Jamf After Dark: Network Relay
Explore how Jamf network relay enables secure, seamless remote access optimized for modern Apple devices – without the limitations of legacy VPNs.

In this episode of Jamf After Dark, veteran host Kat Garbis welcomes her new co-host, Josh Thornton, Competitive Intelligence, Jamf. Together, they dive into the world of secure Apple device connectivity with guests Iulia Arghir, Senior Product Manager at Jamf, and Alexander Dove, Senior Sales Engineer at Jamf.
Our intrepid team explores Jamf network relay, the cutting-edge, remote access feature currently being developed that enhances the security of remote access without the pitfalls of traditional VPNs.
Whether you're an IT admin, security pro or Apple-enthusiast, this episode delivers a closer look at how Jamf is redefining Zero Trust Network Access (ZTNA) for modern enterprises that support Apple.
What is network relay?
Described by Arghir as a “modern VPN”, network relay is:
- Developed by Apple using MASQUE
- A protocol over HTTP/3 and QUIC
- The same technology behind iCloud Private Relay
It provides app-specific, policy-driven tunneling as opposed to tunneling all network traffic (like legacy VPN does). Combined with Managed Device Attestation, Jamf’s implementation ensures:
- Strong, hardware-backed identity verification
- Integration into our ZTNA solution
Creating a seamless, secure experience across Mac, iPhone, iPad and Vision Pro.
For detailed hardware and software requirements, check out the complete podcast.
What problem(s) does it solve?
Network relay was created to solve challenges surrounding secure remote access while adhering to Zero Trust implementations. This is especially crucial in modern environments where legacy VPNs fall short by design limitations.
What are the top three benefits it provides?
In addition to the benefits listed in the previous section, it also:
- Offers a non-intrusive, highly compatible tunnel that operates seamlessly in the background
- Reduces friction for end users and administrators alike by:
- Enabling always-on secure remote connectivity before user login
- Eliminating the need for user-driven, identity-based authentication
- Providing interoperability with third-party tools and services
- Securing connectivity across all network types and connections
- Supporting client-less remote access in highly restricted scenarios
- Mitigates insecure behaviors, like users bypassing security protections
Step into the light with Jamf After Dark!