Jamf Blog
Jamf + ZecOps logo
November 17, 2022 by Michael Devins

ZecOps acquisition expands Jamf’s mobile security capabilities

What does Jamf's purchase of ZecOps mean for Jamf solutions? And how can IT administrators take advantage of these advanced mobile security features?

Jamf completed its acquisition of ZecOps, and many are wondering what this means for our solutions— and how to take advantage of these exciting new mobile detection and response features.

This acquisition helps IT and security teams strengthen their organization’s mobile security posture and accelerate mobile security investigations from weeks to minutes. It also uses known indicators of compromise (IOC) to detect intrusion attempts or other malicious activities at scale and helps identify sophisticated 0- or 1-click attacks on a much deeper level.

And this added security arsenal for any organization couldn’t have come at a better time. Mobile devices now account for 59% of global website traffic, and according to the 2022 Verizon Mobile Security Index, close to half (45%) of surveyed companies have suffered a compromise involving a mobile device in the past 12 months.

Jamf already offers robust management and mobile security capabilities for iOS devices. However, access to deeper insights into potential security exploits is technically challenging and requires physical access to the device— difficult in a remote work environment. The ZecOps acquisition will provide a deeper layer of insight and assurance for security-conscious customers who must protect company data as well as mobile users with access to sensitive information.

ZecOps will offer customers unprecedented detection capabilities to identify mobile exploits similar to the rich telemetry offered by Jamf Protect for Mac.

Test these iOS security features for yourself.

Michael Devins
Michael Devins, Director, Product Marketing, Security.
Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.