iTWire – Jamf boosts security capabilities

Apple enterprise management specialist Jamf has developed new technologies to help organizations provide an environment that is “enterprise secure and consumer simple”.

Jamf’s new technologies are being delivered as enhancements to the Jamf Protect product, and two new products, Jamf Trust and Jamf Safe Internet.

The enhancements to Jamf Protect make Jamf the only comprehensive endpoint and network security platform built for Apple, the company claims.

• Network threat prevention: Jamf’s macOS endpoint protection now includes detection of network-based indicators of compromise.

• Powerful analytics: Comprehensive logging for both endpoint and network security events helps InfoSec teams isolate and remediate threats detected, and investigate incidents using data collected on the device and from the network. It also provides improved visibility of the IT environment.

• Removable storage: New removable storage controls ensure sensitive business data is only written to encrypted USB mass media drives, thus protecting against physical loss and unauthorized data access.

Jamf Trust supports workflows related to Jamf Threat Defense, Jamf Safe Internet, Jamf Data Policy, and Jamf Private Access (among other Jamf products). It will give users access to security capabilities without impacting device performance or productivity, the company said. Jamf Trust will be available for iOS, iPadOS, macOS, Android and Windows starting in May.

Jamf Safe Internet combines content filtering and network threat prevention, and is aimed primarily at educational institutions. Protection from against malware and phishing attacks is combined with vast content-filtering database. The lightweight technology is said to filter results without invading student privacy or sacrificing the learning experience that Apple devices provide.

Jamf Safe Internet will be available for macOS and iOS this winter.

“Organisations should not have to choose between comprehensive security and exceptional usability in today’s work anywhere environments. That’s why we are excited to expand on the security capabilities available in the enterprise-secure, consumer-simple platform our customers know and love,” said Jamf. vice president of portfolio strategy Michael Covington.

“At Jamf, we are rethinking endpoint security to meet the needs of the modern enterprise. We want organizations to confidently send devices into the world that have good baseline configurations that can detect and stop malware, and that are equipped with preventative measures to block inbound attacks like phishing from impacting worker productivity.”


The past year has seen a meteoric rise in ransomware incidents worldwide.

Over the past 12 months, SonicWall Capture Labs threat researchers have diligently tracked the meteoric rise in cyberattacks, as well as trends and activity across all threat vectors, including:

Encrypted threats
IoT malware
Zero-day attacks and more

These exclusive findings are now available via the 2022 SonicWall Cyber ​​Threat Report, which ensures SMBs, government agencies, enterprises and other organizations have the actionable intelligence needed to combat the rising tide of cybercrime threat.

Click the button below to get the report.



It’s all about Webinars.

Marketing budgets are now focused on Webinars combined with Lead Generation.

If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site and prominent Newsletter promotion and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV which will be used in Promotional Posts on the iTWire Home Page.

Now we are coming out of Lockdown iTWire will be focused to assisting with your webinars and campaigns and assistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.

We look forward to discussing your campaign goals with you. Please click the button below.



Leave a Comment