Jamf Blog https://www.jamf.com/blog/ The latest blog posts from Jamf en 2024-11-21T14:00:00+00:00 What is Vulnerability Prioritization? https://www.jamf.com/blog/vulnerability-prioritization-guide-for-it-experts/ https://www.jamf.com/blog/vulnerability-prioritization-guide-for-it-experts/ Learn about prioritizing vulnerabilities, why it’s critical and what are the key factors that influence vulnerability prioritization in the enterprise.

]]>
2024-11-21T14:00:00+00:00
Introducing App Installers for Jamf Now https://www.jamf.com/blog/jamf-now-app-installers-macos-software-management/ https://www.jamf.com/blog/jamf-now-app-installers-macos-software-management/ App Installers has arrived at Jamf Now. Distribute third-party macOS software titles and let Jamf do the packaging for you.

]]>
2024-11-20T14:00:00+00:00
What is advanced threat protection (ATP)? https://www.jamf.com/blog/what-is-advanced-threat-protection/ https://www.jamf.com/blog/what-is-advanced-threat-protection/

Advanced persistent threats are targeted and complex cyber attacks that can hide in your system for long periods of times. Defending against them can be tricky — read this blog to find out where to start with ATP cybersecurity.

]]>
2024-11-19T15:08:00+00:00
Apple Mobile Device Management FAQ: your top questions answered https://www.jamf.com/blog/apple-mobile-device-management-faq/ https://www.jamf.com/blog/apple-mobile-device-management-faq/

The world of Apple Mobile Device Management (MDM) can sometimes raise questions. Here are some of the most frequently asked questions, some answers, and some suggestions for further reading.

]]>
2024-11-15T20:00:00+00:00
Anatomy of an Attack: Atomic Stealer malware https://www.jamf.com/blog/anatomy-of-an-attack-learn-more/ https://www.jamf.com/blog/anatomy-of-an-attack-learn-more/ Learn about the cyber kill chain and how to use it to learn more about the threats and threat actors targeting your enterprise. Also, Jamf Threat Labs takes you on a deep dive into the anatomy of an attack, dissecting each phase of an attack by the Atomic Stealer malware.

]]>
2024-11-14T14:00:00+00:00
Meet Self Service+ https://www.jamf.com/blog/meet-self-service-plus/ https://www.jamf.com/blog/meet-self-service-plus/ Learn about Self Service+ and join the beta!

]]>
2024-11-12T18:00:00+00:00
What is endpoint hardening? https://www.jamf.com/blog/endpoint-hardening-best-practices/ https://www.jamf.com/blog/endpoint-hardening-best-practices/ Learn about endpoint hardening: what it is, its benefits and best practices.

]]>
2024-11-12T15:00:00+00:00
APT Actors Embed Malware within macOS Flutter Applications https://www.jamf.com/blog/jamf-threat-labs-apt-actors-embed-malware-within-macos-flutter-applications/ https://www.jamf.com/blog/jamf-threat-labs-apt-actors-embed-malware-within-macos-flutter-applications/ Jamf Threat Labs discovered malware samples believed to be tied to the Democratic People's Republic of Korea (DPRK), aka North Korea, that are built using Flutter, which by design provides obfuscation to the malicious code. JTL performs a deep dive into how the malicious code works to help protect users on macOS devices.

]]>
2024-11-12T13:00:00+00:00
Modern authentication: an overview https://www.jamf.com/blog/modern-authentication-explained/ https://www.jamf.com/blog/modern-authentication-explained/ Learn about modern authentication and what technologies define it. Discover how it helps organizations defend against sophisticated threats while allowing users to stay productive.

]]>
2024-11-10T14:00:00+00:00
Endpoint security best practices https://www.jamf.com/blog/endpoint-security-best-practices/ https://www.jamf.com/blog/endpoint-security-best-practices/ Start your endpoint security journey with some best practices.

]]>
2024-11-08T15:00:00+00:00
3 benefits of adopting declarative device management today https://www.jamf.com/blog/adopt-declarative-device-management-today/ https://www.jamf.com/blog/adopt-declarative-device-management-today/ Declarative Device Management (DDM) is the future of modern device management. But what can you do with it today?

