Ultimate endpoint protection for Apple devices.
Use Cases and Deployment Scope
We utilize Jamf Protect for our Apple assets to protect against threats and suspicious activity. Jamf Protect provides multiple levels of telemetry collection allowing administrator to select how sensitive they want to be on event triggers. Furthermore, Jamf Protect allows you to monitor against specific threat categories aligned to the MITRE ATT&CK framework. In addition to protection, we utilize Jamf Protect to monitor our endpoint compliance with the CIS Critical Security Controls baselines.
Pros
- Deep visibility into system telemetry
- Compliance reporting automatically updates and provides a quantifiable metric which teams can use to track maturity for CIS CSC.
- USB device management to protect against data exfiltration and USB delivered malware attacks.
Cons
- Expand out of box support for additional SIEM's
- Improve the enduser onboarding UX
- The UI takes some getting used to. Provide more inline instruction prompts for new admins.
Likelihood to Recommend
If the environment is predominantly Apple based then Jamf Protect is a strong solution for providing EDR capabilities to endpoints. The detection capabilities are up to par with other leading EDR tools and it integrates well with Jamf MDM. Additionally, the compliance, telemetry, log forwarding, and USB device management being included as part of Jamf Protect provide good ROI.
