Sign in Agent Mode
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Reviews from AWS customer

2 AWS reviews

External reviews

10 reviews
from

External reviews are not included in the AWS star rating for the product.


    Nick Rudman

Security platform has reduced malware risk and has strengthened compliance for macOS endpoints

  • February 16, 2026
  • Review from a verified AWS customer

What is our primary use case?

I have been using Jamf Protect for four years and have utilized it for Apple assets to protect against threats and suspicious activity.

Jamf Protect provides multiple levels of telemetry collection, allowing me to select how sensitive I want to be on event triggers. Jamf Protect allows me to monitor against specific threat categories aligned to the MITRE ATT&CK framework. In addition to protection, I utilize Jamf Protect to monitor our endpoint compliance with the CIS critical security control baseline.

If the environment is predominantly Apple based, Jamf Protect is a strong solution for providing EDR capabilities to endpoints. The detection capabilities are on par with other leading EDR tools, and it integrates well with Jamf MDM. The compliance telemetry, log forwarding, and USB device management included as part of Jamf Protect provide a good return on investment.

I use Jamf Protect as our main security endpoint for all our macOS devices, which are Apple devices. It was very easy to implement by following Jamf's documentation, and our security team is very happy with how it monitors threats. The compliance feature is also very useful to them, and it constantly helps them monitor and ensure our devices comply with our security policies.

What is most valuable?

Jamf Protect provides multiple levels of telemetry collection, allowing me to select how sensitive I want to be on event triggers. Jamf Protect allows me to monitor against specific threat categories aligned to the MITRE ATT&CK framework. In addition to protection, I utilize Jamf Protect to monitor our endpoint compliance with the CIS critical security control baseline.

If the environment is predominantly Apple based, Jamf Protect is a strong solution for providing EDR capabilities to endpoints. The detection capabilities are on par with other leading EDR tools, and it integrates well with Jamf MDM. The compliance telemetry, log forwarding, and USB device management included as part of Jamf Protect provide a good return on investment.

Jamf Protect has had a positive impact on my organization, as it has been one of the best tools that protects against malware. It offers better detection of malware, reducing downtime and risk to our network by approximately 30 to 50 percent. Implementing it is straightforward, although there can be a steep learning curve in general, especially for less technical users. The competitive pricing included in the business package is great, and compliance with our security standards has been maintained.

What needs improvement?

To improve Jamf Protect, I suggest enhancing the end user onboarding user experience, expanding out-of-the-box support for additional SIEMs, and noting that the user interface takes some getting used to. More inline instruction prompts for new admins would also be beneficial.

For how long have I used the solution?

I have been using Jamf Protect for four years and have utilized it for Apple assets to protect against threats and suspicious activity.

What do I think about the stability of the solution?

Jamf Protect is very stable, and I have not seen any downtime.

What do I think about the scalability of the solution?

Jamf Protect is very scalable, enabling me to manage a large number of devices seamlessly and easily.

How are customer service and support?

The customer support is very proactive, helpful, and knowledgeable.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I previously used Microsoft Defender for Endpoint.

I switched from Microsoft Defender for Endpoint to Jamf Protect because I find that Microsoft Defender for Endpoint has the same features; however, Jamf Protect is specifically tailored for managing macOS devices. With Jamf Protect, it is one license that covers all features without requiring additional licenses for features such as USB device control, making it very cost-effective.

How was the initial setup?

It is easy to implement and easy to manage.

It was very easy to implement by following Jamf's documentation, and our security team is very happy with how it monitors threats.

What was our ROI?

The compliance telemetry, log forwarding, and USB device management included as part of Jamf Protect provide a good return on investment.

What's my experience with pricing, setup cost, and licensing?

The pricing, setup cost, and licensing have been very effective.

Jamf Protect includes a number of features that other EDR solutions charge additional fees for, such as compliance and device control. It has helped us lower the cost per endpoint compared to other EDR solutions, and it is easy to manage since it is centrally managed with strong integration with Jamf MDM.

Which other solutions did I evaluate?

I evaluated other options before choosing Jamf Protect, specifically CrowdStrike Falcon.

What other advice do I have?

