TrustRadius: an HG Insights company

Jamf Protect

Score9 out of 10

15 Reviews and Ratings

What is Jamf Protect?

Developed exclusively for macOS, Jamf Protect provides a solution to maintain endpoint compliance, monitor for, respond to, and remediate security incidents on macOS with minimal impact to the device and end-user experience. Jamf Protect detects Mac-specific threats, and prevents known malware from running on devices and quarantines them for later analysis. Jamf Protect forwards data to a system of record to ensure a security posture, fleetwide, stays compliant by monitoring security settings on Macs against a common benchmark.

Categories & Use Cases

Top Performing Features

  • Hybrid Deployment Support

    Administrators should be able to choose endpoint security on-premise, cloud, or hybrid.

    Category average: 8.1

  • Centralized Management

    Centralized management supporting multi-factor authentication, customized views, and role-based access control.

    Category average: 8.7

  • Anti-Exploit Technology

    In-memory and application layer attack blocking (e.g. ransomeware)

    Category average: 8.8

Areas for Improvement

  • Malware Detection

    Detection and blocking of zero-day file and fileless malware.

    Category average: 9.1

  • Infection Remediation

    Capability to quarantine infected endpoint and terminate malicious processes.

    Category average: 8.6

  • Vulnerability Management

    Vulnerability prioritization for fixes.

    Category average: 8.6

Ultimate endpoint protection for Apple devices.

Use Cases and Deployment Scope

We utilize Jamf Protect for our Apple assets to protect against threats and suspicious activity. Jamf Protect provides multiple levels of telemetry collection allowing administrator to select how sensitive they want to be on event triggers. Furthermore, Jamf Protect allows you to monitor against specific threat categories aligned to the MITRE ATT&CK framework. In addition to protection, we utilize Jamf Protect to monitor our endpoint compliance with the CIS Critical Security Controls baselines.

Pros

  • Deep visibility into system telemetry
  • Compliance reporting automatically updates and provides a quantifiable metric which teams can use to track maturity for CIS CSC.
  • USB device management to protect against data exfiltration and USB delivered malware attacks.

Cons

  • Expand out of box support for additional SIEM's
  • Improve the enduser onboarding UX
  • The UI takes some getting used to. Provide more inline instruction prompts for new admins.

Return on Investment

  • Jamf Protect includes a number of features which other EDR solutions charge additional fees for (e.g. compliance and device control)
  • Lower cost per endpoint compared to other EDR solutions
  • Centrally managed
  • Strong integrations with Jamf MDM

Usability

Alternatives Considered

CrowdStrike Falcon and Microsoft Defender for Endpoint

Other Software Used

Zscaler Internet Access, Zscaler Private Access, Tenable Vulnerability Management, Jamf Pro

Jamf Protect - My kind of endpoint

Use Cases and Deployment Scope

We use Jamf Protect as our main security endpoint for all our macOS devices. It was easy to implement by following Jamf's documentation and our security team is very happy with how it monitors threats. The compliance feature is very useful to them and is constantly helping them monitor and make sure our devices comply with our security policies.

Pros

  • Threat Protection
  • Compliance
  • Alerts
  • Identifying devices that may have fallen off the radar

Cons

  • Jamf scoping can be a but of a pain sometimes
  • For none security specialists it can be a little hard to navigate the portal
  • It can be hard at times to understand the alerts and what is causing them

Return on Investment

  • Implementing Jamf Protect help us to identify that our devices were not really meeting basic compliance requirements

Alternatives Considered

Sophos Intercept X

Other Software Used

Microsoft Azure, Microsoft 365

Jamf Protect! YOU NEED THIS

Use Cases and Deployment Scope

We use Jamf Protect in our school [...]. We keep an eye on all the MacBooks & iMacs for all teachers and admin staff. We used to get lots of issues with the iMacs and MacBooks. Jamf Protect filters out all the bad actors and keep the staff safe. Without it I am sure we would have a whole lot more issues

Pros

  • COMPLIANCE PAGE
  • COMPUTERS PAGE
  • And the customization of the devices

Cons

  • We also have JAMF Safe internet for iPads. I would love to see this same simple idea in Jamf Protect for the iMacs

macOS Protection at its finest.

Pros

  • Onboarding and Setup
  • Integration with Jamf Pro
  • Deployment to already deployed machines
  • Threat Remediation

Cons

  • The cloud GUI. It can be confusing at times.

Most Important Features

  • Day 0/1 Support
  • Automatic Updates
  • Cloud hosted.

Return on Investment

  • Positive: It allowed us to deploy machines that were not deployable before due to compliance issues.
  • Positive: Easy to implement in the shortest amount of time needed.
  • Negative: Could be costly if you have a big environment

Alternatives Considered

CrowdStrike Falcon Endpoint Protection, Symantec Endpoint Encryption and Bitglass

Other Software Used

Jamf Pro, CrowdStrike Falcon Endpoint Protection, HCL BigFix (formerly from IBM)

Jamf Protect--saving us money and boosting security

Use Cases and Deployment Scope

Security has never been more important nor more challenging. Jamf Protect allows us to leverage Apple's built-in malware protections in new and more advanced ways. It gives us great reporting, allows us to proactively take action, and set custom rules for various situations. Most of all, it integrates very nicely with our Mac management system, Jamf Pro.

We use Jamf Protect on all our Macs. It works quietly and efficiently behind the scenes. Our users love that it does't bother them with prompts yet does its job very well.

The biggest benefit for us is that Jamf Protect allows us to give users admin access. Catalina and Big Sur are a lot harder to use without admin access. Jamf Protect adds a strong layer of protection that means a user with admin access who makes a foolish choice will not be able to install malware. Jamf Protect and Apple's security system will detect the malware, block it, and notify us of the issue. It has reduced our need for help desk tickets and more than paid for itself.

Pros

  • Security--it scans processes for 'bad stuff'
  • Notifies admins of any issues or potential issues; entirely customizable and we create many custom notifications and groups.
  • Integrates with Jamf Pro
  • Monitor CIS benchmarks via a clean and nice looking dashboard

Cons

  • The integration with Jamf Pro has come a long way but could still be a bit more "one stop" vs two tools and two dashboards.

Most Important Features

  • Secure our systems against threats
  • CIS benchmarks
  • Jamf Pro integration
  • Integration with Apple security protocols

Return on Investment

  • Reduced helpdesk tickets for admin tasks; reduces overall IT costs
  • Reduced lost time due to malware
  • Reduced lost data due to infected computers needing a wipe and purge of any malware

Alternatives Considered

Jamf Pro, N-able RMM (formerly Solarwinds RMM), SentinelOne and Webroot Endpoint Protection

Other Software Used

Jamf Pro, Microsoft Teams, Microsoft 365 (formerly Office 365), 1Password