www.jamf.com
Open in
urlscan Pro
3.221.207.22
Public Scan
Submitted URL: http://jamfprotect.fr/
Effective URL: https://www.jamf.com/products/jamf-protect/
Submission: On October 26 via manual from IN — Scanned from FR
Effective URL: https://www.jamf.com/products/jamf-protect/
Submission: On October 26 via manual from IN — Scanned from FR
Form analysis
2 forms found in the DOMGET /resources/search/
<form action="/resources/search/" method="GET" class="search-input"> <button class="search-input__submit" type="submit"> <svg>
<use href="#icon__magnifier"></use>
</svg> </button> <input id="resource-search" class="search-input__keywords" name="keywords" type="text" required=""> <span for="keywords" class="search-input__placeholder"> e.g. Device Management </span> <button class="search-input__reset"
type="reset"> <svg>
<use href="#icon__x"></use>
</svg> </button> </form>
GET https://www.jamf.com/search/
<form action="https://www.jamf.com/search/" method="GET" class="navigation__search-input search-input"> <input class="search-input__keywords" name="keywords" type="text" required="" autocomplete="off"> <span for="keywords"
class="search-input__placeholder"> Search </span> <button class="search-input__submit" type="submit"> <svg>
<use href="#icon__magnifier"></use>
</svg> <span class="sr-only"> Submit </span> </button> <button class="search-input__reset" type="reset"> <svg>
<use href="#icon__x"></use>
</svg> <span class="sr-only"> Reset </span> </button> </form>
Text Content
Cookie Policy To edit your cookie settings, click here. Privacy Policy Jamf uses cookies to enhance your browsing experience, personalize ads and analyze usage. Without cookies, you may not be able to use certain features of our sites. To learn more, visit our Privacy Policy. DeclineAllow Skip to main content English * English * Deutsch (German) * Français (French) * Español (Spanish) * 日本語 (Japanese) * Nederlands (Dutch) Jamf Home Toggle Navigation * Solutions The Jamf platform Where device love meets Trusted Access manage devices Zero-touch deployment Mobile Device Management (MDM) Application management Inventory management Self Service secure endpoints Identity and access management Endpoint protection Threat prevention and remediation Content filtering and safe internet Zero Trust Network Access (ZTNA) Security visibility and compliance explore industries Business Improve business operations and empower employees Education Engage learners through streamlined education technology Healthcare Enhance the patient experience and personalize telehealth Learn about the products that drive Jamf’s solutions. * Pricing * Resources Search resources e.g. Device Management -------------------------------------------------------------------------------- Browse Resources by Type: * E-Books Thought-provoking content designed to keep you ahead of industry trends. * White Papers Research reports and best practices to keep you informed of Apple management tactics. * Videos See product demos in action and hear from Jamf customers. * Technical Papers Instructions on how to deploy, administer, and integrate Jamf and third-party products. * Case Studies Apple management success stories from those saving time and money with Jamf. * Infographics At-a-glance statistics and information needed to make the most informed decisions. * Webinars On-demand webinar videos covering an array of Apple management topics. * Product Documentation Guides to help you install, administer and use Jamf products. * Contact Start Trial * Site Search Search Submit Reset * * Start Trial 1. Jamf Home 2. Products 3. Jamf Protect * Start Trial JAMF PROTECT ENDPOINT PROTECTION BUILT EXCLUSIVELY FOR MAC. WHY JAMF PROTECT? Apple builds one of the strongest out-of-the-box security platforms on the market. But hackers love a challenge, and the platform on its own won’t completely defend against attacks. You need Mac protection that aligns with existing Apple security instead of forcing Apple to adapt to security tools built for other operating systems. Jamf Protect amplifies core Apple security features with better preventions, stronger controls, and broader visibility and remediation capabilities. By aligning with the endpoint security framework in macOS, Jamf Protect supports the latest Apple software and hardware on the day of release —including Monterey and Apple Silicon— allowing you to upgrade your devices on your schedule, not ours. PREVENT AND DETECT. Tailored Mac threat prevention and full event visibility. COMPREHENSIVE INSIGHT INTO MAC-SPECIFIC MALWARE. Prevent known Mac-specific malware, adware and ransomware from running. Jamf Protect prevents and quarantines known macOS malware and even prevents some unknown threats. REAL-TIME ALERTS OF MALICIOUS APPLICATIONS, SCRIPTS AND USER ACTIONS. With a deep awareness of concerning activity on macOS, Jamf Protect adapts to your environment and minimizes downtime with: * Behavioral analytics identify suspicious or malicious activity. * Customized analytics adapt Jamf Protect’s analytics to your unique environment. * Threat hunting allows you to hunt for threats that specifically target your environment. * The MITRE ATT&CK framework