My advice to others looking into using Jamf Protect is that it is easy to manage and offers a separate interface from Jamf MDM, which is beneficial for security operations teams. It allows security teams to manage only the security aspects without having to navigate through all the MDM configurations, saving a lot of time. Additionally, if your environment is predominantly Apple or macOS based, Jamf Protect is a strong solution for providing EDR capabilities to endpoints. I would rate this solution an 8 out of 10.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?


    SachinShelar

Advanced macOS detection has improved SOC efficiency and provides faster incident response

  • February 09, 2026
  • Review from a verified AWS customer

What is our primary use case?

Jamf Protect is used in my organization for endpoint threat detection and prevention on macOS environments, specifically for real-time malware detection, behavioral monitoring, and security visibility across managed Apple endpoints for multiple customers integrated with Jamf Pro and SIEM for incident response.

An example of how Jamf Protect is used for real-time malware detection and behavioral monitoring occurred when it detected a suspicious process execution and abnormal file activity on a macOS endpoint. The alert was forwarded to SIEM, and the endpoint was isolated by Jamf Pro, leading to IOC-based remediation that prevented the lateral impact.

Jamf Protect is also used for enforcing endpoint security baselines, monitoring macOS-specific attack techniques, and providing security telemetry to SOC teams for faster investigation and response.

How has it helped my organization?

Jamf Protect has positively impacted my organization by improving macOS security visibility, enabling faster detection and response, reducing manual SOC effort, and providing consistent endpoint protection across multi-customer Apple environments.

The measurable outcomes related to these improvements show a 30 to 40 percent reduction in macOS incident response time, early detection of suspicious activity before user impact, and fewer malware-related escalations due to behavioral blocking. SOC efficiency has also improved through actionable low-noise alerts.

What is most valuable?

The best features that stand out in Jamf Protect include macOS native threat detection using the kernel and user space behavioral analysis, real-time alerting, integration with Jamf Pro with automated response and quarantine actions, and pre-built rule sets that help with macOS threat models and MITRE mapping.

The real-time alert on suspicious process and persistence attempts has helped my team significantly. It triggers immediate SOC visibility, and the automated Jamf Pro action restricts user access and blocks execution, reducing dwell time and avoiding manual endpoint intervention across customer fleets.

Regarding Jamf Protect features, low performance impact and macOS-focused detection are appreciated, though the solution would benefit from more built-in automated response actions within Jamf Protect itself and deeper native integration with third-party SOAR tools.

What needs improvement?

Jamf Protect should have more built-in automated remediation actions, enhanced reporting and long-term analytics, and deeper SOAR and SIEM native integration with more customization in behavioral rule tuning for MSP environments.

Jamf Protect should offer more documentation and simplify alert tuning and policy management UI.

For how long have I used the solution?

I have been using Jamf Protect for more than three years.

What do I think about the stability of the solution?

Jamf Protect is stable, reliable, and has been functioning well in production across the macOS fleet with low endpoint performance impact and no significant resource issues observed.

What do I think about the scalability of the solution?

Jamf Protect is scalable. I initially had a few customers with macOS but now have more, and it remains stable without encountering issues, allowing me to scale it up to many customers.

How are customer service and support?

I have had good experiences reaching out to Jamf Protect customer support. The technical team is knowledgeable, response times are good, and resolution times are low.

How would you rate customer service and support?

Which solution did I use previously and why did I switch?

I did not use a different solution before Jamf Protect, as there were not many Apple products in the environment. Now there are many customers with macOS.

What was our ROI?

A return on investment has been realized with Jamf Protect, having saved 30 to 40 percent in time due to faster detection-to-response cycles for macOS indications. Operational efficiency has improved since the manual endpoint triage workload for SOC and infrastructure teams has been reduced, and there have been fewer escalations for manual malware or behavioral threats, thus lowering potential breach costs while the premium is justified by a stronger macOS security posture and SOC efficiency gains.

What's my experience with pricing, setup cost, and licensing?

My experience with pricing, setup cost, and licensing is not extensive as I am not from the sales team, but I hear from the sales team that it is more costly. However, the setup cost is relatively low due to the deployment effort for macOS fleet through standard setup via Jamf Pro policies and Jamf Protect onboarding, initial tuning, and rule configuration, resulting in fair value for macOS security telemetry and detection. Licensing feels premium in multi-tenant environments.

