Zero-Trust Cloud Security | Jamf Blog https://www.jamf.com/blog/category/wandera/ The latest Zero-Trust Cloud Security blog posts from Jamf en 2024-11-21T14:00:00+00:00 How to scale technology in hard hat industries https://www.jamf.com/blog/scale-technology-hard-hat-industries/ https://www.jamf.com/blog/scale-technology-hard-hat-industries/ As manufacturing and hard hat industries approach the next industrial revolution, mobile technologies are poised to drive the transformation. Learn how having Jamf and Apple help this industry transition to the digital age.

]]>
2024-06-13T14:00:00+00:00
Zero Trust vs Least Privilege https://www.jamf.com/blog/zero-trust-vs-least-privilege/ https://www.jamf.com/blog/zero-trust-vs-least-privilege/

Zero Trust and the principle of least privilege are components of an enterprises’s security plan that can sometimes be confounded. In this blog, we define both and explain how they work in detail.

]]>
2024-03-22T14:00:00+00:00
Elevate Apple device security with Jamf Security Cloud’s new feature https://www.jamf.com/blog/enhance-apple-device-security-jamf-security-cloud/ https://www.jamf.com/blog/enhance-apple-device-security-jamf-security-cloud/

Jamf Security Cloud leverages Jamf Pro API to bring together management and security, building automatic deployment of activation profiles in a single click.

]]>
2024-03-01T15:00:00+00:00
Verizon expands Jamf partnership for enhanced MDM and security https://www.jamf.com/blog/verizon-expands-jamf-product-offerings-for-enhanced-device-management-and-security/ https://www.jamf.com/blog/verizon-expands-jamf-product-offerings-for-enhanced-device-management-and-security/

The partnership between Verizon and Jamf continues to grow, extending access to Jamf’s comprehensive solutions for mobile device management and security.

]]>
2023-08-11T13:00:00+00:00
Jamf After Dark: An update on Jamf in Healthcare https://www.jamf.com/blog/jamf-after-dark-update-on-jamf-in-healthcare/ https://www.jamf.com/blog/jamf-after-dark-update-on-jamf-in-healthcare/

Our Jamf After Dark co-hosts Kat Garbis and Sean Rabbitt welcome the Jamf Healthcare team to the podcast to discuss Jamf’s growth in the space, the need for innovative solutions, emerging security efforts, and what to expect at HIMSS 2023.

]]>
2023-04-07T17:16:00+00:00
Mastering security compliance for Mac and mobile devices https://www.jamf.com/blog/security-compliance-mac-mobile-devices/ https://www.jamf.com/blog/security-compliance-mac-mobile-devices/

Learn about the cyber security compliance controls available for macOS and mobile devices and how to ensure your organization meets industry benchmarks and IT standards.

]]>
2023-03-29T14:44:00+00:00
How to deploy new technology in healthcare organizations https://www.jamf.com/blog/how-to-deploy-new-technology-in-healthcare-organizations/ https://www.jamf.com/blog/how-to-deploy-new-technology-in-healthcare-organizations/

Learn how to successfully deploy Apple technology in your healthcare organization with enterprise secure, consumer simple management and security solutions from Jamf.

]]>
2022-11-29T16:09:00+00:00
A holistic approach to security: Identity and Access Management (IAM) https://www.jamf.com/blog/new-solutions-pages-blog-identity-and-access-management/ https://www.jamf.com/blog/new-solutions-pages-blog-identity-and-access-management/

Identity and Access Management (IAM) extends far beyond the simple notion of authenticating users. While that is certainly a central point, modern work environments require changes to IT infrastructure for users to remain safe while being productive from any device, over any network while physically being anywhere. That’s where the modernized IAM workflows coupled with first- and third-party integrations are critical to extending access through greater flexibility while enhancing security for all stakeholders.

]]>
2022-11-17T15:00:00+00:00
A holistic approach to security: Zero Trust Network Access (ZTNA) https://www.jamf.com/blog/ztna-never-trust-always-verify/ https://www.jamf.com/blog/ztna-never-trust-always-verify/

Zero Trust Network Access, part of Jamf Connect, provides modern threat landscape protection to your entire fleet of macOS, iOS/iPadOS, Android and Windows endpoints, extending secure remote access and “Zero Trust” technology to organizational resources and data – granting access only to endpoints and users that meet your requirements – all others are denied, by default.

Jamf endpoint security and mobile threat defense solutions offer detection, prevention and remediation capabilities that extend protections across your entire desktop and mobile fleet, protecting devices and empowering users while keeping data secure and maintaining privacy.

]]>
2022-11-10T15:00:00+00:00
No trust assumed: strengthen cybersecurity with ZTNA https://www.jamf.com/blog/secure-remote-access-with-ztna/ https://www.jamf.com/blog/secure-remote-access-with-ztna/

A mobile workforce requires secure remote access solutions: learn why Zero Trust Network Access is the future of workplace cybersecurity.

]]>
2022-11-04T14:00:00+00:00
Wandera is now Jamf | A Partner guide to delivering a new, unified security brand https://www.jamf.com/blog/wandera-is-now-jamf-partner-guide/ https://www.jamf.com/blog/wandera-is-now-jamf-partner-guide/

Wandera is now part of Jamf. Here's how we're delivering a new, unified security brand.

]]>
2021-12-20T15:39:00+00:00
Enhancing the Apple education experience with Jamf Solutions https://www.jamf.com/blog/apple-education-experience-jamf-solutions-jnuc2021/ https://www.jamf.com/blog/apple-education-experience-jamf-solutions-jnuc2021/

In this JNUC session, Jamfs discuss the latest updates to Jamf solutions for education made to empower student success.

]]>
2021-10-19T16:05:00+00:00
Pegasus spyware slipping into mobile devices unnoticed. Time to take mobile security seriously. https://www.jamf.com/blog/pegasus-spyware-slipping-into-mobile-devices-unnoticed-its-time-to-take-mobile-security-seriously/ https://www.jamf.com/blog/pegasus-spyware-slipping-into-mobile-devices-unnoticed-its-time-to-take-mobile-security-seriously/

The Pegasus surveillance software used to target terrorist and criminal threats has been linked to governments using it to target journalists, activists and dissidents. Using the sophisticated tools to monitor and capture privacy data without the user's explicit consent in an effort that mirrors known spyware activity.

]]>
2021-07-21T16:22:00+00:00
Software-Defined Perimeter (SDP) vs Virtual Private Network (VPN) and ZTNA https://www.jamf.com/blog/software-defined-perimeter-sdp-vs-virtual-private-network-vpn-and-ztna/ https://www.jamf.com/blog/software-defined-perimeter-sdp-vs-virtual-private-network-vpn-and-ztna/

What are the main differences between Software-Defined Perimeters (SDP) and VPN technologies in achieving Zero Trust Network Access (ZTNA)?

]]>
2020-09-28T20:38:00+00:00
What is Adaptive Access and why does it matter in ZTNA? https://www.jamf.com/blog/what-is-adaptive-access-and-why-does-it-matter-in-ztna/ https://www.jamf.com/blog/what-is-adaptive-access-and-why-does-it-matter-in-ztna/

Adopting adaptive access is important for ensuring that the right users are connecting to sensitive information with secure devices.

]]>
2020-02-07T22:56:00+00:00