Privacy Policy</a>." data-cc-allow="Allow" data-cc-dismiss="To edit your cookie settings, <a class='cc-revoke'>click here</a>." data-cc-deny="Decline" data-cc-revoke="Cookie Policy" data-cc-privacy-policy="Privacy Policy" data-cc-privacy-url="/privacy-policy/" data-http-status-code="200" > Security - Page 5 | Blog | Jamf

Jamf Blog

Posts in the Security Category

May 6, 2024 by Jesus Vigo

Introducing Microsoft Copilot for Security with Jamf

Learn what Microsoft Copilot for Security is, how you can leverage Jamf management and security, and what it means when tools and expertise combine to make your devices much more secure.

May 1, 2024 by Hannah Bien

Maximizing ROI in security investments: The financial advantages of integrated solutions

Is your security solution worth it? Learn how to calculate and maximize your security return on investment.

April 30, 2024 by Hannah Bien

Jamf named CVE Numbering Authority

Jamf has been authorized by the Common Vulnerabilities and Exposures (CVE) program as a CVE Numbering Authority! Learn more about the CVE program and what this means for Jamf.

April 25, 2024 by Jesus Vigo

Defense-in-depth: Understanding and adapting security for the modern threat landscape

Learn more about closing gaps in security by integrating and layering solutions.

April 17, 2024 by Jesus Vigo

Choosing the right IT security partner: How Jamf fulfills your IT security need

Learn how choosing the right partner for your security needs can veritably make or break your cybersecurity plan. Also, gain a better understanding of how Jamf solutions integrate to address the challenges of the modern threat landscape through Trusted Access for top-to-bottom and end-to-end protection of your enterprise.

April 12, 2024 by Michael Devins

Mitigate mercenary spyware attacks for iPhone with Jamf Executive Threat Protection

Explore a comprehensive mobile security strategy that defends against the most sophisticated attacks impacting users.

April 12, 2024 by Hannah Bien

What is threat detection?

Threats of all kinds put our cybersecurity in danger. Learn about common threat types and how to detect them.

April 8, 2024 by Aaron Webb

Jamf Connect feature: Limit Application Access for Unmanaged Devices

Strengthening mobile security is critical. Especially for unmanaged devices that lack the management, identity and security controls of managed endpoints. In this blog, learn how Jamf Connect’s newest feature adds a layer of security to protect against unauthorized access and data breaches.

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.