Resources

Jamf Cloud vs. On-Premises

At Jamf we help organizations succeed with Apple. Jamf Pro is the leading device management tool used by IT Admins to deploy, inventory, and secure Mac, iPad, iPhone and Apple TV devices.  

Read More »

An Apple Distinguished School

Client The Western Academy of Beijing   Background Western Academy of Beijing was founded in 1994 and is now a top international school in China with 1,400 students and world-class facilities. WAB was founded with a strong sense of purpose, recognizing that there was a need for a truly international school that put children at the center of its efforts, embracing the experience of being in China and responsive to its community. After more than 20 years, WAB continues its tradition of excellence and embodies the spirit of

Read More »

Mobile security versus worker productivity

Background One of the largest blockchain and digital asset derivatives companies in the world. Their businesses include trading and finance, education, data and research, social charity, investment and incubation, decentralization and infrastructure solution.   Challenge Due to the fact that the majority of employees work remotely, the company must both ensure the data security of remote office computers through compliance settings, remote locking, remote wiping etc., while also making corporate resources like software and VPN configurations as convenient and accessible as possible for their employees. To ensure that

Read More »

Enhancing the luxury retail experience with tech

Customer MaxMara   Background The group is dedicated to offering a wide variety of fashion products and a top-notch customer experience as a leading global fashion brand. For various client categories and fashions, it has so far created a number of brands and collections. With more than 2,500 single-brand stores and more than 10,000 multi-brand stores, the organization is currently active in 105 countries.   Challenge As a global famous brand, the company has many stores. However, there are only a few iPads in each store, and the

Read More »

Mac Management: Behind the scenes Mac

Background Asia’s largest one of the largest and best-performing private equity funds, the group has identified and invested in a large number of outstanding companies with long-term competitive advantages for more than a decade, many of which have become Fortune 500 and A-share listed companies. It has developed into an international team of top talents around the world, and has become a leader in digital technology.   Challenge The investment organization places a high priority on information and data security, so the company has stringent security requirements for

Read More »

Power to the People: Users as Device Managers

Background As a Fortune 500 company with a focus on home appliances, the group has a presence in more than 200 countries and regions.   Challenge Windows clients can easily complete administrative account creation, password synchronization, domain service login and other tasks after adding to domain, but the effect of adding a domain on Mac clients will be greatly reduced, both administrators and users do not have a good experience, mainly in: The first time a domain account logs in, it appears that it cannot connect to the

Read More »

Level up reporting capabilities with powerful script

Client Leo paper   Background In 1982 Leo opened its doors as a traditional printing company. Since then, it has grown into a leading global printing communications company, providing clients with comprehensive services.   Challenge Mac computers are separated into personal use and shared use in client usage scenarios, and each user has administrator privileges. Each user is thus free to add software and modify settings as they see fit. Users frequently need to copy files using USB flash drives due to the nature of their work, but

Read More »

Deliver a robust onboarding experience

Background A world-renowned large public company that integrates R&D, production and sales of consumer electronics system assembly. Its sales revenue exceeds 100 billion RMB and it has 40 subsidiaries, more than 10 manufacturing bases and over 30,000 employees.   Challenge As an Apple supply chain vendor, Apple has a set of extremely strict security specification requirements to the customer prevent business information leakage. Therefore, Apple computers and cell phone terminals of enterprise employees need to be subject to security control, such as prohibiting the use of USB disk

Read More »