Blog

All things security

Have questions on MDM, EDR, or other enterprise security topics? We've
got you covered!
Blog post image describing the post's content
MDM

MDM 101: What Device Management Actually Means (and Why It’s a Great First Security Control)

Anne Maguire
September 10, 2025
5 min read
Learn why Mobile Device Management (MDM) is the foundational control behind every modern security program and how it enables visibility, enforcement and trust at scale.
Blog post image describing the post's content
Company

Securing the Full Stack: Zip Security and Galvanick Announce Strategic Partnership

Perry Rahman-Porras
June 10, 2025
5 min read
Zip Security and Galvanick are now partnering to provide unified cybersecurity across both Information Technology (IT) and Operational Technology (OT) environments.
Blog post image describing the post's content
How To Guide

Intune Tune-Up: 11 Quick Fixes for Stronger Security

Anne Maguire
February 11, 2025
5 min read
Get your Intune setup in top shape with these high-impact adjustments and audit recommendations.
Blog post image describing the post's content
Security

Case Study: Zip Security & Observa defend SaaS company against malware tied to Russia

Anne Maguire
October 18, 2024
5 min read
CrowdStrike and Managed Detection & Response (MDR), deployed and configured through the Zip Security platform, protect company from data exfiltration and credential theft malware.
Blog post image describing the post's content
How To Guide

Mastering Mixed-Platform MDM

Anne Maguire
September 16, 2024
5 min read
For businesses with mixed-platform environments, a dual-solution approach to mobile device management (MDM) using Microsoft Intune and Jamf is the industry standard. Read on to learn about how this set-up best addresses operating system differences.
Blog post image describing the post's content
Security

An Overview of the CrowdStrike Outage & Proactive Strategies for Mitigating IT Disruption

Anne Maguire
July 25, 2024
5 min read
CrowdStrike made headlines early Friday morning as a routine content upgrade pushed bad code to an estimated 8.5 million Windows devices worldwide.
Blog post image describing the post's content
Security

Enhancing Enterprise Security: The Case for Enterprise Browsers

Anne Maguire
July 23, 2024
5 min read
Through its integration with Chrome Enterprise Core, Zip Security enables organizations to centrally manage and secure browser configurations, extensions, and updates across all endpoints.
Blog post image describing the post's content
How To Guide

Start-Up Banking 101: How to Protect your Business from Disruption

Josh Zweig
July 18, 2024
5 min read
Access to funds is crucial for start-ups as it directly affects their ability to operate, grow, and innovate. Learn how to best set-up your accounts and account security to protect against disruption.
Blog post image describing the post's content
Security

Building an Effective Cybersecurity Awareness Program: A Key Component for Organizational Security

Cindy Huang
June 7, 2024
5 min read
Empower your organization with a comprehensive and engaging cybersecurity awareness program to mitigate risks and strengthen your security posture.
Blog post image describing the post's content
Security

A Deep Dive into SaaS Security

Cindy Huang
April 26, 2024
5 min read
A breakdown of SaaS security approach and how to ensure you utilizing the right SaaS security tools to effectively strategy to manage the risks associated.
Blog post image describing the post's content
Security

An Overview of Security Management: Demystifying the terms MSP, MSSP, Co-Management

Cindy Huang
April 19, 2024
5 min read
A breakdown of the management approaches in security, and how to avoid the common pitfalls that businesses experience as they scale.
Blog post image describing the post's content
Company

Announcing Our Collaboration with Ambience Healthcare on a Co-Authored Whitepaper to Help Healthcare Organizations Assess Security Risks

Cindy Huang
April 3, 2024
5 min read
We're excited to announced the release of a co-authored cybersecurity white paper!
Blog post image describing the post's content
Company

We’re Excited to Unveil our New Branding!

Cindy Huang
March 25, 2024
5 min read
We're excited to unveil our revamped branding, break down the design process, and explore the values and story behind Zip.
Blog post image describing the post's content
Security

The Future of Authentication & the Shift to a Passwordless Future

Cindy Huang
March 15, 2024
5 min read
Passwords should no longer be the primary form of authentication. This article breaks down the limitations of passwords, and offers a view of the future of passwordless and multi-factor authentication.
Blog post image describing the post's content
Security

The Evolving Cybersecurity Landscape: Reevaluating the Role of VPNs

Cindy Huang
February 29, 2024
5 min read
In the ever evolving landscape of security and technology, this article explores the question: what is the role of the VPN in a modern security program?
Blog post image describing the post's content
Security

In Defense of Local Admin Rights

Cindy Huang
February 16, 2024
5 min read
Unlocking the debate on local admin rights: Why restricting local admin rights is no longer the answer to securing your organization
Blog post image describing the post's content
Security

Building a Culture of Security Consciousness: Getting a Security Program off the Ground as a ‘Department of One’

Cindy Huang
February 8, 2024
5 min read
A webinar recap discussing prioritization, tooling, and approaches to building a security 'Department of One'
Blog post image describing the post's content
Security

