Listing Thumbnail

    Jamf Protect

     Info
    Sold by: Jamf 
    Deployed on AWS
    Free Trial
    Vendor Insights
    AWS Free Tier
    Jamf Protect is an endpoint security and mobile threat defense (MTD) solution that helps organizations defend against modern threats, maintain endpoint compliance, identify active threats and respond to them.
    4.6

    Overview

    Purpose-built endpoint security and mobile threat defense (MTD) for Mac and mobile devices that allows organizations to maintain compliance, defend against the modern threat landscape, identify and respond to security incidents with minimal impact to the end user experience.

    Why Jamf Protect?

    Apple's rapid growth and adoption in the enterprise make Apple devices an appealing target. Jamf Protect enhances Apple's built-in security features by increasing visibility, preventions, controls and remediation capabilities. Jamf Protect uses native security frameworks in macOS and iOS to offer same-day support for the latest Apple software and hardware.

    Highlights

    • Endpoint Protection - Comprehensive detection and protection for Apple-specific malware and attacks. Device controls to manage how removable storage devices are used to prevent data loss.
    • Threat Prevention - Prevent threats that put corporate data at risk. Block phishing, ransomware, malicious domains. Block web-based or internet-based threats. Enforce acceptable use policy and block risky content.
    • Compliance & Visibility - Audit security benchmarks to ensure ongoing compliance of Mac and mobile devices. Log rich telemetry to aide in incident investigations. Full visibility into security events.

    Details

    Sold by

    Delivery method

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Vendor Insights

     Info
    Skip the manual risk assessment. Get verified and regularly updated security info on this product with Vendor Insights.
    Security credentials achieved
    (1)

    Buyer guide

    Gain valuable insights from real users who purchased this product, powered by PeerSpot.
    Buyer guide

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Free trial

    Try this product free according to the free trial terms set by the vendor.

    Jamf Protect

     Info
    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    12-month contract (1)

     Info
    Dimension
    Description
    Cost/12 months
    Jamf Protect
    Jamf Protect Offer
    $50,000.00

    Vendor refund policy

    No Refunds

    Custom pricing options

    Request a private offer to receive a custom quote.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Support

    Vendor support

    Support for Jamf Products. Jamf helps you manage and secure your Apple devices at work, backed by the most dedicated support team in the industry.

    Support Email: support@jamf.com 

    US Phone Support: +1 844-411-5263 International Phone Support Available. Visit the Jamf Technical Support Desk website to local number.

    Open a ticket or contact your account team in the Jamf Support Portal.

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly
    By Iru
    By IBM Security

    Accolades

     Info
    Top
    50
    In IT Business Management
    Top
    10
    In Device Security, Device Management
    Top
    50
    In Device Management, Device Security

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    0 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    Insufficient data
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Endpoint Protection
    Native security framework integration for comprehensive malware detection and prevention on Apple devices
    Threat Prevention
    Advanced blocking mechanisms for phishing, ransomware, malicious domains, and web-based threats
    Device Control
    Management of removable storage devices to prevent unauthorized data access and potential data loss
    Compliance Monitoring
    Security benchmark auditing and logging of rich telemetry for comprehensive device security assessment
    Mobile Threat Defense
    Native security framework support for iOS and macOS with same-day updates for latest Apple software and hardware
    Device Management
    Comprehensive mobile device management (MDM) solution specifically designed for Apple platform devices including Mac, iPhone, iPad, and Apple TV
    Endpoint Security
    Advanced endpoint detection and response functionality delivered through a unified single agent with comprehensive threat intelligence
    Automated Configuration
    Over 150 configurable security settings with self-healing device controls that automatically monitor and enforce compliance without additional scripting
    Identity Integration
    Deep integration with identity providers and single sign-on systems, enabling automatic blueprint and control assignments based on user identity data
    Software Update Management
    Automated app patching and managed OS updates across device fleet, ensuring consistent software versions without manual intervention
    Unified Endpoint Management
    Comprehensive management platform supporting multiple device types and operating systems including Android, iOS, iPadOS, Chrome OS, AR/VR devices, wearables, and rugged devices
    Mobile Device Security
    Enterprise Mobility Management (EMM) capabilities with containerization, device security features, and protection for corporate-owned and BYOD environments
    Zero-Touch Device Enrollment
    Over-the-Air (OTA) device enrollment with support for Apple Business Manager and Android Enterprise zero-touch enrollment processes
    AI-Powered Management
    AI-driven real-time alerts and security policy enforcement with automated compliance monitoring and task orchestration
    Multi-Platform Device Monitoring
    Comprehensive inventory visibility across devices, applications, content, and corporate data with centralized management console

