Listing Thumbnail

    Jamf Protect

     Info
    Sold by: Jamf 
    Deployed on AWS
    Free Trial
    Vendor Insights
    AWS Free Tier
    Jamf Protect is an endpoint security and mobile threat defense (MTD) solution that helps organizations defend against modern threats, maintain endpoint compliance, identify active threats and respond to them.
    4.6

    Overview

    Purpose-built endpoint security and mobile threat defense (MTD) for Mac and mobile devices that allows organizations to maintain compliance, defend against the modern threat landscape, identify and respond to security incidents with minimal impact to the end user experience.

    Why Jamf Protect?

    Apple's rapid growth and adoption in the enterprise make Apple devices an appealing target. Jamf Protect enhances Apple's built-in security features by increasing visibility, preventions, controls and remediation capabilities. Jamf Protect uses native security frameworks in macOS and iOS to offer same-day support for the latest Apple software and hardware.

    Highlights

    • Endpoint Protection - Comprehensive detection and protection for Apple-specific malware and attacks. Device controls to manage how removable storage devices are used to prevent data loss.
    • Threat Prevention - Prevent threats that put corporate data at risk. Block phishing, ransomware, malicious domains. Block web-based or internet-based threats. Enforce acceptable use policy and block risky content.
    • Compliance & Visibility - Audit security benchmarks to ensure ongoing compliance of Mac and mobile devices. Log rich telemetry to aide in incident investigations. Full visibility into security events.

    Details

    Sold by

    Delivery method

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Vendor Insights

     Info
    Skip the manual risk assessment. Get verified and regularly updated security info on this product with Vendor Insights.
    Security credentials achieved
    (1)

    Buyer guide

    Gain valuable insights from real users who purchased this product, powered by PeerSpot.
    Buyer guide

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Free trial

    Try this product free according to the free trial terms set by the vendor.
    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    12-month contract (1)

     Info
    Dimension
    Description
    Cost/12 months
    Jamf Protect
    Jamf Protect Offer
    $50,000.00

    Vendor refund policy

    No Refunds

    Custom pricing options

    Request a private offer to receive a custom quote.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Support

    Vendor support

    Support for Jamf Products. Jamf helps you manage and secure your Apple devices at work, backed by the most dedicated support team in the industry.

    Support Email: support@jamf.com 

    US Phone Support: +1 844-411-5263 International Phone Support Available. Visit the Jamf Technical Support Desk website to local number.

    Open a ticket or contact your account team in the Jamf Support Portal.

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly
    By Iru
    By IBM Security

    Accolades

     Info
    Top
    50
    In IT Business Management
    Top
    10
    In Device Security, Device Management
    Top
    50
    In Device Management, Device Security

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    2 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    Insufficient data
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Endpoint Protection
    Comprehensive detection and protection for Apple-specific malware and attacks with device controls to manage removable storage devices and prevent data loss.
    Threat Prevention
    Prevention of phishing, ransomware, malicious domains, and web-based threats with enforcement of acceptable use policies and blocking of risky content.
    Compliance and Visibility
    Audit of security benchmarks for Mac and mobile device compliance with rich telemetry logging and full visibility into security events for incident investigations.
    Native Security Framework Integration
    Utilization of native security frameworks in macOS and iOS to provide same-day support for latest Apple software and hardware updates.
    Mobile Threat Defense
    Mobile threat defense capabilities for iOS devices to identify and respond to security incidents with minimal impact to end user experience.
    Zero-Touch Device Deployment
    Automatic transformation of Apple devices into enterprise-ready endpoints upon first power-on with pre-configured apps, settings, and security controls without user intervention.
    Identity Provider and Single Sign-On Integration
    Deep integration with identity providers enabling automatic blueprint and control assignment based on user data, with support for customized login experiences.
    Self-Healing Security Controls
    Over 150 configurable security settings monitored and automatically enforced by the Kandji Agent with automatic remediation if settings drift from specified configuration.
    Unified Endpoint Detection and Response
    Single agent delivering both MDM and EDR functionality with file metadata analysis, malicious activity detection, and quarantine capabilities during file download operations.
    Compliance Framework Templates
    Pre-built security templates mapped to NIST, CIS, and STIG frameworks enabling rapid deployment of advanced security configurations across device fleets with customizable individual settings.
    Unified Endpoint Management
    Manage multiple device types and operating systems including Android, iOS, iPadOS, Chrome OS, AR/VR devices, wearables, and rugged devices from a single console
    Mobile Threat Defense
    Enable mobile threat defense with continuous on-device protection and near real-time dashboards to identify and remediate security risks
    Device Enrollment and Onboarding
    Support Over-the-Air (OTA) device enrollment, Apple Business Manager integration, and Android Enterprise zero-touch enrollment for streamlined device setup
    Enterprise Mobility Management
    Provide MDM and EMM capabilities with containerization and device security features for inventory visibility of devices, apps, content, and corporate data across corporate-owned and BYOD programs
    AI-Powered Security Automation
    Deliver AI-powered real-time alerts and automated security policy enforcement through the Compliance Engine and Action Orchestrator for routine and complex endpoint tasks

