Skip to main content

Help us improve the Digital Marketplace - send your feedback

POSTREMO IT LIMITED

Jamf Apple Device Management and Security Solution

Jamf simplifies Apple device management and security, offering streamlined deployment, secure access, and robust threat prevention. With user based licensing, organisations benefit from cost effective scalability and simplified management. Experience seamless Apple device management and enhanced security, ensuring optimal performance for end users and administrators

Features

  • Unified management across macOS, iOS, tvOS devices
  • Zero Trust Network Access for secure connectivity - ZTNA
  • Seamless Zero-Touch deployment via Apple Business Manager
  • Integrated identity management with Jamf Connect
  • Advanced endpoint protection through Jamf Protect
  • Automated updates with efficient patch management
  • Robust full disk encryption for enhanced security
  • Secure, easy integration with major IDPs
  • Integration with Okta, Google Workspace, Entra ID, Azure
  • Enhanced security with the Jamf Security Cloud

Benefits

  • Optimises operational efficiency and resource usage
  • Increase productivity with automated workflows to update and deploy apps
  • Streamlines IT operations with integrated solutions
  • Accelerates device setup for faster onboarding
  • Empowers users with flexible self-service options
  • Uniformly applies security policies to all managed devices
  • Provides real time threat monitoring and mitigation
  • Facilitates proactive device health and status monitoring
  • Offers cloud-powered security for maximum protection
  • Enterprise SSO integration for ease of access

Pricing

£3 to £12 a device a month

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at info@postremoit.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

7 7 9 9 9 2 0 1 7 3 7 3 7 5 9

Contact

POSTREMO IT LIMITED Tajinder Chana
Telephone: 0207 550 9103
Email: info@postremoit.com

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints
Buyers should be aware of planned maintenance windows for routine upkeep, potentially affecting service availability. Jamf offers various support tiers, with response times and coverage depending on the chosen plan. Compatibility primarily extends to Apple devices, necessitating assessment for integration with existing infrastructure. Integration may require additional configuration and resource allocation. License management, including user-based models, demands careful monitoring to ensure compliance and optimisation. By considering these factors, buyers can effectively plan for the implementation and ongoing utilisation of Jamf's solutions within their organisation
System requirements
  • Recommended macOS 14.x - macOS Sonoma
  • Recommended iOS 17.x
  • Recommended iPadOS 17.x
  • Recommended tvOS 17.x
  • Recommended visionOS 1.1 or later

User support

Email or online ticketing support
Yes, at extra cost
Support response times
Support hours are available from 8:30 AM to 6:00 PM, Monday to Friday, excluding Bank Holidays. Hours can be extended depending on contracted hours.
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
P1 - URGENT
Description:
Critical incidents that affect all users or critical systems. All systems are down, resulting in a complete system outage.
User Impact:
All users are affected and are unable to perform their day-to-day jobs; no workaround is available.
Target Technical Response Time:
1 hour

P2 - HIGH
Description:
Significantly degraded performance or functionality without a workaround.
User Impact:
Impacts some users; however, a workaround is available. Critical systems are affected but remain functional.
Target Technical Response Time:
2 hours

P3 - MEDIUM
Description:
High-priority incidents that affect a single user or non-critical systems.
User Impact:
Degraded performance or functionality, though a workaround exists.
Target Technical Response Time:
3 hours

P4 - LOW
Description:
Low-priority incidents that do not significantly affect the overall operation of the infrastructure.
User Impact:
These incidents are usually usage questions or minor inconveniences.
Target Technical Response Time:
4 hours

