Are you ready for Big Sur? Join Apple experts Bradley Chambers and Tom Bridge on Oct. 7th to learn how to prepare for Big Sur and the future of Mac management. Register today

Apple Experts Talk macOS Big Sur, Device Management: Bradley Chambers & Tom Bridge




Are you ready for macOS® Big Sur? 

If you’re not, you’re not alone — but the countdown is on for organizations to find and implement an Apple® MDM for Mac® management before Big Sur arrives sometime this fall.

When you hear “MDM,” you might think of a few different things. MDM is short for Mobile Device Management, which refers to a product category, services or functionality across OSs, or more specifically Apple’s MDM protocol. Apple’s MDM protocol is what allows IT admins to send device management commands to macOS devices and  iOS devices running iOS 4 and later — in macOS Big Sur, it’ll be the only method admins will be able to use for device management. 

macOS Big Sur for the first time restricts the silent delivery and installation of configuration profiles to be exclusive to the Apple MDM protocol, making it essential for Mac admins to identify, evaluate, and implement an Apple MDM solution for continued macOS device / fleet management. This change impacts administrators to varying degrees depending on the end user devices you manage. Apple MDM for macOS devices may simply be one tool in a more holistic device management tool belt, while for other OSs, like Windows® and Linux®, admins must employ other device management options for remote and in-office workforces.

Mark your calendars on October 7th for an exclusive discussion on the implications of macOS Big Sur for Mac management with leading Apple technology experts. You’ll leave knowing exactly what you need to about macOS Big Sur, Apple MDM, and the future of device management. 

Join the Discussion: What You Should Know About macOS Big Sur, Apple MDM, & the Future of Device Management

As you prepare for the release of macOS Big Sur, listen in as two of the top minds in the Mac admin space share need-to-know information for configuring and securing Macs. 

On October 7th, join a virtual round table discussion on changes macOS Big Sur brings and what’s ahead for device management. The event’s speakers, who have decades of combined experience supporting Apple environments and using Macs, are:

Bradley Chambers, EDU IT director and all-things-Apple writer at 9to5Mac 
Tom Bridge, founding partner at premier IT management firm Technolutionary, and host of the MacAdmins podcast

You’ll learn details about what’s new in macOS Big Sur, how IT teams are approaching its release and Mac management, and predictions about the evolving device management ecosystem.

Get your questions ready for Bradley and Tom to answer live! 

Event Details

Seats are limited so save your spot today for this event. 

We’ll see you there live on October 7th at 9:30 am MT / 11:30 am ET.

If you can’t join live, register and we’ll send you a link to the recording for on-demand viewing. 

This event is hosted by JumpCloud®, the cloud directory platform that securely manages and connects users to their IT resources regardless of platform, provider, protocol, or location. JumpCloud offers Apple MDM alongside comprehensive device management for Mac, Windows, and Linux computers and the cloud or on-premises resources employees need at work. Try JumpCloud Free to experience the platform with up to 10 users and 10 devices.

Have more questions about MDM and device management? Keep the conversation going in the JumpCloud Lounge, a new public Slack workspace for your worldwide community of IT admins.


Recent Posts
RADIUS has long served the IT industry, securing networks and end user access to them. Now, cloud RADIUS provides the same benefits without the setup.

Blog

Cloud RADIUS 101

RADIUS has long served the IT industry, securing networks and end user access to them. Now, cloud RADIUS provides the same benefits without the setup.

There are four core ways to try to head off phishing attacks before they happen. Only one avoids phishing vectors altogether. Find it free here.

Blog

Anti-Phishing Approaches

There are four core ways to try to head off phishing attacks before they happen. Only one avoids phishing vectors altogether. Find it free here.

Understand the risk in updating passwords on Microsoft 365, and learn a new approach to securing a user’s core identity. Try JumpCloud Free.

Blog

The Risks to Updating Passwords on Microsoft 365

Understand the risk in updating passwords on Microsoft 365, and learn a new approach to securing a user’s core identity. Try JumpCloud Free.