Internal IT
Apple MDM Evaluation Checklist
This checklist gives your team a clear, vendor-agnostic way to evaluate Apple MDM options and avoid costly mistakes on your first deployment.
Accessibility Update – Fall 2025
We continue on our path to improve accessibility throughout our web application. This quarter we added the following improvements:
Deep Dive Into Declarative OS Updates & Upgrades
Apple’s approach to OS updates has changed a lot — from manual updates, to MDM-driven commands, and now to Declarative OS Updates. This webinar breaks down what’s changed, why it matters, and how you can make updates smoother across your fleet.
Checklist- How to Pass Audits Without an MDM Migration
Take control of your Apple device fleet with the Amplify Checklist. Instantly gain real-time visibility, automate compliance and security, and empower your IT team to act before issues arise. Discover how agent-driven management bridges gaps left by legacy MDMs—so you can scale, secure, and support your Apple environment with total confidence.
Randomized MAC Addresses: What IT Admins Need to Know
Randomized MAC addresses enhance privacy on Apple devices but pose challenges for IT teams managing secure networks. As these devices join corporate systems, understanding the impact on authentication, tracking, and access control is crucial. This guide covers what MAC randomization is, how to manage it, and how to address enterprise-level issues it may cause.
Think Differently: An Apple Security 101 for Windows Teams
Explore Apple device security management with our ebook. Learn why Addigy MDM is vital for IT admins and MSPs handling Apple’s unique security needs
Proactive Apple Device Management: Minimizing Risk
Navigate the ever-changing landscape of Apple device management with confidence. Our latest Executive Brief, featuring insights from Preetham Gurram, VP of Product at Addigy, equips you with the tools and tips to proactively manage Apple devices.
Microsoft Conditional Access: All You Need To Know
In this session, you can learn everything from the basics of integration configuration to a step-by-step breakdown of how the integration functions, as well as the best practices for a seamless end-user experience.