Security platform has reduced malware risk and has strengthened compliance for macOS endpoints
What is our primary use case?
I have been using Jamf Protect for four years and have utilized it for Apple assets to protect against threats and suspicious activity.
Jamf Protect provides multiple levels of telemetry collection, allowing me to select how sensitive I want to be on event triggers. Jamf Protect allows me to monitor against specific threat categories aligned to the MITRE ATT&CK framework. In addition to protection, I utilize Jamf Protect to monitor our endpoint compliance with the CIS critical security control baseline.
If the environment is predominantly Apple based, Jamf Protect is a strong solution for providing EDR capabilities to endpoints. The detection capabilities are on par with other leading EDR tools, and it integrates well with Jamf MDM. The compliance telemetry, log forwarding, and USB device management included as part of Jamf Protect provide a good return on investment.
I use Jamf Protect as our main security endpoint for all our macOS devices, which are Apple devices. It was very easy to implement by following Jamf's documentation, and our security team is very happy with how it monitors threats. The compliance feature is also very useful to them, and it constantly helps them monitor and ensure our devices comply with our security policies.
What is most valuable?
Jamf Protect provides multiple levels of telemetry collection, allowing me to select how sensitive I want to be on event triggers. Jamf Protect allows me to monitor against specific threat categories aligned to the MITRE ATT&CK framework. In addition to protection, I utilize Jamf Protect to monitor our endpoint compliance with the CIS critical security control baseline.
If the environment is predominantly Apple based, Jamf Protect is a strong solution for providing EDR capabilities to endpoints. The detection capabilities are on par with other leading EDR tools, and it integrates well with Jamf MDM. The compliance telemetry, log forwarding, and USB device management included as part of Jamf Protect provide a good return on investment.
Jamf Protect has had a positive impact on my organization, as it has been one of the best tools that protects against malware. It offers better detection of malware, reducing downtime and risk to our network by approximately 30 to 50 percent. Implementing it is straightforward, although there can be a steep learning curve in general, especially for less technical users. The competitive pricing included in the business package is great, and compliance with our security standards has been maintained.
What needs improvement?
To improve Jamf Protect, I suggest enhancing the end user onboarding user experience, expanding out-of-the-box support for additional SIEMs, and noting that the user interface takes some getting used to. More inline instruction prompts for new admins would also be beneficial.
For how long have I used the solution?
I have been using Jamf Protect for four years and have utilized it for Apple assets to protect against threats and suspicious activity.
What do I think about the stability of the solution?
Jamf Protect is very stable, and I have not seen any downtime.
What do I think about the scalability of the solution?
Jamf Protect is very scalable, enabling me to manage a large number of devices seamlessly and easily.
How are customer service and support?
The customer support is very proactive, helpful, and knowledgeable.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
I previously used Microsoft Defender for Endpoint.
I switched from Microsoft Defender for Endpoint to Jamf Protect because I find that Microsoft Defender for Endpoint has the same features; however, Jamf Protect is specifically tailored for managing macOS devices. With Jamf Protect, it is one license that covers all features without requiring additional licenses for features such as USB device control, making it very cost-effective.
How was the initial setup?
It is easy to implement and easy to manage.
It was very easy to implement by following Jamf's documentation, and our security team is very happy with how it monitors threats.
What was our ROI?
The compliance telemetry, log forwarding, and USB device management included as part of Jamf Protect provide a good return on investment.
What's my experience with pricing, setup cost, and licensing?
The pricing, setup cost, and licensing have been very effective.
Jamf Protect includes a number of features that other EDR solutions charge additional fees for, such as compliance and device control. It has helped us lower the cost per endpoint compared to other EDR solutions, and it is easy to manage since it is centrally managed with strong integration with Jamf MDM.
Which other solutions did I evaluate?
I evaluated other options before choosing Jamf Protect, specifically CrowdStrike Falcon.
What other advice do I have?
My advice to others looking into using Jamf Protect is that it is easy to manage and offers a separate interface from Jamf MDM, which is beneficial for security operations teams. It allows security teams to manage only the security aspects without having to navigate through all the MDM configurations, saving a lot of time. Additionally, if your environment is predominantly Apple or macOS based, Jamf Protect is a strong solution for providing EDR capabilities to endpoints. I would rate this solution an 8 out of 10.
