Guide for Apple IT: Apple Business Manager

Apple Business Manager is a critical tool that Apple IT managers can use to help effectively manage Apple devices. In this Apple Business Manager guide, we will explore the entire portal and share some guidance on how you can make the most of this powerful tool. We will also explore how Apple Business Manager complements your Apple MDM. We’ve noticed there is some confusion around how Apple Business Manager is different from the Device Enrollment Program (DEP) and the Volume …

Keep Reading

Introducing MDM+, the Apple MDM We Wish We Had

You’ve chosen Apple — or maybe Apple has chosen you. Maybe your business has acquired a company that is an Apple shop. Perhaps your design or product teams say they need Macs in order to do their jobs well. Maybe your new hire won’t take the job unless they can work on an Apple device. Or, maybe Apple has been your ride or die for as long as you can remember. Despite the growth of Apple in the workplace, people …

Keep Reading

Zero Touch Deployment for Mac

Keeping up to date with your company’s cybersecurity needs is a never-ending task. There are always new cyber threats to deal with—and new tools to help combat them. There’s a new buzzword that’s gaining steam amongst businesses looking for ways to increase their mobile device security: zero touch deployment. What is zero touch deployment and how does it work? For those who may be unfamiliar with the concept of “zero touch” and how it relates to software deployments, here’s a …

Keep Reading

NIST Compliance for macOS

The National Institute of Standards and Technology, or NIST, is an organization in the U.S. Department of Commerce that deals with many aspects of technology—from communications systems, to quantum science, to health & bioscience. However, one of the things that NIST is best known for is its publications and standards regarding cybersecurity (such as the NIST cybersecurity framework and NIST 800-171). Maintaining compliance with the NIST cybersecurity framework is a major goal for many organizations because it helps to protect them against …

Keep Reading

FedRAMP Compliance for macOS

The Federal Risk and Authorization Management Program, or FedRAMP, is a government program designed to provide, as they put it in their FedRAMP Security Assessment Framework document, “a standardized approach to security assessment, authorization, and continuous monitoring for cloud-based services.” While FedRAMP is meant for cloud service providers (CSPs) and government agencies, other organizations can still benefit from maintaining FedRAMP compliance—especially if they plan to work with a government agency at some point. The scope for devices needing FedRAMP is …

Keep Reading

MDM, EMM, and UEM for Apple Devices

Having lived and breathed device management for a long time, it's easy to forget how acronym-laden this space can be. Whether you are new to device management and just getting your bearings, or an IT veteran looking for a sanity check, here is quick guide to tell the difference between mobile device management (MDM), enterprise mobility management (EMM), and the more recent variant, unified endpoint management (UEM). What is Mobile Device Management (MDM)? The general definition of mobile device management …

Keep Reading

CIS Compliance for macOS

These days, implementing a minimum level of security protections on your organization-owned devices is expected by your customers, suppliers, and employees. Whether you leverage an outsourced IT group (such as an MSP or MSSP) or have an internal team, best practices around endpoint security should be taken seriously. The challenge is that many organizations don't know where to start, and their MDM/EMM solution (if they have one) only covers a few basic settings, which simply won't cut it. Luckily, The Center for Internet Security …

Keep Reading