Which other solutions did I evaluate?

Before choosing Jamf Protect, CrowdStrike Falcon for macOS was evaluated.

What other advice do I have?

My advice for others looking into Jamf Protect is to start with the pre-built macOS behavioral rule and then tune it for the environment, integrating it with SIEM and SOC workflows for centralized monitoring. I would rate this review as a 9 out of 10.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?


    reviewer2799429

Secure access to company sites has protected our devices and now runs quietly in the background

  • January 25, 2026
  • Review provided by PeerSpot

What is our primary use case?

My main use case for Jamf Protect at my organization is that we use it for VPN to access company websites through VPN. A specific example of how we use Jamf Protect for VPN access is that my organization uses it to secure the MacBook devices that have been provided to us. When we were signing up for this, we received our laptop devices and with the initial setup, Jamf Protect was configured to avoid breaching any sensitive information.

What is most valuable?

The best features Jamf Protect offers, in my opinion, is that the one we are using currently is excellent for helping secure the devices, but other than that, I do not have any idea of what other features Jamf Protect offers.

I am confident that Jamf Protect has impacted my organization positively because we have been using it for quite a while now. Since I joined this company recently, I have not noticed any security-related changes. Regarding productivity and peace of mind, I do not see much work around this, so I would say that Jamf Protect is doing an excellent job securing the devices.

I can think of having a general sense that Jamf Protect makes me and my team feel more secure because I have not noticed or seen any security-related breaches with me or with any of my other colleagues.

What needs improvement?

Regarding improvements for Jamf Protect, I receive the warnings related to insecure website accesses through mail at a later stage, so if they could be flagged the moment I visit them, that would be great because I would know exactly which website was causing the warnings.

Regarding how Jamf Protect communicates these alerts, I think it is useful as it is now, the way they inform us through emails. However, when I use this office device to access some personal websites, I do not receive any alert at that time and later on in the evening when I am checking my emails, I receive this email from Jamf Protect saying that there was a website I accessed which had a threat level of medium or minor. At that time, I do not know which website caused this, so it would be more helpful if the device itself could flag it at the point when I access the website. Other than that, I think it is still useful because it is mostly company-related activities and there are very few personal websites, so I can still identify the suspects.

For how long have I used the solution?

I have been using Jamf Protect since I joined my last company. We use this for VPNs and VPN connections.

What do I think about the stability of the solution?

In my experience, Jamf Protect is very stable right now, and I have not faced any issues related to it to date.

What do I think about the scalability of the solution?

I believe Jamf Protect's scalability is effective because we have been using it in our organization since the start, and our numbers have recently risen by a large amount, so we are still using it.

How are customer service and support?

I have not faced any issues with Jamf Protect, so I have no feedback on customer support from my or my team's experience.

How would you rate customer service and support?

Negative

How was the initial setup?

A specific example of how we use Jamf Protect for VPN access is that my organization uses it to secure the MacBook devices that have been provided to us. When we were signing up for this, we received our laptop devices and with the initial setup, Jamf Protect was configured to avoid breaching any sensitive information.

What other advice do I have?

My advice for others looking into using Jamf Protect is that it is an excellent tool to use to secure your devices, so I would recommend moving forward with it.

I give Jamf Protect a rating of eight out of ten. I gave it an eight out of ten because it is working behind the scenes, and I do not have any data as a client, so that might be related to authorization accesses since I am just a Level 3 employee at my company. The senior folks or the security folks might be having more detailed access to that, and apart from that, the shortcoming regarding the warnings received through emails is another point. Regarding our relationship with this vendor, my company is just a customer, and we do not have a business relationship other than that. My overall review rating for Jamf Protect is eight out of ten.


    reviewer2584980

Experience agile user-centric security with AI-powered endpoint protection

  • October 15, 2024
  • Review provided by PeerSpot

What is our primary use case?

I use Jamf Protect for myself, especially for POC demonstration purposes. It is also used as part of our consultation services, where I recommend it to customers.

How has it helped my organization?

