Cybersecurity News Hub
No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us
No Result
View All Result
Cybersecurity News Hub
No Result
View All Result
Home Mobile Security

Jamf Trust: Dead Gateway Detection

Cyberinchief by Cyberinchief
October 29, 2025
Reading Time: 2 mins read
0
Jamf Trust: Dead Gateway Detection


RELATED POSTS

Top 5 Mobile App Security Threats Leaders Must Prepare for in 2026

Emerging Technology Management for Modern IT Leaders

Adopting Blueprints in Jamf Tools

New Jamf Trust capability

Jamf Trust now notifies users when a device loses its Zero Trust Network Access (ZTNA) connection and provides additional context when users access the internet from captive portals.

This blog explores how Jamf Trust improves the user experience with captive portals: login or payment screens often found on airplanes, trains or in public spaces. We’ll discuss how the app now ensures internet access isn’t blocked and clearly informs the user of their ZTNA status.

The captive portal conundrum

Working with traditional Virtual Private Network (VPN) software can be frustrating; it often requires constant authentication and provides little visibility into connection status. While ZTNA significantly reduces these headaches by only routing relevant company traffic, it isn’t immune to connection issues.

A common pain point for Jamf customers

Customers were having trouble with the way Jamf Trust managed and reported ZTNA status, particularly when using captive portals.

What are captive portals?

Captive portals are used to present users with a license agreement, login or payment screen before granting full internet access. They are ubiquitous, whether you’re purchasing in-flight snacks or completing a hotel’s Wi-Fi login.

Most modern operating systems (OS) support the Wireless Internet Service Provider Roaming (WISPr) protocol to help detect internet connectivity. However, this often results in complicated, confusing device statuses.

Buy JNews
ADVERTISEMENT

By allowing access to in-flight maps or purchase menus only through captive portals, these network configurations can inadvertently break a necessary ZTNA or VPN connection.

This leaves the end user completely blocked from both the internet and company resources. Users were understandably frustrated, often attributing the fault to the Jamf Trust app. This was a problem we needed to solve.

Dead gateway detection

We are excited to announce that this problem is now a thing of the past. We have enhanced Jamf Trust to provide better detection in these scenarios.

When the connection to your ZTNA gateway is unavailable, the app will now temporarily disable ZTNA and its related features to ensure that your internet traffic is not blocked.

This key enhancement:

  • Maintains internet access. End users can complete the captive portal login, browse the web or access any other internet services like streaming movies or purchasing snacks.
  • Helps on-device filtering respect these bypass policies to prevent the device from blocking internet traffic while the ZTNA connection is down.
  • Communicates clearly. The app provides clear in-app information and notifies users about the ZTNA connection status.

Once the device has a restored connection, Jamf Trust will automatically and silently reconnect to ZTNA and re-enable content filtering. This ensures continued access to company resources while also providing network security — all without any user intervention.

This feature is a prime example of our continuous pursuit to help organizations succeed with Apple. We’re proud to give end users clarity into connection status, eliminating guesswork when their device isn’t connecting as expected.

Availability

This capability, Dead Gateway Detection (DGD), is now available for Jamf Trust on iOS, macOS and Android devices.



Source link

Tags: DeadDetectionGatewayJamfTrust
ShareTweetPin
Cyberinchief

Cyberinchief

Related Posts

Top 5 Mobile App Security Threats Leaders Must Prepare for in 2026
Mobile Security

Top 5 Mobile App Security Threats Leaders Must Prepare for in 2026

January 21, 2026
Emerging Technology Management for Modern IT Leaders
Mobile Security

Emerging Technology Management for Modern IT Leaders

December 8, 2025
Adopting Blueprints in Jamf Tools
Mobile Security

Adopting Blueprints in Jamf Tools

December 8, 2025
Jamf Safe Internet + On-Device Phishing AI
Mobile Security

Jamf Safe Internet + On-Device Phishing AI

December 7, 2025
Act on Jamf Protect Alerts
Mobile Security

Act on Jamf Protect Alerts

December 7, 2025
Terraform + GitLab CI/CD for Jamf
Mobile Security

Terraform + GitLab CI/CD for Jamf

December 6, 2025
Next Post
Delmia Apriso Systems Under Attack

Delmia Apriso Systems Under Attack

How to know if your computer’s been hacked. #cybersecurity #cyber #safety #cybercrime

How to know if your computer’s been hacked. #cybersecurity #cyber #safety #cybercrime

Recommended Stories

Alleged Jabber Zeus Coder ‘MrICQ’ in U.S. Custody – Krebs on Security

Alleged Jabber Zeus Coder ‘MrICQ’ in U.S. Custody – Krebs on Security

November 3, 2025
AI-Powered Cyberattacks & Social Engineering. How to Detect and Defend Against Them.

AI-Powered Cyberattacks & Social Engineering. How to Detect and Defend Against Them.

November 22, 2025
ব্যাংকে বসেই প্রতারণা! গ্রেফতার বন্ধন ব্যাঙ্কের ৫ আধিকারিক | Cyber Crime | Bandhan Bank

ব্যাংকে বসেই প্রতারণা! গ্রেফতার বন্ধন ব্যাঙ্কের ৫ আধিকারিক | Cyber Crime | Bandhan Bank

November 8, 2025

Popular Stories

  • Allianz Life – 1,115,061 breached accounts

    Allianz Life – 1,115,061 breached accounts

    0 shares
    Share 0 Tweet 0
  • Prosper – 17,605,276 breached accounts

    0 shares
    Share 0 Tweet 0
  • साइबर अपराध | Illegal Payment Gateway & Rented Bank Accounts | MAMTA CHOPRA

    0 shares
    Share 0 Tweet 0
  • Miljödata – 870,108 breached accounts

    0 shares
    Share 0 Tweet 0
  • Snowflake Data Breach Explained: Lessons and Protection Strategies

    0 shares
    Share 0 Tweet 0

Search

No Result
View All Result

Recent Posts

  • Top 5 Mobile App Security Threats Leaders Must Prepare for in 2026
  • Microsoft On Women In Cybersecurity At Black Hat Europe 2025 In London
  • Polisi kembali ungkap sindikat Cyber Crime kejahatan Internasional – iNews Malam 09/03

Categories

  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos

Newsletter

© 2025 All rights reserved by cyberinchief.com

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us

© 2025 All rights reserved by cyberinchief.com

Newsletter Signup

Subscribe to our weekly newsletter below and never miss the latest News.

Enter your email address

Thanks, I’m not interested