- 23 Sep 2022
- 1 Minute to read
- DarkLight
- PDF
Threat and Risk Management
- Updated on 23 Sep 2022
- 1 Minute to read
- DarkLight
- PDF
Just because a device is sanctioned doesn't mean that the device is safe.
For this reason, the Trusted Access solution calls for on-device and in-network endpoint protection technologies that ensure devices are:
- Protected from inbound threats to the maximum extent possible.
- Compliant against a company's security baselines.
- Able to report their activity to security analytics tools (EDR/XDR) to enable sophisticated threat hunting.
- Provided a risk level given each devices instantaneous state and health to drive risk-based access controls.
- Are able to self-remediate or request assistance from the device's end user.
Jamf provides first party endpoint security tools for macOS, iOS/iPadOS, and Android devices. Refer to the Device Trust, User Identity, and Deployment for details on how to deploy and configure Jamf Protect or Jamf Trust across these platforms and ownership modes.
Most importantly, you will need to define your organization's security policy across your macOS, iOS/iPadOS, and Android devices.
More advanced security organizations can then steam threat and activity metadata to the SIEM or XDR , or various Jamf API Interfaces for custom workflows.