Overview
Learn essential strategies for maintaining IT policy compliance and meeting industry security standards for Apple devices in the workplace through this 42-minute webinar. Discover various security compliance forms and implementation methods for both corporate-owned and BYOD environments. Explore device management fundamentals, endpoint protection strategies, and specific considerations for Mac and mobile devices in regulated settings. Master compliance best practices including software updates, encryption protocols, and security training while gaining insights into compliance mandates and available tools. Delve into topics such as secure device baselines, the JAMF Compliance Editor, telemetry monitoring, and security information event management. Get practical guidance on establishing secure connections, maintaining enrolled devices, and fostering security awareness, with access to additional resources through the Jamf Nation Community and Security Lounge.
Syllabus
Introduction
Overview
Agenda
About Jamf
About Jamf Solutions
Overview of Compliance
Mobile Device Management
Software Updates
Encryption
Security Training
Endpoint Security
Ownership Model
Secure Device Baseline
Mac OS Security Compliance
JAMF Compliance Editor
Examples of Compliance
Telemetry and Security Information Event Management
Java Protect for Microsoft Sentinel
How to Ensure Complete Compliance
Enrolled Devices
Security Awareness
Establishing Secure Connections
Recap
Additional Resources
Jamf Nation Community
Jamf Security Lounge
Taught by
Jamf