<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom"> <channel> <title>Jamf Blog</title> <link>https://www.jamf.com/blog/</link> <atom:link href="https://www.jamf.com/blog/rss/" rel="self" type="application/rss+xml" /> <description>The latest blog posts from Jamf</description> <dc:language>en</dc:language> <dc:date>2024-10-04T19:30:00+00:00</dc:date> <item> <title>Gartner IAM Summit recap</title> <link>https://www.jamf.com/blog/gartner-iam-summit-recap/</link> <guid>https://www.jamf.com/blog/gartner-iam-summit-recap/</guid> <description> <![CDATA[ <p>Jamf demonstrates security interoperability at the Gartner IAM conference with other industry leaders.</p> ]]> </description> <dc:date>2024-12-19T15:42:00+00:00</dc:date> </item> <item> <title>Elevating retail operations with Jamf strategic partnerships</title> <link>https://www.jamf.com/blog/jamf-retail-experience-innovations/</link> <guid>https://www.jamf.com/blog/jamf-retail-experience-innovations/</guid> <description> <![CDATA[  <img src="https://media.jamf.com/images/news/elevating-retail-operations-with-jamfs-strategic-partnerships.webp?q=80&w=800" alt=""><br> <p>Jamf partners up with our allies in the retail space to enhance the customer retail experience. Read this blog to learn more about how Jamf and our partners can make a difference.</p> ]]> </description> <dc:date>2024-12-19T15:17:00+00:00</dc:date> </item> <item> <title>Jamf School: Return to Service</title> <link>https://www.jamf.com/blog/jamf-school-return-to-service/</link> <guid>https://www.jamf.com/blog/jamf-school-return-to-service/</guid> <description> <![CDATA[ <p>Improve your iPad management workflows with Apple&#39;s Return to Service in Jamf School.</p> ]]> </description> <dc:date>2024-12-17T20:00:00+00:00</dc:date> </item> <item> <title>Tech partner spotlight: nDuo IQ and Jamf</title> <link>https://www.jamf.com/blog/jamf-pro-mobile-iq-app-manage-apple-devices/</link> <guid>https://www.jamf.com/blog/jamf-pro-mobile-iq-app-manage-apple-devices/</guid> <description> <![CDATA[ <p>Meet nDuo iQ: the mobile app that brings Jamf Pro to your fingertips while on the go.</p> ]]> </description> <dc:date>2024-12-12T14:00:00+00:00</dc:date> </item> <item> <title>Jamf After Dark: Why Jamf</title> <link>https://www.jamf.com/blog/jamf-after-dark-why-jamf/</link> <guid>https://www.jamf.com/blog/jamf-after-dark-why-jamf/</guid> <description> <![CDATA[ <p>In this podcast recap, the team sits down to discuss what sets Jamf apart from the competition. From making security a cornerstone of our solutions lineup to the global community of IT and Security professionals of Jamf Nation and much more.</p> ]]> </description> <dc:date>2024-12-12T14:00:00+00:00</dc:date> </item> <item> <title>Moving Target: The Evolving Risks of Enterprise Mobility Recap</title> <link>https://www.jamf.com/blog/risks-of-enterprise-mobility-webinar-recap/</link> <guid>https://www.jamf.com/blog/risks-of-enterprise-mobility-webinar-recap/</guid> <description> <![CDATA[ <p>Join Jamf and SASIG as we present “<strong>Moving</strong><strong> Target: The Evolving Risks of Enterprise Mobility.</strong>” The webinar highlights the security risks prevalent in organizations that utilize mobile devices. Also, we discuss the challenges to safeguarding devices, users, and business apps, as well as provide key strategies to integrate mobile into your security stack. </p> ]]> </description> <dc:date>2024-12-11T14:00:00+00:00</dc:date> </item> <item> <title>Unauthorized access to iCloud: analyzing an iOS vulnerability that could expose sensitive data to attackers</title> <link>https://www.jamf.com/blog/tcc-bypass-steals-data-from-icloud/</link> <guid>https://www.jamf.com/blog/tcc-bypass-steals-data-from-icloud/</guid> <description> <![CDATA[ <p><a href="https://www.jamf.com/threat-labs/">Jamf Threat Labs</a> has discovered a bypass vulnerability in the Transparency, Consent and Control (TCC) subsystem in iOS that fails to notify users when another application tries to access sensitive information such as photos, GPS location, contacts and more. Read on to learn more about our findings.