Jamf Protect
More employees than ever before are working from different locations and on various devices. Jamf Connect enables remote management of users, groups, passwords and access to corporate applications and cloud resources, while safely connecting workers to the devices, apps and data they need to be productive in the modern world. With Jamf, ensure the right users are on compliant devices accessing authorized resources — no matter where they are. This evolved approach to identity and security management eases the burden on IT staff and end users.Jamf Connect allows for simple provisioning of users from a cloud identity service during an Apple provisioning workflow, complete with multi-factor authentication and access controls:
Relevant product features
-
Endpoint Protection
Purpose-built for Apple. Protect devices from threats to keep organizational and personal data safe.
- Malware prevention that prevents known malware and new variants of known malware from running on the Mac with Jamf Protect
- On-device protection blocking new and zero-day threats with behavioral analysis aligned with the MITRE ATT&CK framework for macOS and on-device security detections for mobile devices with the Jamf Trust app
- Removable Storage Controls to ensure that only approved or compliant external storage devices can be connected
- Application Restrictions to define applications or developer IDs that should be blocked, hidden or otherwise prevented from running on a device
Threat Prevention and Remediation
Protect users from threats like phishing attacks and other cyber threats that can put organizational or personal data at risk.
- Web-based threat prevention (phishing, ransomware) preventing threats from impacting protected users and devices
- MI:RIAM, Jamf’s advanced machine learning and threat intelligence engine that evaluates unknown domains in real time to block likely threats
- Remediation with Jamf Pro integration offers a variety of options for streamlining or even automating any required actions after a threat is detected
- SIEM / SOAR integrations with Jamf with your organization’s Security Incident and Event Management solution or Security Orchestration, Automation and Response solution
-
Content Filtering
Content filtering with a focus on privacy that ensures that a user’s personal data is not inspected.
- Enforce an acceptable use policy preventing users from accessing prohibited or risky content on work devices
- Block illegal or extreme content
- Data Capping to manage data consumption to control costs
Security Visibility & Compliance
Validate that every Mac meets your organization’s specific compliance requirements and react immediately if anything deviates from your baseline.
- Built using native Apple frameworks by Apple experts who understand how Apple operating systems work and providing same-day support
- Built-in compliance benchmarks to easily audit against a variety of leading industry benchmarks, including from the Center for Internet Security (CIS), to ensure your entire deployment remains compliant
- Increased visibility of native Apple security frameworks including actions taken by Gatekeeper, File Quarantine, XProtect and MRT
- Rich Telemetry allow streaming of robust log and activity data from Mac endpoints to Jamf or directly to your organization’s SIEM
- Telemetry-only deployment mode available: Stream telemetry data to a SIEM without any data flowing through Jamf Cloud or other Jamf services using Jamf Protect High Compliance
- Advanced Detection and Response for mobile devices (ZecOps) (ADR) for mobile devices that gives organizations the ability to extract critical device telemetry
Let us help you get started
Or you can reach us at:
Phone: +964 780 000 2511 | Email: a.bose@istyle.iq