]]>
2024-11-07T21:30:00+00:00
Vulnerability Remediation: Why your security relies on it https://www.jamf.com/blog/vulnerability-remediation-why-your-security-relies-on-it/ https://www.jamf.com/blog/vulnerability-remediation-why-your-security-relies-on-it/ Learn about vulnerability remediation, including what it is and why it’s a critical component of your organizational security posture and overarching cybersecurity strategy to keep endpoints, users and data secure from threats and attacks.

]]>
2024-11-06T14:00:00+00:00
Jamf leads in IDC vendor assessment https://www.jamf.com/blog/idc-marketspace-jamf-leads-in-vendor-assessment/ https://www.jamf.com/blog/idc-marketspace-jamf-leads-in-vendor-assessment/ Jamf emerges as a leader in Apple device management — read on for more information.

]]>
2024-11-05T20:16:00+00:00
OS upgrades 2024: macOS/iPadOS/iOS: Education https://www.jamf.com/blog/ipados-ios-macos-sequoia-features-education/ https://www.jamf.com/blog/ipados-ios-macos-sequoia-features-education/ Each new Apple software update brings new learning and teaching opportunities for both iPad and Mac users. macOS 15 and iOS/iPadOS 18 include a host of new features, but in this blog, we take a look at some of the more prominent ones supporting the classroom and beyond.

]]>
2024-11-01T13:00:00+00:00
Total cost of ownership: iPad vs. Chromebook https://www.jamf.com/blog/total-cost-of-ownership-ipad-vs-chromebook/ https://www.jamf.com/blog/total-cost-of-ownership-ipad-vs-chromebook/

However you add it up, iPad costs far less over time than Chromebook.

]]>
2024-11-01T13:00:00+00:00
OS upgrades, security and Apple Intelligence https://www.jamf.com/blog/os-upgrades-apple-intelligence-security/ https://www.jamf.com/blog/os-upgrades-apple-intelligence-security/ It’s an old saying: the most secure software is up-to-date software. But it is also true. By using the latest version of software, you will improve the security posture of your users, devices and entire IT infrastructure. This blog highlights how upgrading your Apple operating systems across your devices creates a more secure organization.

]]>
2024-10-31T19:54:00+00:00
Jamf After Dark: get to know Jamf Threat Labs https://www.jamf.com/blog/jamf-after-dark-get-to-know-jamf-threat-labs/ https://www.jamf.com/blog/jamf-after-dark-get-to-know-jamf-threat-labs/ Get an inside look at Jamf Threat Labs in this episode of Jamf After Dark.

]]>
2024-10-31T14:15:00+00:00
Why Apple Intelligence and Private Cloud Compute are so different and secure https://www.jamf.com/blog/apple-intelligence-private-cloud-compute-explained/ https://www.jamf.com/blog/apple-intelligence-private-cloud-compute-explained/ Learn about the security and privacy controls in Apple Intelligence and how Apple’s revolutionary approach to designing the Private Cloud Compute infrastructure sets it apart from AI models hosted in cloud-based environments. Furthermore, understand how Apple succeeds where others are subject to common data security vulnerabilities and user privacy risks.

]]>
2024-10-30T16:45:00+00:00
What’s new in Jamf Teacher: AI restrictions and more https://www.jamf.com/blog/jamf-teacher-app-enhancements/ https://www.jamf.com/blog/jamf-teacher-app-enhancements/

Among a slew of other Jamf Teacher app enhancements this year, teachers can now control access to Apple Intelligence features in the classroom.

]]>
2024-10-28T14:00:00+00:00
Ohio Senate Bill 29 and Jamf Safe Internet https://www.jamf.com/blog/ohio-senate-bill-29-jamf-student-data-privacy/ https://www.jamf.com/blog/ohio-senate-bill-29-jamf-student-data-privacy/ Learn about the recent Ohio Senate Bill 29 and how Jamf Safe Internet helps schools meet the bill's requirements.

]]>
2024-10-25T14:00:00+00:00
Jamf wins mobile security solution of the year! https://www.jamf.com/blog/jamf-wins-mobile-security-solution-of-the-year/ https://www.jamf.com/blog/jamf-wins-mobile-security-solution-of-the-year/ Jamf security solutions are recognized at this year’s Computing Security Awards.