</p> ]]> </description> <dc:date>2024-12-10T12:45:00+00:00</dc:date> </item> <item> <title>The invisible threat: how mobile device hacks can compromise your organization</title> <link>https://www.jamf.com/blog/jamf-threat-labs-the-invisible-threat/</link> <guid>https://www.jamf.com/blog/jamf-threat-labs-the-invisible-threat/</guid> <description> <![CDATA[ <p>Jamf Threat Labs investigates how attackers can spy on employee iPhones — without the user ever knowing.</p> ]]> </description> <dc:date>2024-12-09T12:45:00+00:00</dc:date> </item> <item> <title>Everything You Need to Know About Jamf Training and Certification</title> <link>https://www.jamf.com/blog/get-jamf-training-and-certification/</link> <guid>https://www.jamf.com/blog/get-jamf-training-and-certification/</guid> <description> <![CDATA[ <p>Jamf certifications provide an accurate measure of the knowledge and skills needed to manage and secure Apple devices in the enterprise and at school. Learn about each certification and discover the various learning tools and resources to succeed personally and professionally with Jamf.</p> ]]> </description> <dc:date>2024-12-04T14:00:00+00:00</dc:date> </item> <item> <title>Digital safety: real solutions for campus safety</title> <link>https://www.jamf.com/blog/keep-students-safe-with-digital-signage/</link> <guid>https://www.jamf.com/blog/keep-students-safe-with-digital-signage/</guid> <description> <![CDATA[ <p>Our "Digital Safety: Real Solutions for Keeping Campuses Safe" webinar explores how leading-edge technologies like Carousel, Singlewire and Jamf create safer learning environments.</p> ]]> </description> <dc:date>2024-12-03T20:45:00+00:00</dc:date> </item> <item> <title>M&amp;amp;C Saatchi Group transforms IT operations with Jamf</title> <link>https://www.jamf.com/blog/mc-saatchi-transforms-it-with-jamf/</link> <guid>https://www.jamf.com/blog/mc-saatchi-transforms-it-with-jamf/</guid> <description> <![CDATA[ <p>Discover how one firm saw enormous time savings, improved security, lowered costs and more scalable growth with Jamf.</p> ]]> </description> <dc:date>2024-11-25T19:00:00+00:00</dc:date> </item> <item> <title>What is Vulnerability Prioritization?</title> <link>https://www.jamf.com/blog/vulnerability-prioritization-guide-for-it-experts/</link> <guid>https://www.jamf.com/blog/vulnerability-prioritization-guide-for-it-experts/</guid> <description> <![CDATA[ <p>Learn about prioritizing vulnerabilities, why it’s critical and what are the key factors that influence vulnerability prioritization in the enterprise.</p> ]]> </description> <dc:date>2024-11-21T14:00:00+00:00</dc:date> </item> <item> <title>Introducing App Installers for Jamf Now</title> <link>https://www.jamf.com/blog/jamf-now-app-installers-macos-software-management/</link> <guid>https://www.jamf.com/blog/jamf-now-app-installers-macos-software-management/</guid> <description> <![CDATA[ <p>App Installers has arrived at Jamf Now. Distribute third-party macOS software titles and let Jamf do the packaging for you.</p> ]]> </description> <dc:date>2024-11-20T14:00:00+00:00</dc:date> </item> <item> <title>What is advanced threat protection (ATP)?</title> <link>https://www.jamf.com/blog/what-is-advanced-threat-protection/</link> <guid>https://www.jamf.com/blog/what-is-advanced-threat-protection/</guid> <description> <![CDATA[  <img src="https://media.jamf.com/images/what-is-advanced-threat-protection.jpeg?q=80&w=800" alt=""><br> <p>Advanced persistent threats are targeted and complex cyber attacks that can hide in your system for long periods of times. Defending against them can be tricky — read this blog to find out where to start with ATP cybersecurity.