Jamf Protect gives you Apple built-in native support for endpoint security. It supports zero-day protection in the Apple ecosystem and is agile, user-centric, and lightweight for macOS.

What is most valuable?

The behavioral detection is valuable. It also includes built-in network protection that is powered by our AI called Medium. It provides telemetry and signature-based detection, which offer comprehensive endpoint security.

What needs improvement?

The dependency on Jamf Pro or SIEM or SOAR for some automations and integrations could be reduced. In-built automation and remediation of behavior-based threats would be beneficial enhancements.

For how long have I used the solution?

I have been using it for the last four years.

How are customer service and support?

The technical support is good and proactive. That said, it can be improved. There is some scope to enhance the response and resolution time. From an Indian perspective, I would rate their support at seven point five out of ten.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have an understanding of CrowdStrike and certain security solutions from Forcepoint.

What other advice do I have?

I would recommend inbuilt remediation for behavior-based threats and less dependency on third-party tools.

I'd rate the solution eight out of ten.


    Dinesh Venkates

Effective device management, enhance threat detection and smooth integration

  • May 27, 2024
  • Review provided by PeerSpot

What is our primary use case?

Jamf Protect manages all Apple devices, deploys and upgrades applications, and enforces security features like blocking data transfers and improving security profiles.

How has it helped my organization?

Compliance is ensured through encryption, like with DEP.

Jamf Protect adapted to evolving security threats specific to macOS. We integrated with Microsoft Defender for added protection.

Compared to on-premises solutions, there are a lot of features improved in cloud-based solutions. The performance after implementation is better than with on-premises solutions.

Integration is also easy. Nothing complex about it. I never found any issues with it.

What is most valuable?

Jamf Protect's most effective features for threat detection include managing devices and applications, deploying and upgrading the OS, and its overall security features.

We can block data transfer and manage other security aspects through profiles.

What needs improvement?

Beginners need initial training and have basic/essential knowledge.

For how long have I used the solution?

I used it for five years. I moved to the cloud version two years ago. Before that, it was on-premises. It was Jamf's own cloud (private cloud).

What do I think about the stability of the solution?

I would rate the stability a ten out of ten.

What do I think about the scalability of the solution?

I would rate the scalability a ten out of ten.

How are customer service and support?

The customer service and support are good.

How would you rate customer service and support?

Positive

How was the initial setup?

I would rate my experience with the initial setup a ten out of ten, with ten being easy.

Initially, the deployment took 15 days for the pilot phase, and then another 15 days for production. However, the actual deployment itself only took 15 days, as it was preconfigured.

So it took around one month in total. Stakeholder approval caused a delay, but the actual deployment for the facility department was only 15 days.

No maintenance is required because everything is associated. It's a cloud solution, so we only need to modify applications for the services.

So, 99.9% of the time, it's working fine.

What was our ROI?

There are many financial benefits because everything is managed in a single cloud for Apple devices, with no need for third-party software.

What other advice do I have?

Everything is working well for me; it also supports single sign-on. Jamf Protect is very good and excellent.

Overall, I would rate the solution a ten out of ten. I would recommend it to other users. Beginners should have basic knowledge. If they have normal, basic knowledge, they can use the resources provided with the solution.


    Ashitosh Bankar

Searches incoming and outgoing traffic for malware and monitors the network for security

  • April 25, 2024
  • Review provided by PeerSpot

What is our primary use case?

Our customers use Jamf Protect for security purposes.

What is most valuable?

Jamf Protect provides zero-touch integration, and we can add various IdPs for synchronization or authentication.The most effective feature of the solution for security needs is that users can create a zero-touch environment network access and VPN access. Jamf Protect searches incoming and outgoing traffic for malware to monitor the network for security.

What needs improvement?

The solution’s stability could be improved. We need to regularly update the security patches for malware protection and threat protection. Jamf Protect should be integrated with third-party malware solutions or threat protection services.

For how long have I used the solution?

I have been using Jamf Protect for 2 years.

What do I think about the stability of the solution?

I rate the solution a seven out of ten for stability.

What do I think about the scalability of the solution?

More than 10 to 15 enterprise business customers use Jamf Protect.

I rate the solution a nine out of ten for scalability.

