Ultimate endpoint protection for Apple devices.
Use Cases and Deployment Scope
We utilize Jamf Protect for our Apple assets to protect against threats and suspicious activity. Jamf Protect provides multiple levels of telemetry collection allowing administrator to select how sensitive they want to be on event triggers. Furthermore, Jamf Protect allows you to monitor against specific threat categories aligned to the MITRE ATT&CK framework. In addition to protection, we utilize Jamf Protect to monitor our endpoint compliance with the CIS Critical Security Controls baselines.
Pros
- Deep visibility into system telemetry
- Compliance reporting automatically updates and provides a quantifiable metric which teams can use to track maturity for CIS CSC.
- USB device management to protect against data exfiltration and USB delivered malware attacks.
Cons
- Expand out of box support for additional SIEM's
- Improve the enduser onboarding UX
- The UI takes some getting used to. Provide more inline instruction prompts for new admins.
Return on Investment
- Jamf Protect includes a number of features which other EDR solutions charge additional fees for (e.g. compliance and device control)
- Lower cost per endpoint compared to other EDR solutions
- Centrally managed
- Strong integrations with Jamf MDM
Usability
Alternatives Considered
CrowdStrike Falcon and Microsoft Defender for Endpoint
Other Software Used
Zscaler Internet Access, Zscaler Private Access, Tenable Vulnerability Management, Jamf Pro