</p> ]]> </description> <dc:date>2024-11-19T15:08:00+00:00</dc:date> </item> <item> <title>Apple Mobile Device Management FAQ: your top questions answered</title> <link>https://www.jamf.com/blog/apple-mobile-device-management-faq/</link> <guid>https://www.jamf.com/blog/apple-mobile-device-management-faq/</guid> <description> <![CDATA[  <img src="https://media.jamf.com/images/photos/apple-mobile-device-management-faq.png?q=80&w=800" alt=""><br> <p>The world of Apple Mobile Device Management (MDM) can sometimes raise questions. Here are some of the most frequently asked questions, some answers, and some suggestions for further reading.</p> ]]> </description> <dc:date>2024-11-15T20:00:00+00:00</dc:date> </item> <item> <title>Anatomy of an Attack: Atomic Stealer malware</title> <link>https://www.jamf.com/blog/anatomy-of-an-attack-learn-more/</link> <guid>https://www.jamf.com/blog/anatomy-of-an-attack-learn-more/</guid> <description> <![CDATA[ <p>Learn about the cyber kill chain and how to use it to learn more about the threats and threat actors targeting your enterprise. Also, Jamf Threat Labs takes you on a deep dive into the anatomy of an attack, dissecting each phase of an attack by the Atomic Stealer malware.</p> ]]> </description> <dc:date>2024-11-14T14:00:00+00:00</dc:date> </item> <item> <title>Meet Self Service+</title> <link>https://www.jamf.com/blog/meet-self-service-plus/</link> <guid>https://www.jamf.com/blog/meet-self-service-plus/</guid> <description> <![CDATA[ <p>Learn about Self Service+ and join the beta!</p> ]]> </description> <dc:date>2024-11-12T18:00:00+00:00</dc:date> </item> <item> <title>What is endpoint hardening?</title> <link>https://www.jamf.com/blog/endpoint-hardening-best-practices/</link> <guid>https://www.jamf.com/blog/endpoint-hardening-best-practices/</guid> <description> <![CDATA[ <p>Learn about endpoint hardening: what it is, its benefits and best practices.</p> ]]> </description> <dc:date>2024-11-12T15:00:00+00:00</dc:date> </item> <item> <title>APT Actors Embed Malware within macOS Flutter Applications</title> <link>https://www.jamf.com/blog/jamf-threat-labs-apt-actors-embed-malware-within-macos-flutter-applications/</link> <guid>https://www.jamf.com/blog/jamf-threat-labs-apt-actors-embed-malware-within-macos-flutter-applications/</guid> <description> <![CDATA[ <p>Jamf Threat Labs discovered malware samples believed to be tied to the Democratic People's Republic of Korea (DPRK), aka North Korea, that are built using Flutter, which by design provides obfuscation to the malicious code. JTL performs a deep dive into how the malicious code works to help protect users on macOS devices.</p> ]]> </description> <dc:date>2024-11-12T13:00:00+00:00</dc:date> </item> <item> <title>Modern authentication: an overview</title> <link>https://www.jamf.com/blog/modern-authentication-explained/</link> <guid>https://www.jamf.com/blog/modern-authentication-explained/</guid> <description> <![CDATA[ <p>Learn about modern authentication and what technologies define it. Discover how it helps organizations defend against sophisticated threats while allowing users to stay productive.</p> ]]> </description> <dc:date>2024-11-10T14:00:00+00:00</dc:date> </item> <item> <title>Endpoint security best practices</title> <link>https://www.jamf.com/blog/endpoint-security-best-practices/</link> <guid>https://www.jamf.com/blog/endpoint-security-best-practices/</guid> <description> <![CDATA[ <p>Start your endpoint security journey with some best practices.</p> ]]> </description> <dc:date>2024-11-08T15:00:00+00:00</dc:date> </item> <item> <title>3 benefits of adopting declarative device management today</title> <link>https://www.jamf.com/blog/adopt-declarative-device-management-today/</link> <guid>https://www.jamf.com/blog/adopt-declarative-device-management-today/</guid> <description> <![CDATA[ <p>Declarative Device Management (DDM) is the future of modern device management. But what can you do with it today?