How was the initial setup?

On a scale from one to ten, where one is difficult and ten is easy, I rate the solution's initial setup a seven out of ten.

What about the implementation team?

Deploying the solution for testing does not take more than two to three hours. However, deploying the solution in a production environment may take a day or two. The basic part of deployment is the configuration, and then we use Jamf Pro to deploy the package of Jamf Protect.

What's my experience with pricing, setup cost, and licensing?

Jamf Protect is an expensive solution. Customers need to pay additional costs for Jamf Protect's on-ground support.

On a scale from one to ten, where one is cheap and ten is expensive, I rate the solution’s pricing ten out of ten.

What other advice do I have?

We are working with the latest version of the solution. Our customers utilize Jamf Protect only in the Mac environment. Customers should get a MacBook before installing Jamf Protect. Jamf Protect is the ideal solution for Mac because it is deeply integrated with Apple devices and is aware of bugs.

Overall, I rate the solution a nine out of ten.


    Amit-Sarkar

Allows users to easily monitor miscellaneous activities occurring in their environments

  • April 24, 2024
  • Review provided by PeerSpot

What is our primary use case?

Jamf Protect is basically an endpoint solution for any external drives since it can detect any kind of malware attacks or any miscellaneous activities that occur through a device. If someone is trying to take out the data without permission, the tool also detects that.

What is most valuable?

The most valuable features of the solution are in terms of data, especially whenever someone is trying to take out some data or trying to do any miscellaneous activities, which are areas that Jamf Protect easily catches. The aforementioned area consists of the tool's most useful and important feature.

An important point associated with the product is in the area related to the external drives, and it can be considered as an additional feature that most corporations need nowadays.

What needs improvement?

The product's price is an area of concern where improvements are required. It would be good if Jamf Protect could be integrated with Jamf Pro and used as a single solution.

There are a couple of improvements where there is a need to change a few things. There are also a couple of things that need to be removed and merged into the main tool, Jamf Pro.

The solution's technical team needs to improve because somewhere I felt from my personal experience that unless Jamf's team puts in an effort to understand the requirements of its customers, help can't be provided. The help provided by Jamf's team is on the basis of what they know, so I feel that they need to put a bit of effort into understanding what customers expect from the product.

For how long have I used the solution?

I have been using Jamf Protect for four years.

What do I think about the stability of the solution?

It is a great and stable solution. As long as your product is good, you can achieve what you are trying to do. Stability-wise, I rate the solution a seven out of ten.

What do I think about the scalability of the solution?

It is definitely a scalable solution. It should be a mandatory solution for any organization using Mac devices.

Around 350 people in my company use the product.

My company plans to increase the usage of the solution. In the future, my organization plans to make Mac devices available to users, so we may probably add a few more licenses from Jamf Protect.

How are customer service and support?

The solution's technical team has to be a bit aggressive from a support perspective. The solution's technical team needs to pay keen attention to the support part.

How was the initial setup?

The product's initial setup phase has very simple steps. If you have Jamf Pro in your environment, you don't have to do any migration. If you buy Jamf Protect separately, it can be installed very quickly and doesn't take much time.

The solution can be deployed if you are using Jamf Pro. I don't think that you need something else apart from Jamf Pro to deploy Jamf Protect.

Which other solutions did I evaluate?

I have also evaluated other solutions, but Jamf Protect is the best solution for Mac management.

What other advice do I have?

Apart from Jamf Protect one doesn't need any other security tool. If you have a tool already in your existing premises then such a product can be integrated with Jamf Protect.

I recommend the product to those who plan to use it. Users should try to first be on Jamf Pro and then move to Jamf Protect. Experience with Jamf Pro is mandatory.

The product's benefit is simple since it allows users to monitor everything related to miscellaneous activities, as well as the existing external drives that someone puts into the environment. The tool can also help monitor if someone is trying to take out some data through any means you can monitor with this solution.

I rate the tool an eight out of ten.


    Amira Youssef

User-friendly dashboard that helps protect staff computers from malware and antivirus

  • April 02, 2024
  • Review provided by PeerSpot

What is most valuable?

We mainly use Jamf Protect to protect staff computers from malware and antivirus.

