Overview
Purpose-built endpoint security and mobile threat defense (MTD) for Mac and mobile devices that allows organizations to maintain compliance, defend against the modern threat landscape, identify and respond to security incidents with minimal impact to the end user experience.
Why Jamf Protect?
Apple's rapid growth and adoption in the enterprise make Apple devices an appealing target. Jamf Protect enhances Apple's built-in security features by increasing visibility, preventions, controls and remediation capabilities. Jamf Protect uses native security frameworks in macOS and iOS to offer same-day support for the latest Apple software and hardware.
Highlights
- Endpoint Protection - Comprehensive detection and protection for Apple-specific malware and attacks. Device controls to manage how removable storage devices are used to prevent data loss.
- Threat Prevention - Prevent threats that put corporate data at risk. Block phishing, ransomware, malicious domains. Block web-based or internet-based threats. Enforce acceptable use policy and block risky content.
- Compliance & Visibility - Audit security benchmarks to ensure ongoing compliance of Mac and mobile devices. Log rich telemetry to aide in incident investigations. Full visibility into security events.
Details
Unlock automation with AI agent solutions

Features and programs
Security credentials achieved
(1)

Financing for AWS Marketplace purchases
Pricing
Free trial
Dimension | Description | Cost/12 months |
---|---|---|
Jamf Protect | Jamf Protect Offer | $50,000.00 |
Vendor refund policy
No Refunds
Custom pricing options
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
Software as a Service (SaaS)
SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.
Support
Vendor support
Support for Jamf Products. Jamf helps you manage and secure your Apple devices at work, backed by the most dedicated support team in the industry.
Support Email: support@jamf.com
US Phone Support: +1 844-411-5263 International Phone Support Available. Visit the Jamf Technical Support Desk website to local number.
Open a ticket or contact your account team in the Jamf Support Portal.
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.
FedRAMP
GDPR
HIPAA
ISO/IEC 27001
PCI DSS
SOC 2 Type 2
Standard contract
Customer reviews
Guichet unique pour sécuriser et suivre
Experience agile user-centric security with AI-powered endpoint protection
What is our primary use case?
I use Jamf Protect for myself, especially for POC demonstration purposes. It is also used as part of our consultation services, where I recommend it to customers.
How has it helped my organization?
Jamf Protect gives you Apple built-in native support for endpoint security. It supports zero-day protection in the Apple ecosystem and is agile, user-centric, and lightweight for macOS.
What is most valuable?
The behavioral detection is valuable. It also includes built-in network protection that is powered by our AI called Medium. It provides telemetry and signature-based detection, which offer comprehensive endpoint security.
What needs improvement?
The dependency on Jamf Pro or SIEM or SOAR for some automations and integrations could be reduced. In-built automation and remediation of behavior-based threats would be beneficial enhancements.
For how long have I used the solution?
I have been using it for the last four years.
How are customer service and support?
The technical support is good and proactive. That said, it can be improved. There is some scope to enhance the response and resolution time. From an Indian perspective, I would rate their support at seven point five out of ten.
Which solution did I use previously and why did I switch?
I have an understanding of CrowdStrike and certain security solutions from Forcepoint.
What other advice do I have?
I would recommend inbuilt remediation for behavior-based threats and less dependency on third-party tools.
I'd rate the solution eight out of ten.