</p> ]]> </description> <dc:date>2024-11-07T21:30:00+00:00</dc:date> </item> <item> <title>Vulnerability Remediation: Why your security relies on it</title> <link>https://www.jamf.com/blog/vulnerability-remediation-why-your-security-relies-on-it/</link> <guid>https://www.jamf.com/blog/vulnerability-remediation-why-your-security-relies-on-it/</guid> <description> <![CDATA[ <p>Learn about vulnerability remediation, including what it is and why it’s a critical component of your organizational security posture and overarching cybersecurity strategy to keep endpoints, users and data secure from threats and attacks.</p> ]]> </description> <dc:date>2024-11-06T14:00:00+00:00</dc:date> </item> <item> <title>Jamf leads in IDC vendor assessment</title> <link>https://www.jamf.com/blog/idc-marketspace-jamf-leads-in-vendor-assessment/</link> <guid>https://www.jamf.com/blog/idc-marketspace-jamf-leads-in-vendor-assessment/</guid> <description> <![CDATA[ <p>Jamf emerges as a leader in Apple device management — read on for more information.</p> ]]> </description> <dc:date>2024-11-05T20:16:00+00:00</dc:date> </item> <item> <title>OS upgrades 2024: macOS/iPadOS/iOS: Education</title> <link>https://www.jamf.com/blog/ipados-ios-macos-sequoia-features-education/</link> <guid>https://www.jamf.com/blog/ipados-ios-macos-sequoia-features-education/</guid> <description> <![CDATA[ <p>Each new Apple software update brings new learning and teaching opportunities for both iPad and Mac users. macOS 15 and iOS/iPadOS 18 include a host of new features, but in this blog, we take a look at some of the more prominent ones supporting the classroom and beyond.</p> ]]> </description> <dc:date>2024-11-01T13:00:00+00:00</dc:date> </item> <item> <title>Total cost of ownership: iPad vs. Chromebook</title> <link>https://www.jamf.com/blog/total-cost-of-ownership-ipad-vs-chromebook/</link> <guid>https://www.jamf.com/blog/total-cost-of-ownership-ipad-vs-chromebook/</guid> <description> <![CDATA[  <img src="https://media.jamf.com/images/news/ipad-vs-chromebook.jpg?q=80&w=800" alt=""><br> <p>However you add it up, iPad costs far less over time than Chromebook.</p> ]]> </description> <dc:date>2024-11-01T13:00:00+00:00</dc:date> </item> <item> <title>OS upgrades, security and Apple Intelligence</title> <link>https://www.jamf.com/blog/os-upgrades-apple-intelligence-security/</link> <guid>https://www.jamf.com/blog/os-upgrades-apple-intelligence-security/</guid> <description> <![CDATA[ <p>It’s an old saying: the most secure software is up-to-date software. But it is also true. By using the latest version of software, you will improve the security posture of your users, devices and entire IT infrastructure. This blog highlights how upgrading your Apple operating systems across your devices creates a more secure organization. </p> ]]> </description> <dc:date>2024-10-31T19:54:00+00:00</dc:date> </item> <item> <title>Jamf After Dark: get to know Jamf Threat Labs</title> <link>https://www.jamf.com/blog/jamf-after-dark-get-to-know-jamf-threat-labs/</link> <guid>https://www.jamf.com/blog/jamf-after-dark-get-to-know-jamf-threat-labs/</guid> <description> <![CDATA[ <p>Get an inside look at Jamf Threat Labs in this episode of Jamf After Dark.</p> ]]> </description> <dc:date>2024-10-31T14:15:00+00:00</dc:date> </item> <item> <title>Why Apple Intelligence and Private Cloud Compute are so different and secure</title> <link>https://www.jamf.com/blog/apple-intelligence-private-cloud-compute-explained/</link> <guid>https://www.jamf.com/blog/apple-intelligence-private-cloud-compute-explained/</guid> <description> <![CDATA[ <p>Learn about the security and privacy controls in <a href="https://www.apple.com/apple-intelligence/">Apple Intelligence</a> and how Apple’s revolutionary approach to designing the Private Cloud Compute infrastructure sets it apart from AI models hosted in cloud-based environments. Furthermore, understand how Apple succeeds where others are subject to common data security vulnerabilities and user privacy risks.