What needs improvement?

Jamf Protect protects just Mac devices, and we would love to have one solution for other platforms and not just Mac devices.

For how long have I used the solution?

I have been using Jamf Protect for one year.

What do I think about the scalability of the solution?

I am satisfied with the solution’s scalability and performance.

How are customer service and support?

The solution's technical support is great.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We previously used Norton Antivirus, and it wasn't efficient at all. I previously used Workspace ONE. The only advantage of Workspace ONE over Jamf Protect is that it supports a wide range of devices, including Mac and Windows.

What's my experience with pricing, setup cost, and licensing?

Jamf Protect costs double the price that we were paying before.

What other advice do I have?

Jamf Protect automatically detects computer malware and prevents the user from running it. It also removes the malware completely from the computers, and we got notified about it. We can set the benchmark based on the school's preferences. The solution's automated MAC-specific threat hunting gives us more security on the computer.

The solution's dashboard is user-friendly. We are working to set up the benchmark based on the school preferences. Sometimes, we need to modify them based on any updates related to the security level we want to apply. Jamf Protect provides good protection from the user's perspective and is easy to manage from the admin's perspective. We used other platforms before, and they did not provide good malware detection.

I would recommend the solution to other users.

Overall, I rate Jamf Protect a nine out of ten.


    Kishoth P

Along with a good interface, the tool offers great technical support team

  • January 11, 2024
  • Review provided by PeerSpot

What is our primary use case?

I use Jamf Protect in my company to deal with the area around local account setup, specifically in terms of password synchronization.

The use cases related to the product are pretty straightforward because if you don't need an LDAP account setup in your organization and prefer to deal in the area around local account management, then Jamf Protect is a suitable solution. Jamf Connect is the only solution that offers password synchronization and gives a notification every 90 days, and then the synchronization will happen to the FileVault on macOS.

How has it helped my organization?

From the improvement and enhancement perspective, the product's users need not think of or worry about the area around password synchronization since it is taken care of automatically, because of which users don't have to think about updating the password every time they change it. Jamf Connect will eventually take the part where a user has made changes to the password and help with the area of password synchronization so that they don't face any sign-in issues because of the change in the password. The tool helps avoid problems that crop up because of the earlier lack of password synchronization, which was a big task for many users in the past.

What is most valuable?

The notification feature of the product, with the help of which the tool sends notifications to the user every ninety days, asking to take care of the password update that needs to be done. Additionally, the tool gives the password expiration time and information about the local account, such as whether there has been an update or if it is a standard one. The availability of all the information under one umbrella helps the tool provide more value.

What needs improvement?

The scope of improvement will fall under the support hierarchy that the tool offers to the latest version that Apple derives for any of the latest operating systems to launch. If Jamf Protect offers support immediately and ensures to offer zero-day support, then it can be an achievement.

In the future release of the product, I would want the tool to have a little bit of account-related capabilities. If a firewall gets enabled in an account, the information from such enablement would eventually solve the purpose of the administrators in terms of how they can use the solution to manage the accounts.

For how long have I used the solution?

I have been using Jamf Protect for more than two years. My company is a customer and partner of Jamf Protect. Before the acquisition, Jamf Protect was known as NoMAD.

What do I think about the stability of the solution?

It is a stable solution. Stability-wise, I rate the solution a nine out of ten.

What do I think about the scalability of the solution?

Scalability-wise, I rate the solution a nine out of ten.

Around 2,000 to 3,000 staff in my company use the product.

Whether my company plans to increase the use of the solution depends on one of the recent services that was conducted in our organization, indicating that in the future, we may have to deal with more than 500 accounts.

How are customer service and support?

I rate the technical support a ten out of ten.

How would you rate customer service and support?

Positive

How was the initial setup?

I rate the product's initial setup phase a nine on a scale of one to ten, where one is a difficult setup phase, and ten is an easy setup phase.

The solution is deployed on an on-premises model.

The solution can be deployed in a week, which is very fast.

What about the implementation team?

One of the in-house teams in my company takes care of the product's deployment process.

What was our ROI?

I rate the product's ROI a nine out of ten.

What's my experience with pricing, setup cost, and licensing?

