Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Securing the Risky Mobile Workforce Matt Woodruff, Enterprise Security Solutions, Jamf Supporting a mobile workforce will take more than just a standard mobile device management program to mitigate threats and provide effective complianc... 4 months ago | 24 mins The Art of Zero Touch Deployments Jim Grandbois, Partner Marketing, Jamf The bygone days of imaging have made way for zero-touch deployments, empowering IT to successfully deploy Mac, iPad and iPhone to users directly witho... 7 months ago | 27 mins Tech in the classroom: The educator's guide to device lifecycle management Curtis Armstrong, Field Engineer, Jamf Let's be honest. IT admins face unexpected challenges like onboarding new and experienced teachers, introducing new technology, or distributing studen... 7 months ago | 22 mins Apple Enterprise Management for Beginners Kaylee Carlson, Product Marketing Manager Apple, Microsoft and Google all have unique workflows, and no one tool meets the needs of each ecosystem. Which means IT and security teams need a uni... 8 months ago | 27 mins Mobile Threat Patterns Across Australia | 2022 Q4 Analysis Pat Shueh | VP of Solution Engineering, Zimperium Mobile is the unsecured dream frontier for malicious actors targeting critical data and IT systems here in Australia. No matter the device, OS or own... February 7, 2023 12:00am Safeguarding Federal Agency Mobile Applications and Devices Chris Gogoel, Vice President of Program and Product Management & Ilya Dreytser, Head of Customer Engineering Mobile devices are essential to any workplace and have become increasingly vital as more applications allow employees to work and live from anywhere. ... 6 days ago | 32 mins Reaching Your Users Where They Are—Request Service From Your Collaboration Tools Peter Di Stefano, Principal Product Marketing Manager & David Russell, Solutions Engineer When your users need help, it shouldn’t matter where they are or what tools they use to engage; it needs to be quick, simple, and effective. Businesse... February 8, 2023 4:00pm Deep Dive: How to Migrate Native GPOs to Microsoft Intune Jeremy Moskowitz (CTO and Founder of PolicyPak, now part of Netwrix) This is a shell webinarIf your organization is like most, shifting from a traditional in-office model to a modern remote or hybrid workforce — while e... February 15, 2023 6:00pm Corporate Applications on the Move using Hybrid Workspaces Paul Pedron, Hybrid Workspaces Product Manager, Micro Focus Today’s workers are as mobile as the devices they rely on. Some split time between traditional and home offices. Some are digital nomads who are const... February 9, 2023 4:00pm Prevent Online Consumer Fraud Using Risk Signals and Biometrics Maya Ogranovitch Scott, Solutions Marketing Manager, Ping Identity & Alex Wong, Director Product Management, Ping Identity As an existing Ping customer, you probably have a good handle on SSO and MFA concerns, but online consumer fraud is on the rise and it’s directly affe... February 9, 2023 5:00pm Load more