Hi [[ session.user.profile.firstName ]]

Best Practices for Managing Apple Devices: Secure and Empower a Remote Workforce

Covid-19 has had a huge impact on the global workforce - with more employees working remotely now than ever before. This new “virtual reality” is putting a strain on normal business operations at the same time as attackers are trying to exploit various vulnerabilities. How do you enable your employees to work securely?
Recorded Jan 26 2021 39 mins
Your place is confirmed,
we'll send you email reminders
Presented by
James Herbert, Solutions Engineer, Enterprise, OneLogin and Ross Drummond, Systems Engineer, Jamf
Presentation preview: Best Practices for Managing Apple Devices: Secure and Empower a Remote Workforce

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • What is Apple Business Manager? Mar 4 2021 9:00 am UTC 27 mins
    Danny Porter, Partner Development Manager
    Apple offers many tools and services that make it easy to set up and leverage Apple devices for work, whether employees are at home or in the office. IT administrators can utilize helpful functionalities and manage users, content and devices from a web-based portal called Apple Business Manager.

    In our webinar, What is Apple Business Manager, you’ll learn everything you need to know about Apple Business Manager and how to get started with it.

    We’ll show you:

    - An overview of Apple tools and services for businesses
    - A guided walk-through of the Apple Business Manager portal
    - How to set up your Apple devices in Apple Business Manager
    - How to enroll devices in a mobile device management (MDM) solution
  • The Formula for Secure, Identity Based Access Recorded: Feb 25 2021 29 mins
    Kaylee Carson, Jamf, Kelsey Nelson, Okta, Paul Cleary, Venafi
    Employees and their devices are more mobile than ever. With the evolution of remote work, security requirements are increasingly difficult to meet. It’s essential that organizations have the tools in place to ensure only the right people, devices and apps are accessing secure networks and sensitive corporate data.

    In this webinar, The Formula for Secure, Identity-Based Access, presenters from Okta, Venafi and Jamf discuss how implementing a modern, “zero trust” approach to identity-based access satisfies security requirements without compromising the end-user experience.

    You'll learn:
    - What it takes to leverage a "never trust, always verify” security model
    - How to provide passwordless access to business-critical apps
    - Best practices for integrating with cloud-identity providers
    - How to add an extra layer of armor by securing physical devices
  • The Definitive Guide to Digital Onboarding Recorded: Feb 24 2021 28 mins
    Kaylee Carlson
    With retention and productivity on the line, it is paramount that organizations offer the right technology and leverage the right tools to facilitate a streamlined onboarding process for remote and on-site employees.

    In our webinar, The Definitive Guide to Technology Onboarding, you’ll learn how to enable efficient technology onboarding workflows without sacrificing the user experience of new employees.

    We'll show you:

    What modern, user-centric technology onboarding looks like
    How to create a frictionless, zero-touch strategy
    Steps to prepare, purchase and deploy devices
    How to provide simple access to company resources
  • Best Practices for Managing Apple Devices: Secure and Empower a Remote Workforce Recorded: Jan 26 2021 39 mins
    James Herbert, Solutions Engineer, Enterprise, OneLogin and Ross Drummond, Systems Engineer, Jamf
    Covid-19 has had a huge impact on the global workforce - with more employees working remotely now than ever before. This new “virtual reality” is putting a strain on normal business operations at the same time as attackers are trying to exploit various vulnerabilities. How do you enable your employees to work securely?
  • An introduction to Apple Device Management Recorded: Jan 19 2021 35 mins
    Jim Grandbois
    While some are already familiar with Apple device management, many of you are diving in for the first time and seeking guidance on ways to properly deploy, manage and secure the growing number of Mac, iPad, iPhone and Apple TV devices joining your environment. If you fall into the “I want help” camp, we are here for you.

    In our webinar, Apple Device Management for Beginners, we’ll teach you the basics and help you build, and ultimately master, your Apple management skills.

    You’ll learn:

    What Apple services and programs are available
    The stages of Apple lifecycle management
    Best practices for infrastructure planning
  • Apple IT Trends for 2021 Recorded: Jan 12 2021 26 mins
    Garrett Denney, Product Manager, Jamf
    As another year passes, Apple's commitment to empowering business and education organisations is unquestionable. Evolved management capabilities and strategic partnerships aim to help more students, teachers and employees enjoy the unmatched capabilities of the Apple ecosystem than ever before.

    Before you finalise your technology plans for 2020, join us for a brief recap of the major milestones Apple has hit in 2019, and take a sneak peek at what Apple IT trends you can expect in the next year.

    We’ll cover:

    - Apple IT accomplishments in 2019
    - Predictions for Apple IT trends in 2020
    - IT initiatives to consider and how to implement

    Have questions about our webinar? Reach out to us at info@jamf.com.
  • 5 mythes over Apple Security Recorded: Jan 5 2021 42 mins
    Jeroen Bremmer
    Krijg antwoord op al je vragen omtrent Apple beveiliging en ontdek nieuwe en betere manieren om je Apple apparaten te beschermen.

