Listing Thumbnail

    Jamf Protect

     Info
    Sold by: Jamf 
    Deployed on AWS
    Free Trial
    Vendor Insights
    AWS Free Tier
    Jamf Protect is an endpoint security and mobile threat defense (MTD) solution that helps organizations defend against modern threats, maintain endpoint compliance, identify active threats and respond to them.
    4.5

    Overview

    Purpose-built endpoint security and mobile threat defense (MTD) for Mac and mobile devices that allows organizations to maintain compliance, defend against the modern threat landscape, identify and respond to security incidents with minimal impact to the end user experience.

    Why Jamf Protect?

    Apple's rapid growth and adoption in the enterprise make Apple devices an appealing target. Jamf Protect enhances Apple's built-in security features by increasing visibility, preventions, controls and remediation capabilities. Jamf Protect uses native security frameworks in macOS and iOS to offer same-day support for the latest Apple software and hardware.

    Highlights

    • Endpoint Protection - Comprehensive detection and protection for Apple-specific malware and attacks. Device controls to manage how removable storage devices are used to prevent data loss.
    • Threat Prevention - Prevent threats that put corporate data at risk. Block phishing, ransomware, malicious domains. Block web-based or internet-based threats. Enforce acceptable use policy and block risky content.
    • Compliance & Visibility - Audit security benchmarks to ensure ongoing compliance of Mac and mobile devices. Log rich telemetry to aide in incident investigations. Full visibility into security events.

    Details

    Sold by

    Delivery method

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Vendor Insights

     Info
    Skip the manual risk assessment. Get verified and regularly updated security info on this product with Vendor Insights.
    Security credentials achieved
    (1)

    Buyer guide

    Gain valuable insights from real users who purchased this product, powered by PeerSpot.
    Buyer guide

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Free trial

    Try this product free according to the free trial terms set by the vendor.
    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    12-month contract (1)

     Info
    Dimension
    Description
    Cost/12 months
    Jamf Protect
    Jamf Protect Offer
    $50,000.00

    Vendor refund policy

    No Refunds

    Custom pricing options

    Request a private offer to receive a custom quote.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Support

    Vendor support

    Support for Jamf Products. Jamf helps you manage and secure your Apple devices at work, backed by the most dedicated support team in the industry.

    Support Email: support@jamf.com 

    US Phone Support: +1 844-411-5263 International Phone Support Available. Visit the Jamf Technical Support Desk website to local number.

    Open a ticket or contact your account team in the Jamf Support Portal.

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly
    By Iru
    By IBM Security

    Accolades

     Info
    Top
    50
    In IT Business Management
    Top
    10
    In Device Security, Device Management
    Top
    50
    In Device Management, Device Security

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    3 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    Insufficient data
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Endpoint Protection
    Comprehensive detection and protection for Apple-specific malware and attacks with device controls to manage removable storage devices and prevent data loss.
    Threat Prevention
    Prevention of phishing, ransomware, malicious domains, and web-based threats with enforcement of acceptable use policies and blocking of risky content.
    Compliance and Visibility
    Audit of security benchmarks for Mac and mobile device compliance with rich telemetry logging and full visibility into security events for incident investigations.
    Native Security Framework Integration
    Utilization of native security frameworks in macOS and iOS to provide same-day support for latest Apple software and hardware updates.
    Mobile Threat Defense
    Mobile threat defense capabilities for iOS devices to identify and respond to security incidents with minimal impact to end user experience.
    Zero-Touch Device Deployment
    Automatic transformation of Apple devices into enterprise-ready endpoints upon first power-on with pre-configured apps, settings, and security controls without user intervention.
    Identity Provider and Single Sign-On Integration
    Deep integration with identity providers enabling automatic blueprint and control assignment based on user data, with support for customized login experiences.
    Self-Healing Security Controls
    Over 150 configurable security settings monitored and automatically enforced by the Kandji Agent with automatic remediation if settings drift from specified configuration.
    Unified Endpoint Detection and Response
    Single agent delivering both MDM and EDR functionality with file metadata analysis, malicious activity detection, and quarantine capabilities during file download operations.
    Compliance Framework Templates
    Pre-built security templates mapped to NIST, CIS, and STIG frameworks enabling rapid deployment of advanced security configurations across device fleets with customizable individual settings.
    Unified Endpoint Management
    Manage multiple device types and operating systems including Android, iOS, iPadOS, Chrome OS, AR/VR devices, wearables, and rugged devices from a single console
    Mobile Threat Defense
    Enable mobile threat defense with continuous on-device protection and near real-time dashboards to identify and remediate security risks
    Device Enrollment and Onboarding
    Support Over-the-Air (OTA) device enrollment, Apple Business Manager integration, and Android Enterprise zero-touch enrollment for streamlined device setup
    Enterprise Mobility Management
    Provide MDM and EMM capabilities with containerization and device security features for inventory visibility of devices, apps, content, and corporate data across corporate-owned and BYOD programs
    AI-Powered Security Automation
    Deliver AI-powered real-time alerts and automated security policy enforcement through the Compliance Engine and Action Orchestrator for routine and complex endpoint tasks

