{"id":21817,"date":"2023-04-24T09:04:37","date_gmt":"2023-04-24T17:04:37","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2023\/04\/24\/news-15548\/"},"modified":"2023-04-24T09:04:37","modified_gmt":"2023-04-24T17:04:37","slug":"news-15548","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/04\/24\/news-15548\/","title":{"rendered":"Jamf debuts sophisticated security protection for executive iPhones"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/idge\/imported\/imageapi\/2023\/04\/08\/08\/lifestyle_iphone_back_2-100939531-small.jpg\"\/><\/p>\n<p>Newton\u2019s Third Law of motion argues that for every action there is an equal and opposite reaction. With that in mind, it\u2019s no surprise that the Apple ecosystem is fighting back in a big way against the <a href=\"https:\/\/www.computerworld.com\/article\/3692922\/yet-more-digital-spies-targeting-iphones-exposed-by-security-researchers.html\">mercenary spyware companies<\/a> that have <a href=\"https:\/\/www.computerworld.com\/article\/3693691\/nso-group-returns-with-triple-ios-1516-zero-click-spyware-attack.html\">made headlines recently<\/a>.<\/p>\n<p>Few people in tech sit comfortably with <a href=\"https:\/\/www.computerworld.com\/article\/3666688\/apple-slaps-hard-against-mercenary-surveillance-as-a-service-industry.html\">NSO Group<\/a> and others in their<a href=\"https:\/\/www.computerworld.com\/article\/3694132\/security-researchers-uncover-nso-group-iphone-attacks-in-europe.html\">\u00a0attacks\u00a0against journalists, human rights advocates, and high-value targets<\/a>\u00a0on behalf of repressive governments. They know that these technologies tend to proliferate, which is why most firms are now engaged in finding new ways to fight back.<\/p>\n<p>Apple has arguably already deployed one super-strong protection against attacks in the form of <a href=\"https:\/\/www.applemust.com\/how-to-use-lockdown-mode-on-your-iphone-ipad-and-mac\/\" rel=\"noopener nofollow\" target=\"_blank\">Lockdown Mode<\/a>, but there is more that can be done to improve situational awareness. After all, while Lockdown Mode will protect you if you think you might be attacked, it provides little visibility into whether you are or have been so targeted. That\u2019s information that\u2019s exceedingly hard to get when it comes to zero-day attacks such as those used by the NSO Group; identifying those exploits usually requites insight into what your systems are doing.<\/p>\n<p>Telematics data is one way security experts can identify when attempts are being made, or have succeeded, in subverting device security. They watch for signals of subversion, such as unexpected communications with servers, unexplained software downloads, or weird packets of outgoing data shared at unusual times of day. Those are among the typical signs an exploit has taken or is taking place, but spotting that information is beyond the capacity of most users.<\/p>\n<p>The nature of spyware attacks is they tend to target high-value users. With this in mind, Jamf introduced Executive Threat Protection, a solution that gathers and analyzes system logs and device information to identify threats. The solution is aimed at users such as government officials, senior executives, journalists, and the like. The company calls it an \u201cadvanced detection and response tool designed for mobile devices,&#8221; and says it is based on tech it <a href=\"https:\/\/www.computerworld.com\/article\/3674792\/jamf-buys-zecops-to-bring-world-class-security-to-apple-enterprise.html\">acquired when it purchased ZecOps in 2022<\/a>.<\/p>\n<p>The system works like this. The end user has an app installed on their device to gather system logs and device information. This data is constantly explored to identify indicators of potential compromise (IOC). If a threat is detected, the system includes remediation tools to create a timeline of events to help identify when a device is hit, as well as tools to sterilize it once it has been.<\/p>\n<p>What\u2019s critical is that this kind of deep exploration and analysis is <a href=\"https:\/\/www.jamf.com\/blog\/jamf-executive-threat-protection-launch\/\" rel=\"noopener nofollow\" target=\"_blank\">much better\u00a0at spotting the kind of sophisticated zero-day attacks<\/a>\u00a0that the new breed of surveillance-as-a-service mercenaries use in their attacks against such high level targets.<\/p>\n<p>Jamf CEO Dean Hager says it, \u201cgoes beyond endpoint security to provide advanced detection and response capabilities, empowering organizations to stay ahead of targeted attacks and safeguard their most high-risk workers.