Jamf Protect - My kind of endpoint
March 25, 2024

Jamf Protect - My kind of endpoint

Will Steward | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User

Overall Satisfaction with Jamf Protect

We use Jamf Protect as our main security endpoint for all our macOS devices. It was easy to implement by following Jamf's documentation and our security team is very happy with how it monitors threats. The compliance feature is very useful to them and is constantly helping them monitor and make sure our devices comply with our security policies.
  • Threat Protection
  • Compliance
  • Alerts
  • Identifying devices that may have fallen off the radar
  • Jamf scoping can be a but of a pain sometimes
  • For none security specialists it can be a little hard to navigate the portal
  • It can be hard at times to understand the alerts and what is causing them
  • Implementing Jamf Protect help us to identify that our devices were not really meeting basic compliance requirements
Sophos was our main endpoint for all our windows and macOS devices. However with the newer releases of macOS Sophos started to become more problematic to deploy. Moving over to Jamf protect was the obvious choice and cost wise a lot more beneficial for us. It's monitoring and management does everything we want from an endpoint and the added features like the compliance monitoring is a positive for us.

Do you think Jamf Protect delivers good value for the price?

Yes

Are you happy with Jamf Protect's feature set?

Yes

Did Jamf Protect live up to sales and marketing promises?

I wasn't involved with the selection/purchase process

Did implementation of Jamf Protect go as expected?

Yes

Would you buy Jamf Protect again?

Yes

The main reason we went with Jamf Protect was because we wanted a dedicated macOS security endpoint. Is was easy to implement and migrate over from our previous endpoint provider. As a university we have lab macOS devices that multiple users use. So we have Jamf Protect profiles that block the use of external drives and other other profiles that allow it. We different user accounts requiring different access this can get a bit messy when deploying the config profiles at login for each user that signs in.

Jamf Protect Feature Ratings

Anti-Exploit Technology
8
Endpoint Detection and Response (EDR)
8
Centralized Management
8
Hybrid Deployment Support
8
Infection Remediation
8
Vulnerability Management
8
Malware Detection
8