    Security credentials

     Info
    Validated by AWS Marketplace
    FedRAMP
    GDPR
    HIPAA
    ISO/IEC 27001
    PCI DSS
    SOC 2 Type 2
    -
    -
    -
    -
    -
    No security profile
    No security profile

    Contract

     Info
    Standard contract
    No
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    4.6
    9 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    44%
    56%
    0%
    0%
    0%
    0 AWS reviews
    |
    9 external reviews
    External reviews are from PeerSpot .
    reviewer2584980

    Experience agile user-centric security with AI-powered endpoint protection

    Reviewed on Oct 15, 2024
    Review provided by PeerSpot

    What is our primary use case?

    I use Jamf Protect  for myself, especially for POC demonstration purposes. It is also used as part of our consultation services, where I recommend it to customers.

    How has it helped my organization?

    Jamf Protect  gives you Apple built-in native support for endpoint security. It supports zero-day protection in the Apple ecosystem and is agile, user-centric, and lightweight for macOS.

    What is most valuable?

    The behavioral detection is valuable. It also includes built-in network protection that is powered by our AI called Medium. It provides telemetry and signature-based detection, which offer comprehensive endpoint security.

    What needs improvement?

    The dependency on Jamf Pro  or SIEM  or SOAR  for some automations and integrations could be reduced. In-built automation and remediation of behavior-based threats would be beneficial enhancements.

    For how long have I used the solution?

    I have been using it for the last four years.

    How are customer service and support?

    The technical support is good and proactive. That said, it can be improved. There is some scope to enhance the response and resolution time. From an Indian perspective, I would rate their support at seven point five out of ten.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    I have an understanding of CrowdStrike and certain security solutions from Forcepoint.

    What other advice do I have?

    I would recommend inbuilt remediation for behavior-based threats and less dependency on third-party tools.

    I'd rate the solution eight out of ten.

    Dinesh Venkates

    Effective device management, enhance threat detection and smooth integration

    Reviewed on May 27, 2024
    Review provided by PeerSpot

    What is our primary use case?

    Jamf Protect manages all Apple devices, deploys and upgrades applications, and enforces security features like blocking data transfers and improving security profiles.

    How has it helped my organization?

    Compliance is ensured through encryption, like with DEP.

    Jamf Protect adapted to evolving security threats specific to macOS. We integrated with Microsoft Defender for added protection.

    Compared to on-premises solutions, there are a lot of features improved in cloud-based solutions. The performance after implementation is better than with on-premises solutions.

    Integration is also easy. Nothing complex about it. I never found any issues with it.

    What is most valuable?

    Jamf Protect's most effective features for threat detection include managing devices and applications, deploying and upgrading the OS, and its overall security features.

    We can block data transfer and manage other security aspects through profiles.

    What needs improvement?

    Beginners need initial training and have basic/essential knowledge.

    For how long have I used the solution?

    I used it for five years. I moved to the cloud version two years ago. Before that, it was on-premises. It was Jamf's own cloud (private cloud).

    What do I think about the stability of the solution?

    I would rate the stability a ten out of ten.

    What do I think about the scalability of the solution?