]]>
2024-10-24T13:46:00+00:00
Apple, Jamf and Lana Health enable the smart hospital of the future. https://www.jamf.com/blog/smart-hospital-automation-with-jamf-lana-health/ https://www.jamf.com/blog/smart-hospital-automation-with-jamf-lana-health/ Jamf for healthcare: Discover how Lana Health and Jamf Pro combine Apple device management and a platform that creates a seamless healthcare experience for patients and clinicians.

]]>
2024-10-22T17:45:00+00:00
Back to security basics: phishing https://www.jamf.com/blog/signs-youve-been-fished/ https://www.jamf.com/blog/signs-youve-been-fished/

Phishing is responsible for the majority of cyber attacks, affecting users and organizations financially and personally. In this blog, we go back to the basics of what phishing is, what an attack looks like and what steps can be taken to prevent falling victim to phishing attacks.

]]>
2024-10-22T13:00:00+00:00
Deploying Apple devices in hard hat/manufacturing industries https://www.jamf.com/blog/deploying-apple-devices-in-hard-hat-manufacturing-industries/ https://www.jamf.com/blog/deploying-apple-devices-in-hard-hat-manufacturing-industries/ Manufacturing and hard hat industries benefit greatly from powerful yet easy-to-use Apple devices that transform processes and drive innovation. Learn about how Apple and Jamf help these industries transition business workflows to the digital age.

]]>
2024-10-21T13:00:00+00:00
Optimizing Apple device deployments in aviation https://www.jamf.com/blog/optimizing-apple-device-deployments-in-aviation/ https://www.jamf.com/blog/optimizing-apple-device-deployments-in-aviation/ Learn how Jamf helps airlines get the most out of their Apple devices.

]]>
2024-10-18T13:30:00+00:00
Tech partner spotlight: Jamf and NavvTrack https://www.jamf.com/blog/tech-partner-spotlight-jamf-and-navvtrack/ https://www.jamf.com/blog/tech-partner-spotlight-jamf-and-navvtrack/ Keep precise track of your devices' locations — even within the office — with NavvTrack and Jamf.

]]>
2024-10-17T14:00:00+00:00
Managed software updates make Apple patch management easier https://www.jamf.com/blog/streamline-patch-management/ https://www.jamf.com/blog/streamline-patch-management/ Apple patch management and macOS and iOS upgrades just got much easier to manage. Learn how to deliver a seamless end-user experience during updates.

]]>
2024-10-11T20:30:00+00:00
Defense in depth: combating modern threats with Jamf https://www.jamf.com/blog/mobile-threat-defense-with-jamf/ https://www.jamf.com/blog/mobile-threat-defense-with-jamf/ In this JNUC presentation, Adam Boynton, Senior Security Sales Manager at Jamf, walks us through an effective mobile security strategy with Jamf.

]]>
2024-10-11T16:18:00+00:00
Self Service+: empowering productivity and security through a unified app experience https://www.jamf.com/blog/unified-app-platform-productivity-security/ https://www.jamf.com/blog/unified-app-platform-productivity-security/ Truly delighting end users with genuinely helpful apps tailored to their needs is the focus of Sam Allcock, Director of Product Management and Kyle Hammond, Principal Software Engineer at Jamf at JNUC 2024.

]]>
2024-10-11T13:00:00+00:00
Diamond Assets: keeping pace with innovation https://www.jamf.com/blog/jamf-diamond-assets-mdm-integration/ https://www.jamf.com/blog/jamf-diamond-assets-mdm-integration/ Diamond McKenna, Paula Currie and Tim Schigur of Diamond Assets discuss how schools and enterprises can get the most from their device fleet and stay ahead of technology innovation with Diamond Assets.

]]>
2024-10-10T14:00:00+00:00
Achieving tailored event monitoring and implementing behavioral baselines https://www.jamf.com/blog/mac-endpoint-security-behavioral-baselines/ https://www.jamf.com/blog/mac-endpoint-security-behavioral-baselines/ In this session, discover the challenges specific to macOS event monitoring and why it’s critical to organizational cybersecurity. Also, learn which questions help IT/Security admins decide on the SIEM solution that works best for them, and finally, follow the guided demo that uses a custom analytic/rule to mitigate malware on macOS.