    Security credentials

     Info
    Validated by AWS Marketplace
    FedRAMP
    GDPR
    HIPAA
    ISO/IEC 27001
    PCI DSS
    SOC 2 Type 2
    -
    -
    -
    -
    -
    No security profile
    No security profile

    Contract

     Info
    Standard contract
    No
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    4.5
    15 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    67%
    33%
    0%
    0%
    0%
    5 AWS reviews
    |
    10 external reviews
    External reviews are from PeerSpot .
    Julius Johnson

    Security analytics have cut investigation time and protect our device fleet from intrusions

    Reviewed on Apr 12, 2026
    Review from a verified AWS customer

    What is our primary use case?

    Jamf Protect  is a good product worth the price, easy to implement, and manage. It has demonstrated to be a trustworthy process. During my time of usage, it has proven that our data and information is secure and easy to manage at all times.

    In my day-to-day work, other users in our department have enjoyed sharing our insights on the system, and we have provided mostly positive feedback. We have not yet experienced any issue. I use Jamf Protect  as our main security endpoint for all our devices, protecting our desktop and laptop fleet of over 320 units. We switched to this product for a number of reasons, with key ones being that our previous antivirus solution was causing significant performance issues by consuming more resources than it should.

    What is most valuable?

    Jamf Protect offers excellent vendor support, which is very responsive and knowledgeable, along with managed and custom analytics in addition to the out-of-the-box analytics provided. I can set up custom analytics to focus on areas of concern, such as NIST compliance items, and it has low resource usage while protecting against agent tampering with an agent that is not a resource hog.

    Custom analytics and resource usage have helped our team and organization by allowing us to tackle all the problems and protect our desktop and laptop fleet from hackers' intrusions.

    Jamf Protect has positively impacted our organization as it is easy to use, helping us save 50 to 55 percent of our time since we deployed it. We have gained popularity and positive feedback from our clients, bringing positive impacts to our organization.

    When I say it saved 50 to 55 percent of my time, I mean that it is easy to deploy and use, which made work easier in our organization. It also helped us make good decisions.

    What needs improvement?

    Jamf Protect can be improved with better Jamf Pro  integration because explaining the integration always causes confusion when introducing a new Jamf Protect admin to the system. Pro integration only gives limited visibility over things, but it has improved significantly, although there is still room for improvement.

    For how long have I used the solution?

    I have been using Jamf Protect for six years.

    What do I think about the stability of the solution?

    Jamf Protect is stable.

    What do I think about the scalability of the solution?

    Jamf Protect is very scalable.

    How are customer service and support?

    Jamf Protect customer support is very responsive and proactive.

    Which solution did I use previously and why did I switch?

    Before Jamf Protect, I previously used other solutions before making the switch.