I rate the product price as a five on a scale of one to ten, where one is a low price, and ten is a high price. I consider the product to be not costly but a tool priced as a solution available in the middle range from a cost perspective. There are no additional costs apart from the standard licensing costs attached to the product.

What other advice do I have?

The tool's interface support capability is good.

I rate the overall tool a ten out of ten.


    Hitesh Sharema1

Lightweight, compatible with all Mac OS versions, and there's zero lag or performance impact

  • December 29, 2023
  • Review provided by PeerSpot

What is our primary use case?

We use it to block USB drives from laptops and protect our Macs from malware and other attacks with its antivirus features.

How has it helped my organization?

Unlike other antiviruses, Jamf Protect doesn't push any additional agents or antivirus onto the laptops. Macs already have built-in malware protection like Gatekeeper and Jamf Protect tweaks and configure them to work more effectively as an endpoint solution. So, it really protects us from all sorts of malware.

What is most valuable?

The quick updates are really good. If a new OS update drops today, I'll have the Jamf Protect update within a few hours. It's also compatible with all Mac OS versions, and there's zero lag or performance impact. Unlike Trend Micro or Microsoft Defender, which can slow down systems, Jamf Protect is lightweight and doesn't hog CPU resources, keeping laptops running smoothly.

What needs improvement?

I'd really like to see some data loss prevention (DLP) capabilities. More visibility into user activity on laptops would be helpful. For example, knowing if someone took a screenshot is good, but knowing what was captured in the screenshot would be even better. I'd definitely provide feedback on adding such features.

For how long have I used the solution?

I have been using it for more than four years.

What do I think about the stability of the solution?

I didn't encounter any downtimes.

What do I think about the scalability of the solution?

Currently, there are around 500 end users in this organization. It is a scalable product.

How are customer service and support?

They're the best support team I've encountered after Dell. We used to say we had the best support from another company, but now I have to say Jamf takes the cake. They have 24/7 support and resolve issues within that timeframe.

Most of the support people are from Europe, but somehow they manage to work 24/7 for us. They pick up the ticket and call you within one or one and a half hours.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We have a Fortinet solution in our environment.

How was the initial setup?

The initial setup is very straightforward. Much easier than other antiviruses. With the others, you have to make multiple configuration files and push them to laptops.

With Jamf Protect, there's only one, and everything can be handled from the backend.

What about the implementation team?

For deployment, I took care of two parts. There are different aspects: server updates from the backend are handled by Jamf itself, and machine and endpoint deployments are done by us. We get a beta version, test it, and then push it up.

Two people deployed it to the machines. This is my second organization using it. In the first one, it took a week, but in this one, it took just two days. We were already familiar with the environment and requirements, so it was quicker.

It does require maintenance, but it is very minimal, maybe once every two years or one and a half years, only for specific things like major malware attacks or big updates. Otherwise, Jamf takes care of backend maintenance.

What was our ROI?

It is value for money. For example, for just $4 or $5 per user license, I get endpoint protection, including some DLP capabilities like screenshot tracking. Normal antivirus doesn't offer that.

They also provide zero-hour protection. If new malware emerges, they quickly push an update to all endpoints. No other product I know of offers that kind of speed and support.

Microsoft takes a week, Apex three to four days, but Jamf, because of their close partnership with Apple, gets it done much faster. I don't think any other MDM solution for Mac comes close to what Jamf provides.

Intune and others work with various platforms, not just Mac. Jamf Protect is specifically designed for Apple devices.

What's my experience with pricing, setup cost, and licensing?

It's significantly cheaper than other options like ApexOne or ApexTwo. And we're using Jamf Pro as well. So, for our environment, Jamf Protect fits perfectly. The dashboard is perfect, and everything is just perfect.

The pricing is reasonable for Jamf Protect.

Which other solutions did I evaluate?

Jamf Protect is basically just and just for Mac. We can't implement all Windows or Linux.

Compared to other products, that's the only disadvantage.

What other advice do I have?

Make sure you work closely with the Jamf team. They're very experienced and knowledgeable about different environments. We often make mistakes during implementation, and they're always there to help us correct them. Trust their guidance.

Overall, I would rate the solution a nine out of ten.