Zero Touch Deployment for Mac

Keeping up to date with your company’s cybersecurity needs is a never-ending task. There are always new cyber threats to deal with—and new tools to help combat them. There’s a new buzzword that’s gaining steam amongst businesses looking for ways to increase their mobile device security: zero touch deployment. What is zero touch deployment and how does it work? For those who may be unfamiliar with the concept of “zero touch” and how it relates to software deployments, here’s a …

Keep Reading

NIST Compliance for macOS

The National Institute of Standards and Technology, or NIST, is an organization in the U.S. Department of Commerce that deals with many aspects of technology—from communications systems, to quantum science, to health & bioscience. However, one of the things that NIST is best known for is its publications and standards regarding cybersecurity (such as the NIST cybersecurity framework and NIST 800-171). Maintaining compliance with the NIST cybersecurity framework is a major goal for many organizations because it helps to protect them against …

Keep Reading

FedRAMP Compliance for macOS

The Federal Risk and Authorization Management Program, or FedRAMP, is a government program designed to provide, as they put it in their FedRAMP Security Assessment Framework document, “a standardized approach to security assessment, authorization, and continuous monitoring for cloud-based services.” While FedRAMP is meant for cloud service providers (CSPs) and government agencies, other organizations can still benefit from maintaining FedRAMP compliance—especially if they plan to work with a government agency at some point. The scope for devices needing FedRAMP is …

Keep Reading

MDM, EMM, and UEM for Apple Devices

Having lived and breathed device management for a long time, it's easy to forget how acronym-laden this space can be. Whether you are new to device management and just getting your bearings, or an IT veteran looking for a sanity check, here is quick guide to tell the difference between mobile device management (MDM), enterprise mobility management (EMM), and the more recent variant, unified endpoint management (UEM). What is Mobile Device Management (MDM)? The general definition of mobile device management …

Keep Reading

CIS Compliance for macOS

These days, implementing a minimum level of security protections on your organization-owned devices is expected by your customers, suppliers, and employees. Whether you leverage an outsourced IT group (such as an MSP or MSSP) or have an internal team, best practices around endpoint security should be taken seriously. The challenge is that many organizations don't know where to start, and their MDM/EMM solution (if they have one) only covers a few basic settings, which simply won't cut it. Luckily, The Center for Internet Security …

Keep Reading