Additional service levels are available
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Postremo IT offers a thorough setup and onboarding service. This service encompasses establishing users with a baseline configuration, allowing buyers to ensure the environment adheres to industry-standard baselines for security. Additionally, we provide training and documentation to equip users and technical teams with the necessary skills to uphold the configuration. Furthermore, we extend an ongoing support service to assist support teams and users.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Customers have the ability to download or extract their data directly from their Jamf Pro instance. This information is available through the API, enabling seamless extraction as required. Additionally, should customers require assistance with data extraction, they can submit a request to the supplier, who will provide the necessary support to facilitate the process.
End-of-contract process
When the contract ends the customers environments are decommissioned within a set time outlined in the customers SLAS. No customer data is retained.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
Yes
Compatible operating systems
  • IOS
  • MacOS
  • Other
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Jamf's mobile service, Jamf Pro, focuses on managing iOS devices like iPhones and iPads, offering comprehensive Mobile Device Management (MDM) capabilities tailored for the Apple ecosystem.
Jamf's desktop service, also Jamf Pro, targets macOS devices such as MacBooks and iMacs, providing similar robust management and security features optimised for Mac computers. While both services share the same underlying platform and offer similar capabilities, they are tailored to the unique requirements of their respective device types, allowing organisations to efficiently manage their entire fleet of Apple devices through a unified platform
Service interface
Yes
User support accessibility
WCAG 2.1 AA or EN 301 549
Description of service interface
Jamf Pro offers a web based interface, known as the Jamf Pro Admin Console, for managing Apple devices. This interface facilitates tasks such as device enrolment, configuration, app deployment, security settings, and inventory management. User-friendly and intuitive, it allows administrators to efficiently monitor device status and health from a centralised dashboard. With role-based access control, organisations can grant specific permissions to users based on their responsibilities. This interface serves as a comprehensive tool for admins to oversee and manage all aspects of their Apple device ecosystem.
Accessibility standards
WCAG 2.1 AA or EN 301 549
Accessibility testing
N/A
API
Yes
What users can and can't do using the API
Users can perform a variety of tasks using the Jamf API, including device management, configuration, and automation. This includes actions such as enrolling devices, deploying applications, configuring settings, retrieving inventory data, and executing custom scripts. However, there are limitations to what users can do with the Jamf API. For security reasons, certain administrative tasks may be restricted or require elevated permissions. Additionally, some features or functionalities available in the Jamf Pro interface may not be accessible or fully supported through the API. Users should review the Jamf API documentation for details on available endpoints, authentication methods, and usage guidelines.
API documentation
Yes
API documentation formats
HTML
API sandbox or test environment
No
Customisation available
Yes
Description of customisation
Jamf Pro offers extensive customisation options to tailor the platform to your organisations needs, including features like Jamf Protect and Jamf Connect. Administrators can customise device configurations, security settings, app deployments, and user access permissions. Additionally, Jamf Pro supports scripting and automation for creating custom workflows. It also facilitates integrations with third-party systems, enabling seamless alignment with existing IT infrastructure. These customisation options empower organisations to optimise device management and security processes, automate tasks, and integrate Jamf Pro seamlessly into their workflows, ensuring efficient operations and alignment with organisational requirements

Scaling

Independence of resources
Jamf Cloud uses a clustered Jamf Pro configuration with multiple, load balanced web applications.

Regular maintenance is performed and may include Jamf Pro version upgrades, infrastructure improvements, and security improvements. Customers are notified prior to the start of maintenance.

Analytics

Service usage metrics
Yes
Metrics types
Jamf's reports provide extensive insights into device management, offering vital data on device inventory, compliance, security, and usage. These reports allow IT professionals to monitor key performance indicators, including device deployment rates, software adoption, and security risks. With customisable dashboards and intuitive visualisations, Jamf's reports empower businesses to make informed decisions, streamline workflows, and ensure effective device management. From spotting trends to evaluating user activity,
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Jamf

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Other
Other data at rest protection approach
The information is available once a suitable NDA has been signed and agreed upon by both parties. Online security portals also provide information
Data sanitisation process
No
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Customers can download and retrieve their from the Jamf console using a supported browser in pre defined formats
Data export formats
  • CSV
  • Other
Other data export formats
  • Tsv
  • Xml
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Jamf provide 99.9% uptime and 24/7 availability. 30 days of secure backups.
Approach to resilience
The information is available once a suitable NDA has been signed and agreed upon by both parties. Online security portals also provide information
Outage reporting
Public Dashbaord - https://status.jamf.com/
Users can subscribe to Email Alerts

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels
Role based access control can be configured when an identity provider has been configured.

