Ultimate endpoint protection for Apple devices.
March 11, 2025

Ultimate endpoint protection for Apple devices.

Anonymous | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User

Overall Satisfaction with Jamf Protect

We utilize Jamf Protect for our Apple assets to protect against threats and suspicious activity. Jamf Protect provides multiple levels of telemetry collection allowing administrator to select how sensitive they want to be on event triggers. Furthermore, Jamf Protect allows you to monitor against specific threat categories aligned to the MITRE ATT&CK framework. In addition to protection, we utilize Jamf Protect to monitor our endpoint compliance with the CIS Critical Security Controls baselines.

Pros

  • Deep visibility into system telemetry
  • Compliance reporting automatically updates and provides a quantifiable metric which teams can use to track maturity for CIS CSC.
  • USB device management to protect against data exfiltration and USB delivered malware attacks.

Cons

  • Expand out of box support for additional SIEM's
  • Improve the enduser onboarding UX
  • The UI takes some getting used to. Provide more inline instruction prompts for new admins.
  • Jamf Protect includes a number of features which other EDR solutions charge additional fees for (e.g. compliance and device control)
  • Lower cost per endpoint compared to other EDR solutions
  • Centrally managed
  • Strong integrations with Jamf MDM
Jamf Protect is easy to manage. It is a separate interface from Jamf MDM which is nice for Security Operations teams. It allows Security teams to manage only the Security aspects without having to dig through all of the MDM configurations. For exception uses cases, Jamf Protect does provide options to customize settings where needed.
I find that all of the products have the same features; however, Jamf Protect is stronger if managing macOS devices. Also, it is one license so what you pay covers all of the features and does not require additional licenses for features like USB device control. The CIS compliance aspects generally look better in in Jamf as compared to Crowdstrike.

Do you think Jamf Protect delivers good value for the price?

Yes

Are you happy with Jamf Protect's feature set?

Yes

Did Jamf Protect live up to sales and marketing promises?

Yes

Did implementation of Jamf Protect go as expected?

Yes

Would you buy Jamf Protect again?

Yes

If the environment is predominantly Apple based then Jamf Protect is a strong solution for providing EDR capabilities to endpoints. The detection capabilities are up to par with other leading EDR tools and it integrates well with Jamf MDM. Additionally, the compliance, telemetry, log forwarding, and USB device management being included as part of Jamf Protect provide good ROI.

Jamf Protect Feature Ratings

Anti-Exploit Technology
9
Endpoint Detection and Response (EDR)
9
Centralized Management
10
Hybrid Deployment Support
10
Infection Remediation
Not Rated
Vulnerability Management
Not Rated
Malware Detection
9

Comments

More Reviews of Jamf Protect