Customers are able to define policies that suit their specific needs and risk levels. For example, a customer may want to only allow devices that are managed and originate from a specific IP address range, have a certain device risk score present, or have a minimum OS version. For companies that run applications on AWS, Jamf’s support creates an easy to way to secure business data by verifying someone trying to use an application is a trusted user and a trusted device. This integration is one component of the wider vision of Trusted Access Jamf that was presented at this year’s Jamf Nation User Conference.

We are excited to continue working  with AWS, one of the world’s most comprehensive and broadly adopted cloud offerings, to help our joint customers increase organizational security while simplifying security controls, said Dean Hager, CEO, Jamf. With this integration, organizations can use the AWS infrastructure they have invested in, empower users with the devices they love, and depend on security workflows that IT and security teams trust.”