Software Engineer at a tech vendor with 501-1,000 employees
Real User
Top 20
Jan 25, 2026
My main use case for Jamf Protect at my organization is that we use it for VPN to access company websites through VPN. A specific example of how we use Jamf Protect for VPN access is that my organization uses it to secure the MacBook devices that have been provided to us. When we were signing up for this, we received our laptop devices and with the initial setup, Jamf Protect was configured to avoid breaching any sensitive information.
Presales Engineer at a computer software company with 201-500 employees
Reseller
Top 20
Oct 15, 2024
I use Jamf Protect for myself, especially for POC demonstration purposes. It is also used as part of our consultation services, where I recommend it to customers.
Jamf Protect manages all Apple devices, deploys and upgrades applications, and enforces security features like blocking data transfers and improving security profiles.
Jamf Protect is basically an endpoint solution for any external drives since it can detect any kind of malware attacks or any miscellaneous activities that occur through a device. If someone is trying to take out the data without permission, the tool also detects that.
Jamf Protect provides comprehensive security for Apple devices, aiding in malware protection, threat prevention, CIS benchmarks, and USB blockages while supporting local accounts and password sync.Designed for managing Apple devices, Jamf Protect offers robust security features, such as malware detection and prevention, unauthorized data transfer blocks, and enhanced security profiles. It allows seamless deployment and upgrades of applications, coupled with efficient endpoint management. The...
My main use case for Jamf Protect at my organization is that we use it for VPN to access company websites through VPN. A specific example of how we use Jamf Protect for VPN access is that my organization uses it to secure the MacBook devices that have been provided to us. When we were signing up for this, we received our laptop devices and with the initial setup, Jamf Protect was configured to avoid breaching any sensitive information.
I use Jamf Protect for myself, especially for POC demonstration purposes. It is also used as part of our consultation services, where I recommend it to customers.
Jamf Protect manages all Apple devices, deploys and upgrades applications, and enforces security features like blocking data transfers and improving security profiles.
Our customers use Jamf Protect for security purposes.
Jamf Protect is basically an endpoint solution for any external drives since it can detect any kind of malware attacks or any miscellaneous activities that occur through a device. If someone is trying to take out the data without permission, the tool also detects that.
We use it to block USB drives from laptops and protect our Macs from malware and other attacks with its antivirus features.
Jamf Protect is a security product that helps us with CIS benchmarks and threat prevention.