&#8221;<\/p>\n<p>Features of Executive Threat Protection include:<\/p>\n<p>Jamf also announced that it has joined the <a href=\"https:\/\/www.globenewswire.com\/news-release\/2023\/04\/18\/2649104\/0\/en\/Jamf-Expands-Collaboration-with-Microsoft-and-Joins-the-Microsoft-Intelligent-Security-Association-MISA.html\" rel=\"noopener nofollow\" target=\"_blank\">Microsoft Intelligent Security Association<\/a> (MISA). The latter means enterprises using Apple devices can integrate their Jamf Protect endpoint security protection with Microsoft Sentinel, a collaboration which also helps deliver early warning of attack.<\/p>\n<p>Jamf is evidently aiming at what is expected to become a $183 billion cybersecurity market in 2023. The company isn\u2019t alone (most in the Apple focused MDM space seem to be working on their own approaches to boost device security) and there\u2019s quite clearly demand among high-level targets for solutions of this kind.<\/p>\n<p>For most users, there is a little reassurance in that solutions do tend to proliferate over time, which suggests we can anticipate increasingly complex security protection to become a standard fitting in consumer devices.<\/p>\n<p>Security is a dance, of course, and as one set of flaws get plugged, criminals will seek out alternative weaknesses. That\u2019s why it\u2019s going to become increasingly important for every user to become security aware. It\u2019s also why everyone should make sure to protect home and personal devices against becoming conduits for lateral attacks against employers or business partners.<\/p>\n<p><em>Please follow me on\u00a0<a href=\"https:\/\/social.vivaldi.net\/@jonnyevans\" rel=\"nofollow noopener\" target=\"_blank\">Mastodon<\/a>, or join me in the\u00a0<a href=\"https:\/\/mewe.com\/join\/appleholics_bar_and_grill\" rel=\"nofollow noopener\" target=\"_blank\">AppleHolic\u2019s bar &amp; grill<\/a>\u00a0and\u00a0<\/em><a href=\"https:\/\/mewe.com\/join\/apple_discussions\" rel=\"nofollow noopener\" target=\"_blank\"><em>Apple<\/em>\u00a0<em>Discussions<\/em><\/a><em>\u00a0groups on MeWe.<\/em><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3694191\/jamf-debuts-sophisticated-security-protection-for-executive-iphones.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/idge\/imported\/imageapi\/2023\/04\/08\/08\/lifestyle_iphone_back_2-100939531-small.jpg\"\/><\/p>\n<article>\n<section class=\"page\">\n<p>Newton\u2019s Third Law of motion argues that for every action there is an equal and opposite reaction. With that in mind, it\u2019s no surprise that the Apple ecosystem is fighting back in a big way against the <a href=\"https:\/\/www.computerworld.com\/article\/3692922\/yet-more-digital-spies-targeting-iphones-exposed-by-security-researchers.html\">mercenary spyware companies<\/a> that have <a href=\"https:\/\/www.computerworld.com\/article\/3693691\/nso-group-returns-with-triple-ios-1516-zero-click-spyware-attack.html\">made headlines recently<\/a>.<\/p>\n<h2><strong>Improving situational awareness<\/strong><\/h2>\n<p>Few people in tech sit comfortably with <a href=\"https:\/\/www.computerworld.com\/article\/3666688\/apple-slaps-hard-against-mercenary-surveillance-as-a-service-industry.html\">NSO Group<\/a> and others in their<a href=\"https:\/\/www.computerworld.com\/article\/3694132\/security-researchers-uncover-nso-group-iphone-attacks-in-europe.html\">\u00a0attacks\u00a0against journalists, human rights advocates, and high-value targets<\/a>\u00a0on behalf of repressive governments. They know that these technologies tend to proliferate, which is why most firms are now engaged in finding new ways to fight back.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3694191\/jamf-debuts-sophisticated-security-protection-for-executive-iphones.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[2211,8826,10554,714,24580],"class_list":["post-21817","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-apple","tag-iphone","tag-mobile","tag-security","tag-small-and-medium-business"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/21817","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=21817"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/21817\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=21817"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=21817"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=21817"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}