    I would rate the scalability a ten out of ten.

    How are customer service and support?

    The customer service and support are good.

    How would you rate customer service and support?

    Positive

    How was the initial setup?

    I would rate my experience with the initial setup a ten out of ten, with ten being easy.

    Initially, the deployment took 15 days for the pilot phase, and then another 15 days for production. However, the actual deployment itself only took 15 days, as it was preconfigured.

    So it took around one month in total. Stakeholder approval caused a delay, but the actual deployment for the facility department was only 15 days.

    No maintenance is required because everything is associated. It's a cloud solution, so we only need to modify applications for the services.

    So, 99.9% of the time, it's working fine.

    What was our ROI?

    There are many financial benefits because everything is managed in a single cloud for Apple devices, with no need for third-party software.

    What other advice do I have?

    Everything is working well for me; it also supports single sign-on. Jamf Protect is very good and excellent.

    Overall, I would rate the solution a ten out of ten. I would recommend it to other users. Beginners should have basic knowledge. If they have normal, basic knowledge, they can use the resources provided with the solution.

    Ashitosh Bankar

    Searches incoming and outgoing traffic for malware and monitors the network for security

    Reviewed on Apr 25, 2024
    Review provided by PeerSpot

    What is our primary use case?

    Our customers use Jamf Protect for security purposes.

    What is most valuable?

    Jamf Protect provides zero-touch integration, and we can add various IdPs for synchronization or authentication.The most effective feature of the solution for security needs is that users can create a zero-touch environment network access and VPN access. Jamf Protect searches incoming and outgoing traffic for malware to monitor the network for security.

    What needs improvement?

    The solution’s stability could be improved. We need to regularly update the security patches for malware protection and threat protection. Jamf Protect should be integrated with third-party malware solutions or threat protection services.

    For how long have I used the solution?

    I have been using Jamf Protect for 2 years.

    What do I think about the stability of the solution?

    I rate the solution a seven out of ten for stability.

    What do I think about the scalability of the solution?

    More than 10 to 15 enterprise business customers use Jamf Protect.

    I rate the solution a nine out of ten for scalability.

    How was the initial setup?

    On a scale from one to ten, where one is difficult and ten is easy, I rate the solution's initial setup a seven out of ten.

    What about the implementation team?

    Deploying the solution for testing does not take more than two to three hours. However, deploying the solution in a production environment may take a day or two. The basic part of deployment is the configuration, and then we use Jamf Pro to deploy the package of Jamf Protect.

    What's my experience with pricing, setup cost, and licensing?

    Jamf Protect is an expensive solution. Customers need to pay additional costs for Jamf Protect's on-ground support.

    On a scale from one to ten, where one is cheap and ten is expensive, I rate the solution’s pricing ten out of ten.

    What other advice do I have?

    We are working with the latest version of the solution. Our customers utilize Jamf Protect only in the Mac environment. Customers should get a MacBook before installing Jamf Protect. Jamf Protect is the ideal solution for Mac because it is deeply integrated with Apple devices and is aware of bugs.

    Overall, I rate the solution a nine out of ten.

    Amit-Sarkar

    Allows users to easily monitor miscellaneous activities occurring in their environments

    Reviewed on Apr 24, 2024
    Review provided by PeerSpot

    What is our primary use case?

    Jamf Protect is basically an endpoint solution for any external drives since it can detect any kind of malware attacks or any miscellaneous activities that occur through a device. If someone is trying to take out the data without permission, the tool also detects that.

    What is most valuable?

    The most valuable features of the solution are in terms of data, especially whenever someone is trying to take out some data or trying to do any miscellaneous activities, which are areas that Jamf Protect easily catches. The aforementioned area consists of the tool's most useful and important feature.

    An important point associated with the product is in the area related to the external drives, and it can be considered as an additional feature that most corporations need nowadays.

    What needs improvement?

