Likelihood to Recommend The system is great for enterprise or larger IT departments or teams where temporary or full access may be given using privileged IDs. Requirements for needing local admin access is also eliminated which can help with specific Windows workstation related tasks. It can be very useful when working with remote teams or contractors who may need temporary access to a system when required.
Read full review JumpCloud is least suited in situations where you have few devices, but lots of users. JumpCloud heavily focuses on the "One-User-One-Device" type of use, and does lack some of the features things like Active Directory is better suited for when having multiple users accessing one machine. Their Powershell APIs are fantastic and getting only more powerful. Lots of features are hidden behind these APIs, so admins not as familiar with Powershell would have more issues leveraging these tools. BYOD deployments are amazing, especially for macOS devices that are using Apple Business Manager and can leverage Zero Touch deployments. It is especially good at handling mixed systems, whereas other options, such as Jamf, are really suiting only for macOS, or Intune is more suited for Windows; JumpCloud managed to handle both systems well.
Read full review Pros Automatically discover new servers on the network and take control of the local admin password by vaulting it and ensuring nobody knows the password. A different password on every server. Automatically roll the password in a configurable manner - after each use, after a certain period of time, etc. Track and govern sensitive account usage by ensuring only properly authorized users can access the vault and obtain the credentials and then monitor usage. Read full review User Management - The ability to control our users and set password/polices is made easy in the JC console Device Management - Using JC each user is assigned to their own device with only the rights to do their job - When elevated rights are required, this is done simply via the JC console for the period of time required SSO - Using JC's SAML SSO integrations we are building out our SSO offering and this is making for a much simpler daily user experience Read full review Cons GUI - right now everything is on one page/dashboard. Some level of folder/Safe type view would be great More options when storing passwords - especially for network based passwords Better integrations with vendors like Cisco so that admins dont need to really get the password from the vault (think Last Pass type add on) Read full review SSO via OpenID - Opening up their SSO from just SAML to including OpenID (OAuth) would allow us to make more use of the service and to also incorporate it into some internal testing suites Time Limited User Elevation - The ability to time limit a users elevation of privileges would be a great addition Extending device management to include LPA - Least Privilege Access is becoming a bigger ask from our external auditors - Being able to do this via JC would be amazing Read full review Usability It's simple. I like how JumpCloud keeps things simple. Similar to Apple's ecosystem, they give you what you want with some extra features and bells and whistles but it doesn't take a large instruction manual to use it. They have the support system and KB articles to back up their product and learn about a feature and how to implement it
Read full review Support Rating Customer support and technical support have always been great when we require assistance. Especially when we come across issues that we're not familiar with.
Read full review I have rarely contacted support. When I have, the responses were within expected time frames, and easy to access. Community support is incredible, both from the JumpCloud representatives, and the user base community at large. The support pages on the website also are typically very well written and strike a nice balance between having the technical information needed, and also being easy to understand for the small business types that might not have as much of a technical background as an IT Admin.
Read full review Implementation Rating Being responsible for choosing the product after a POC and pilot we found the process to be simple and effective
Read full review Alternatives Considered It is known as one of the safest products in the market. It has good support and is also available as on-premise. You can run it virtually on VMWare (and probably on other hypervisors as well). You can have a second instance on bare metal and that makes it a very safe system.
Read full review Read full review Contract Terms and Pricing Model Some features would make more sense for us to be bundled by machine, instead of the user. We have fewer machines, and multiple users log into one machine, so doing something like paying per user for services like Patch Management are difficult to warrant the cost. I also feel a more complete package that includes common addon features; Patch Management and Password Manager, would be an improvement. It would also be nice if we could change packages, addons, and other billing services via self-service instead of reaching out to our account manager.
Read full review Professional Services services and professional team and support teams are good
Read full review Return on Investment Decreased the probability of an external cyber attack to privileged accounts.. Management can control privileged account life cycle management more effectively Recording privileged sessions allows our organization to play back exactly the point of a breach or malicious behavior Automated system to manage and verify passwords, as privileged accounts are constantly created and deleted Automatic PWD change functionality will substantially decrease probability of PWD theft or misuse. Read full review Very easily add, or disable employee logins Reduce "password fatigue" by being able to reduce password expiration requirements, and having single sign on Higher security and visibility of security issues Reduced onboarding time from days to minutes Enabled easy reassignment of user accounts to another user via groups when employees leave Quick securing of terminated users, or otherwise compromised accounts Reduced user disablement time from previous manual methods requiring days, to literal minutes Read full review ScreenShots CyberArk Privileged Access Management Screenshots