Linh Lam, CIO, Jamf Lam: There arepolicies around data governance that you need to have in placeand train users to abide by, but we focus on the mechanical controls you can implement. Of course, you won't be able to control it all, but as much as you can, you ...
Financial burden:Gartner put shadow IT spending in large enterprises around 30% to 40%, while Everest Group puts in closer to 50%. Much of this comes in the form of cloud-based software. Shadow IT cloud usage is estimated to be10xgreaterthan known cloud usage with worldwide end-user spend...
such as a large company or educational institution, you may discover when you first use it that it is still managed by that organization using Jamf’s mobile device management (MDM) tools. That creates a problem for you because it will restrict what you can do on this Mac and may mean y...
Return to Service is a newly-introduced device management tool designed to make it much easier to handle transient deployments and semi-shared devices.
It means getting to the file you need is as easy as swiping out with four fingers on the trackpad and a tap or two on the relevant Stack.Overall impression: I’m finding Stacks to be a great way to work. It is so much easier than leaving files festooned fiercely across your Desktop...
Apple @ Work is a 9to5Mac series where Bradley Chambers looks at the latest trends and news with how the Mac and iOS are working in enterprise IT environments. A new regular series from Bradley Chambers covering Apple in the enterprise ...
The scope of vulnerability for Macs is demonstrably much smaller, and thus Macs don’t necessarily require the same detailed control. (However, the Mac does have its own security issues that you should understand.) Many organizations can take a looser approach to management for their Macs. Case...
The only way to connect them to WiFi is to wake it up and go to home screen. If an iPad is locked with passcode and not connected to WiFi, how will it complete the "Clear passcode" command through Jamf? There is literally no way to connect back to the internet using the same WiF...
Julian Wayte, a senior security solutions engineer at Uptycs, provides perspective on Osquery’s impact: “It just gives you so much visibility and protection. Without the knowledge of what’s going on in your system, you’re at risk. With 250 subject areas' worth of info, Osquery is unriv...
You can find details of how to do that here: https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/mac-jamfpro-policies#step-3-configure-microsoft-defender-atp-settings This concludes Part 1 of our blog series on how to use tagging effectively. ...