Jamf your Org!
April 11, 2018

Jamf your Org!

Matthew Davidson | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User

Overall Satisfaction with Jamf Pro

We are able to image a computer and have a computer on a users desk within the hour. If I need to push out a policy in order to comply with our security team's request I can do that. We are able to store File Vault recovery keys on the Jamf server, in the event that someone is out of town and needs to get into their computer we can provide them with the key to get in. We pull application usage logs in our computer lab environment to justify the need for licensed software.
  • I like how with a click of a few buttons I can automate a task that would take my team weeks to complete.
  • I like the quick response and thoroughness that Jamf Support provides.
  • After moving from open source management solutions to JAMF I have had much more time to implement processes and technology that increase the quality of service for our environment.
  • While Jamf is working hard on implementing patch management, I wish it was here sooner.
  • I wish there were more ways to pull reports on specific items such as application usage for a group of computers (example a lab). However, It does a good job at providing reports of many other data points.
  • We would need to hire a team of 3 Mac Administrators to accomplish what jamf provides for us. This is a conservative savings of $85k/ year.
  • deploy studio and munki
We used to be a Munki and Deploy Studio shop which is perfect if you have the manpower to manage the granularity that is needed in a complex environment. Unfortunately, we don't have that option so this is where Jamf filled the void of what needs to get done and the number of man-hours that are available to us.
Jamf works well if you have a wide variety of different types of computers/users. In our case, we have computer labs, faculty, staff, classrooms so the ability to push out software or configuration to a selection of computers is very useful. It also allows the flexibility to pull inventory information about the computer, if you can read the information in bash you can pull it into jamf and then create reports based on it, this is a requirement in our environment to report on compliance with FERPA and internal policies.