Jamf Blog

Posts in the Zero-Trust Cloud Security Category

October 19, 2021 by Haddayr Copley-Woods

Enhancing the Apple education experience with Jamf Solutions

In this JNUC session, Jamfs discuss the latest updates to Jamf solutions for education made to empower student success.

July 21, 2021 by Liarna La Porta

Pegasus spyware slipping into mobile devices unnoticed. Time to take mobile security seriously.

The Pegasus surveillance software used to target terrorist and criminal threats has been linked to governments using it to target journalists, activists and dissidents. Using the sophisticated tools to monitor and capture privacy data without the user's explicit consent in an effort that mirrors known spyware activity.

September 28, 2020 by Robin Gray

Software-Defined Perimeter (SDP) vs Virtual Private Network (VPN) and ZTNA

What are the main differences between Software-Defined Perimeters (SDP) and VPN technologies in achieving Zero Trust Network Access (ZTNA)?

February 7, 2020 by Alex Wells

What is Adaptive Access and why does it matter in ZTNA?

Adopting adaptive access is important for ensuring that the right users are connecting to sensitive information with secure devices.

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.