Privacy Policy</a>." data-cc-allow="Allow" data-cc-dismiss="To edit your cookie settings, <a class='cc-revoke'>click here</a>." data-cc-deny="Decline" data-cc-revoke="Cookie Policy" data-cc-privacy-policy="Privacy Policy" data-cc-privacy-url="/privacy-policy/" data-http-status-code="200" > Jamf Connect - Page 5 | Blog | Jamf

Jamf Blog

Posts in the Jamf Connect Category

February 15, 2023 by Haddayr Copley-Woods

Misconceptions about mobile BYOD

Worried about what Bring Your Own Device (BYOD) might mean for your organization . . . or yourself? Read on to see us debunk some common myths about BYOD.

February 9, 2023 by Haddayr Copley-Woods

Securing modern healthcare

It seems as if every day in the past weeks has seen a headline about a breach in another healthcare organization. How did we get here? What can healthcare organizations do about it?

February 2, 2023 by Karen Goss

Introducing the Jamf Learning Hub

Check out the new Jamf Learning Hub to find the product technical content you need, when you need it to get the most out of Jamf products and succeed with Apple.

February 1, 2023 by Kaylee Carlson

Jamf security: simplified.

Jamf has consolidated its Mac endpoint security and Mac authentication offerings into two comprehensive products: Jamf Connect and Jamf Protect. Here’s the breakdown of how we’ve still got you covered— and on more devices!

December 22, 2022 by Thijs Xhaflaire

How-to: Granting local admin permissions with Microsoft Forms and Power Automate

In this step-by-step guide we will show how to use Microsoft Forms and Microsoft Power Automate to streamline and manage local administrator permissions within a managed macOS fleet.

November 29, 2022 by Laurie Mona

How to deploy new technology in healthcare organizations

Learn how to successfully deploy Apple technology in your healthcare organization with enterprise secure, consumer simple management and security solutions from Jamf.

November 17, 2022 by Jesus Vigo

A holistic approach to security: Identity and Access Management (IAM)

Identity and Access Management (IAM) extends far beyond the simple notion of authenticating users. While that is certainly a central point, modern work environments require changes to IT infrastructure for users to remain safe while being productive from any device, over any network while physically being anywhere. That’s where the modernized IAM workflows coupled with first- and third-party integrations are critical to extending access through greater flexibility while enhancing security for all stakeholders.

November 10, 2022 by Jesus Vigo

A holistic approach to security: Zero Trust Network Access (ZTNA)

Zero Trust Network Access, part of Jamf Connect, provides modern threat landscape protection to your entire fleet of macOS, iOS/iPadOS, Android and Windows endpoints, extending secure remote access and “Zero Trust” technology to organizational resources and data – granting access only to endpoints and users that meet your requirements – all others are denied, by default.

Jamf endpoint security and mobile threat defense solutions offer detection, prevention and remediation capabilities that extend protections across your entire desktop and mobile fleet, protecting devices and empowering users while keeping data secure and maintaining privacy.

Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.