</p> ]]> </description> <dc:date>2024-10-30T16:45:00+00:00</dc:date> </item> <item> <title>What&#8217;s new in Jamf Teacher: AI restrictions and more</title> <link>https://www.jamf.com/blog/jamf-teacher-app-enhancements/</link> <guid>https://www.jamf.com/blog/jamf-teacher-app-enhancements/</guid> <description> <![CDATA[  <img src="https://media.jamf.com/images/hero/jamf-teacher-app-enhancements.jpg?q=80&w=800" alt=""><br> <p>Among a slew of other Jamf Teacher app enhancements this year, teachers can now control access to Apple Intelligence features in the classroom.</p> ]]> </description> <dc:date>2024-10-28T14:00:00+00:00</dc:date> </item> <item> <title>Ohio Senate Bill 29 and Jamf Safe Internet</title> <link>https://www.jamf.com/blog/ohio-senate-bill-29-jamf-student-data-privacy/</link> <guid>https://www.jamf.com/blog/ohio-senate-bill-29-jamf-student-data-privacy/</guid> <description> <![CDATA[ <p>Learn about the recent Ohio Senate Bill 29 and how Jamf Safe Internet helps schools meet the bill&#39;s requirements.</p> ]]> </description> <dc:date>2024-10-25T14:00:00+00:00</dc:date> </item> <item> <title>Jamf wins mobile security solution of the year!</title> <link>https://www.jamf.com/blog/jamf-wins-mobile-security-solution-of-the-year/</link> <guid>https://www.jamf.com/blog/jamf-wins-mobile-security-solution-of-the-year/</guid> <description> <![CDATA[ <p>Jamf security solutions are recognized at this year’s Computing Security Awards.</p> ]]> </description> <dc:date>2024-10-24T13:46:00+00:00</dc:date> </item> <item> <title>Apple, Jamf and Lana Health enable the smart hospital of the future.</title> <link>https://www.jamf.com/blog/smart-hospital-automation-with-jamf-lana-health/</link> <guid>https://www.jamf.com/blog/smart-hospital-automation-with-jamf-lana-health/</guid> <description> <![CDATA[ <p>Jamf for healthcare: Discover how Lana Health and Jamf Pro combine Apple device management and a platform that creates a seamless healthcare experience for patients and clinicians.</p> ]]> </description> <dc:date>2024-10-22T17:45:00+00:00</dc:date> </item> <item> <title>Back to security basics: phishing</title> <link>https://www.jamf.com/blog/signs-youve-been-fished/</link> <guid>https://www.jamf.com/blog/signs-youve-been-fished/</guid> <description> <![CDATA[  <img src="https://media.jamf.com/images/news/back-to-basics-phishing.jpg?q=80&w=800" alt=""><br> <p>Phishing is responsible for the majority of cyber attacks, affecting users and organizations financially and personally. In this blog, we go back to the basics of what phishing is, what an attack looks like and what steps can be taken to prevent falling victim to phishing attacks.</p> ]]> </description> <dc:date>2024-10-22T13:00:00+00:00</dc:date> </item> <item> <title>Deploying Apple devices in hard hat/manufacturing industries</title> <link>https://www.jamf.com/blog/deploying-apple-devices-in-hard-hat-manufacturing-industries/</link> <guid>https://www.jamf.com/blog/deploying-apple-devices-in-hard-hat-manufacturing-industries/</guid> <description> <![CDATA[ <p>Manufacturing and hard hat industries benefit greatly from powerful yet easy-to-use Apple devices that transform processes and drive innovation. Learn about how Apple and Jamf help these industries transition business workflows to the digital age.