Jamf offers enterprise IT security and compliance tools

Enterprise IT teams responsible for managing Macs and iOS devices are getting new compliance and security tools from the device management company Jamf said during his spring event. A new feature in Jamf Connect allows granting temporary administrative privileges to a local Mac user. This activity data powers Jamf Protect, which just added a compliance dashboard that presents overall fleet compliance and drills down to individual devices.

Jamf Connect creates a cloud-based identity for each user that, once authenticated, allows them to set up access to the tools and applications they need via VPN. The new feature, Privilege Escalation, temporarily grants end users elevated administrator privileges to perform tasks such as updating device drivers, installing printers, and adding software not managed by Self-Service. Once the IT-set privilege escalation time expires, the user automatically reverts to the standard user role.

Jamf has also added a compliance dashboard to Jamf Protect, which it provides anti-malware tools, threat defense, and metrics for a variety of macOS and iOS devices. From the dashboard, an administrator can view which devices are not compliant with the guidelines; update any software, including operating system version, that requires it; and automatically quarantine suspicious files. The new fleet hardening score in Jamf Protect is an aggregate baseline score that quantifies your organization’s overall level of endpoint security. Administrators can learn more individual devices to understand and solve problems.

The integration between Jamf Connect and Jamf Protect provides administrators with detailed telemetry about privileged activities performed on the device. Administrators can use telemetry to monitor endpoints and as part of intrusion detection and response.

Apple devices have long established themselves presence in business. Enterprise-grade tools like Jamf’s help ensure that these devices remain compliant with expectations for corporate security standards.



Source link

Leave a Reply

Your email address will not be published. Required fields are marked *