Overview
Purpose-built endpoint security and mobile threat defense (MTD) for Mac and mobile devices that allows organizations to maintain compliance, defend against the modern threat landscape, identify and respond to security incidents with minimal impact to the end user experience.
Why Jamf Protect?
Apple's rapid growth and adoption in the enterprise make Apple devices an appealing target. Jamf Protect enhances Apple's built-in security features by increasing visibility, preventions, controls and remediation capabilities. Jamf Protect uses native security frameworks in macOS and iOS to offer same-day support for the latest Apple software and hardware.
Highlights
- Endpoint Protection - Comprehensive detection and protection for Apple-specific malware and attacks. Device controls to manage how removable storage devices are used to prevent data loss.
- Threat Prevention - Prevent threats that put corporate data at risk. Block phishing, ransomware, malicious domains. Block web-based or internet-based threats. Enforce acceptable use policy and block risky content.
- Compliance & Visibility - Audit security benchmarks to ensure ongoing compliance of Mac and mobile devices. Log rich telemetry to aide in incident investigations. Full visibility into security events.
Details
Introducing multi-product solutions
You can now purchase comprehensive solutions tailored to use cases and industries.
Features and programs
Security credentials achieved
(1)

Buyer guide

Financing for AWS Marketplace purchases
Pricing
Free trial
Dimension | Description | Cost/12 months |
|---|---|---|
Jamf Protect | Jamf Protect Offer | $50,000.00 |
Vendor refund policy
No Refunds
Custom pricing options
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
Software as a Service (SaaS)
SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.
Support
Vendor support
Support for Jamf Products. Jamf helps you manage and secure your Apple devices at work, backed by the most dedicated support team in the industry.
Support Email: support@jamf.com
US Phone Support: +1 844-411-5263 International Phone Support Available. Visit the Jamf Technical Support Desk website to local number.
Open a ticket or contact your account team in the Jamf Support Portal.
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.
FedRAMP
GDPR
HIPAA
ISO/IEC 27001
PCI DSS
SOC 2 Type 2
Standard contract
Customer reviews
Granular telemetry has strengthened compliance and simplified USB control for large Mac fleets
What is our primary use case?
I initially started using Jamf Protect for telemetry and auditing purposes. However, because we have other DLP products and antivirus in our organization, we have slowly and gradually started using a few more features of Jamf Protect, including DLP , which has made the process much smoother. The earlier process of DLP was quite complex in our environment, but since we started using Jamf Protect, it has become much easier for us to use those features that were very complex before. The first example I can give you is using a third-party USB. Previously, whitelisting the USB in our environment was a significant challenge because we are a large organization with approximately 10,000 Macs. Every now and then, people come to us saying they need a specific USB to work for a client. Since we started using Jamf Protect, that has become quite easy for us to handle. There are other compliance features that we are trying to use. I have just completed my certification with Jamf Protect, so we are trying to implement some compliance features using Jamf Protect. However, as of now, we are using very limited features of Jamf Protect.
What is most valuable?
Jamf Protect offers good telemetry and auditing capabilities. We can use Jamf Protect for auditing purposes and for meeting our minimum compliance requirements. We can also use Jamf Protect for whitelisting USB devices. The one limitation is that you cannot replace the antivirus completely with Jamf Protect, so you cannot consider it as a complete antivirus solution. However, you can use a few features of Jamf Protect.
We use Jamf Protect for telemetry and auditing because we collect telemetry data and hand it over to the security team. Regarding how beneficial it is, the security team has said that the previous application we were using for auditing and telemetry did not provide data that was as granular. I do not audit anything myself because I am in the engineering part. However, the security team has been continuously saying that the data we get from Jamf Protect is quite granular and quite helpful. After using Jamf Protect, they have been able to put many restrictions in place that they previously thought were not necessary. They have come to us asking whether we can implement this feature or that feature into the process. There were many things that we were previously allowing, thinking they would not cause any issues in the environment. However, using the data from Jamf Protect, they came to the conclusion that certain features could be a big issue in the coming days or could be a threat. They have asked us to stop those features on the Mac. I am not sure about the specifics of how they are using the data because there is a specific security team that manages all of these details.
If some other organization is using Jamf Pro , they should definitely go for Jamf Protect. That will streamline many things for them.
What needs improvement?