</p> ]]> </description> <dc:date>2024-10-21T13:00:00+00:00</dc:date> </item> <item> <title>Optimizing Apple device deployments in aviation</title> <link>https://www.jamf.com/blog/optimizing-apple-device-deployments-in-aviation/</link> <guid>https://www.jamf.com/blog/optimizing-apple-device-deployments-in-aviation/</guid> <description> <![CDATA[ <p>Learn how Jamf helps airlines get the most out of their Apple devices.</p> ]]> </description> <dc:date>2024-10-18T13:30:00+00:00</dc:date> </item> <item> <title>Tech partner spotlight: Jamf and NavvTrack</title> <link>https://www.jamf.com/blog/tech-partner-spotlight-jamf-and-navvtrack/</link> <guid>https://www.jamf.com/blog/tech-partner-spotlight-jamf-and-navvtrack/</guid> <description> <![CDATA[ <p>Keep precise track of your devices' locations — even within the office — with NavvTrack and Jamf.</p> ]]> </description> <dc:date>2024-10-17T14:00:00+00:00</dc:date> </item> <item> <title>Managed software updates make Apple patch management easier</title> <link>https://www.jamf.com/blog/streamline-patch-management/</link> <guid>https://www.jamf.com/blog/streamline-patch-management/</guid> <description> <![CDATA[ <p>Apple patch management and macOS and iOS upgrades just got much easier to manage. Learn how to deliver a seamless end-user experience during updates.</p> ]]> </description> <dc:date>2024-10-11T20:30:00+00:00</dc:date> </item> <item> <title>Defense in depth: combating modern threats with Jamf</title> <link>https://www.jamf.com/blog/mobile-threat-defense-with-jamf/</link> <guid>https://www.jamf.com/blog/mobile-threat-defense-with-jamf/</guid> <description> <![CDATA[ <p>In this JNUC presentation, Adam Boynton, Senior Security Sales Manager at Jamf, walks us through an effective mobile security strategy with Jamf.</p> ]]> </description> <dc:date>2024-10-11T16:18:00+00:00</dc:date> </item> <item> <title>Self Service+: empowering productivity and security through a unified app experience</title> <link>https://www.jamf.com/blog/unified-app-platform-productivity-security/</link> <guid>https://www.jamf.com/blog/unified-app-platform-productivity-security/</guid> <description> <![CDATA[ <p>Truly delighting end users with genuinely helpful apps tailored to their needs is the focus of Sam Allcock, Director of Product Management and Kyle Hammond, Principal Software Engineer at Jamf at JNUC 2024.</p> ]]> </description> <dc:date>2024-10-11T13:00:00+00:00</dc:date> </item> <item> <title>Diamond Assets: keeping pace with innovation</title> <link>https://www.jamf.com/blog/jamf-diamond-assets-mdm-integration/</link> <guid>https://www.jamf.com/blog/jamf-diamond-assets-mdm-integration/</guid> <description> <![CDATA[ <p>Diamond McKenna, Paula Currie and Tim Schigur of Diamond Assets discuss how schools and enterprises can get the most from their device fleet and stay ahead of technology innovation with Diamond Assets.</p> ]]> </description> <dc:date>2024-10-10T14:00:00+00:00</dc:date> </item> <item> <title>Achieving tailored event monitoring and implementing behavioral baselines</title> <link>https://www.jamf.com/blog/mac-endpoint-security-behavioral-baselines/</link> <guid>https://www.jamf.com/blog/mac-endpoint-security-behavioral-baselines/</guid> <description> <![CDATA[ <p>In this session, discover the challenges specific to macOS event monitoring and why it’s critical to organizational cybersecurity. Also, learn which questions help IT/Security admins decide on the SIEM solution that works best for them, and finally, follow the guided demo that uses a custom analytic/rule to mitigate malware on macOS.</p> ]]> </description> <dc:date>2024-10-10T13:00:00+00:00</dc:date> </item> <item> <title>How to create value in Higher Education with Jamf and Microsoft</title> <link>https://www.jamf.com/blog/jamf-microsoft-integration-higher-education/</link> <guid>https://www.jamf.com/blog/jamf-microsoft-integration-higher-education/</guid> <description> <![CDATA[ <p>Brian Lenz, San Diego State University (SDSU) and Simon Binder, Advania Knowledge Factory, discussed combining Apple, Microsoft and Jamf in the same higher education environment in this JNUC 2024 session.