Which deployment model are you using for this solution?
Hybrid Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Advanced macOS detection has improved SOC efficiency and provides faster incident response
What is our primary use case?
Jamf Protect is used in my organization for endpoint threat detection and prevention on macOS environments, specifically for real-time malware detection, behavioral monitoring, and security visibility across managed Apple endpoints for multiple customers integrated with Jamf Pro and SIEM for incident response.
An example of how Jamf Protect is used for real-time malware detection and behavioral monitoring occurred when it detected a suspicious process execution and abnormal file activity on a macOS endpoint. The alert was forwarded to SIEM, and the endpoint was isolated by Jamf Pro, leading to IOC-based remediation that prevented the lateral impact.
Jamf Protect is also used for enforcing endpoint security baselines, monitoring macOS-specific attack techniques, and providing security telemetry to SOC teams for faster investigation and response.
How has it helped my organization?
Jamf Protect has positively impacted my organization by improving macOS security visibility, enabling faster detection and response, reducing manual SOC effort, and providing consistent endpoint protection across multi-customer Apple environments.
The measurable outcomes related to these improvements show a 30 to 40 percent reduction in macOS incident response time, early detection of suspicious activity before user impact, and fewer malware-related escalations due to behavioral blocking. SOC efficiency has also improved through actionable low-noise alerts.
What is most valuable?
The best features that stand out in Jamf Protect include macOS native threat detection using the kernel and user space behavioral analysis, real-time alerting, integration with Jamf Pro with automated response and quarantine actions, and pre-built rule sets that help with macOS threat models and MITRE mapping.
The real-time alert on suspicious process and persistence attempts has helped my team significantly. It triggers immediate SOC visibility, and the automated Jamf Pro action restricts user access and blocks execution, reducing dwell time and avoiding manual endpoint intervention across customer fleets.
Regarding Jamf Protect features, low performance impact and macOS-focused detection are appreciated, though the solution would benefit from more built-in automated response actions within Jamf Protect itself and deeper native integration with third-party SOAR tools.
What needs improvement?
Jamf Protect should have more built-in automated remediation actions, enhanced reporting and long-term analytics, and deeper SOAR and SIEM native integration with more customization in behavioral rule tuning for MSP environments.
Jamf Protect should offer more documentation and simplify alert tuning and policy management UI.
For how long have I used the solution?
I have been using Jamf Protect for more than three years.
What do I think about the stability of the solution?
Jamf Protect is stable, reliable, and has been functioning well in production across the macOS fleet with low endpoint performance impact and no significant resource issues observed.
What do I think about the scalability of the solution?
Jamf Protect is scalable. I initially had a few customers with macOS but now have more, and it remains stable without encountering issues, allowing me to scale it up to many customers.
How are customer service and support?
I have had good experiences reaching out to Jamf Protect customer support. The technical team is knowledgeable, response times are good, and resolution times are low.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
I did not use a different solution before Jamf Protect, as there were not many Apple products in the environment. Now there are many customers with macOS.
What was our ROI?
A return on investment has been realized with Jamf Protect, having saved 30 to 40 percent in time due to faster detection-to-response cycles for macOS indications. Operational efficiency has improved since the manual endpoint triage workload for SOC and infrastructure teams has been reduced, and there have been fewer escalations for manual malware or behavioral threats, thus lowering potential breach costs while the premium is justified by a stronger macOS security posture and SOC efficiency gains.
What's my experience with pricing, setup cost, and licensing?
My experience with pricing, setup cost, and licensing is not extensive as I am not from the sales team, but I hear from the sales team that it is more costly. However, the setup cost is relatively low due to the deployment effort for macOS fleet through standard setup via Jamf Pro policies and Jamf Protect onboarding, initial tuning, and rule configuration, resulting in fair value for macOS security telemetry and detection. Licensing feels premium in multi-tenant environments.
Which other solutions did I evaluate?
Before choosing Jamf Protect, CrowdStrike Falcon for macOS was evaluated.
What other advice do I have?
My advice for others looking into Jamf Protect is to start with the pre-built macOS behavioral rule and then tune it for the environment, integrating it with SIEM and SOC workflows for centralized monitoring. I would rate this review as a 9 out of 10.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?