Jamf Blog

Posts in the Zero-Trust Cloud Security Category

November 10, 2022 by Jesus Vigo

A holistic approach to security: Zero Trust Network Access (ZTNA)

Zero Trust Network Access, part of Jamf Connect, provides modern threat landscape protection to your entire fleet of macOS, iOS/iPadOS, Android and Windows endpoints, extending secure remote access and “Zero Trust” technology to organizational resources and data – granting access only to endpoints and users that meet your requirements – all others are denied, by default.

Jamf endpoint security and mobile threat defense solutions offer detection, prevention and remediation capabilities that extend protections across your entire desktop and mobile fleet, protecting devices and empowering users while keeping data secure and maintaining privacy.

November 4, 2022 by Laurie Mona

No trust assumed: strengthen cybersecurity with ZTNA

A mobile workforce requires secure remote access solutions: learn why Zero Trust Network Access is the future of workplace cybersecurity.

December 20, 2021 by Kelsey Giambruno

Wandera is now Jamf | A Partner guide to delivering a new, unified security brand

Wandera is now part of Jamf. Here's how we're delivering a new, unified security brand.

October 19, 2021 by Haddayr Copley-Woods

Enhancing the Apple education experience with Jamf Solutions

In this JNUC session, Jamfs discuss the latest updates to Jamf solutions for education made to empower student success.

July 21, 2021 by Liarna La Porta

Pegasus spyware slipping into mobile devices unnoticed. Time to take mobile security seriously.

The Pegasus surveillance software used to target terrorist and criminal threats has been linked to governments using it to target journalists, activists and dissidents. Using the sophisticated tools to monitor and capture privacy data without the user's explicit consent in an effort that mirrors known spyware activity.

September 28, 2020 by Robin Gray

Software-Defined Perimeter (SDP) vs Virtual Private Network (VPN) and ZTNA

What are the main differences between Software-Defined Perimeters (SDP) and VPN technologies in achieving Zero Trust Network Access (ZTNA)?

February 7, 2020 by Alex Wells

What is Adaptive Access and why does it matter in ZTNA?

Adopting adaptive access is important for ensuring that the right users are connecting to sensitive information with secure devices.

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.