Try our new research platform with insights from 80,000+ expert users

Jamf Protect vs VMware Carbon Black Endpoint comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 9, 2024
 

Categories and Ranking

Jamf Protect
Ranking in Endpoint Protection Platform (EPP)
30th
Average Rating
9.4
Reviews Sentiment
7.9
Number of Reviews
10
Ranking in other categories
No ranking in other categories
VMware Carbon Black Endpoint
Ranking in Endpoint Protection Platform (EPP)
18th
Average Rating
7.8
Reviews Sentiment
6.9
Number of Reviews
63
Ranking in other categories
Security Incident Response (1st), Endpoint Detection and Response (EDR) (15th), Ransomware Protection (4th)
 

Mindshare comparison

As of December 2024, in the Endpoint Protection Platform (EPP) category, the mindshare of Jamf Protect is 0.6%, up from 0.1% compared to the previous year. The mindshare of VMware Carbon Black Endpoint is 2.0%, down from 2.6% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Protection Platform (EPP)
 

Featured Reviews

Ashitosh Bankar - PeerSpot reviewer
Searches incoming and outgoing traffic for malware and monitors the network for security
Jamf Protect provides zero-touch integration, and we can add various IdPs for synchronization or authentication.The most effective feature of the solution for security needs is that users can create a zero-touch environment network access and VPN access. Jamf Protect searches incoming and outgoing traffic for malware to monitor the network for security.
Matthew Weisler - PeerSpot reviewer
Great granularity for policies or applications without needing hash values
The solution is cloud based which makes it easy to use for remote devices or work-at-home situations. The solution supports full trust or signature-based approvals. You can get very granular and band out policies or applications without having to do hash values. You can band through the entire environment by execution of the name or desk IDXE. This can be achieved on the policy side because of the signature, IOC, or naming convention itself. This is very effective for pushing more blockage or removing threats across the board. The solution has a very nice API on the back end for remoting into a system and executing scripts or utilizing self automation. This is useful for monitoring several different companies in a workspace or workbook-type format. For example, I report and send out mass emails from a clickable button in an Excel workbook. The APIs all exist for each client. I push out automatic endpoint monitoring and reports every single day at a particular time, with a simple clickable button that serves as a scheduled task for fifty clients.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The quick updates are really good. If a new OS update drops today, I'll have the Jamf Protect update within a few hours. It's also compatible with all Mac OS versions, and there's zero lag or performance impact."
"I rate the technical support a ten out of ten."
"The product's initial setup phase is straightforward and as simple as CrowdStrike."
"Jamf Protect's most effective features for threat detection include managing devices and applications, deploying and upgrading the OS, and its overall security features."
"We mainly use Jamf Protect to protect staff computers from malware and antivirus."
"Jamf Protect searches incoming and outgoing traffic for malware to monitor the network for security."
"The behavioral detection is valuable."
"Jamf Protect is a security product that helps us with CIS benchmarks and threat prevention."
"I like its reporting."
"The threat analysis functionality is good."
"I like the historical features, interface, and integration."
"The product's most valuable feature is its ability to be fully integrated with the VMware environment."
"The most valuable feature is that it detects and stops malicious executables."
"The best feature of this solution is that we have a live response, which is really tailored to our needs."
"The software uses very few resources; it is almost invisible to the end user."
"The data analysis is the most valuable because of the whitelist database. It is different than standard IDS solutions."
 

Cons

"The scope of improvement will fall under the support hierarchy that the tool offers to the latest version that Apple derives for any of the latest operating systems to launch."
"The dependency on Jamf Pro or SIEM or SOAR for some automations and integrations could be reduced."
"Jamf Protect protects just Mac devices, and we would love to have one solution for other platforms and not just Mac devices."
"I'd really like to see some data loss prevention (DLP) capabilities. More visibility into user activity on laptops would be helpful."
"Beginners need initial training."
"Jamf Protect needs to improve its pricing."
"The tool's drawback is that it fails to offer support for Linux."
"The solution’s stability could be improved."
"The node management could be much better. The one thing that they cannot do very easily is change the tenant from a backend."
"In my company, we face issues sometimes when there is a need to write custom rules or we want to write for some rules that are different from the standard rules provided by the solution."
"It would be nice to have additional forensic tools that you can build into the back end."
"The local technical support is very poor, but the support from headquarters is very nice."
"I would personally give the tech support a rating of seven out of ten."
"Integration is difficult, but CB Defense is more powerful than others. It is difficult to implement but easy to pick up many detections."
"It is difficult to extract reports for ongoing scans"
"The endpoint machines need improvement."
 

Pricing and Cost Advice

"I rate the product price as a five on a scale of one to ten, where one is a low price, and ten is a high price."
"The licensing costs are yearly and expensive."
"The product is not an averagely priced tool."
"Jamf Protect is an expensive solution."
"It's significantly cheaper than other options like ApexOne."
"Jamf Protect costs double the price that we were paying before."
"The pricing is annually based and operates through another department than mine."
"​The cost/benefit factor has great relevance in Cb Defense implementations​."
"The product is quite reasonable."
"We have branches, we have different companies, but we cannot buy less than 100 licenses. This does not make sense to me... It should be more flexible. I can understand their saying, "Okay, to be a customer you need 100," but to add on to that number it should be something very straightforward. If I need to add five, for example, I shouldn't need to add 100."
"The price for the solution is completely at government level, meaning one which is very high."
"The pricing is very high."
"The cost is a considerable factor, but the benefit factor is the most important. When you compare it with other products, the price is high. Carbon Black will negotiate the price."
"I am not really involved in the pricing of this product. But, from my understanding, it is OK for us."
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
824,053 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
University
14%
Computer Software Company
14%
Financial Services Firm
9%
Retailer
5%
Computer Software Company
15%
Financial Services Firm
10%
Government
10%
Manufacturing Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Jamf Protect?
Jamf Protect searches incoming and outgoing traffic for malware to monitor the network for security.
What is your experience regarding pricing and costs for Jamf Protect?
The product is not an averagely priced tool. If the organization is fully on Apple's fleet, they can consider Jamf Protect, but it is quite costly. Jamf Protect is costly compared with any other so...
What needs improvement with Jamf Protect?
The dependency on Jamf Pro or SIEM or SOAR for some automations and integrations could be reduced. In-built automation and remediation of behavior-based threats would be beneficial enhancements.
What to choose: an endpoint antivirus, an EDR solution or both?
I can recommend Carbon Black, an award-winning next-gen anti-virus (NGAV) and endpoint detection and response (EDR) security solution. The CB Predictive Security Cloud platform combines multiple hi...
What's the difference between Carbon Black CB Response and Carbon Black CB Defense?
Carbon Black offers two different levels of Endpoint Detection and Response. One is the VM Carbon Black Cloud Endpoint Standard (CB Defense), and the other is the Carbon Black Endpoint Detection an...
What do you like most about Carbon Black CB Defense?
VMware Carbon Black Endpoint is a highly stable solution.
 

Also Known As

No data available
Carbon Black CB Defense, Bit9, Confer
 

Learn More

 

Overview

 

Sample Customers

Information Not Available
Netflix, Progress Residential, Indeed, Hologic, Gentle Giant, Samsung Research America
Find out what your peers are saying about Jamf Protect vs. VMware Carbon Black Endpoint and other solutions. Updated: December 2024.
824,053 professionals have used our research since 2012.