Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Securing the Risky Mobile Workforce Matt Woodruff, Enterprise Security Solutions, Jamf Supporting a mobile workforce will take more than just a standard mobile device management program to mitigate threats and provide effective complianc... 4 months ago | 24 mins Mobile Threat Landscape [EMEA] David Williams (Senior Engineer), Connor Brant (iOS Researcher), Gabriel Cirlig (Lead Android Researcher) Mobile devices are now our primary access point for communications, finances, and our social lives –because of this, cybercriminals are increasingly f... 3 months ago | 71 mins Tech in the classroom: The educator's guide to device lifecycle management Curtis Armstrong, Field Engineer, Jamf Let's be honest. IT admins face unexpected challenges like onboarding new and experienced teachers, introducing new technology, or distributing studen... 7 months ago | 22 mins The Art of Zero Touch Deployments Jim Grandbois, Partner Marketing, Jamf The bygone days of imaging have made way for zero-touch deployments, empowering IT to successfully deploy Mac, iPad and iPhone to users directly witho... 7 months ago | 27 mins Apple Enterprise Management for Beginners Kaylee Carlson, Product Marketing Manager Apple, Microsoft and Google all have unique workflows, and no one tool meets the needs of each ecosystem. Which means IT and security teams need a uni... 8 months ago | 27 mins How to Stop Your Data from Leaving with Employees Stephanie Torto- Sr. Product Marketing Manager & Sai Chavali- Sr. Product Marketing Manager Employees are leaving – and subsequently joining – new organizations at an unprecedented rate. As a result, the Great Resignation, often referred to a... 5 months ago | 31 mins The Freedom Of Control: Enable Your Business While Minimizing Risk Patricia Titus, Markel Corporation; Jeff Farinich, New American Funding; Christian Toon, Pinsent Masons Control. For decades, it’s been the mandate for Enterprise IT teams. Keep data secure. Lock it down. Put it behind firewalls. Don’t let it slip onto p... January 31, 2023 3:00pm Shifting Software Security Training Left Fred Pinkett, Sr. Director Product Management Many organizations are “shifting left” to introduce security earlier in the software development lifecycle (SDLC). The benefits are more secure softwa... 3 days ago | 31 mins Why Identity Protection is essential for Zero Trust implementation David Muniz - Cybersecurity Specialist Zero Trust has been a hot cybersecurity topic for quite some time. Organizations have been implementing Zero Trust for some time, however, the movemen... February 1, 2023 5:00pm Shifting Software Security Training Left Fred Pinkett, Sr. Director Product Management Many organizations are “shifting left” to introduce security earlier in the software development lifecycle (SDLC). The benefits are more secure softwa... 3 days ago | 31 mins Load more