</p> ]]> </description> <dc:date>2024-10-10T13:00:00+00:00</dc:date> </item> <item> <title>Say Yes to Code: developing custom tools for a first&#45;class user experience</title> <link>https://www.jamf.com/blog/developing-custom-tools-apple-frameworks/</link> <guid>https://www.jamf.com/blog/developing-custom-tools-apple-frameworks/</guid> <description> <![CDATA[ <p>What do you do when tasked with bringing 300+ subsidiaries into the same macOS client? You build your own apps and framework, of course!</p> ]]> </description> <dc:date>2024-10-09T20:30:00+00:00</dc:date> </item> <item> <title>Layering Jamf Protect to reinforce security</title> <link>https://www.jamf.com/blog/layering-jamf-protect-mac-endpoint-protection/</link> <guid>https://www.jamf.com/blog/layering-jamf-protect-mac-endpoint-protection/</guid> <description> <![CDATA[ <p>Dan Lawrence, Senior Applications Engineer at MedMutual and Kat Garbis, Senior Channel Program Manager at Jamf, chat about MedMutual’s implementation of Jamf Protect.</p> ]]> </description> <dc:date>2024-10-09T14:17:00+00:00</dc:date> </item> <item> <title>Endpoint security with Chrome Enterprise and Jamf</title> <link>https://www.jamf.com/blog/chrome-enterprise-jamf-endpoint-security/</link> <guid>https://www.jamf.com/blog/chrome-enterprise-jamf-endpoint-security/</guid> <description> <![CDATA[ <p>Learn about how Chrome Enterprise and Jamf can work together to create a new endpoint security standard.</p> ]]> </description> <dc:date>2024-10-08T20:00:00+00:00</dc:date> </item> <item> <title>Deploying Apple Devices &#45; what&#8217;s new in 2024?</title> <link>https://www.jamf.com/blog/deploying-apple-devices-whats-new-in-2024/</link> <guid>https://www.jamf.com/blog/deploying-apple-devices-whats-new-in-2024/</guid> <description> <![CDATA[ <p>The Apple platform provides incredible value to businesses with its intuitive capabilities. Companies that offer Apple create a deeper employee engagement experience and drive IT efficiency, in some cases at a lower cost of ownership compared to other platforms.</p> ]]> </description> <dc:date>2024-10-08T17:00:00+00:00</dc:date> </item> <item> <title>Jamf API CLI tool: one solution for secure Jamf API access in policies and scripts</title> <link>https://www.jamf.com/blog/secure-jamf-api-access-cli-tool/</link> <guid>https://www.jamf.com/blog/secure-jamf-api-access-cli-tool/</guid> <description> <![CDATA[ <p>Howard Griffith, Senior Systems Manager at the University of Texas at Austin, explains his proof-of-concept tool for securely providing API bearer token keys to your managed devices.</p> ]]> </description> <dc:date>2024-10-08T14:19:00+00:00</dc:date> </item> <item> <title>Take control of Mobile Device Management</title> <link>https://www.jamf.com/blog/mastering-mobile-device-management-with-jamf/</link> <guid>https://www.jamf.com/blog/mastering-mobile-device-management-with-jamf/</guid> <description> <![CDATA[ <p>Discover how to get the most out of Mobile Device Management with traditional MDM and Declarative Device Management. Discover how to anticipate and avoid pitfalls. </p> ]]> </description> <dc:date>2024-10-08T13:41:00+00:00</dc:date> </item> <item> <title>Break Glass: How to Securely Administer Computers Using Jamf Pro LAPS</title> <link>https://www.jamf.com/blog/secure-admin-account-jamf-pro-laps/</link> <guid>https://www.jamf.com/blog/secure-admin-account-jamf-pro-laps/</guid> <description> <![CDATA[ <p>In this session, Mark Buffington and William Smith explain what LAPS is and why it is critical for device security. Also, Rob Potvin guides users through a demo of how to secure enterprise devices using LAPS and Jamf Pro.</p> ]]> </description> <dc:date>2024-10-08T13:00:00+00:00</dc:date> </item> </channel> </rss>