Jamf Pro (formerly Casper Suite) is designed to automate device management for users while driving end-user productivity and creativity. According to the vendor, it is the EMM tool that delights IT pros and the users they support by delivering on the promise of unified endpoint management for Apple devices.
N/A
Microsoft Entra ID
Score 8.9 out of 10
N/A
Microsoft Entra ID (formerly Microsoft Azure Active Directory or Azure AD) is a cloud-based identity and access management (IAM) solution supporting restricted access to applications with Azure Multi-Factor Authentication (MFA) built-in, single sign-on (SSO), B2B collaboration controls, self-service password, and integration with Microsoft productivity and cloud storage (Office 365, OneDrive, etc) as well as 3rd party services.
$6
per user/per month
Pricing
Jamf Pro
Microsoft Entra ID
Editions & Modules
No answers on this topic
Premium P1
$6.00
per user/per month
Premium P2
$9.00
per user/per month
Offerings
Pricing Offerings
Jamf Pro
Microsoft Entra ID
Free Trial
Yes
Yes
Free/Freemium Version
No
Yes
Premium Consulting/Integration Services
Yes
No
Entry-level Setup Fee
No setup fee
No setup fee
Additional Details
$3.33 per month per iOS device
$6.25 per month per Mac
Education and volume discounts available.
Onboarding
3-Day for Mac + iOS: $7,500
2-Day for Mac only: $6,000
4hr Remote for iOS only: $750
Billed Annually
It simply does not do what Jamf does in that way Jamf is doing it.
Verified User
Engineer
Chose Jamf Pro
AAD lacks the broad feature set of Jamf Pro for full management. Jamf Pro actually integrates with AAD, giving you the best of both worlds - you can use AAD to set and enforce a level of trust, while leveraging Jamf Pro to ensure your endpoints meet that trust level reliably.
Air…
Verified User
Administrator
Chose Jamf Pro
I had previously been using Meraki Systems Manager and I personally find the user interface of Jamf Pro a lot more intuitive and easier to navigate than I did with Systems Manager. Ultimately, the feature set offered by Jamf at the price point made the decision very easy to make.
We have used the System Manager program in Meraki. We have used Google Admin to manage Chromebooks. We have used Active Directory and Group Policies within the Windows ecosystem.
Nothing compares to the power and manageability of Jamf Pro.
Well suited for any organization that wants to manage apple products. It's extremely easy to integrate and has many connectors for existing enterprise infrastructure applications. Certificate management is a breeze. Not so suited for smaller businesses that only have 10-20 devices. Jamf has another product called JAMF Now that would suffice for those areas.
That one is tough. It's just easy to integrate the sign-on portion with other products from other companies. Like BluePoint or Podint. It's very easy to integrate the user information with others. Using Android ID to register an application with other companies' applications.
Jamf Pro's Self Service is a great mechanism for making software available to end uses as they need it.
Jamf Pro is also great for creating plans called PreStage Enrollments that allow for computers to skip many of the setup screens, as well as automating account creation.
Jamf Pro in combination with Apple Automated Device Enrollment (formerly DEP) allows for devices to supervised and managed, this combination allows for locking, remote wipe of devices, and finding locations of devices when put into lost mode.
The first thing is that it's a really good platform to make a whole inventory of your hardware and software that you already have in the organization. It's very simple. It's very easy to look at what you have in the whole organization. And after that, start applying, for instance, some policies, some solutions in terms of zero trust access using MFA as a second form of authentication. So, these are the ways we use the MTIV platform.
Finding what you need in Jamf Pro can be tough at times. The interface is not what I would call friendly.
You'll need static credentials for Jamf Pro. They don't integrate with the Jamf Account, and it doesn't offer 2FA. SSO is an option, but it's not simple to set up.
There is one thing that we lost since we migrated from Active Directory and it is the user expiration date. If I have an external that I know will work for six months, I have to manually check or put some kind of reminder. I cannot set an expiration date in Microsoft Entra ID. I still don't know why.
We stepped away and are looking at different products that integrate with our entire fleet MDM solution rather than focusing specifically on Apple products. An all in one solution fits our needs better and is more cost-effective in the long run. Jamf Pro needs to improve some features and support but overall its a good product.
MSFT Entra ID has been essential for managing our geographically dispersed team. We're confident that it will scale with us as grow, and we'll be able to take advantage of additional security and ID management features as they become necessary. Being able to centrally manage our user access from anywhere with a small support team is such a relief.
Jamf Pro has done pretty much anything we've needed with little setup headache. If we hit a wall, the Jamf user community and tech support departments both are more than willing to help solve problems. Tech support is excellent, but the surprising thing is the user base is by far the biggest resource. Jamf users love to help each other, by directly chatting about issues, posting best practices, or just posting info on the forums.
It's not complex. It works as configured, right? There's a lot of granular rules, and it'll get very specific if you need it to. But for many of our security capabilities, especially for mid-market enterprises, I think you can get all the capabilities you typically need with OnStar.
Jamf Support is very responsive and usually assists in any challenge we are tackling. They are also very transparent when they are allowed to be. I personally love our Jamf Pro support rep and don't fear messaging their support team.
I have not needed to engage support for anything at this time. I have been able to find the answers either online or in a knowledgebase. I tried to skip the question but it would not let me, so I rated a 9 based on other interactions with Microsoft support I have had
The training session was beneficial because it expanded my knowledge about Jamf products and really learn what I am capable of doing with Jamf Pro in terms of managing Apple computers and devices. Immediately after the training course, I was able to implement what I learn to our cloud instance.
Migration from an existing MDM requires device wipe and reenroll for full supervision of the device. It's somewhat painful. User enrollment makes things easier, but you miss out on full management.
Make sure you use a good partner. Our implementation was a bit longer and more problematic than we expected. Our partner got it done, but, in my opinion, some of their inexperience and staffing issues were evident.
Even thought we are using this solutions for different purposes (macOS device management VS mobile device management), I think at the end Jamf Pro is more focused or aimed for macOS management, and mobile device management is just a good addition to that. Same I can tell about Ivanty, is more about iOS/Android management rather than macOS
Microsoft Entra ID is not as stand-alone product as competitors like Okta. It may lack some of the features that competing products have but on the other hand it integrates both technically and license wise with other Microsoft cloud services and is easy to deploy. It is also the easiest way to extend identity management to the cloud if you already have Microsoft Active Directory in use.
Microsoft Professional Services' technical knowledge is appreciable as consultants design the solution as per customer requirements. Mapping of features per user specifications and assisting Customer IT engineers to implement so they can manage and administer the services.
Jamf Pro has allowed us to minimize the time it takes to deploy devices. We can use zero-touch deployment methodologies which allow devices to go directly to end users and allow end users to get up and running without needing IT's help.
We have implemented both a third-party & macOS patching service, which allows us to ensure all apps and versions of macOS are updated and secure.
Definitely, I can consider this one a positive because, as I mentioned earlier, it's a tool that can help our internal ID team track end users' activities in their sign-in logs and a lot of other things, which is really good and helpful for us.