entire desktop and mobile fleet, protecting devices and empowering users while keeping data secure and maintaining privacy.

November 4, 2022 by Laurie Mona

No trust assumed: strengthen cybersecurity with ZTNA

A mobile workforce requires secure remote access solutions: learn why Zero Trust Network Access is the future of workplace cybersecurity.

December 20, 2021 by Kelsey Giambruno

Wandera is now Jamf | A Partner guide to delivering a new, unified security brand

Wandera is now part of Jamf. Here's how we're delivering a new, unified security brand.

October 19, 2021 by Haddayr Copley-Woods

Enhancing the Apple education experience with Jamf Solutions

In this JNUC session, Jamfs discuss the latest updates to Jamf solutions for education made to empower student success.

July 21, 2021 by Liarna La Porta

Pegasus spyware slipping into mobile devices unnoticed. Time to take mobile security seriously.

The Pegasus surveillance software used to target terrorist and criminal threats has been linked to governments using it to target journalists, activists and dissidents. Using the sophisticated tools to monitor and capture privacy data without the user's explicit consent in an effort that mirrors known spyware activity.

September 28, 2020 by Robin Gray

Software-Defined Perimeter (SDP) vs Virtual Private Network (VPN) and ZTNA

What are the main differences between Software-Defined Perimeters (SDP) and VPN technologies in achieving Zero Trust Network Access (ZTNA)?

Browse Blog
by Category:
Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.