The first thing I would like to improve is Jamf's technical assessment on any product. When we were talking with Jamf about Jamf Protect features, they were not able to share all the features with us completely at that time. This was the first time I was involved in this type of conversation, and there is an architect in my team who normally takes care of these matters, but he had other things to do, so I was involved. I had to invest a lot of time going back and forth to understand what features of Jamf Protect we could use. I would say that Jamf should come up with a very clear picture of what all features we can use. Since we are an old customer of Jamf, they should be aware that these features are not being used in the environment and they should come to us and tell us how those features can be beneficial for us.
I would just want Jamf Protect to be included in Jamf Pro , the same way compliance and blueprints have been included. I do not want to go into three different portals. For Jamf Connect , I have to go to a different portal. For analytics, there is another portal, radar.vandera.com, which is also related to Jamf Protect analytics. I have to go to that portal for analytics. Jamf Protect and Radar portal are both connected, but I just want them to streamline everything into Jamf Pro so I can use one portal for everything rather than going to three or four different portals.
For how long have I used the solution?
I have been using this solution for about one and a half years.
What do I think about the stability of the solution?
I would say it was good. Initially, we had a few issues when we started our alpha testing on Jamf Protect. For some reason, it was causing a lot of CPU usage. Generally, it should hardly take any CPU usage and must be at zero CPU usage about ninety to ninety-five percent of the time. However, in the alpha phase, we found out that it was taking twenty to thirty percent of CPU usage, and in some of the Macs, it was taking even more than seventy percent of CPU usage. We had a discussion with Jamf about that, and Jamf helped us resolve it. Since then we have conducted two pilot phases and we have not had any issues. The integration was very good. I would not say it was excellent, but it was very good, though not excellent.
How are customer service and support?
The customer service rating is four out of ten.
Which solution did I use previously and why did I switch?
I have not been working with MetaDefender . I think someone took me wrong in a previous conversation. I have been working with Defender for quite long, about three to three and a half years. However, I have not worked on any Meta products. I have worked with Microsoft Defender, not MetaDefender .
How was the initial setup?
The initial setup was not complex; it was simple.
What other advice do I have?
Jamf Protect and Radar portal are both connected, and I would just want them to streamline everything into Jamf Pro so I can use one portal for everything rather than going to three or four different portals.
We have a very large number of client-facing Mac users, and we cannot simply put something on their Mac. We have to be very conscious when we start using any security stack in our environment. When we get rid of any security stack in our environment, we need to put it in a very clear picture to the leadership explaining why we are doing it and what impact it will have, as well as how beneficial it will be for the users. We have gotten rid of a few things in the past and it was very difficult for us to remove those applications. That is why using all the features of Jamf Protect instantly in our environment is a bit difficult, but we have slowly and gradually shifted a few things to Jamf Protect. The first thing is using USB. We will obviously include analytics in the coming time, but as of now, we are not using it.
We are using three Jamf products: Jamf Protect, Jamf Connect , and Jamf Pro. I would rate this review an eight out of ten.
Security platform has reduced malware risk and has strengthened compliance for macOS endpoints
What is our primary use case?
I have been using Jamf Protect for four years and have utilized it for Apple assets to protect against threats and suspicious activity.
Jamf Protect provides multiple levels of telemetry collection, allowing me to select how sensitive I want to be on event triggers. Jamf Protect allows me to monitor against specific threat categories aligned to the MITRE ATT&CK framework. In addition to protection, I utilize Jamf Protect to monitor our endpoint compliance with the CIS critical security control baseline.
If the environment is predominantly Apple based, Jamf Protect is a strong solution for providing EDR capabilities to endpoints. The detection capabilities are on par with other leading EDR tools, and it integrates well with Jamf MDM . The compliance telemetry, log forwarding, and USB device management included as part of Jamf Protect provide a good return on investment.
I use Jamf Protect as our main security endpoint for all our macOS devices, which are Apple devices. It was very easy to implement by following Jamf's documentation, and our security team is very happy with how it monitors threats. The compliance feature is also very useful to them, and it constantly helps them monitor and ensure our devices comply with our security policies.
What is most valuable?
Jamf Protect provides multiple levels of telemetry collection, allowing me to select how sensitive I want to be on event triggers. Jamf Protect allows me to monitor against specific threat categories aligned to the MITRE ATT&CK framework. In addition to protection, I utilize Jamf Protect to monitor our endpoint compliance with the CIS critical security control baseline.
If the environment is predominantly Apple based, Jamf Protect is a strong solution for providing EDR capabilities to endpoints. The detection capabilities are on par with other leading EDR tools, and it integrates well with Jamf MDM . The compliance telemetry, log forwarding, and USB device management included as part of Jamf Protect provide a good return on investment.