    Ondanks het groeiende marktaandeel van Apple in ondernemingen zijn er nog steeds misvattingen en zorgen over de beveiliging van Apple hardware en apparaten in vergelijking met andere platformen.
    In onze webinar, 5 Apple Beveiligingsmythen, onderzoeken we gebieden waar verkeerde informatie blijft hangen en delen we de feiten op het gebied van Apple beveiliging zodat IT-beheerders en hun organisaties de veiligheid van hun Mac, iPad, iPhone en Apple TV-apparaten kunnen waarborgen.

    We behandelen vijf mythes:
    1. MDM is niet essentieel om een Apple apparaat te beveiligen
    2. Apple ID's zijn omslachtig en moeilijk te gebruiken
    3. Extra encryptie-instrumenten zijn vereist voor Apple
    4. De ingebouwde veiligheidsfuncties van Apple zijn niet genoeg
    5. Mac-apparaten verbinden met een netwerk is een must

    Heeft u vragen over onze webinar? Neem contact met ons op via bnl@jamf.com of bel ons vandaag nog, +31 20 241 6329.
  • How to Make Zero-Touch Deployment a Reality Recorded: Dec 18 2020 32 mins
    William Smith, Professional Services Engineer, Jamf
    Implementing a zero-touch deployment strategy means successfully deploying Mac, iPad and iPhone devices by the dozens, hundreds or even thousands without IT ever having to open a box.

    In our webinar, How to Make Zero-Touch Deployment a Reality, we'll show you the step-by-step workflows necessary to successfully utilize this key deployment functionality, as well as common pitfalls to avoid​.

    We'll cover:
    - What 'zero-touch deployment' really means
    - The benefits of zero-touch deployment
    - Step-by-step workflows from purchasing to provisioning
    - How to unlock a delightful end-user experience
  • The Formula for Secure, Identity Based Access Recorded: Dec 16 2020 29 mins
    Kaylee Carson, Jamf, Kelsey Nelson, Okta, Paul Cleary, Venafi
    Employees and their devices are more mobile than ever. With the evolution of remote work, security requirements are increasingly difficult to meet. It’s essential that organizations have the tools in place to ensure only the right people, devices and apps are accessing secure networks and sensitive corporate data.

    In this webinar, The Formula for Secure, Identity-Based Access, presenters from Okta, Venafi and Jamf discuss how implementing a modern, “zero trust” approach to identity-based access satisfies security requirements without compromising the end-user experience.

    You'll learn:
    - What it takes to leverage a "never trust, always verify” security model
    - How to provide passwordless access to business-critical apps
    - Best practices for integrating with cloud-identity providers
    - How to add an extra layer of armor by securing physical devices
  • Meistern Sie die Kunst von Zero Touch Deployments Recorded: Dec 14 2020 33 mins
    Fabian Ulmrich, Systems Engineer, Jamf
    Erfahren Sie, wie Benutzer dank der Bereitstellungsprogramme von Apple bereits unmittelbar nach dem Auspacken ihres Mac, iPad oder iPhone produktiv sein können.
  • Mac Security Trends in 2020 Recorded: Nov 23 2020 34 mins
    Andrew Medearis, Senior Product Manager, Patrick Wardle, Principal Security Researcher, Mathias Wollnik, Product Marketing
    Organisations have long been discussing best practices and strategies when it comes to securing Windows devices and their networks. However, as Mac usage in the enterprise has grown and shows no signs of slowing, securing Mac endpoints is now a crucial part of the discussion.

    In our webinar, Mac Security Trends in 2020, we'll address several findings from a recent, global survey that assessed how security professionals secure Mac in the enterprise.

    We'll cover:

    - Mac usage in organisations and resulting security concerns
    - The security posture of Mac and how their perception affects deployments
    - The methods organisations are using to secure Mac
  • How to Remediate a macOS Security Incident Recorded: Nov 16 2020 24 mins
    Dave Hornby, Business Development Engineer, Security
    Today's organisation needs a robust framework to defend against malicious security threats. Fortunately, there are tools, workflows and best practices to ensure organisations are prepared should a cyberattack or security breach occur.

    In our webinar, How to Remediate a macOS Security Incident, we'll explain the four key components of a security incident response and how to meet the standard for each.

    You'll learn how to:

    - Prepare for incidents
    - Detect and analyse incidents
    - Contain, eradicate and recover from incidents
    - Monitor post-incident activity
  • The Definitive Guide to Digital Onboarding Recorded: Sep 24 2020 28 mins
    Kaylee Carlson, Product Marketing Manager, Jamf
    With retention and productivity on the line, it is paramount that organizations offer the right technology and leverage the right tools to facilitate a streamlined onboarding process for remote and on-site employees.

    In our webinar, The Definitive Guide to Technology Onboarding, you’ll learn how to enable efficient technology onboarding workflows without sacrificing the user experience of new employees.