]]>
2024-10-10T13:00:00+00:00
How to create value in Higher Education with Jamf and Microsoft https://www.jamf.com/blog/jamf-microsoft-integration-higher-education/ https://www.jamf.com/blog/jamf-microsoft-integration-higher-education/ Brian Lenz, San Diego State University (SDSU) and Simon Binder, Advania Knowledge Factory, discussed combining Apple, Microsoft and Jamf in the same higher education environment in this JNUC 2024 session.

]]>
2024-10-10T13:00:00+00:00
Say Yes to Code: developing custom tools for a first-class user experience https://www.jamf.com/blog/developing-custom-tools-apple-frameworks/ https://www.jamf.com/blog/developing-custom-tools-apple-frameworks/ What do you do when tasked with bringing 300+ subsidiaries into the same macOS client? You build your own apps and framework, of course!

]]>
2024-10-09T20:30:00+00:00
Layering Jamf Protect to reinforce security https://www.jamf.com/blog/layering-jamf-protect-mac-endpoint-protection/ https://www.jamf.com/blog/layering-jamf-protect-mac-endpoint-protection/ Dan Lawrence, Senior Applications Engineer at MedMutual and Kat Garbis, Senior Channel Program Manager at Jamf, chat about MedMutual’s implementation of Jamf Protect.

]]>
2024-10-09T14:17:00+00:00
Endpoint security with Chrome Enterprise and Jamf https://www.jamf.com/blog/chrome-enterprise-jamf-endpoint-security/ https://www.jamf.com/blog/chrome-enterprise-jamf-endpoint-security/ Learn about how Chrome Enterprise and Jamf can work together to create a new endpoint security standard.

]]>
2024-10-08T20:00:00+00:00
Deploying Apple Devices - what’s new in 2024? https://www.jamf.com/blog/deploying-apple-devices-whats-new-in-2024/ https://www.jamf.com/blog/deploying-apple-devices-whats-new-in-2024/ The Apple platform provides incredible value to businesses with its intuitive capabilities. Companies that offer Apple create a deeper employee engagement experience and drive IT efficiency, in some cases at a lower cost of ownership compared to other platforms.

]]>
2024-10-08T17:00:00+00:00
Jamf API CLI tool: one solution for secure Jamf API access in policies and scripts https://www.jamf.com/blog/secure-jamf-api-access-cli-tool/ https://www.jamf.com/blog/secure-jamf-api-access-cli-tool/ Howard Griffith, Senior Systems Manager at the University of Texas at Austin, explains his proof-of-concept tool for securely providing API bearer token keys to your managed devices.

]]>
2024-10-08T14:19:00+00:00
Take control of Mobile Device Management https://www.jamf.com/blog/mastering-mobile-device-management-with-jamf/ https://www.jamf.com/blog/mastering-mobile-device-management-with-jamf/ Discover how to get the most out of Mobile Device Management with traditional MDM and Declarative Device Management. Discover how to anticipate and avoid pitfalls.

]]>
2024-10-08T13:41:00+00:00
Break Glass: How to Securely Administer Computers Using Jamf Pro LAPS https://www.jamf.com/blog/secure-admin-account-jamf-pro-laps/ https://www.jamf.com/blog/secure-admin-account-jamf-pro-laps/ In this session, Mark Buffington and William Smith explain what LAPS is and why it is critical for device security. Also, Rob Potvin guides users through a demo of how to secure enterprise devices using LAPS and Jamf Pro.

]]>
2024-10-08T13:00:00+00:00
Modern Identity Management With Microsoft Entra ID, Platform Single Sign-On and Jamf Pro https://www.jamf.com/blog/modern-identity-management-entra-id-pssoe/ https://www.jamf.com/blog/modern-identity-management-entra-id-pssoe/ In this JNUC session, discover what Platform Single Sign-On is, what it can do and how it can be implemented, along with your identity provider and MDM solution to create phishing-resistant credentials. Additionally, learn about some of the best practices to help get organizations on the right track to maximize security protections without compromising the user experience.

]]>
2024-10-08T13:00:00+00:00
Practical Mac security https://www.jamf.com/blog/practical-endpoint-security-for-mac-jamf/ https://www.jamf.com/blog/practical-endpoint-security-for-mac-jamf/ Get actionable insights to secure your Mac fleet and defend them from current and growing threats.