    Security credentials

     Info
    Validated by AWS Marketplace
    FedRAMP
    GDPR
    HIPAA
    ISO/IEC 27001
    PCI DSS
    SOC 2 Type 2
    -
    -
    -
    -
    -
    No security profile
    No security profile

    Contract

     Info
    Standard contract
    No
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    4.6
    12 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    67%
    33%
    0%
    0%
    0%
    2 AWS reviews
    |
    10 external reviews
    External reviews are from PeerSpot .
    Nick Rudman

    Security platform has reduced malware risk and has strengthened compliance for macOS endpoints

    Reviewed on Feb 16, 2026
    Review from a verified AWS customer

    What is our primary use case?

    I have been using Jamf Protect  for four years and have utilized it for Apple assets to protect against threats and suspicious activity.

    Jamf Protect  provides multiple levels of telemetry collection, allowing me to select how sensitive I want to be on event triggers. Jamf Protect allows me to monitor against specific threat categories aligned to the MITRE ATT&CK framework. In addition to protection, I utilize Jamf Protect to monitor our endpoint compliance with the CIS critical security control baseline.

    If the environment is predominantly Apple based, Jamf Protect is a strong solution for providing EDR capabilities to endpoints. The detection capabilities are on par with other leading EDR tools, and it integrates well with Jamf MDM . The compliance telemetry, log forwarding, and USB device management included as part of Jamf Protect provide a good return on investment.

    I use Jamf Protect as our main security endpoint for all our macOS devices, which are Apple devices. It was very easy to implement by following Jamf's documentation, and our security team is very happy with how it monitors threats. The compliance feature is also very useful to them, and it constantly helps them monitor and ensure our devices comply with our security policies.

    What is most valuable?

    Jamf Protect provides multiple levels of telemetry collection, allowing me to select how sensitive I want to be on event triggers. Jamf Protect allows me to monitor against specific threat categories aligned to the MITRE ATT&CK framework. In addition to protection, I utilize Jamf Protect to monitor our endpoint compliance with the CIS critical security control baseline.

    If the environment is predominantly Apple based, Jamf Protect is a strong solution for providing EDR capabilities to endpoints. The detection capabilities are on par with other leading EDR tools, and it integrates well with Jamf MDM . The compliance telemetry, log forwarding, and USB device management included as part of Jamf Protect provide a good return on investment.

    Jamf Protect has had a positive impact on my organization, as it has been one of the best tools that protects against malware. It offers better detection of malware, reducing downtime and risk to our network by approximately 30 to 50 percent. Implementing it is straightforward, although there can be a steep learning curve in general, especially for less technical users. The competitive pricing included in the business package is great, and compliance with our security standards has been maintained.

    What needs improvement?

    To improve Jamf Protect, I suggest enhancing the end user onboarding user experience, expanding out-of-the-box support for additional SIEMs, and noting that the user interface takes some getting used to. More inline instruction prompts for new admins would also be beneficial.

    For how long have I used the solution?

    I have been using Jamf Protect for four years and have utilized it for Apple assets to protect against threats and suspicious activity.

    What do I think about the stability of the solution?

    Jamf Protect is very stable, and I have not seen any downtime.

    What do I think about the scalability of the solution?

    Jamf Protect is very scalable, enabling me to manage a large number of devices seamlessly and easily.

    How are customer service and support?

    The customer support is very proactive, helpful, and knowledgeable.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    I previously used Microsoft Defender for Endpoint .