maps activity through core analytics. STOP ATTACKS BEFORE THEY CAN STRIKE. Block cyber threats like phishing and malicious downloads before they can compromise users or devices. Jamf Protect blocks command and control (C2) traffic as well as risky domains to keep users and organizations safe. MONITOR AND REMEDIATE. View your entire Mac fleet. Secure devices and users with minimal disruption. GAIN GRANULAR INSIGHTS INTO YOUR MAC FLEET'S ACTIVITIES FOR DEVICE HEALTH, THREAT HUNTING AND COMPLIANCE. Receive immediate alerts when devices deviate from your OS hardening configurations and bring them back into the fold with Jamf Protect and Jamf Pro. macOS security tool visibility. See all macOS security tools activity. Unified log forwarding. A customizable feed of Unified Log data from macOS to your system-of-record for visibility and compliance. CIS benchmarks. Enforce and monitor a secure baseline for adherence to the CIS macOS benchmarks using Jamf. PROTECT USERS WITHOUT GETTING IN THEIR WAY. Jamf Protect makes isolating machines, eradicating unwanted files and getting devices back into a trusted state easy— and automated. Perform incident response manually or automate it with Jamf Protect and Jamf Pro: the tools that IT already uses to manage Mac. COMPLIANCE MEET AND MAINTAIN COMPLIANCE REQUIREMENTS TO KEEP YOUR MAC FLEET PERFORMING OPTIMALLY. Minimize risk with strong security policies. Real-time visibility. Track what’s going on in the background and mitigate risks before they grow into something far more difficult to contain. Knowledge is power. Real-time visibility into the most critical network and system processes — including user activity — helps meet your endpoint auditing compliance goals. IT can immediately investigate, mitigate or remediate as needed. Regulation compliance. Align your processes with CIS benchmarking standards out-of-the-box. Stream real-time data. Combine compliance and audit data captured with Compliance Reporter in Jamf Protect with data analysis tools to minimize non-compliance. Organizations working together, connected by Jamf. INTEGRATIONS TAKE THINGS TO THE NEXT LEVEL WITH APP INTEGRATIONS, API ACCESS AND MORE. Open up more capabilities. When you combine Jamf's software with third-party offerings, messaging apps can extend real-time notifications to your smartphone or other mobile devices. Forwarding alerts to your SIEM or dashboard solution can provide better data visualization. And that’s just the tip of the iceberg. Jamf Protect and Jamf Pro work with the apps you already know and trust. We minimize risk by reporting to your SIEM solution, managing your enterprise's authentication process through an Identity Provider (IdP) and visualizing endpoint health data on customized dashboards. Powerful API access. IT can manage Jamf Protect through Terminal thanks to our use of a modern Application Programming Interface (API). This makes short work of complex scripts. API access also allows for unprecedented integration with all first- and many third-party security apps, further bolstering protections available to Mac. GET STARTED WITH JAMF. Put the power of behavioral analysis to work. Request Trial JAMF PROTECT Purpose-built endpoint security for Mac macOS Education $6 per device per month when billed annually Ready to purchase? Buy now. $12 per device per year Schools may purchase Jamf Safe Internet for network threat prevention, which is not included in Jamf Protect's education pricing. Jamf English * English * Deutsch (German) * Français (French) * Español (Spanish) * 日本語 (Japanese) * Nederlands (Dutch) Jamf helps organizations succeed with Apple. By enabling IT to empower end users, we bring the legendary Apple experience to businesses, education and government organizations. Learn about Jamf. +1 612-605-6625 info@jamf.com BUSINESS EDUCATION HEALTHCARE THE JAMF PLATFORM * Zero-touch deployment * Mobile Device Management (MDM) * Application management * Inventory management * Self Service * Identity and access management * Endpoint protection * Threat prevention and remediation * Content filtering and safe internet * Zero Trust Network Access (ZTNA) * Security visibility and compliance PRICING SUPPORT * Jamf Pro * Jamf Now * Jamf School * Jamf Connect * Jamf Protect Support SERVICES * Onboarding * Premium Services * Jamf Services Policies TRAINING * In-Class * Online * Training Policies STORE RESOURCES * Events * Blog * E-Books * Case Studies * White Papers * Jamf Threat Labs PARTNERS * Marketplace * Find a Partner * Developers PRODUCTS * Jamf Pro * Jamf Now * Jamf School * Jamf Connect * Jamf Private Access * Jamf Data Policy * Jamf Protect * Jamf Threat Defense * Jamf Safe Internet INTEGRATIONS * Apple * Microsoft * Google ABOUT * Leadership * Contact * News * Press Releases * Careers * Events * Investor Relations * Media Kit * Trust Center * Corporate Responsibility English * English * Deutsch (German) * Français (French) * Español (Spanish) * 日本語 (Japanese) * Nederlands (Dutch) All contents © copyright 2002-2022 Jamf. All rights reserved. Copyright Privacy Terms of Use Trust Modern Slavery Act Statement Twitter LinkedIn YouTube Instagram Facebook Back to Top