Netflix streamlined global Mac management by integrating Oomnitza and Jamf, achieving 99.9% data accuracy, reduced toil, and improved security posture.| Jamf Blog
Jamf boosts Apple security with Google Security Operations. Learn how this integration enables faster incident response and stronger enterprise resilience.| Jamf Blog
App Discovery gives security and network teams a better way.| Jamf Blog
Learn about Jamf and Airlock Digital’s integration, how it blocks shadow IT and ensures only trusted files and applications run on macOS.| Jamf Blog
Hear from a Jamf Customer Success Manager discussing Platform Single Sign-On, including how it impacts authentication workflows and how Jamf customers can get started today.| Jamf Blog
Two mobile apps available for download are leaking personally identifiable information. Jamf Threat Labs investigates.| Jamf Blog
This blog discusses the major feature and functionality enhancements from Apple’s latest operating system release across all of their platforms.| Jamf Blog
The new iPadOS and macOS 26 offer features that help students excel. Learn more about these features and find out how to upgrade your devices as soon as they come out.| Jamf Blog
Jamf After Dark co-hosts Josh Thornton and Kat Garbis welcome Jeff Ovik and Kelsey Dahl — Senior Event Specialists at Jamf — to talk about the upcoming Jamf Nation User Conference| Jamf Blog
Chrome now supports Apple’s Extensible SSO! Discover how it boosts productivity, strengthens security and enhances the user experience.| Jamf Blog
Discover its origin, how it compromises macOS and more importantly, how the JTL detected this malicious threat to keep Jamf customers safe.| www.jamf.com
Discover how shifting from reactive responses to proactive strategies reduces risk and mitigate threats impacting K-12 schools globally.| Jamf Blog
Jamf and CyCraft are better together, combining Jamf’s industry-leading Apple device management and security with CyCraft’s AI-powered threat exposure management.| Jamf Blog
Jamf releases Jamf Pro 11.20! Discover the latest features and functionalities.| Jamf Blog
Schools are subject to strict data protection regulations. Any vendors should be held to the same standard — learn how Jamf handles your school's data.| Jamf Blog
Look past the headlines to see what screen time means for students.| Jamf Blog
At Jamf, we know how important it is to stay up to date with Apple releases and have done so since 2002. This blog deep dives into the importance of upgrades — and their impact on security and productivity.| Jamf Blog
What if you could show that Mac not only delivers long-term savings — but also measurably increases business value?| Jamf Blog
Learn how NHS Trusts can meet UK Data Security and Protection Toolkit (DSPT) requirements for mobile devices, and how Jamf's solutions ensure DSPT compliance.| Jamf Blog
Explore how Jamf network relay enables secure, seamless remote access optimized for modern Apple devices – without the limitations of legacy VPNs.| Jamf Blog
Jamf Executive Threat Protection has updated functionality to track and resolve security incidents.| Jamf Blog
Ensure a smooth start to the new school year with this comprehensive Jamf School preparation guide.| Jamf Blog
Learn how Jamf Apple device management and Cyberhaven data-lineage DLP stop leaks, insider threats and exfiltration on macOS| www.jamf.com
K-12 schools face numerous cyber threats every day. Learn about the top 10 schools face — and get some tools to prevent them.| Jamf Blog
Third-party app stores introduce risk. Jamf Threat Labs investigates.| Jamf Blog
Discover how Jamf Pro's compliance benchmarks feature integrates with mSCP to automate security standards implementation, reducing deployment time from weeks to minutes.| www.jamf.com
Learn the essential steps to prepare for a Mac device security audit. Explore tools, strategies, and best practices tailored for IT professionals.| www.jamf.com
Schools are a common target for cyber criminals trying to steal personal information. This blog discusses how schools can foster digital citizenship while defending students and their network from cyber threats.| Jamf Blog
The podcast episode provides insight for Apple admins responsible for managing and securing device with an inherited Jamf instance, including where to start and what critical functions to review.| www.jamf.com
Discover how Jamf Purposeful Deployment redefines Apple device management in education. Empower students, teachers, and IT admins with streamlined solutions.| www.jamf.com
