Teqtivity + Jamf Integration
Simplify asset management for all Apple devices with seamless synchronization.
What is Jamf?
Jamf is a leading mobile device management (MDM) solution designed to help organizations deploy, manage, and secure Apple devices, including macOS, iOS, iPadOS, and tvOS. Jamf simplifies device management by providing tools for remote device management, application deployment, security enforcement, and compliance tracking, ensuring seamless integration of Apple devices across an organization. Jamf combines enterprise-level security with ease of use, maintaining a balance between productivity, security, and personal privacy. It enables organizations to ensure Apple devices are both easy to use and compliant with corporate policies.
Why Choose Teqtivity + Jamf?
- Centralized Device Management: Teqtivity integrates with Jamf to provide a single platform for tracking Apple devices in real time. IT teams can manage devices without switching between tools, covering the entire lifecycle from enrollment to decommissioning.
- Comprehensive Asset Data: Jamf provides critical device data, while Teqtivity consolidates this into a centralized view. Data includes:
- Device: Make, model, serial #, and storage capacity.
- User Activity: Login details, last usage.
- Security Features: Encryption status, installed apps, and compliance.
- Streamlined Device Lifecycle Management: Jamf handles remote enrollment and security, while Teqtivity tracks devices across their lifecycle, ensuring proper allocation and compliance from deployment to retirement.
- Real-Time Monitoring and Alerts: Alerts for security breaches and non-compliance empower IT teams to act quickly, minimizing risks and keeping devices operational.
- Improved IT Efficiency: Automates repetitive tasks like device provisioning, assignment, and compliance checks, reducing manual workloads and boosting productivity.
- Cost Optimization: Removal of unused devices from the MDM system reduces management costs by lowering the number of devices being tracked.
- Better Decision Making: Discrepancy reports provide valuable insights into device issues, allowing IT teams to make informed decisions quickly.
How Teqtivity + Jamf Works
Automated Asset Management
New Apple devices enrolled in Jamf automatically create asset records in Teqtivity. Pre-existing device statuses are updated (e.g., “stored” to “assigned”) based on Jamf data.
User Assignment
Teqtivity syncs user login data from Jamf, automatically assigning devices to the correct users, avoiding manual errors.
Discrepancy Handling
Teqtivity flags unassigned devices or mismatched statuses in its reports. IT teams can resolve issues manually or automate updates based on Jamf data.
- Devices Not Created: If Jamf doesn’t sync an employee’s email with Teqtivity, the asset appears in this report for IT review to determine if it’s assigned or in storage.
- User Discrepancy: When a device is assigned to one user in Jamf but logged in by another, IT needs to investigate. Teqtivity can automate reassignment if set up.
- Status Mismatch: If a device marked as in storage in Teqtivity is logged into in Jamf, IT checks if it’s been taken out of storage or if the status wasn’t updated. Teqtivity can automate reassignment.
- Inactive Device: When a device hasn’t been used for 10+ days, IT needs to investigate why, as Teqtivity can’t automate updates without knowing the cause.
- Unmanaged Devices: If a device appears in Teqtivity but not Jamf, it’s a compliance issue. IT must ensure the device is registered and syncing with Jamf.
Remote Security Actions
IT can lock or erase devices via Jamf’s API through Teqtivity to safeguard data in cases of loss, theft, or non-compliance.
Syncing Security Attributes
Teqtivity regularly syncs security-related data from Jamf, including:
- Encryption Status: Ensures devices are encrypted to meet organizational policies.
- Find My Mac (FMI) Status: Tracks whether location tracking is enabled for device recovery.
- Firewall Activation: Confirms that devices are protected from unauthorized access.
- Compliance Updates: Monitors adherence to password, software update, and security policies.
- Security Patches: Logs updates installed on devices to safeguard against vulnerabilities.
Customizable Workflows
Organizations can tailor workflows, like automatic device reassignment or manual discrepancy reviews, based on operational preferences.