Navigating the Cybersecurity Landscape: A Deep Dive into Device Security

Cindy Huang
February 2, 2024
5 min read
A breakdown of device security tools and how to ensure your fleet is best protected from threats.
Blog post image describing the post's content
Windows

How to manage Windows devices without Microsoft Entra ID accounts

Cindy Huang
January 25, 2024
5 min read
Managing a Windows device that is not joined to Entra can be a complex challenge... we break it down for you.
Blog post image describing the post's content
MDM

Navigating the Cybersecurity Landscape: A Deep Dive into Device Management

Cindy Huang
January 18, 2024
5 min read
A deep dive into Device Management and how to ensure you are selecting the best tool for your organization.
Blog post image describing the post's content
Identity Solution

Navigating the Cybersecurity Landscape: A Deep Dive into Identity Solutions

Cindy Huang
January 9, 2024
5 min read
This deep dive demystifies the complexities of Identity Solutions, offering insights into their mechanisms, selection criteria, and the impact they have on safeguarding against the theft of credentials.
Blog post image describing the post's content
How To Guide

What Cybersecurity Tools do you Need to Build an Effective Security Strategy?

Cindy Huang
January 4, 2024
5 min read
In this post, we’ll cover the fundamental building blocks of an effective cybersecurity strategy and provide practical information on how best to assess different tools to determine which meet your organization’s requirements.
Blog post image describing the post's content
Security

Security for Hard Tech Companies

Gabbi Merz
November 20, 2023
5 min read
Securing your hard tech company can be a daunting task. To help you stay secure, we’ve compiled a list of the highest return on investment (ROI) actions you can take to protect your company data.
Blog post image describing the post's content
Company

Announcing Our $7.7M Funding Round to Protect Businesses from Cyber Threats

Josh Zweig
November 14, 2023
5 min read
We are excited to announce our $7.7M funding round co-led by General Catalyst and Human Capital, with participation from BoxGroup!
Blog post image describing the post's content
Product Update

Satisfy Compliance Frameworks in One Click with Zip

November 2, 2023
5 min read
Save countless hours by automatically having your software deployed, configured, and reported against according to your desired compliance framework, with the single click of a button!
Blog post image describing the post's content
Security

The SMB and the Case of the Personal Mobile Phones

Josh Zweig
October 26, 2023
5 min read
So you are wondering about MDM on personally owned mobile phones
Blog post image describing the post's content
Security

What is an M(S)SP?

Josh Zweig
October 5, 2023
5 min read
MSPs are important players in the tech ecosystem. What actually are they?
Blog post image describing the post's content
SOC2

A Guide to Achieving SOC2 with Zip

September 21, 2023
5 min read
SOC2 the easy way
Blog post image describing the post's content
Security

A Quick Primer on DoD Cybersecurity Standards

Josh Zweig
September 7, 2023
5 min read
A few acronyms you should expect to see
Blog post image describing the post's content
Security

Unlocking the Future of Account Security: Exploring WebAuthn and Biometric MFA

Chase Walters
May 26, 2023
5 min read
MFA that is more convenient than TOTP and more secure than SMS: WebAuthn using biometrics
Blog post image describing the post's content
Security

Prevent Data Breaches From Laptop Thefts

May 18, 2023
5 min read
Laptop theft is a growing threat. MDM with remote wiping can help protect sensitive data.
Blog post image describing the post's content
Security

Startups and Cybersecurity: How to Build a Solid Defense on a Tight Budget

Ashley Meuser
May 12, 2023
5 min read
Small businesses must prioritize cybersecurity. Steps include educating employees, enforcing MFA, using strong passwords, securing Wi-Fi, and obtaining cyber insurance.
Blog post image describing the post's content
macOS

Activation Lock: Friend or Foe

Gabbi Merz
May 2, 2023
5 min read
macOS Activation Lock -- friend or foe for small businesses?
Blog post image describing the post's content
macOS

4 Recommendations for Keeping Your macOS Fleet Up to Date

March 30, 2023
5 min read
Keep your macOS fleet secure by following these recommendations: leverage Nudge, define upgrade policies, monitor compliance, and gate major OS upgrades.
Blog post image describing the post's content
Security

Our Commitment to Security: Announcing SOC2 Type I

Gabbi Merz
March 16, 2023
5 min read
Zip Security is now SOC2 Type I compliant!
Blog post image describing the post's content
macOS

3 Best Practices for Wiping and Locking macOS Devices

Gabbi Merz
March 14, 2023
5 min read
Best practices for wiping and locking macOS devices: take care with irreversible actions, disable Activation Lock before off-boarding, and prepare in advance.
Blog post image describing the post's content
MDM

7 Best Practices for Deploying MDM: Part 2

Josh Zweig
March 2, 2023
5 min read
Part 2 of our article on MDM covers 3 essential best practices for success: communicate changes, know compliance objectives, and pick the right tool.
Blog post image describing the post's content
MDM

7 Best Practices for Deploying MDM: Part 1

Josh Zweig
February 22, 2023
5 min read
This post provides tips for effective Mobile Device Management (MDM) of Mac devices, including managing certificates, staged rollouts, personal recovery keys, and using Single Sign-On (SSO).