How secure is your data on Bushel? Your data on anything is only ever as secure as your password. At Bushel, we take a lot of precautions to protect your data, including from ourselves. We time out your session, we encrypt your session on a per-transaction basis, and we encrypt your data while at rest on our servers (although consider it like the secure enclave in iOS, where we encrypt the data that needs to be encrypted – such as FileVault keys and activation lock bypass information). These basic precautions keep your communication with Bushel secure and prevent people from doing things like hijacking your session. Read My Article On…
-
-
Bushel: VPP App Distribution Without Apple IDs
Starting today, Bushel can be used to deploy Volume Purchase Program (VPP) apps to Apple devices running iOS 9 or OS X 10.11 El Capitan without the need for an Apple ID. That’s right, no Apple ID required! Read More About VPP App Distribution Without Apple IDs on the Bushel Blog
-
Bushel Launch Coverage
I missed posting this one back in November. I’m slow… It’s from an interview I did a little while back. http://tech.mn/news/2014/11/04/jamf-software-bushel-apple-device-management/ Mostly, these are placeholders so I can find interviews I’ve done easily… #bushel
-
The Bushel Challenge on 9to5 Mac
In special collaboration with 9to5Mac, we are excited to announce a project we’re calling The Bushel Challenge. We’re asking businesses who have shied away from the complex and often expensive solutions they’ve come to know, to give Bushel a shot, and see first-hand just how simple a solution can be. Read More About The Bushel Challenge On The Bushel Blog
-
Install Apple Configurator To Use With Bushel
Occasionally, when discussing various deployments with Bushel customers, we’ll recommend you use a tool called Apple Configurator for certain tasks. Apple Configurator is a great tool to manage iOS devices. It’s also a pretty decent tool when you need to create profiles for use on Macs. Apple Configurator is easily installed using the Mac App Store. Read More About Using Apple Configurator With Bushel On The Bushel Blog
-
Bushel and the GRS Group
As we’ve grown, one of the most exciting things for the team has been to watch our customers use Bushel to help solve some of their workplace problems. A few have shared their stories with us, and we’re excited to highlight one here on our blog. If you’re inspired to share your own, we’d love to hear from you! Reach out anytime at hello@bushel.com. Read More About How The GRS Group Uses Bushel On The Bushel Blog
-
Bushel: Notes On Unlocking A Locked Device
We’ve all been there, or spoken with someone who’s been there: you’re looking at a locked device and someone doesn’t know the PIN to unlock the device. On an iPad, iPhone, iPod Touch a Mobile Device Management product such as Bushel can unlock that device by resetting the PIN and allowing you to configure a new PIN. It’s kinda’ awesome when someone forgets a PIN they assigned a device, leaves the company or just plain forgets. But, there are a few things we should probably mention about this feature of Bushel: Read More About Unlocking A Locked Device On The Bushel Blog
-
Bushel, A Great Gift For People That Need To Save Time!
My dad is a Superman. He makes his daily juggling act look effortless. He plays music, does tons of work around the house and in the garden, he’s always making new artwork, and is pretty much always doing something. He has an incredible green thumb, growing everything from beautiful Southern flowers to pear trees, ivy – and the occasional herb or grape. And these days, he shares it all on Facebook, complete with witty banter and a like for pretty much every one of my posts. Bushel, A Great Gift For People That Need To Save Time!
-
Bushel: MDM, MAM, MEM, & EMM
Mobile Device Management (MDM) is an additional layer of securing provided to a standard deployment of mobile devices. In the Apple management context, MDM provides our customers with a way to make sure that they can monitor devices, that devices fit within the boundaries of what our customers consider to be good security, making it easier to setup devices (by quickly providing WiFi information, helping to deploy apps, etc) and of course by getting a good inventory of the devices you have out there in the wild. Read More About MDM, MAM, MEM, and EMM At blog.bushel.com