    I switched from Microsoft Defender for Endpoint  to Jamf Protect because I find that Microsoft Defender for Endpoint has the same features; however, Jamf Protect is specifically tailored for managing macOS devices. With Jamf Protect, it is one license that covers all features without requiring additional licenses for features such as USB device control, making it very cost-effective.

    How was the initial setup?

    It is easy to implement and easy to manage.

    It was very easy to implement by following Jamf's documentation, and our security team is very happy with how it monitors threats.

    What was our ROI?

    The compliance telemetry, log forwarding, and USB device management included as part of Jamf Protect provide a good return on investment.

    What's my experience with pricing, setup cost, and licensing?

    The pricing, setup cost, and licensing have been very effective.

    Jamf Protect includes a number of features that other EDR solutions charge additional fees for, such as compliance and device control. It has helped us lower the cost per endpoint compared to other EDR solutions, and it is easy to manage since it is centrally managed with strong integration with Jamf MDM.

    Which other solutions did I evaluate?

    I evaluated other options before choosing Jamf Protect, specifically CrowdStrike Falcon .

    What other advice do I have?

    My advice to others looking into using Jamf Protect is that it is easy to manage and offers a separate interface from Jamf MDM, which is beneficial for security operations teams. It allows security teams to manage only the security aspects without having to navigate through all the MDM configurations, saving a lot of time. Additionally, if your environment is predominantly Apple or macOS based, Jamf Protect is a strong solution for providing EDR capabilities to endpoints. I would rate this solution an 8 out of 10.

    Which deployment model are you using for this solution?

    Hybrid Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    SachinShelar

    Advanced macOS detection has improved SOC efficiency and provides faster incident response

    Reviewed on Feb 09, 2026
    Review from a verified AWS customer

    What is our primary use case?

    Jamf Protect  is used in my organization for endpoint threat detection and prevention on macOS environments, specifically for real-time malware detection, behavioral monitoring, and security visibility across managed Apple endpoints for multiple customers integrated with Jamf Pro  and SIEM  for incident response.

    An example of how Jamf Protect  is used for real-time malware detection and behavioral monitoring occurred when it detected a suspicious process execution and abnormal file activity on a macOS endpoint. The alert was forwarded to SIEM , and the endpoint was isolated by Jamf Pro , leading to IOC-based remediation that prevented the lateral impact.

    Jamf Protect is also used for enforcing endpoint security baselines, monitoring macOS-specific attack techniques, and providing security telemetry to SOC teams for faster investigation and response.

    How has it helped my organization?

    Jamf Protect has positively impacted my organization by improving macOS security visibility, enabling faster detection and response, reducing manual SOC effort, and providing consistent endpoint protection across multi-customer Apple environments.

    The measurable outcomes related to these improvements show a 30 to 40 percent reduction in macOS incident response time, early detection of suspicious activity before user impact, and fewer malware-related escalations due to behavioral blocking. SOC efficiency has also improved through actionable low-noise alerts.

    What is most valuable?

    The best features that stand out in Jamf Protect include macOS native threat detection using the kernel and user space behavioral analysis, real-time alerting, integration with Jamf Pro with automated response and quarantine actions, and pre-built rule sets that help with macOS threat models and MITRE mapping.

    The real-time alert on suspicious process and persistence attempts has helped my team significantly. It triggers immediate SOC visibility, and the automated Jamf Pro action restricts user access and blocks execution, reducing dwell time and avoiding manual endpoint intervention across customer fleets.

    Regarding Jamf Protect features, low performance impact and macOS-focused detection are appreciated, though the solution would benefit from more built-in automated response actions within Jamf Protect itself and deeper native integration with third-party SOAR  tools.

    What needs improvement?

    Jamf Protect should have more built-in automated remediation actions, enhanced reporting and long-term analytics, and deeper SOAR  and SIEM native integration with more customization in behavioral rule tuning for MSP environments.

    Jamf Protect should offer more documentation and simplify alert tuning and policy management UI.

    For how long have I used the solution?

    I have been using Jamf Protect for more than three years.

    What do I think about the stability of the solution?

    Jamf Protect is stable, reliable, and has been functioning well in production across the macOS fleet with low endpoint performance impact and no significant resource issues observed.

    What do I think about the scalability of the solution?

    Jamf Protect is scalable. I initially had a few customers with macOS but now have more, and it remains stable without encountering issues, allowing me to scale it up to many customers.

    How are customer service and support?

