macOS Protection at its finest.
Updated December 07, 2021

macOS Protection at its finest.

Philip Chotipradit | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User

Overall Satisfaction with Jamf Protect

Jamf Protect is being used on our fleet of Apple M1 Processor MacBooks Pros and Airs. This is due to the compatibility of our current anti-virus solution. It is being used school(School of Medicine) wide and will continue to for the near future. It addresses compliance for day one deployments of M1 processor machines that are purchased.
  • Onboarding and Setup
  • Integration with Jamf Pro
  • Deployment to already deployed machines
  • Threat Remediation
  • The cloud GUI. It can be confusing at times.
  • Day 0/1 Support
  • Automatic Updates
  • Cloud hosted.
  • Positive: It allowed us to deploy machines that were not deployable before due to compliance issues.
  • Positive: Easy to implement in the shortest amount of time needed.
  • Negative: Could be costly if you have a big environment
In some aspects, Jamf Protect was far superior to the others mentioned above. The only downside I can see is that it is only macOS which could be a problem for hybrid environments.

Do you think Jamf Protect delivers good value for the price?

Yes

Are you happy with Jamf Protect's feature set?

Yes

Did Jamf Protect live up to sales and marketing promises?

Yes

Did implementation of Jamf Protect go as expected?

Yes

Would you buy Jamf Protect again?

Yes

Jamf Protect will always have day 1 support for new OS updates, which is an amazing feature. The reporting could use a bit more work and the actions it captures are far beyond anything we would need, but it does that really well too. There are plenty of scenarios where I will gladly recommend this to other institutions. There are not many where I wouldn't. Maybe only if you have a hybrid environment, where licensing another endpoint protection may be beneficial to the budget.

Jamf Protect Feature Ratings

Anti-Exploit Technology
9
Endpoint Detection and Response (EDR)
9
Centralized Management
9
Hybrid Deployment Support
5
Infection Remediation
8
Vulnerability Management
9
Malware Detection
10