Discover how parent-funded, school-managed (PFSM) device deployments help schools maintain technology programs while stretching budgets and keeping control of classroom devices.| www.jamf.com
Last week, security researchers at Moonlock published new findings on the latest version of Atomic Stealer (AMOS), highlighting significant updates — including the addition of a backdoor. Around the same time, Jamf Threat Labs independently analyzed samples that exhibit many of the same characteristics detailed in Moonlock’s research.| Jamf Blog
Offer employees secure and seamless access from anywhere with continuous conditional access from Jamf and Okta.| Jamf Blog
We take the stress out of Mac endpoint management and lighten IT load with AI, device security, and Smart Group automation. See how we improve efficiency of IT teams| www.jamf.com
Discover Jamf Pro's new blueprints configured to streamline device management workflows, or create one of your own to your specifications.| www.jamf.com
Jamf Account is an online portal where you can find and manage features related to your account with Jamf. You can access Jamf products, manage your Jamf identity, enroll in training courses, participate in Beta/RC programs and more!| Jamf Blog
Discover how to set up OIDC-based Single Sign-On and get answers to frequently asked questions.| www.jamf.com
Discover how Jamf and AuthenTrend's partnership delivers passwordless fingerprint authentication for Apple devices, enabling secure, frictionless access across enterprise Mac fleets.| www.jamf.com
Unlock strategic benefits and minimize disruptions with our MDM Migration Checklist – your illustrated guide to a successful transition.| Jamf Blog
Learn how a California citrus grower is using Jamf and LifeSaver Mobile to keep drivers safe, devices secure and operations running smoothly.| Jamf Blog
Minimize IT headaches and maximize compliance by managing and securing your Apple devices automatically with Jamf’s latest release.| Jamf Blog
Find out how to optimize your mobile fleet with a preview of our webinar, Unlocking Mobility: The Future of Work with Jamf for Mobile.| Jamf Blog
Redzone gives IT and operations teams in food, beverage and CPG manufacturing an easier way to deploy, manage and scale Apple-based solutions.| Jamf Blog
Jamf expands Apple security training with new 270 Course and updated 170/370 Courses to boost admin readiness.| Jamf Blog
Discover the top 10 reasons to attend JNUC 2025, in Denver, Colorado, October 7-9.| Jamf Blog
The Jamf 170 Course is a security-focused, self-paced certification course and introduction to Jamf Protect.| Jamf Blog
Discover what the Jamf Security 360: Annual Trends Report reveals about the state of Mac and mobile in 2025.| Jamf Blog
IT compliance for Mac: Leverage macOS security features with Jamf to meet NIST standards.| Jamf Blog
Get a ringside seat to VPN vs. ZTNA. Determine which is the champion to best secure modern endpoints and network traffic.| Jamf Blog
Learn how to get deep insight into your fleet out of the box with Jamf's Mac Endpoint Telemetry feature.| Jamf Blog
WWDC'25 introduces Apple innovations that empower IT, educators, and students with enhanced management, personalized learning and secure digital experiences.| Jamf Blog
At WWDC 2025, Apple highlights important updates to Apple Business Manager and Apple School Manager, Platform SSO updates and easier device management migrations.| Jamf Blog
Learn how IT compliance benchmarks help organizations maintain security and stay ahead in today’s evolving compliance landscape.| www.jamf.com
A recent DPIA confirms Jamf School’s MDM solution is secure for schools. Learn how Jamf enhances digital safety and supports compliance in education.| www.jamf.com
Jamf Threat Labs discovers new pirated macOS applications that establish communication with attacker infrastructure, allowing the victim's computer to be controlled by the attacker.| www.jamf.com
With malicious code hidden within, the new malware with ties to DPRK, has evaded detection by notable malware checking systems that may signal a new way of attacking macOS devices.| www.jamf.com
Learn more about how malicious threats continue to target macOS users, compromising their Macs and exfiltrating their data.| www.jamf.com
What is Mobile Device Management (MDM)? Discover a tool for getting more from mobile technology and helping your team succeed with mobile devices.| www.jamf.com
Zero-day exploits TCC protection by allowing XCSSET malware to bypass user authorization through piggy-backing from previously approved applications.| www.jamf.com