![]() This should be done via a triggered event, or an event based workflow so it happens as soon as it can. They day they leave, all their access should be cut to all systems. You have a senior developer leave your Org for a new job. Lets toss a real world scenario into play. We are genuinely excited to make these capabilities generally available and can’t wait to see how our customers will use them.My problem is I don't want to wait hours/days for data to sync from jamf to Intune to stop someone from accessing a resource. This is a solution that is integrated, modern, and is The feedback has been universally positive. Since the announcement on this partnership, we have had the opportunity to personally talk with more than 100 joint customers. We are looking forward to hearing your feedback and continuing to add new features in the coming year. Because these solutions now work together, IT can enjoy the management power of each ecosystem with the simplicity of inventory reporting in a single pane of glass. Here’s an overview of the architecture for this integration:īoth of our teams are excited to continue working together to enable this functionality for our mutual customers. To fix any security issues causing the device to be non-compliant and preventing them from accessing company data. This integration also provides a user-friendly remediation experience for noncompliant devices. If the Mac is compliant with the conditional access policies IT has set, it will be given access to the protected company resources. This inventory data can then be analyzed by Intune’s compliance engine to generate a report and then, combined with intelligence about the user’s identity, enforce conditional access via EMS. With critical information about the security status of managed Macs, this inventory opens up the ability to do single-pane-of-glass reporting within Intune. Jamf admins will now be able to sync their Mac inventory data with Intune and the Microsoft Cloud. We combined the power of the unified endpoint management and conditional access in EMS with Jamf’s Mac device management capabilities to meet the needs of our mutual customers, focusing on three key functions: ![]() The reasoning behind this partnership is simple: Our mutual customers were looking for a way to enforce EMS conditional access policies across all the devices their users chose to use - PCs, mobile devices, and Macs. With this partnership, Jamf is continually feeding the rich data on Macs from Jamf Pro into the Microsoft Cloud – further strengthening the ability of the Microsoft Cloud to protect access to company data. Conditional access gives IT the power to enforce policies that work in real-time based on the intelligence in the Microsoft Cloud. Given the increasing sophistication of the attacks and the speed at which these attacks are designed to spread, organizations require solutions that put the power of intelligent clouds working on their behalf 24x7 to assist them in protecting the organization. This identity-driven security model is what is needed in the modern world of cloud services and mobile devices. Access is then “conditionally” granted to company data based on the policies IT has defined - and this action relies on the unique data and intelligence in the Microsoft Cloud. Each time access to corporate data is requested, EMS is able to quickly determine if the request is in fact coming from a trusted user, on a trusted device, with a trusted app. To address this challenge, EMS has delivered a unique set of security controls for the modern world. However, the perimeter-based security model that organizations have traditionally used is no longer effective in providing this level of security when the data is increasingly outside of the corporate firewall – in cloud services and on mobile devices. Jamf customers can upgrade to Jamf Pro 10.1 to get startedīeen updated with this functionality and are available globally.Įvery organization wants to ensure that only trusted users, on trusted devices, using trusted apps get access to their data. ![]() Today, Microsoft and Jamf are proud to make this integration generally available to our shared customers. To ensure that company data can only be accessed by trusted users, from trusted devices, using trusted apps. ![]() Microsoft Enterprise Mobility + Security (EMS) , we talked about how our partnership would provide an automated compliance-based solution for secure access to corporate data from Mac devices. Jamf Nation User Conference (JNUC) in October This post is co-authored by Brad Anderson, Corporate Vice President, Microsoft and Dean Hager, CEO, Jamf. First published on CloudBlogs on Dec 14, 2017
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |