This integration also provides a user-friendly remediation experience for noncompliant devices. If the Mac is compliant with the conditional access policies IT has set, it will be given access to the protected company resources. This inventory data can then be analyzed by Intune’s compliance engine to generate a report and then, combined with intelligence about the user’s identity, enforce conditional access via EMS. With critical information about the security status of managed Macs, this inventory opens up the ability to do single-pane-of-glass reporting within Intune. ![]() ![]() Jamf admins will now be able to sync their Mac inventory data with Intune and the Microsoft Cloud. We combined the power of the unified endpoint management and conditional access in EMS with Jamf’s Mac device management capabilities to meet the needs of our mutual customers, focusing on three key functions: The reasoning behind this partnership is simple: Our mutual customers were looking for a way to enforce EMS conditional access policies across all the devices their users chose to use - PCs, mobile devices, and Macs. With this partnership, Jamf is continually feeding the rich data on Macs from Jamf Pro into the Microsoft Cloud – further strengthening the ability of the Microsoft Cloud to protect access to company data. Conditional access gives IT the power to enforce policies that work in real-time based on the intelligence in the Microsoft Cloud. Given the increasing sophistication of the attacks and the speed at which these attacks are designed to spread, organizations require solutions that put the power of intelligent clouds working on their behalf 24x7 to assist them in protecting the organization. This identity-driven security model is what is needed in the modern world of cloud services and mobile devices. Access is then “conditionally” granted to company data based on the policies IT has defined - and this action relies on the unique data and intelligence in the Microsoft Cloud. Each time access to corporate data is requested, EMS is able to quickly determine if the request is in fact coming from a trusted user, on a trusted device, with a trusted app. To address this challenge, EMS has delivered a unique set of security controls for the modern world. However, the perimeter-based security model that organizations have traditionally used is no longer effective in providing this level of security when the data is increasingly outside of the corporate firewall – in cloud services and on mobile devices. ![]() Jamf customers can upgrade to Jamf Pro 10.1 to get startedīeen updated with this functionality and are available globally.Įvery organization wants to ensure that only trusted users, on trusted devices, using trusted apps get access to their data. ![]() Today, Microsoft and Jamf are proud to make this integration generally available to our shared customers. To ensure that company data can only be accessed by trusted users, from trusted devices, using trusted apps. Microsoft Enterprise Mobility + Security (EMS) , we talked about how our partnership would provide an automated compliance-based solution for secure access to corporate data from Mac devices. Jamf Nation User Conference (JNUC) in October This post is co-authored by Brad Anderson, Corporate Vice President, Microsoft and Dean Hager, CEO, Jamf. First published on CloudBlogs on Dec 14, 2017
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |