's Avatar

@kandji.bsky.social

34 Followers  |  3 Following  |  96 Posts  |  Joined: 18.11.2024  |  1.8977

Latest posts by kandji.bsky.social on Bluesky

Preview
macOS Vulnerabilities: A Year of Security Research at Kandji Kandji researchers uncovered and disclosed key macOS vulnerabilities over the past year. Learn how we protect customers through detection and patching.

Why does Kandji invest in proprietary security research?

Because when we find vulnerabilities before attackers do, everyone wins.

Our team put together a walk-through of the past year's discoveriesβ€”dive in here:

01.05.2025 21:14 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Apple in the Enterprise: A 2025 report card In 2021, device-management startup Kandji approached Six Colors to commission a new entry in our Report Card series focusing on how Apple’s doing in large organizations, including businesses, educa…

The report surveyed IT pros managing Apple devices at scale, and goes over everything from hardware and security, to OS rollouts, to AI on devices.

πŸ‘‰ Dive into the full report and insights: buff.ly/piUm3gR

30.04.2025 20:53 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Apple in the Enterprise: A 2025 report card Kandji approached Six Colors to commission a new entry in their Report Card series focusing on how Apple’s doing in large organizations. Explore the 2025 survey results, plus comments from survey participants.

Apple’s influence in enterprise IT keeps growingβ€”but are they living up to expectations? πŸ‘€

The latest Six Colors Apple in the Enterprise Report Card for 2025 is out and explores the answer.

30.04.2025 20:53 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

IT leaders don’t need less automationβ€”they need the right kind of automation.

How do you decide what to automate?

29.04.2025 15:42 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

βœ… Automated compliance checks mean you don’t have to trust; you can verify.
βœ… Automated patch rollbacks mean you can deploy updates without fear.
βœ… Policy-based automation ensures every endpoint is configured exactly as intended.

29.04.2025 15:42 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

So the fear of losing control with automation makes sense. But what if we flipped the narrative?

Done right, automation doesn’t remove controlβ€”it strengthens it.

29.04.2025 15:42 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

Ask an IT admin what keeps them up at night, and they’ll likely tell you:
πŸ‘‰ A patch that introduces a system-breaking bug.
πŸ‘‰ A security update that conflicts with legacy apps.
πŸ‘‰ A misconfiguration that locks users out.

29.04.2025 15:42 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Preview
The Future of Scoping: Assignment Maps Explained In Kandji's latest Demo Day, learn how Assignment Maps make app and configuration management for Apple devices easier and more intuitive.

Kandji’s latest Demo Day focused on Assignment Maps, a visual, logic-based way to automate and precisely control the assignment of apps and configurations to your devices.

See how this powerful feature can revolutionize your device management:

25.04.2025 20:37 β€” πŸ‘ 1    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0

If IT embraces automation through an automation-driven MDM like Kandji's, it becomes a strategic driver of security and efficiency.

Where does your IT team still rely on manual work?

23.04.2025 21:43 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

What would your IT team do with that reclaimed time?
How much faster could security threats be addressed?
How much better could IT support employees?

If IT doesn’t automate, it falls behind.

23.04.2025 21:43 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

Think about your team's daily IT operations.

How much time is spent on:
Resetting passwords?
Deploying software updates?
Approving access requests?
Scrambling for compliance reports?

Now, imagine if none of those tasks required manual intervention.

23.04.2025 21:43 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

The best security posture is one that never falls behind.

A unified MDM, EDR, and Vulnerability Management solution like Kandji's can help you easily accomplish this across your Apple fleet in one convenient platform.

What security workflows is your company automating?

#EDR #ITAutomation #ITAdmin

22.04.2025 17:06 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

πŸ‘‰ Automated Patching β†’ Zero-day vulnerabilities don’t wait for IT schedules.
πŸ‘‰ Real-Time Access Controls β†’ Reduce insider threats with automatic deprovisioning.
πŸ‘‰ Compliance Audits on Autopilot β†’ Stop scrambling before auditsβ€”automate security checks.

22.04.2025 17:06 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

Security threats evolve faster than manual processes can keep up.

If you’re not automating security, you’re falling behind.

22.04.2025 17:06 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

5 IT and security workflows to automate today:
1️⃣ Onboarding & offboarding – No more access lag.
2️⃣ Patching – Close vulnerabilities faster.
3️⃣ Threat detection & response – Cut incident response time.
4️⃣ Compliance monitoring – Avoid fines.
5️⃣ Software deployment – No more manual installs.

17.04.2025 16:42 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

Are you curious where your peers get updates on the latest IT and security news?

We were curious too. So we took the question to our community in a broad survey of professionals - from security experts to technology leaders and admins.

Results found here: www.kandji.io/blog/top-content-for-it-pros

16.04.2025 16:05 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Video thumbnail

Does this make any sense to you?!

