Threat and Risk Management
  • 23 Sep 2022
  • 1 Minute to read
  • Dark
  • PDF

Threat and Risk Management

  • Dark
  • PDF

Article summary

Just because a device is sanctioned doesn't mean that the device is safe.

For this reason, the Trusted Access solution calls for on-device and in-network endpoint protection technologies that ensure devices are:

  • Protected from inbound threats to the maximum extent possible.
  • Compliant against a company's security baselines.
  • Able to report their activity to security analytics tools (EDR/XDR) to enable sophisticated threat hunting.
  • Provided a risk level given each devices instantaneous state and health to drive risk-based access controls.
  • Are able to self-remediate or request assistance from the device's end user.

Jamf provides first party endpoint security tools for macOS, iOS/iPadOS, and Android devices. Refer to the Device Trust, User Identity, and Deployment for details on how to deploy and configure Jamf Protect or Jamf Trust across these platforms and ownership modes.

Most importantly, you will need to define your organization's security policy across your macOS, iOS/iPadOS, and Android devices.

More advanced security organizations can then steam threat and activity metadata to the SIEM or XDR , or various Jamf API Interfaces for custom workflows.

Changing your password will log you out immediately. Use the new password to log back in.
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
Enter a valid email
Enter a valid password
Your profile has been successfully updated.