    What was our ROI?

    I have seen a return on investment with better detection of malware, reducing downtime and risk to the network. There can be a bit of a steep learning curve in general, but it is easy to implement and deploy.

    What's my experience with pricing, setup cost, and licensing?

    My experience with pricing, setup cost, and licensing was fair.

    Which other solutions did I evaluate?

    Before choosing Jamf Protect, I evaluated ESET PROTECT among other options.

    What other advice do I have?

    I would advise others looking into using Jamf Protect that the key areas it addresses are our main concerns with device compliance. Jamf Protect's flexible analytics allow us to either report or remediate on non-compliance, giving us a better picture of how people are using certain features and also the flexibility to revert back to standard if there are things that we definitely do not want in our environment. I have given this review a rating of 9.

    Which deployment model are you using for this solution?

    Hybrid Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Peter Steven

    Security monitoring has reduced endpoint issues and keeps all staff devices compliant

    Reviewed on Apr 12, 2026
    Review from a verified AWS customer

    What is our primary use case?

    Jamf Protect  serves as our main security endpoint for all our macOS devices. It was easy to implement by following Jamf's documentation, and our security team is very happy with how it monitors threats.

    A specific example of how I use Jamf Protect  day-to-day is that the compliance feature is very useful to our team and constantly helps us monitor and ensure our devices comply with our security policies. We keep an eye on all the MacBooks and iMacs for staff admin. We used to encounter many issues with the iMacs and MacBooks. Jamf Protect filters out all the bad actors and keeps the staff safe. Without it, I am certain we would have significantly more issues.

    What is most valuable?

    The best features Jamf Protect offers are the compliance page, computers page, deployment to already deployed machines, threat remediation, onboarding and setup.

    Out of those features, the compliance page and computer page have made the biggest difference for my team. It has really helped our organization by filtering out bad actors and keeping others safe. It also helped us migrate from our previous endpoint providers, as it allowed us to manage devices that had multiple users. We have a Jamf Protect profile that blocks the use of external drives and other profiles that allow it.

    We have seen fewer insecurities in the organization, which has led to a positive impact.

    What needs improvement?

    Jamf Protect can be improved for non-security specialists, as it can be difficult to navigate the portal. Additionally, it can be hard at times to understand the alerts and what is causing them.

    I would love to see the same simple interface in Jamf Protect for the iMacs, as we also have Jamf Safe Internet for iPads.

    For how long have I used the solution?

    I have been using Jamf Protect for five years.

    What do I think about the stability of the solution?

    Jamf Protect is stable.

    What do I think about the scalability of the solution?

    Jamf Protect's scalability is very scalable.

    How are customer service and support?

    The customer support for Jamf Protect is very responsive and proactive.

    Which solution did I use previously and why did I switch?

    I previously used CrowdStrike Falcon  Endpoint Protection before switching.

    How was the initial setup?

    My experience with pricing, setup cost, and licensing is that it was cost-friendly.

    I have seen a positive impact as it allowed us to deploy machines that were not deployable before due to compliance issues. It was also easy to implement in the shortest amount of time needed, although the cost could be costly if you have a large environment.

    Which other solutions did I evaluate?

    Before choosing Jamf Protect, I evaluated other options such as Symantec Endpoint Encryption  and Bitglass .

    What other advice do I have?

    I would advise others looking into using Jamf Protect that it will always have day-one support for new OS updates, which is an amazing feature. The reporting could use a bit more work, and the actions it captures are far beyond anything we would need, but it does that really well. There are plenty of scenarios where I would gladly recommend this to other institutions. I rate Jamf Protect nine out of ten, primarily because if they improve the portal navigation for non-security specialists, they would definitely receive a ten out of ten.

    Which deployment model are you using for this solution?

    Hybrid Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Glen Johnson

    Deep visibility into telemetry has improved threat detection and strengthened device security

    Reviewed on Apr 12, 2026
    Review from a verified AWS customer

    What is our primary use case?

