Seeky

We experienced the first Mac Admins Europe first hand!

Date of issue

5. 5. 2026

Are you interested in the described topic?

contact us
We experienced the first Mac Admins Europe first hand!

The first annual Mac Admins Europe conference showed how the role of Apple devices in corporate IT has shifted significantly over the past few years. From a peripheral topic, it is becoming a standard part of the infrastructure that has a direct impact on security, identity management and overall work efficiency.

At the same time, it confirms a trend that is evident even outside the Apple ecosystem: device management and cybersecurity cannot be handled separately today.

Apple devices as a standard part of enterprise IT

In businesses today, Apple devices are no longer the exception, but a normal part of the environment. This brings with it a change in expectations.

It’s not enough to just deploy and manage the device. The important thing is to ensure:

  • a single security policy
  • identity-based access control
  • automated rule enforcement
  • real-time overview of device status

In practice, this means that the traditional approach to MDM is gradually hitting its limits.

The importance of the environment and sharing experiences

Leiden as a venue has created conditions that are more conducive to discussion than the traditional conference environment in large cities.

In addition to the lectures themselves, this created a space for sharing experiences between administrators from different backgrounds. It is this practical knowledge that often shows the difference between theoretical design and real deployment.

In an environment where technology is rapidly evolving, this exchange of experience has a direct impact on the quality of implementation.

Technological directions that were repeated across the conference

Automation and GitOps approach

One of the recurring themes was the GitOps approach to application deployment, for example in combination with tools like Workbrew.

From the administration’s point of view, this means:

  • configuration versioning
  • transparent change management
  • possibility to quickly return to the previous state
  • limitation of manual intervention

The result is an environment that is more controllable and predictable.

Declarative Device Management (DDM)

Another important issue was the transition to declaratory management of facilities.

In this model, the device does not wait for instructions, but continuously evaluates its own status against the defined policies.

This has several practical implications:

  • faster policy application
  • less dependence on connectivity
  • lower burden on MDM infrastructure

In an environment with more devices, this is a significant difference.

Passkeys and change in authentication

The discussion around Passkeys has shown that passwordless login is gradually becoming a realistic scenario in the corporate environment.

But it was also said that technology alone is not enough. The key is to integrate it into a wider context:

  • identity management
  • access control
  • the credibility of the device
  • security policies

Without this link, the benefits remain limited.

Different approaches to solving the same problems

Meetings with administrators from different countries have shown that even when using similar tools, approaches can be significantly different.

Differences appear, for example, in:

  • how security policies are deployed
  • level of automation
  • working with identities
  • incident response

This variability helps to better understand which approaches are sustainable and which are not.

Impact on IT department practice

From an enterprise IT perspective, several trends are confirmed:

Device management is part of security

Endpoint management has a direct impact on the security posture of the entire organization.

Emphasis on Zero Trust principles

Access to systems is controlled based on identity, context and device state.

The need for continuous monitoring

Without continuous data evaluation, it is not possible to react in time to deviations or threats.

In this context, the importance of tools and services that combine monitoring, analysis and recommendations becomes apparent. Typically, this is an approach where data from the environment (e.g. Microsoft 365) is continuously evaluated and used as a basis for further decision making – from anomaly detection to the design of specific actions

Summary

Mac Admins Europe has shown that Apple device management is now a fully-fledged part of enterprise IT.

Major changes are taking place in the following areas:

  • automation of administration
  • linking security and endpoint management
  • emphasis on identity as a key security feature
  • a greater role for community experience sharing

For organisations, this means a need to rethink the current approach – not only in terms of tools, but also processes and overall architecture.

More posts

We live with digital technologies. And that’s why we write about them.

Latest Articles
More posts
1/10

Or contact us directly

Martina Plisková

Martina Plisková

office coordinator

Contact us

Fill out our form, we will contact you within a few days with a proposal for a non-binding consultation.

Kontakt - Martina Pliskova