    I have had good experiences reaching out to Jamf Protect customer support. The technical team is knowledgeable, response times are good, and resolution times are low.

    How would you rate customer service and support?

    Which solution did I use previously and why did I switch?

    I did not use a different solution before Jamf Protect, as there were not many Apple products in the environment. Now there are many customers with macOS.

    What was our ROI?

    A return on investment has been realized with Jamf Protect, having saved 30 to 40 percent in time due to faster detection-to-response cycles for macOS indications. Operational efficiency has improved since the manual endpoint triage workload for SOC and infrastructure teams has been reduced, and there have been fewer escalations for manual malware or behavioral threats, thus lowering potential breach costs while the premium is justified by a stronger macOS security posture and SOC efficiency gains.

    What's my experience with pricing, setup cost, and licensing?

    My experience with pricing, setup cost, and licensing is not extensive as I am not from the sales team, but I hear from the sales team that it is more costly. However, the setup cost is relatively low due to the deployment effort for macOS fleet through standard setup via Jamf Pro policies and Jamf Protect onboarding, initial tuning, and rule configuration, resulting in fair value for macOS security telemetry and detection. Licensing feels premium in multi-tenant environments.

    Which other solutions did I evaluate?

    Before choosing Jamf Protect, CrowdStrike Falcon  for macOS was evaluated.

    What other advice do I have?

    My advice for others looking into Jamf Protect is to start with the pre-built macOS behavioral rule and then tune it for the environment, integrating it with SIEM and SOC workflows for centralized monitoring. I would rate this review as a 9 out of 10.

    Which deployment model are you using for this solution?

    Public Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    reviewer2799429

    Secure access to company sites has protected our devices and now runs quietly in the background

    Reviewed on Jan 25, 2026
    Review provided by PeerSpot

    What is our primary use case?

    My main use case for Jamf Protect  at my organization is that we use it for VPN to access company websites through VPN. A specific example of how we use Jamf Protect  for VPN access is that my organization uses it to secure the MacBook devices that have been provided to us. When we were signing up for this, we received our laptop devices and with the initial setup, Jamf Protect was configured to avoid breaching any sensitive information.

    What is most valuable?

    The best features Jamf Protect offers, in my opinion, is that the one we are using currently is excellent for helping secure the devices, but other than that, I do not have any idea of what other features Jamf Protect offers.

    I am confident that Jamf Protect has impacted my organization positively because we have been using it for quite a while now. Since I joined this company recently, I have not noticed any security-related changes. Regarding productivity and peace of mind, I do not see much work around this, so I would say that Jamf Protect is doing an excellent job securing the devices.

    I can think of having a general sense that Jamf Protect makes me and my team feel more secure because I have not noticed or seen any security-related breaches with me or with any of my other colleagues.

    What needs improvement?

    Regarding improvements for Jamf Protect, I receive the warnings related to insecure website accesses through mail at a later stage, so if they could be flagged the moment I visit them, that would be great because I would know exactly which website was causing the warnings.

    Regarding how Jamf Protect communicates these alerts, I think it is useful as it is now, the way they inform us through emails. However, when I use this office device to access some personal websites, I do not receive any alert at that time and later on in the evening when I am checking my emails, I receive this email from Jamf Protect saying that there was a website I accessed which had a threat level of medium or minor. At that time, I do not know which website caused this, so it would be more helpful if the device itself could flag it at the point when I access the website. Other than that, I think it is still useful because it is mostly company-related activities and there are very few personal websites, so I can still identify the suspects.

    For how long have I used the solution?

    I have been using Jamf Protect since I joined my last company. We use this for VPNs and VPN connections.

    What do I think about the stability of the solution?

    In my experience, Jamf Protect is very stable right now, and I have not faced any issues related to it to date.

    What do I think about the scalability of the solution?

    I believe Jamf Protect's scalability is effective because we have been using it in our organization since the start, and our numbers have recently risen by a large amount, so we are still using it.

    How are customer service and support?

    I have not faced any issues with Jamf Protect, so I have no feedback on customer support from my or my team's experience.

    How would you rate customer service and support?

    Negative

    How was the initial setup?

    A specific example of how we use Jamf Protect for VPN access is that my organization uses it to secure the MacBook devices that have been provided to us. When we were signing up for this, we received our laptop devices and with the initial setup, Jamf Protect was configured to avoid breaching any sensitive information.