    Jamf Protect  serves multiple purposes in my organization, with my main focus being device security and threat protection for our Apple assets. We use Jamf Protect  to protect against threats and suspicious activities. Jamf Protect provides multiple levels of telemetry collection, allowing an administrator to select how sensitive they want to be on event triggers.

    What is most valuable?

    The best features Jamf Protect offers are deep visibility into system telemetry, complex reporting that runs automatically, and configurable metrics which can be used to track maturity for our customer success team.

    The deep visibility in system telemetry has really helped us in reporting automatic updates to our clients and giving better metrics which our team is able to track.

    USB device management is a great feature of Jamf Protect to protect against USB-delivered malware attacks.

    Jamf Protect has positively impacted our organization by helping us improve security, and I have seen improvements in security with faster response times.

    What needs improvement?

    Jamf Protect can improve by expanding out-of-box support for additional SIEM  integrations.

    I would like to see Jamf Protect provide online instruction prompts for new administrators.

    For how long have I used the solution?

    I have been using Jamf Protect for four and a half years.

    What do I think about the stability of the solution?

    Jamf Protect is very stable.

    What do I think about the scalability of the solution?

    Jamf Protect is very scalable.

    How are customer service and support?

    The customer support for Jamf Protect is responsive and proactive.

    How was the initial setup?

    My experience with pricing, setup cost, and licensing was that it was easy to use.

    What was our ROI?

    I have seen a return on investment with a low cost per endpoint compared to other EDR solutions, and it is centrally managed with strong integration with Jamf.

    Which other solutions did I evaluate?

    Before choosing Jamf Protect, I evaluated other options like CrowdStrike Falcon  and Microsoft Defender for Endpoint .

    What other advice do I have?

    I recommend Jamf Protect to others looking into using it. I rate this product 9 out of 10.

    Which deployment model are you using for this solution?

    Hybrid Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Vipin Pandey

    Granular telemetry has strengthened compliance and simplified USB control for large Mac fleets

    Reviewed on Mar 19, 2026
    Review from a verified AWS customer

    What is our primary use case?


    I initially started using Jamf Protect  for telemetry and auditing purposes. However, because we have other DLP  products and antivirus in our organization, we have slowly and gradually started using a few more features of Jamf Protect, including DLP , which has made the process much smoother. The earlier process of DLP was quite complex in our environment, but since we started using Jamf Protect, it has become much easier for us to use those features that were very complex before. The first example I can give you is using a third-party USB. Previously, whitelisting the USB in our environment was a significant challenge because we are a large organization with approximately 10,000 Macs. Every now and then, people come to us saying they need a specific USB to work for a client. Since we started using Jamf Protect, that has become quite easy for us to handle. There are other compliance features that we are trying to use. I have just completed my certification with Jamf Protect, so we are trying to implement some compliance features using Jamf Protect. However, as of now, we are using very limited features of Jamf Protect.

    What is most valuable?

    Jamf Protect offers good telemetry and auditing capabilities. We can use Jamf Protect for auditing purposes and for meeting our minimum compliance requirements. We can also use Jamf Protect for whitelisting USB devices. The one limitation is that you cannot replace the antivirus completely with Jamf Protect, so you cannot consider it as a complete antivirus solution. However, you can use a few features of Jamf Protect.

    We use Jamf Protect for telemetry and auditing because we collect telemetry data and hand it over to the security team. Regarding how beneficial it is, the security team has said that the previous application we were using for auditing and telemetry did not provide data that was as granular. I do not audit anything myself because I am in the engineering part. However, the security team has been continuously saying that the data we get from Jamf Protect is quite granular and quite helpful. After using Jamf Protect, they have been able to put many restrictions in place that they previously thought were not necessary. They have come to us asking whether we can implement this feature or that feature into the process. There were many things that we were previously allowing, thinking they would not cause any issues in the environment. However, using the data from Jamf Protect, they came to the conclusion that certain features could be a big issue in the coming days or could be a threat. They have asked us to stop those features on the Mac. I am not sure about the specifics of how they are using the data because there is a specific security team that manages all of these details.

