Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Header of Okta GmbH
Forums it-sa Expo Knowledge Forum E

Jamf + Okta: Unifying strong Identity security and seamless management on Apple

Sharing suspicious behavior to protect devices and secure identities in real-time.

calendar_today Tue, 22.10.2024, 11:15 - 11:30

event_available On site

place Forum, Booth 9-103

Action Video

south_east

Action description

south_east

Speaker

south_east

Themes

Identity and access management Mobile Security

Event

This action is part of the event Forums it-sa Expo

Action Video

grafischer Background
close

This video is available to the it-sa 365 community. 
Please register or log in with your login data.

Action description

Okta and Jamf innovate alongside Apple, developing modern authentication workflows that improve security without slowing staff down.
Jamf securely provisions local macOS user accounts with Okta credentials via Jamf Connect ending up enrolling users into FastPass: Okta's flagship authenticator.
Jamf Protect's endpoint protection, detection, and response capabilities integrate with Okta Identity Threat Protection (ITP) to enrich an organization’s understanding of user risk with deep, multi-platform device security context.
The combination of Jamf and Okta used with an Apple device enables real-time risk assessment and automated response actions such as re-evaluating access policies, enforcing step-up authentication, or logging events when a user's device becomes non-compliant or compromised.
... read more

Language: English

Questions and Answers: No

close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.