    The product's price is an area of concern where improvements are required. It would be good if Jamf Protect could be integrated with Jamf Pro and used as a single solution.

    There are a couple of improvements where there is a need to change a few things. There are also a couple of things that need to be removed and merged into the main tool, Jamf Pro.

    The solution's technical team needs to improve because somewhere I felt from my personal experience that unless Jamf's team puts in an effort to understand the requirements of its customers, help can't be provided. The help provided by Jamf's team is on the basis of what they know, so I feel that they need to put a bit of effort into understanding what customers expect from the product.

    For how long have I used the solution?

    I have been using Jamf Protect for four years.

    What do I think about the stability of the solution?

    It is a great and stable solution. As long as your product is good, you can achieve what you are trying to do. Stability-wise, I rate the solution a seven out of ten.

    What do I think about the scalability of the solution?

    It is definitely a scalable solution. It should be a mandatory solution for any organization using Mac devices.

    Around 350 people in my company use the product.

    My company plans to increase the usage of the solution. In the future, my organization plans to make Mac devices available to users, so we may probably add a few more licenses from Jamf Protect.

    How are customer service and support?

    The solution's technical team has to be a bit aggressive from a support perspective. The solution's technical team needs to pay keen attention to the support part.

    How was the initial setup?

    The product's initial setup phase has very simple steps. If you have Jamf Pro in your environment, you don't have to do any migration. If you buy Jamf Protect separately, it can be installed very quickly and doesn't take much time.

    The solution can be deployed if you are using Jamf Pro. I don't think that you need something else apart from Jamf Pro to deploy Jamf Protect.

    Which other solutions did I evaluate?

    I have also evaluated other solutions, but Jamf Protect is the best solution for Mac management.

    What other advice do I have?

    Apart from Jamf Protect one doesn't need any other security tool. If you have a tool already in your existing premises then such a product can be integrated with Jamf Protect.

    I recommend the product to those who plan to use it. Users should try to first be on Jamf Pro and then move to Jamf Protect. Experience with Jamf Pro is mandatory.

    The product's benefit is simple since it allows users to monitor everything related to miscellaneous activities, as well as the existing external drives that someone puts into the environment. The tool can also help monitor if someone is trying to take out some data through any means you can monitor with this solution.

    I rate the tool an eight out of ten.

    Amira Youssef

    User-friendly dashboard that helps protect staff computers from malware and antivirus

    Reviewed on Apr 02, 2024
    Review provided by PeerSpot

    What is most valuable?

    We mainly use Jamf Protect to protect staff computers from malware and antivirus.

    What needs improvement?

    Jamf Protect protects just Mac devices, and we would love to have one solution for other platforms and not just Mac devices.

    For how long have I used the solution?

    I have been using Jamf Protect for one year.

    What do I think about the scalability of the solution?

    I am satisfied with the solution’s scalability and performance.

    How are customer service and support?

    The solution's technical support is great.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    We previously used Norton Antivirus, and it wasn't efficient at all. I previously used Workspace ONE. The only advantage of Workspace ONE over Jamf Protect is that it supports a wide range of devices, including Mac and Windows.

    What's my experience with pricing, setup cost, and licensing?

    Jamf Protect costs double the price that we were paying before.

    What other advice do I have?

    Jamf Protect automatically detects computer malware and prevents the user from running it. It also removes the malware completely from the computers, and we got notified about it. We can set the benchmark based on the school's preferences. The solution's automated MAC-specific threat hunting gives us more security on the computer.

    The solution's dashboard is user-friendly. We are working to set up the benchmark based on the school preferences. Sometimes, we need to modify them based on any updates related to the security level we want to apply. Jamf Protect provides good protection from the user's perspective and is easy to manage from the admin's perspective. We used other platforms before, and they did not provide good malware detection.

    I would recommend the solution to other users.

    Overall, I rate Jamf Protect a nine out of ten.

    View all reviews