iOS VPN App
(MENAFN– GlobeNewsWire – Nasdaq)
MINNEAPOLIS, April 26, 2022 (GLOBE NEWSWIRE) — Today, Jamf (NASDAQ: JAMF), the standard in Apple Enterprise Management, holds a special Jamf Event to showcase a number of new offerings it has developed to help organizations deliver an enterprise-secure, consumer-simple environment that protects personal privacy.
The thirty-minute, live-streamed event is full of updates aimed at helping businesses, schools, and government entities succeed with Apple and also secure Android and Windows devices, regardless of their size or deployment requirements.
“Whether you’re looking to scale your growing business with Apple, empower your staff to securely work on their personal device, eliminate the inefficiencies of app management or deliver a secure and productive environment to employees and students, Jamf has you covered,” said Dean Hager, CEO of Jamf.“We are here to help you leverage Jamf’s enterprise-secure, consumer-simple technology to further empower your teams.”
Key announcements include:
Jamf Protect: the only comprehensive endpoint and network security platform built for Apple
Jamf announces a new set of endpoint protection technologies for macOS , with the goal of providing all of the tools an organization needs, in one platform, to maintain good device security hygiene, detect attacks, and stop malware from compromising endpoints, while also preventing incoming threats before they put users or devices at risk. Enhancements to Jamf Protect include:
- Network threat prevention: The most successful strategy for dealing with threats to macOS endpoints is to prevent them from reaching devices in the first place. To address the need for threat prevention on macOS, Jamf announces that it is extending its macOS endpoint protection feature set to now include threat prevention capabilities that add network-based indicators of compromise into the solution.
- Powerful analytics: Jamf’s endpoint protection provides comprehensive logging for both endpoint and network security events, allowing InfoSec teams to isolate and remediate detected threats, investigate incidents using data both on the device and from the…