Try our new research platform with insights from 80,000+ expert users

Jamf Protect vs VMware Carbon Black Endpoint comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 9, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Jamf Protect
Ranking in Endpoint Protection Platform (EPP)
30th
Average Rating
9.4
Reviews Sentiment
7.9
Number of Reviews
10
Ranking in other categories
No ranking in other categories
VMware Carbon Black Endpoint
Ranking in Endpoint Protection Platform (EPP)
20th
Average Rating
7.8
Reviews Sentiment
7.0
Number of Reviews
63
Ranking in other categories
Security Incident Response (1st), Endpoint Detection and Response (EDR) (15th), Ransomware Protection (4th)
 

Mindshare comparison

As of January 2025, in the Endpoint Protection Platform (EPP) category, the mindshare of Jamf Protect is 0.7%, up from 0.1% compared to the previous year. The mindshare of VMware Carbon Black Endpoint is 1.9%, down from 2.5% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Protection Platform (EPP)
 

Featured Reviews

Ashitosh Bankar - PeerSpot reviewer
Searches incoming and outgoing traffic for malware and monitors the network for security
Jamf Protect provides zero-touch integration, and we can add various IdPs for synchronization or authentication.The most effective feature of the solution for security needs is that users can create a zero-touch environment network access and VPN access. Jamf Protect searches incoming and outgoing traffic for malware to monitor the network for security.
Matthew Weisler - PeerSpot reviewer
Great granularity for policies or applications without needing hash values
The solution is cloud based which makes it easy to use for remote devices or work-at-home situations. The solution supports full trust or signature-based approvals. You can get very granular and band out policies or applications without having to do hash values. You can band through the entire environment by execution of the name or desk IDXE. This can be achieved on the policy side because of the signature, IOC, or naming convention itself. This is very effective for pushing more blockage or removing threats across the board. The solution has a very nice API on the back end for remoting into a system and executing scripts or utilizing self automation. This is useful for monitoring several different companies in a workspace or workbook-type format. For example, I report and send out mass emails from a clickable button in an Excel workbook. The APIs all exist for each client. I push out automatic endpoint monitoring and reports every single day at a particular time, with a simple clickable button that serves as a scheduled task for fifty clients.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The behavioral detection is valuable."
"Jamf Protect's most effective features for threat detection include managing devices and applications, deploying and upgrading the OS, and its overall security features."
"I rate the technical support a ten out of ten."
"The product's initial setup phase is straightforward and as simple as CrowdStrike."
"We mainly use Jamf Protect to protect staff computers from malware and antivirus."
"The quick updates are really good. If a new OS update drops today, I'll have the Jamf Protect update within a few hours. It's also compatible with all Mac OS versions, and there's zero lag or performance impact."
"Jamf Protect is a security product that helps us with CIS benchmarks and threat prevention."
"The product's initial setup phase has very simple steps."
"I rate Carbon Black CB Defense an eight out of ten for the ease of its initial setup."
"It gives you all of the information in a short and sweet fashion."
"What I like the most about it is the dynamic grouping, where you get to group endpoints based on setup criteria. That's pretty cool. I like the simplified policy management and simplified white-listing process."
"The most valuable asset is the time-lining capability for any breach activity."
"Behavioral Monitoring stops known malicious events before they even begin."
"One of the most valuable features is that it will block vulnerable sites. If there was a connection between one of our devices to a known malware site, it will block it."
"VMware Carbon Black Endpoint is a highly stable solution."
"I feel that the initial setup was straightforward and not complex."
 

Cons

"The dependency on Jamf Pro or SIEM or SOAR for some automations and integrations could be reduced."
"The scope of improvement will fall under the support hierarchy that the tool offers to the latest version that Apple derives for any of the latest operating systems to launch."
"The product's price is an area of concern where improvements are required."
"Jamf Protect needs to improve its pricing."
"The solution's integration with other tools is slow."
"The solution’s stability could be improved."
"Beginners need initial training."
"The tool's drawback is that it fails to offer support for Linux."
"The solution has to mature on container security and a lot of cloud environment security."
"I'm not sure as to the logic of how we've decided to customize it. We've only really used it since February and therefore there may be more to do on that front. That's why it's hard to say if something is missing or if we just aren't utilizing it."
"I would personally give the tech support a rating of seven out of ten."
"The EDR portion could be better. I'm not a big fan, but it works."
"In our company, we also wanted to have network detection, like a host-based IDS on VMware Carbon Black Endpoint, but we did not get it."
"I haven't run into anything that needs improvement. The website interface can be a little bit better, but it's still good as compared to most others."
"The pricing could be more reasonable."
"The tech support communicates, but it's just not with movement."
 

Pricing and Cost Advice

"I rate the product price as a five on a scale of one to ten, where one is a low price, and ten is a high price."
"The licensing costs are yearly and expensive."
"It's significantly cheaper than other options like ApexOne."
"Jamf Protect is an expensive solution."
"The product is not an averagely priced tool."
"Jamf Protect costs double the price that we were paying before."
"The pricing is very high."
"​The cost/benefit factor has great relevance in Cb Defense implementations​."
"The solution has almost the same price as other different kinds of infrastructures, but it offers a lot of different features."
"The license is annual. It's a standard license."
"CB Defense is available on a yearly subscription and is priced by the number of endpoints."
"The product is quite reasonable."
"It's reasonable in price"
"Overall, it was cost-effective too."
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
831,265 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
University
14%
Computer Software Company
13%
Financial Services Firm
9%
Retailer
5%
Computer Software Company
15%
Financial Services Firm
10%
Government
10%
Manufacturing Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Jamf Protect?
Jamf Protect searches incoming and outgoing traffic for malware to monitor the network for security.
What is your experience regarding pricing and costs for Jamf Protect?
The product is not an averagely priced tool. If the organization is fully on Apple's fleet, they can consider Jamf Protect, but it is quite costly. Jamf Protect is costly compared with any other so...
What needs improvement with Jamf Protect?
The dependency on Jamf Pro or SIEM or SOAR for some automations and integrations could be reduced. In-built automation and remediation of behavior-based threats would be beneficial enhancements.
What to choose: an endpoint antivirus, an EDR solution or both?
I can recommend Carbon Black, an award-winning next-gen anti-virus (NGAV) and endpoint detection and response (EDR) security solution. The CB Predictive Security Cloud platform combines multiple hi...
What's the difference between Carbon Black CB Response and Carbon Black CB Defense?
Carbon Black offers two different levels of Endpoint Detection and Response. One is the VM Carbon Black Cloud Endpoint Standard (CB Defense), and the other is the Carbon Black Endpoint Detection an...
What do you like most about Carbon Black CB Defense?
VMware Carbon Black Endpoint is a highly stable solution.
 

Also Known As

No data available
Carbon Black CB Defense, Bit9, Confer
 

Learn More

 

Overview

 

Sample Customers

Information Not Available
Netflix, Progress Residential, Indeed, Hologic, Gentle Giant, Samsung Research America
Find out what your peers are saying about Jamf Protect vs. VMware Carbon Black Endpoint and other solutions. Updated: January 2025.
831,265 professionals have used our research since 2012.