    We'll show you:

    What modern, user-centric technology onboarding looks like
    How to create a frictionless, zero-touch strategy
    Steps to prepare, purchase and deploy devices
    How to provide simple access to company resources

    Contact us today on www.jamf.com
  • The Future of the Digital Workplace Recorded: Sep 17 2020 28 mins
    Kieran O'Connor, RSM, Jamf
    More digital transformation has happened over the last 3-months than ever before. Has your organisation seen a shift in the way employees are working and do you see this changing the future of your workforce?

    Contact us today on www.jamf.com
  • Gestion de la sécurité des Mac dans l’enseignement supérieur Recorded: Sep 16 2020 44 mins
    Guillaume Pereira, Education Sales Manager, et Matthieu Castel, Sales Engineer
    Alors que de plus en plus d’établissements d’enseignement supérieur déploient des Mac, la sécurité et la confidentialité deviennent des préoccupations majeures. De plus, les menaces spécifiques au Mac augmentent et les équipes ne peuvent plus se fier uniquement aux fonctionnalités intégrées aux appareils Apple. Dans un environnement en constante évolution, comment peut-on garantir la sécurité des appareil et données ?

    Lors de notre webinaire vous découvrirez les meilleures pratiques pour garantir la sécurité des Mac, notamment comment :
    • Détecter les menaces spécifiques aux Mac et prévention des logiciels malveillants
    • Surveiller la conformité des appareils macOS
    • Sécuriser les appareils Apple avec un impact minimal pour les utilisateurs finaux
    • Mettre en place ces workflows dans son environnement
    • Retour d’expérience de l’Université Lumière Lyon 2

    Contactez-nous aujourd'hui à france@jamf.com
  • Master the Art of Zero-Touch Deployments Recorded: Sep 15 2020 25 mins
    Jim Grandbois
    In the era of zero-touch deployment, IT can now successfully deploy Mac, iPad and iPhone to users directly without ever having to open the box. Apple’s deployment programs enable this by automating enrolment and configuration from a central location — eliminating the need to ever physically touch the device.

    In this webinar, Master the Art of Zero-Touch Deployments, we will demystify Apple’s deployment programs and walk through what it takes to implement these programs in your organisation.

    Contact us today on www.jamf.com
  • The Future of the Digital Workplace Recorded: Aug 20 2020 28 mins
    Kieran O'Connor, RSM, Jamf
    More digital transformation has happened over the last 3-months than ever before. Has your organisation seen a shift in the way employees are working and do you see this changing the future of your workforce?

    Contact us today on www.jamf.com
  • Jamf Protect: Compliance, threat detection, and malware prevention for macOS Recorded: Aug 18 2020 37 mins
    Dave Hornby
    An organisation’s security posture is paramount to its enterprise success. As employees continue to demand Mac for their work computer, it’s time to get serious about Mac endpoint protection. Instead of leveraging a Windows security solution in an attempt to protect Mac, you need a security solution that's purpose-built by Mac users for Mac users.

    In our webinar, Jamf Protect: Compliance, threat detection, and malware prevention for macOS, we’ll walk you through the capabilities of our new solution and demonstrate how you can:

    Comprehensive detection of Mac-specific threats and malware prevention
    Monitor compliance of macOS devices
    Secure Apple devices with minimal impact to end-users
  • Jamf Protect: Compliance, detectie van bedreigingen en preventie van malware Recorded: Aug 18 2020 32 mins
    Jeroen Bremmer, Systems Engineer, Jamf
    Het beveiligingslandschap voor bedrijven verandert. Een uniforme oplossing levert niet het niveau van inzicht dat nodig is om de geavanceerde bedreigingen van vandaag de dag het hoofd te bieden.
  • Jamf Protect für macOS: Compliance und Sicherheit gewährleisten, Malware verhind Recorded: Aug 17 2020 39 mins
    Matthias Wollnik, Product Marketing Manager Jamf Protect, Jamf
    Selbst die beste Hardware kann von einem besseren Schutz profitieren.
The Standard for Apple in the Enterprise
Contact us today to find out more - https://www.jamf.com/

Empowering your organization with Apple is what we do. Jamf is trusted by IBM, SAP, Ohio State and 35,000+ other businesses and schools. Jamf, the standard for Apple in the enterprise, extends the legendary Apple experience people love to businesses, schools and government organizations through its software and the 100,000 members of Jamf Nation, the largest community of Apple IT admins in the world. Jamf offers the whole product experience, meaning our services don’t stop once you become a customer. If anything, they only get better. From our world-class support model that provides you with a designated Jamf expert, to our educational courses that show you everything you need to know about our tool, to the members of the Jamf Nation community who are ready to talk Apple management at a moment’s notice, you will not find a better Apple management provider out there.

Contact us today to find out more - https://www.jamf.com/

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Best Practices for Managing Apple Devices: Secure and Empower a Remote Workforce
  • Live at: Jan 26 2021 10:00 am
  • Presented by: James Herbert, Solutions Engineer, Enterprise, OneLogin and Ross Drummond, Systems Engineer, Jamf
  • From:
Your email has been sent.
or close