Jamf Protect has had a positive impact on my organization, as it has been one of the best tools that protects against malware. It offers better detection of malware, reducing downtime and risk to our network by approximately 30 to 50 percent. Implementing it is straightforward, although there can be a steep learning curve in general, especially for less technical users. The competitive pricing included in the business package is great, and compliance with our security standards has been maintained.
What needs improvement?
To improve Jamf Protect, I suggest enhancing the end user onboarding user experience, expanding out-of-the-box support for additional SIEMs, and noting that the user interface takes some getting used to. More inline instruction prompts for new admins would also be beneficial.
For how long have I used the solution?
I have been using Jamf Protect for four years and have utilized it for Apple assets to protect against threats and suspicious activity.
What do I think about the stability of the solution?
Jamf Protect is very stable, and I have not seen any downtime.
What do I think about the scalability of the solution?
Jamf Protect is very scalable, enabling me to manage a large number of devices seamlessly and easily.
How are customer service and support?
The customer support is very proactive, helpful, and knowledgeable.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I previously used Microsoft Defender for Endpoint .
I switched from Microsoft Defender for Endpoint to Jamf Protect because I find that Microsoft Defender for Endpoint has the same features; however, Jamf Protect is specifically tailored for managing macOS devices. With Jamf Protect, it is one license that covers all features without requiring additional licenses for features such as USB device control, making it very cost-effective.
How was the initial setup?
It is easy to implement and easy to manage.
It was very easy to implement by following Jamf's documentation, and our security team is very happy with how it monitors threats.
What was our ROI?
The compliance telemetry, log forwarding, and USB device management included as part of Jamf Protect provide a good return on investment.
What's my experience with pricing, setup cost, and licensing?
The pricing, setup cost, and licensing have been very effective.
Jamf Protect includes a number of features that other EDR solutions charge additional fees for, such as compliance and device control. It has helped us lower the cost per endpoint compared to other EDR solutions, and it is easy to manage since it is centrally managed with strong integration with Jamf MDM.
Which other solutions did I evaluate?
I evaluated other options before choosing Jamf Protect, specifically CrowdStrike Falcon .
What other advice do I have?
My advice to others looking into using Jamf Protect is that it is easy to manage and offers a separate interface from Jamf MDM, which is beneficial for security operations teams. It allows security teams to manage only the security aspects without having to navigate through all the MDM configurations, saving a lot of time. Additionally, if your environment is predominantly Apple or macOS based, Jamf Protect is a strong solution for providing EDR capabilities to endpoints. I would rate this solution an 8 out of 10.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Secure access to company sites has protected our devices and now runs quietly in the background
What is our primary use case?
My main use case for Jamf Protect at my organization is that we use it for VPN to access company websites through VPN. A specific example of how we use Jamf Protect for VPN access is that my organization uses it to secure the MacBook devices that have been provided to us. When we were signing up for this, we received our laptop devices and with the initial setup, Jamf Protect was configured to avoid breaching any sensitive information.
What is most valuable?
The best features Jamf Protect offers, in my opinion, is that the one we are using currently is excellent for helping secure the devices, but other than that, I do not have any idea of what other features Jamf Protect offers.
I am confident that Jamf Protect has impacted my organization positively because we have been using it for quite a while now. Since I joined this company recently, I have not noticed any security-related changes. Regarding productivity and peace of mind, I do not see much work around this, so I would say that Jamf Protect is doing an excellent job securing the devices.
I can think of having a general sense that Jamf Protect makes me and my team feel more secure because I have not noticed or seen any security-related breaches with me or with any of my other colleagues.
What needs improvement?
Regarding improvements for Jamf Protect, I receive the warnings related to insecure website accesses through mail at a later stage, so if they could be flagged the moment I visit them, that would be great because I would know exactly which website was causing the warnings.
Regarding how Jamf Protect communicates these alerts, I think it is useful as it is now, the way they inform us through emails. However, when I use this office device to access some personal websites, I do not receive any alert at that time and later on in the evening when I am checking my emails, I receive this email from Jamf Protect saying that there was a website I accessed which had a threat level of medium or minor. At that time, I do not know which website caused this, so it would be more helpful if the device itself could flag it at the point when I access the website. Other than that, I think it is still useful because it is mostly company-related activities and there are very few personal websites, so I can still identify the suspects.
For how long have I used the solution?
I have been using Jamf Protect since I joined my last company. We use this for VPNs and VPN connections.