    If some other organization is using Jamf Pro , they should definitely go for Jamf Protect. That will streamline many things for them.

    What needs improvement?

    The first thing I would like to improve is Jamf's technical assessment on any product. When we were talking with Jamf about Jamf Protect features, they were not able to share all the features with us completely at that time. This was the first time I was involved in this type of conversation, and there is an architect in my team who normally takes care of these matters, but he had other things to do, so I was involved. I had to invest a lot of time going back and forth to understand what features of Jamf Protect we could use. I would say that Jamf should come up with a very clear picture of what all features we can use. Since we are an old customer of Jamf, they should be aware that these features are not being used in the environment and they should come to us and tell us how those features can be beneficial for us.

    I would just want Jamf Protect to be included in Jamf Pro , the same way compliance and blueprints have been included. I do not want to go into three different portals. For Jamf Connect , I have to go to a different portal. For analytics, there is another portal, radar.vandera.com, which is also related to Jamf Protect analytics. I have to go to that portal for analytics. Jamf Protect and Radar portal are both connected, but I just want them to streamline everything into Jamf Pro so I can use one portal for everything rather than going to three or four different portals.

    For how long have I used the solution?

    I have been using this solution for about one and a half years.

    What do I think about the stability of the solution?

    I would say it was good. Initially, we had a few issues when we started our alpha testing on Jamf Protect. For some reason, it was causing a lot of CPU usage. Generally, it should hardly take any CPU usage and must be at zero CPU usage about ninety to ninety-five percent of the time. However, in the alpha phase, we found out that it was taking twenty to thirty percent of CPU usage, and in some of the Macs, it was taking even more than seventy percent of CPU usage. We had a discussion with Jamf about that, and Jamf helped us resolve it. Since then we have conducted two pilot phases and we have not had any issues. The integration was very good. I would not say it was excellent, but it was very good, though not excellent.

    How are customer service and support?

    The customer service rating is four out of ten.

    Which solution did I use previously and why did I switch?

    I have not been working with MetaDefender . I think someone took me wrong in a previous conversation. I have been working with Defender for quite long, about three to three and a half years. However, I have not worked on any Meta products. I have worked with Microsoft Defender, not MetaDefender .

    How was the initial setup?

    The initial setup was not complex; it was simple.

    What other advice do I have?

    Jamf Protect and Radar portal are both connected, and I would just want them to streamline everything into Jamf Pro so I can use one portal for everything rather than going to three or four different portals.

    We have a very large number of client-facing Mac users, and we cannot simply put something on their Mac. We have to be very conscious when we start using any security stack in our environment. When we get rid of any security stack in our environment, we need to put it in a very clear picture to the leadership explaining why we are doing it and what impact it will have, as well as how beneficial it will be for the users. We have gotten rid of a few things in the past and it was very difficult for us to remove those applications. That is why using all the features of Jamf Protect instantly in our environment is a bit difficult, but we have slowly and gradually shifted a few things to Jamf Protect. The first thing is using USB. We will obviously include analytics in the coming time, but as of now, we are not using it.

    We are using three Jamf products: Jamf Protect, Jamf Connect , and Jamf Pro. I would rate this review an eight out of ten.

    Nick Rudman

    Security platform has reduced malware risk and has strengthened compliance for macOS endpoints

    Reviewed on Feb 16, 2026
    Review from a verified AWS customer

    What is our primary use case?

    I have been using Jamf Protect  for four years and have utilized it for Apple assets to protect against threats and suspicious activity.

    Jamf Protect  provides multiple levels of telemetry collection, allowing me to select how sensitive I want to be on event triggers. Jamf Protect allows me to monitor against specific threat categories aligned to the MITRE ATT&CK framework. In addition to protection, I utilize Jamf Protect to monitor our endpoint compliance with the CIS critical security control baseline.