]]>
2024-10-07T14:00:00+00:00
Bridging the gap between IT and Security with Jamf and Microsoft AI https://www.jamf.com/blog/generative-ai-cloud-macs-jamf-integration-jnuc-2024/ https://www.jamf.com/blog/generative-ai-cloud-macs-jamf-integration-jnuc-2024/ In this session, discover how EC2-hosted Mac instances benefit developers by supercharging app-building. Also, learn about how Amazon promotes performance and security with the AWS Nitro System, as well as how to leverage the power of generative AI to develop new apps in novel ways using Amazon Bedrock.

]]>
2024-10-07T13:00:00+00:00
Migrating to Jamf Pro https://www.jamf.com/blog/mdm-migration-from-kandji-to-jamf-pro/ https://www.jamf.com/blog/mdm-migration-from-kandji-to-jamf-pro/ Learn how to plan and execute your MDM migration to Jamf Pro from an MDM that no longer suits your needs.

]]>
2024-10-04T20:30:00+00:00
How to keep your CISO happy with IT during security audits https://www.jamf.com/blog/macos-security-compliance-tools-jamf-pro-audit-guide-jnuc-2024/ https://www.jamf.com/blog/macos-security-compliance-tools-jamf-pro-audit-guide-jnuc-2024/ Learn how to meet endpoint security compliance with Jamf and partners. Generate data that an auditor wants to see, and an audit that your CIO can be proud of.

]]>
2024-10-04T19:30:00+00:00
S.U.P.E.R.M.A.N. III https://www.jamf.com/blog/superman-macos-updates-mobile-device-management-jnuc-2024/ https://www.jamf.com/blog/superman-macos-updates-mobile-device-management-jnuc-2024/ In this JNUC session, MacAdmins learn about the S.U.P.E.R.M.A.N. app and how it can make short work of even the most complex macOS update and upgrade workflows. Plus, how to deploy it via Jamf Pro for greater, automated control over enterprise OS update/upgrade projects.

]]>
2024-10-04T13:00:00+00:00
Flawless MDM communication https://www.jamf.com/blog/mdm-device-communication-best-practices/ https://www.jamf.com/blog/mdm-device-communication-best-practices/ Learn how to ensure your devices are enrolled and up to date with Jamf Pro in this enlightening talk from Patrick Weber and Isaac Ordonez from Mann Consulting.

]]>
2024-10-03T17:25:00+00:00
Introducing Jamf’s AI Assistant https://www.jamf.com/blog/introducing-jamfs-ai-assistant/ https://www.jamf.com/blog/introducing-jamfs-ai-assistant/ We're excited to delve deeper into one of this year's most anticipated JNUC announcements – AI Assistant. With Jamf's AI Assistant, we're proving that robust capabilities and ease of use can go hand in hand.

]]>
2024-10-03T14:11:00+00:00
A Window into Your Photos: Revealing How Sideloaded Apps Can Secretly Monitor Your Images https://www.jamf.com/blog/jamf-threat-labs-how-sideloaded-apps-can-secretly-monitor-your-images/ https://www.jamf.com/blog/jamf-threat-labs-how-sideloaded-apps-can-secretly-monitor-your-images/ In the ever-evolving realm of cybersecurity, staying ahead of malicious threats is essential. At Jamf, we are committed to proactively identifying and mitigating risks to iOS devices. Learn how in our latest post.

]]>
2024-10-03T13:26:00+00:00
Automating Secure Access Control with Device Compliance & Jamf Connect ZTNA https://www.jamf.com/blog/jamf-connect-ztna-device-compliance-jnuc-2024/ https://www.jamf.com/blog/jamf-connect-ztna-device-compliance-jnuc-2024/ In this session, learn about cybersecurity compliance, the importance device of establishing device baselines in maintaining compliance and what compliance looks like with Apple and Jamf in enterprise workflows.

]]>
2024-10-03T13:00:00+00:00
Jamf Partner spotlight on: Backblaze https://www.jamf.com/blog/jamf-backblaze-mac-data-protection-solution/ https://www.jamf.com/blog/jamf-backblaze-mac-data-protection-solution/ Variable IT environments and cyber threats are the two biggest challenges impacting organization’s ability to protect critical data, meet compliance requirements and achieve business continuity objectives. In this blog, learn how integrating Backblaze with Jamf helps organizations, especially with limited resources, address these challenges in three easy steps.

]]>
2024-09-27T14:00:00+00:00