Granular access can be applied to limit access to certain services
Access restriction testing frequency
Less than once a year
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
The information is available once a suitable NDA has been signed and agreed upon by both parties. Online security portals also provide information

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
The information is available once a suitable NDA has been signed and agreed upon by both parties. Online security portals also provide information
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
The information is available once a suitable NDA has been signed and agreed upon by both parties. Online security portals also provide information
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
The information is available once a suitable NDA has been signed and agreed upon by both parties. Online security portals also provide information
Incident management type
Supplier-defined controls
Incident management approach
The information is available once a suitable NDA has been signed and agreed upon by both parties. Online security portals also provide information

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

As a company that focuses on sustainability at the core of its operations, We assess the environmental impact of our products and services, ensuring sustainability drives our decision-making processes. Products and services are evaluated not only on performance but also on its environmental footprint, pushing for smarter, eco-friendlier choices across all business aspects.

As a cloud-first organisation, we harness the power of cloud technology to replace outdated, high-energy systems with modern, efficient alternatives. This shift reduces the need for physical infrastructure, minimising our overall carbon footprint. We advocate for digital technologies to decrease unnecessary travel and further lessen our environmental impact.

Our sustainable practices and cloud-first approach are not only transforming how we do business but also how we support the UK government's ambition to achieve net-zero greenhouse gas emissions.

Covid-19 recovery

At Postremo IT, we are dedicated to empowering communities to overcome the challenges posed by Covid 19. Our mission is to enhance employment in the technology sector, strengthen community resilience, and promote health and well-being through innovative IT solutions. Our expert team is committed to providing adaptable tools that enable businesses and communities to thrive in changing circumstances. We offer remote working solutions as required, supporting flexibility and environmental sustainability by reducing the necessity for daily commutes. Through these focused initiatives, Postremo IT is striving to make a substantial impact, creating a stronger and more resilient future for everyone.

Tackling economic inequality

Committed to economic growth, we actively create new businesses, jobs, and skills through each contract delivered. We focus on generating employment opportunities, particularly for those facing barriers to employment and develop training programs that address industry-specific skills shortages, leading to recognised qualifications.

In addition, we strengthen our supply chain by incorporating a variety of business partners, including start-ups, small and medium-sized enterprises (SMEs), as well as community and social enterprises. This strategy promotes the use of innovative technologies to enhance the quality and reduce the costs of goods and services. Our approach ensures collaborative and responsible interactions with all partners, while we proactively manage cybersecurity risks to maintain the integrity and resilience of our operations. Through these efforts, we influence our staff, suppliers, customers, and communities, driving resilience and capacity building across high-growth sectors.

Equal opportunity

We are committed to creating an inclusive workplace that embraces and promotes diversity. We recognise the unique contributions of each individual and are dedicated to empowering all employees to reach their full potential. Our approach to managing a diverse workforce is centred on respect, value, and the recognition that diversity is crucial to our success.

We are proactive in offering opportunities for career development to differently abled employees, career sustainability, and self-sufficiency are supported. Postremo IT champions an environment of respect and acceptance, embracing diversity in all its forms. We actively work to eliminate unconscious bias and promote transparency across all levels of our organisation.

As an equal opportunity employer, all aspects of employment at Postremo IT, including hiring, promotion, discipline, or dismissal, are based on merit, competence, performance, and business needs. We do not discriminate based on race, colour, religion, marital status, age, national origin, ancestry, physical or mental disability, medical condition, pregnancy, genetic information, gender, sexual orientation, gender identity or expression, or any other status protected under law. We ensure that organisations within our supply chain also demonstrate a commitment to equal opportunity principles.

Wellbeing

We are committed to promoting a positive workplace atmosphere that actively encourages and supports the welfare of its personnel. We implement proactive measures to create a work environment that promotes healthier decision-making and raises awareness about mental health at every organisational level. This dedication establishes secure and transparent channels of communication for personnel encountering health issues, guaranteeing that all individuals feel encouraged and esteemed.

We ensured the financial and physical well-being of our personnel was a priority during the COVID-19 pandemic, allowing them to maintain their health and continue providing exceptional service to our customers. Provisions for remote work are incorporated into our adaptable arrangements, allowing our team members to operate securely from their homes. Consistent health check sessions and daily team communications conducted via video reinforce our dedication to the physical, mental, and emotional welfare of our employees.

Pricing

Price
£3 to £12 a device a month
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
A full version of Jamf Pro is included, contact Postremo IT for more information about setting up the trial.
Trial is valid for 30 days
Link to free trial
https://www.jamf.com/request-trial/

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at info@postremoit.com. Tell them what format you need. It will help if you say what assistive technology you use.