Jamf Blog

Posts in the Zero-Trust Cloud Security Category

November 4, 2022 by Laurie Mona

No trust assumed: strengthen cybersecurity with ZTNA

A mobile workforce requires secure remote access solutions: learn why Zero Trust Network Access is the future of workplace cybersecurity.

December 20, 2021 by Kelsey Giambruno

Wandera is now Jamf | A Partner guide to delivering a new, unified security brand

Wandera is now part of Jamf. Here's how we're delivering a new, unified security brand.

October 19, 2021 by Haddayr Copley-Woods

Enhancing the Apple education experience with Jamf Solutions

In this JNUC session, Jamfs discuss the latest updates to Jamf solutions for education made to empower student success.

July 21, 2021 by Liarna La Porta

Pegasus spyware slipping into mobile devices unnoticed. Time to take mobile security seriously.

The Pegasus surveillance software used to target terrorist and criminal threats has been linked to governments using it to target journalists, activists and dissidents. Using the sophisticated tools to monitor and capture privacy data without the user's explicit consent in an effort that mirrors known spyware activity.

September 28, 2020 by Robin Gray

Software-Defined Perimeter (SDP) vs Virtual Private Network (VPN) and ZTNA

What are the main differences between Software-Defined Perimeters (SDP) and VPN technologies in achieving Zero Trust Network Access (ZTNA)?

February 7, 2020 by Alex Wells

What is Adaptive Access and why does it matter in ZTNA?

Adopting adaptive access is important for ensuring that the right users are connecting to sensitive information with secure devices.

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.