    What other advice do I have?

    My advice for others looking into using Jamf Protect is that it is an excellent tool to use to secure your devices, so I would recommend moving forward with it.

    I give Jamf Protect a rating of eight out of ten. I gave it an eight out of ten because it is working behind the scenes, and I do not have any data as a client, so that might be related to authorization accesses since I am just a Level 3 employee at my company. The senior folks or the security folks might be having more detailed access to that, and apart from that, the shortcoming regarding the warnings received through emails is another point. Regarding our relationship with this vendor, my company is just a customer, and we do not have a business relationship other than that. My overall review rating for Jamf Protect is eight out of ten.

    reviewer2584980

    Experience agile user-centric security with AI-powered endpoint protection

    Reviewed on Oct 15, 2024
    Review provided by PeerSpot

    What is our primary use case?

    I use Jamf Protect  for myself, especially for POC demonstration purposes. It is also used as part of our consultation services, where I recommend it to customers.

    How has it helped my organization?

    Jamf Protect  gives you Apple built-in native support for endpoint security. It supports zero-day protection in the Apple ecosystem and is agile, user-centric, and lightweight for macOS.

    What is most valuable?

    The behavioral detection is valuable. It also includes built-in network protection that is powered by our AI called Medium. It provides telemetry and signature-based detection, which offer comprehensive endpoint security.

    What needs improvement?

    The dependency on Jamf Pro  or SIEM  or SOAR  for some automations and integrations could be reduced. In-built automation and remediation of behavior-based threats would be beneficial enhancements.

    For how long have I used the solution?

    I have been using it for the last four years.

    How are customer service and support?

    The technical support is good and proactive. That said, it can be improved. There is some scope to enhance the response and resolution time. From an Indian perspective, I would rate their support at seven point five out of ten.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    I have an understanding of CrowdStrike and certain security solutions from Forcepoint.

    What other advice do I have?

    I would recommend inbuilt remediation for behavior-based threats and less dependency on third-party tools.

    I'd rate the solution eight out of ten.

    Dinesh Venkates

    Effective device management, enhance threat detection and smooth integration

    Reviewed on May 27, 2024
    Review provided by PeerSpot

    What is our primary use case?

    Jamf Protect manages all Apple devices, deploys and upgrades applications, and enforces security features like blocking data transfers and improving security profiles.

    How has it helped my organization?

    Compliance is ensured through encryption, like with DEP.

    Jamf Protect adapted to evolving security threats specific to macOS. We integrated with Microsoft Defender for added protection.

    Compared to on-premises solutions, there are a lot of features improved in cloud-based solutions. The performance after implementation is better than with on-premises solutions.

    Integration is also easy. Nothing complex about it. I never found any issues with it.

    What is most valuable?

    Jamf Protect's most effective features for threat detection include managing devices and applications, deploying and upgrading the OS, and its overall security features.

    We can block data transfer and manage other security aspects through profiles.

    What needs improvement?

    Beginners need initial training and have basic/essential knowledge.

    For how long have I used the solution?

    I used it for five years. I moved to the cloud version two years ago. Before that, it was on-premises. It was Jamf's own cloud (private cloud).

    What do I think about the stability of the solution?

    I would rate the stability a ten out of ten.

    What do I think about the scalability of the solution?

    I would rate the scalability a ten out of ten.

    How are customer service and support?

    The customer service and support are good.

    How would you rate customer service and support?

    Positive

    How was the initial setup?

    I would rate my experience with the initial setup a ten out of ten, with ten being easy.

    Initially, the deployment took 15 days for the pilot phase, and then another 15 days for production. However, the actual deployment itself only took 15 days, as it was preconfigured.

    So it took around one month in total. Stakeholder approval caused a delay, but the actual deployment for the facility department was only 15 days.

    No maintenance is required because everything is associated. It's a cloud solution, so we only need to modify applications for the services.

    So, 99.9% of the time, it's working fine.

    What was our ROI?

    There are many financial benefits because everything is managed in a single cloud for Apple devices, with no need for third-party software.

    What other advice do I have?

    Everything is working well for me; it also supports single sign-on. Jamf Protect is very good and excellent.

    Overall, I would rate the solution a ten out of ten. I would recommend it to other users. Beginners should have basic knowledge. If they have normal, basic knowledge, they can use the resources provided with the solution.

    View all reviews