What do I think about the stability of the solution?
In my experience, Jamf Protect is very stable right now, and I have not faced any issues related to it to date.
What do I think about the scalability of the solution?
I believe Jamf Protect's scalability is effective because we have been using it in our organization since the start, and our numbers have recently risen by a large amount, so we are still using it.
How are customer service and support?
I have not faced any issues with Jamf Protect, so I have no feedback on customer support from my or my team's experience.
How was the initial setup?
A specific example of how we use Jamf Protect for VPN access is that my organization uses it to secure the MacBook devices that have been provided to us. When we were signing up for this, we received our laptop devices and with the initial setup, Jamf Protect was configured to avoid breaching any sensitive information.
What other advice do I have?
My advice for others looking into using Jamf Protect is that it is an excellent tool to use to secure your devices, so I would recommend moving forward with it.
I give Jamf Protect a rating of eight out of ten. I gave it an eight out of ten because it is working behind the scenes, and I do not have any data as a client, so that might be related to authorization accesses since I am just a Level 3 employee at my company. The senior folks or the security folks might be having more detailed access to that, and apart from that, the shortcoming regarding the warnings received through emails is another point. Regarding our relationship with this vendor, my company is just a customer, and we do not have a business relationship other than that. My overall review rating for Jamf Protect is eight out of ten.
Experience agile user-centric security with AI-powered endpoint protection
What is our primary use case?
I use Jamf Protect for myself, especially for POC demonstration purposes. It is also used as part of our consultation services, where I recommend it to customers.
How has it helped my organization?
Jamf Protect gives you Apple built-in native support for endpoint security. It supports zero-day protection in the Apple ecosystem and is agile, user-centric, and lightweight for macOS.
What is most valuable?
The behavioral detection is valuable. It also includes built-in network protection that is powered by our AI called Medium. It provides telemetry and signature-based detection, which offer comprehensive endpoint security.
What needs improvement?
For how long have I used the solution?
I have been using it for the last four years.
How are customer service and support?
The technical support is good and proactive. That said, it can be improved. There is some scope to enhance the response and resolution time. From an Indian perspective, I would rate their support at seven point five out of ten.
Which solution did I use previously and why did I switch?
I have an understanding of CrowdStrike and certain security solutions from Forcepoint.
What other advice do I have?
I would recommend inbuilt remediation for behavior-based threats and less dependency on third-party tools.
I'd rate the solution eight out of ten.
Effective device management, enhance threat detection and smooth integration
What is our primary use case?
Jamf Protect manages all Apple devices, deploys and upgrades applications, and enforces security features like blocking data transfers and improving security profiles.
How has it helped my organization?
Compliance is ensured through encryption, like with DEP.
Jamf Protect adapted to evolving security threats specific to macOS. We integrated with Microsoft Defender for added protection.
Compared to on-premises solutions, there are a lot of features improved in cloud-based solutions. The performance after implementation is better than with on-premises solutions.
Integration is also easy. Nothing complex about it. I never found any issues with it.
What is most valuable?
Jamf Protect's most effective features for threat detection include managing devices and applications, deploying and upgrading the OS, and its overall security features.
We can block data transfer and manage other security aspects through profiles.
What needs improvement?
Beginners need initial training and have basic/essential knowledge.
For how long have I used the solution?
I used it for five years. I moved to the cloud version two years ago. Before that, it was on-premises. It was Jamf's own cloud (private cloud).
What do I think about the stability of the solution?
I would rate the stability a ten out of ten.
What do I think about the scalability of the solution?
I would rate the scalability a ten out of ten.
How are customer service and support?
The customer service and support are good.
How was the initial setup?
I would rate my experience with the initial setup a ten out of ten, with ten being easy.
Initially, the deployment took 15 days for the pilot phase, and then another 15 days for production. However, the actual deployment itself only took 15 days, as it was preconfigured.
So it took around one month in total. Stakeholder approval caused a delay, but the actual deployment for the facility department was only 15 days.
No maintenance is required because everything is associated. It's a cloud solution, so we only need to modify applications for the services.
So, 99.9% of the time, it's working fine.
What was our ROI?
There are many financial benefits because everything is managed in a single cloud for Apple devices, with no need for third-party software.
What other advice do I have?
Everything is working well for me; it also supports single sign-on. Jamf Protect is very good and excellent.
Overall, I would rate the solution a ten out of ten. I would recommend it to other users. Beginners should have basic knowledge. If they have normal, basic knowledge, they can use the resources provided with the solution.