I'm not afraid to admit that I honestly don't understand it.

If you have a legitimate explanation, please explain it to me in the comments!

#MacSecurity #MacAdmin #DeviceSecurity #MacOS #iOS

15.04.2025 17:05 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
PasivRobber: Chinese Spyware or Security Tool? In March 2025, our team found a suspicious mach-O file named wsus. Read the full analysis on its likely origins, target users, and observed functionality.

Our Threat Intelligence team analyzed a software suite that targets applications like WeChat and QQ.

Explore our team's analysis on this suspicious mach-O file's likely origins, target users, and observed functionality: buff.ly/bkhlcoy

14.04.2025 14:29 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

βœ… Automated patching pushed updates within 2 hours.
βœ… Threat response workflows kicked in instantly.
βœ… Downtime: Zero.

The CIO’s takeaway? πŸ‘‰ "Manual oversight feels safeβ€”until it isn’t."

The key isn’t avoiding automation. It’s implementing automation that works for you, not against you.

11.04.2025 17:00 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

A Fortune 500 company’s IT team was manual-first by design. Their CIO believed automation would introduce risk.

Then it happened.

❌ A zero-day exploit hit.
❌ The patch was available, but deployment took 48 hours.
❌ Within 24 hours, attackers had breached 30% of their systems.

Their competitors?

11.04.2025 17:00 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

If your company is managing Apple devices without fully leveraging ABM, you’re working harder than you need to.

What’s your biggest Apple device management challenge right now?

09.04.2025 16:00 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

❌ Not enforcing Activation Lock bypass – If a device is lost or stolen, can IT reclaim it? Many companies don’t have this set up properly.

❌ Skipping Apps and Books purchasing – Are you manually distributing apps? ABM lets you assign and revoke licenses with zero user involvement.

09.04.2025 16:00 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

❌ Not using Automated Device Enrollment (ADE) – Still manually setting up devices? You’re missing out on true zero-touch deployment.

❌ Ignoring Managed Apple Accounts – Employees using personal Apple Accounts = app sprawl, lost access, and security risks.

09.04.2025 16:00 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

Are you getting the most out of Apple Business Manager (ABM)?

Most companies think they’re using ABM correctly, but in reality, they’re leaving powerful features untapped.

Here’s what we see IT teams overlooking when managing Apple devices:

09.04.2025 16:00 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Preview
Caught in the WebKit: Getting Tangled with CVE-2025-24201 CVE-2025-24201, a high-severity WebKit vulnerability, can affect multiple browsers. Learn what this means for your organization and what to monitor next.

CVE-2025-24201, a high-severity WebKit vulnerability targeting multiple AppleOS platforms, can affect multiple browsers.

Learn what this means for your organization with our team's breakdown: buff.ly/xnSJ3OI

#ITsecurity #VulnerabilityManagement #ThreatIntelligence #DeviceSecurity

08.04.2025 15:41 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Demo Day - Assignment Maps Join Demo Day to explore how Assignment Maps automate device scoping and configuration for Apple fleets, featuring expert insights and a live Q&A session.

This is a (virtual) live, hands-on walkthrough straight from some of our Solutions Engineering team - Brian Van Peski, Joe Soliman, and Maz Kahale.

πŸ—“οΈ Next Thursday, April 17th at 11:00 AM ET
πŸ”— Sign up here: buff.ly/1Pp6TT3

#MacAdmin #DeviceManagement #MDM #ITAutomation #Kandji

07.04.2025 16:19 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Demo Day - Assignment Maps Join Demo Day to explore how Assignment Maps automate device scoping and configuration for Apple fleets, featuring expert insights and a live Q&A session.

Join Kandji's next Demo Day April 17th to see for yourself how to:
β€’ Group devices based on attributes like department, location, or user type
β€’ Apply configurations automatically, without the manual overhead
β€’ Resolve conflicts in real-time with logic and hierarchy-based rules

07.04.2025 16:19 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Preview
Demo Day - Assignment Maps Join Demo Day to explore how Assignment Maps automate device scoping and configuration for Apple fleets, featuring expert insights and a live Q&A session.

Manual configurations don’t scale. Assignment Maps do.

Assignment Maps rethink how IT teams scope and configure devicesβ€”turning what’s usually a time-consuming process into something intuitive, automated, and reliable.

07.04.2025 16:19 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Video thumbnail

This is a big misconception about Kandji that simply isn't true.

We second Arek's dare. Here's our free trial link: signup.kandji.io πŸ‘€

#Kandji #MDM #EDR #ITAdmin #MacAdmin

03.04.2025 16:06 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Managing and securing devices doesn’t have to be complicated. Watch the full session to see how Kandji makes it easy: buff.ly/7MLXlLX

#AppleMDM #MacAdmin #ITSecurity #DeviceManagement #MDM

02.04.2025 20:55 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

@kandji is following 3 prominent accounts