Jamf Trusted Access: Key Takeaways from JNUC 2022

Learn how to use Jamf’s Management and IT Security products in unison to easily limit company data access to trusted users and devices only, all without compromising user experience.

September 27 2022 by

Jesus Vigo

Adopt trusted access to protect data and enable hybrid work

During this presentation by Matt Vlasach, VP Product, Security, Jamf, attendees gained first-hand insight into Jamf’s complete solution that is built upon a foundation of device management principles and capabilities, while integrating them with modern identity and access technologies.

Why is Jamf doing this, you ask? Well, as Vlasach explains during his presentation, the answer is two-fold:

  1. Protect organizational data where it exists
  2. Enable productivity from anywhere

Each part forms a crucial solution that is designed to address the two most pressing security and IT challenges directly from feedback from Jamf’s customers.

Among the drivers of these concerns is no doubt the rise in remote and hybrid work environments. This shift sees a direct juxtaposition between data — which is potentially stored everywhere, like multiple managed and personal devices; and access — which is fragmented due to when and where these devices are used and which applications are using them.

This represents critical security and IT issues as each variable introduces its own possible set of security concerns, stemming from how data is collected, used and whether or not it is securely handled and stored across multiple platforms, such as mobile devices and cloud-based resources, as well as how vulnerable each instance may or may not be.

So, which solution can Security and IT administrators rely on to satisfy data security requirements while enabling users to be as productive as possible on any device, from anywhere and over any connection?

What is Jamf Trusted Access?

Enter Jamf Trusted Access. The grouping of Jamf solutions works in concert to ensure that “company data must be accessible to only trusted and secured devices in a way that is effortless for end users and IT while thwarting attackers.”, according to Vlasach.

In short: today’s users must be productive and secure — no matter where they are and no matter what device, app, service or resource they are using to get the job done.

What problems does it solve?

One of the key problems Jamf Trusted Access solves is ensuring that only trusted users and devices are able to access all of the company data and resources necessary — without negatively impacting user productivity.

A challenging feat, for sure. But as Vlasach goes on to say, it is also one that must balance high performance, secure and seamless access to data amidst the modern computing landscape. It is one that sees this “an essential and expected IT service across all common device platforms.

The three pillars of Trusted Access

During this presentation, Vlasach does a phenomenal job of deep-diving into Jamf Trusted Access, particularly, how it works to protect your organization’s Apple fleet and users and of course, keep data and privacy secured.

But the ingredients that make up the “special sauce” is based on the three pillars of Trusted Access. They are:

  • Sanctioned devices only
  • Safe devices only
  • Loved by users

Sanctioned

Restricts data access to managed or user enrolled endpoints only. No exceptions.

Safe

Provides active threat prevention and risk-based access control of company data, apps and resources.

Loved

Ensures digital trust via seamless and integrated access to data anywhere, on any platform, over any connection and at any time.

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.