    If the environment is predominantly Apple based, Jamf Protect is a strong solution for providing EDR capabilities to endpoints. The detection capabilities are on par with other leading EDR tools, and it integrates well with Jamf MDM . The compliance telemetry, log forwarding, and USB device management included as part of Jamf Protect provide a good return on investment.

    I use Jamf Protect as our main security endpoint for all our macOS devices, which are Apple devices. It was very easy to implement by following Jamf's documentation, and our security team is very happy with how it monitors threats. The compliance feature is also very useful to them, and it constantly helps them monitor and ensure our devices comply with our security policies.

    What is most valuable?

    Jamf Protect provides multiple levels of telemetry collection, allowing me to select how sensitive I want to be on event triggers. Jamf Protect allows me to monitor against specific threat categories aligned to the MITRE ATT&CK framework. In addition to protection, I utilize Jamf Protect to monitor our endpoint compliance with the CIS critical security control baseline.

    If the environment is predominantly Apple based, Jamf Protect is a strong solution for providing EDR capabilities to endpoints. The detection capabilities are on par with other leading EDR tools, and it integrates well with Jamf MDM . The compliance telemetry, log forwarding, and USB device management included as part of Jamf Protect provide a good return on investment.

    Jamf Protect has had a positive impact on my organization, as it has been one of the best tools that protects against malware. It offers better detection of malware, reducing downtime and risk to our network by approximately 30 to 50 percent. Implementing it is straightforward, although there can be a steep learning curve in general, especially for less technical users. The competitive pricing included in the business package is great, and compliance with our security standards has been maintained.

    What needs improvement?

    To improve Jamf Protect, I suggest enhancing the end user onboarding user experience, expanding out-of-the-box support for additional SIEMs, and noting that the user interface takes some getting used to. More inline instruction prompts for new admins would also be beneficial.

    For how long have I used the solution?

    I have been using Jamf Protect for four years and have utilized it for Apple assets to protect against threats and suspicious activity.

    What do I think about the stability of the solution?

    Jamf Protect is very stable, and I have not seen any downtime.

    What do I think about the scalability of the solution?

    Jamf Protect is very scalable, enabling me to manage a large number of devices seamlessly and easily.

    How are customer service and support?

    The customer support is very proactive, helpful, and knowledgeable.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    I previously used Microsoft Defender for Endpoint .

    I switched from Microsoft Defender for Endpoint  to Jamf Protect because I find that Microsoft Defender for Endpoint has the same features; however, Jamf Protect is specifically tailored for managing macOS devices. With Jamf Protect, it is one license that covers all features without requiring additional licenses for features such as USB device control, making it very cost-effective.

    How was the initial setup?

    It is easy to implement and easy to manage.

    It was very easy to implement by following Jamf's documentation, and our security team is very happy with how it monitors threats.

    What was our ROI?

    The compliance telemetry, log forwarding, and USB device management included as part of Jamf Protect provide a good return on investment.

    What's my experience with pricing, setup cost, and licensing?

    The pricing, setup cost, and licensing have been very effective.

    Jamf Protect includes a number of features that other EDR solutions charge additional fees for, such as compliance and device control. It has helped us lower the cost per endpoint compared to other EDR solutions, and it is easy to manage since it is centrally managed with strong integration with Jamf MDM.

    Which other solutions did I evaluate?

    I evaluated other options before choosing Jamf Protect, specifically CrowdStrike Falcon .

    What other advice do I have?

    My advice to others looking into using Jamf Protect is that it is easy to manage and offers a separate interface from Jamf MDM, which is beneficial for security operations teams. It allows security teams to manage only the security aspects without having to navigate through all the MDM configurations, saving a lot of time. Additionally, if your environment is predominantly Apple or macOS based, Jamf Protect is a strong solution for providing EDR capabilities to endpoints. I would rate this solution an 8 out of 10.

    Which deployment model are you using for this solution?

    Hybrid Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    View all reviews