Safe Devices Only
  • 09 Mar 2023
  • 1 Minute to read
  • Dark
  • PDF

Safe Devices Only

  • Dark
  • PDF

Just because a device is sanctioned doesn't mean it is safe..

Every organization strives to protect their organization's crown jewels - its data – from outside threat and exfiltration. Computer and mobile endpoints are the conduits to access and make use of this data to get work done and drive business forward. Therefore, ensuring that only "safe" endpoints are able to access and store copies of company data is of paramount importance.

However the proliferation of laptops, mobile devices, cloud computing, and hybrid-work have completely overwhelemed most IT, InfoSec, legal, and compliance teams, leaving significant gaps in securely managing access to and storage of these data.

Jamf provides various security tools to help protect endpoints from threats and ascertain risk. When deployed as part of Trusted Access, these tools work in conjuction with Jamf Pro and Jamf Connect to influence the storage and accessibility of data based upon the determined risk level of any given device.

There are two types of protections that Jamf security products provide:

Endpoint - Protection from threats to the device itself, such as installed malware, out of date operating systems, or invalid compliance configurations.

Network - Protection from threats that utilize network connectivity to infect a device, phish a user, or exfiltrate data.

Identifying Safe Devices

Every organization is trying to play catchup to all the various means of being attacked. Keeping organizational data safe on devices is certainly a cat & mouse game, needing to be consistently addresses and reviewed. The best understanding that a device is safe to store or transmit corporate or sensitive data can be viewed in the following ways:

  1. Compliant - First is verify the device managed with all the proper compliance settings enforced.
  2. Secured - After the device is compliant, an organization must verify that proper security tools have been [installed and active].(
  3. Monitored - Now that the device is compliant and secured, on-going device and network threat reviews need to be identifying consistent risk to the organization.

Was this article helpful?

What's Next
Changing your password will log you out immediately. Use the new password to log back in.
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
Enter a valid email
Enter a valid password
Your profile has been successfully updated.