Jamf Apple Device Management and Security Solution
Jamf simplifies Apple device management and security, offering streamlined deployment, secure access, and robust threat prevention. With user based licensing, organisations benefit from cost effective scalability and simplified management. Experience seamless Apple device management and enhanced security, ensuring optimal performance for end users and administrators
Features
- Unified management across macOS, iOS, tvOS devices
- Zero Trust Network Access for secure connectivity - ZTNA
- Seamless Zero-Touch deployment via Apple Business Manager
- Integrated identity management with Jamf Connect
- Advanced endpoint protection through Jamf Protect
- Automated updates with efficient patch management
- Robust full disk encryption for enhanced security
- Secure, easy integration with major IDPs
- Integration with Okta, Google Workspace, Entra ID, Azure
- Enhanced security with the Jamf Security Cloud
Benefits
- Optimises operational efficiency and resource usage
- Increase productivity with automated workflows to update and deploy apps
- Streamlines IT operations with integrated solutions
- Accelerates device setup for faster onboarding
- Empowers users with flexible self-service options
- Uniformly applies security policies to all managed devices
- Provides real time threat monitoring and mitigation
- Facilitates proactive device health and status monitoring
- Offers cloud-powered security for maximum protection
- Enterprise SSO integration for ease of access
Pricing
£3 to £12 a device a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
7 7 9 9 9 2 0 1 7 3 7 3 7 5 9
Contact
POSTREMO IT LIMITED
Tajinder Chana
Telephone: 0207 550 9103
Email: info@postremoit.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
- Buyers should be aware of planned maintenance windows for routine upkeep, potentially affecting service availability. Jamf offers various support tiers, with response times and coverage depending on the chosen plan. Compatibility primarily extends to Apple devices, necessitating assessment for integration with existing infrastructure. Integration may require additional configuration and resource allocation. License management, including user-based models, demands careful monitoring to ensure compliance and optimisation. By considering these factors, buyers can effectively plan for the implementation and ongoing utilisation of Jamf's solutions within their organisation
- System requirements
-
- Recommended macOS 14.x - macOS Sonoma
- Recommended iOS 17.x
- Recommended iPadOS 17.x
- Recommended tvOS 17.x
- Recommended visionOS 1.1 or later
User support
- Email or online ticketing support
- Yes, at extra cost
- Support response times
- Support hours are available from 8:30 AM to 6:00 PM, Monday to Friday, excluding Bank Holidays. Hours can be extended depending on contracted hours.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
P1 - URGENT
Description:
Critical incidents that affect all users or critical systems. All systems are down, resulting in a complete system outage.
User Impact:
All users are affected and are unable to perform their day-to-day jobs; no workaround is available.
Target Technical Response Time:
1 hour
P2 - HIGH
Description:
Significantly degraded performance or functionality without a workaround.
User Impact:
Impacts some users; however, a workaround is available. Critical systems are affected but remain functional.
Target Technical Response Time:
2 hours
P3 - MEDIUM
Description:
High-priority incidents that affect a single user or non-critical systems.
User Impact:
Degraded performance or functionality, though a workaround exists.
Target Technical Response Time:
3 hours
P4 - LOW
Description:
Low-priority incidents that do not significantly affect the overall operation of the infrastructure.
User Impact:
These incidents are usually usage questions or minor inconveniences.
Target Technical Response Time:
4 hours
Additional service levels are available - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Postremo IT offers a thorough setup and onboarding service. This service encompasses establishing users with a baseline configuration, allowing buyers to ensure the environment adheres to industry-standard baselines for security. Additionally, we provide training and documentation to equip users and technical teams with the necessary skills to uphold the configuration. Furthermore, we extend an ongoing support service to assist support teams and users.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Customers have the ability to download or extract their data directly from their Jamf Pro instance. This information is available through the API, enabling seamless extraction as required. Additionally, should customers require assistance with data extraction, they can submit a request to the supplier, who will provide the necessary support to facilitate the process.
- End-of-contract process
- When the contract ends the customers environments are decommissioned within a set time outlined in the customers SLAS. No customer data is retained.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- Yes
- Compatible operating systems
-
- IOS
- MacOS
- Other
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
-
Jamf's mobile service, Jamf Pro, focuses on managing iOS devices like iPhones and iPads, offering comprehensive Mobile Device Management (MDM) capabilities tailored for the Apple ecosystem.
Jamf's desktop service, also Jamf Pro, targets macOS devices such as MacBooks and iMacs, providing similar robust management and security features optimised for Mac computers. While both services share the same underlying platform and offer similar capabilities, they are tailored to the unique requirements of their respective device types, allowing organisations to efficiently manage their entire fleet of Apple devices through a unified platform - Service interface
- Yes
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- Description of service interface
- Jamf Pro offers a web based interface, known as the Jamf Pro Admin Console, for managing Apple devices. This interface facilitates tasks such as device enrolment, configuration, app deployment, security settings, and inventory management. User-friendly and intuitive, it allows administrators to efficiently monitor device status and health from a centralised dashboard. With role-based access control, organisations can grant specific permissions to users based on their responsibilities. This interface serves as a comprehensive tool for admins to oversee and manage all aspects of their Apple device ecosystem.
- Accessibility standards
- WCAG 2.1 AA or EN 301 549
- Accessibility testing
- N/A
- API
- Yes
- What users can and can't do using the API
- Users can perform a variety of tasks using the Jamf API, including device management, configuration, and automation. This includes actions such as enrolling devices, deploying applications, configuring settings, retrieving inventory data, and executing custom scripts. However, there are limitations to what users can do with the Jamf API. For security reasons, certain administrative tasks may be restricted or require elevated permissions. Additionally, some features or functionalities available in the Jamf Pro interface may not be accessible or fully supported through the API. Users should review the Jamf API documentation for details on available endpoints, authentication methods, and usage guidelines.
- API documentation
- Yes
- API documentation formats
- HTML
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
- Jamf Pro offers extensive customisation options to tailor the platform to your organisations needs, including features like Jamf Protect and Jamf Connect. Administrators can customise device configurations, security settings, app deployments, and user access permissions. Additionally, Jamf Pro supports scripting and automation for creating custom workflows. It also facilitates integrations with third-party systems, enabling seamless alignment with existing IT infrastructure. These customisation options empower organisations to optimise device management and security processes, automate tasks, and integrate Jamf Pro seamlessly into their workflows, ensuring efficient operations and alignment with organisational requirements
Scaling
- Independence of resources
-
Jamf Cloud uses a clustered Jamf Pro configuration with multiple, load balanced web applications.
Regular maintenance is performed and may include Jamf Pro version upgrades, infrastructure improvements, and security improvements. Customers are notified prior to the start of maintenance.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Jamf's reports provide extensive insights into device management, offering vital data on device inventory, compliance, security, and usage. These reports allow IT professionals to monitor key performance indicators, including device deployment rates, software adoption, and security risks. With customisable dashboards and intuitive visualisations, Jamf's reports empower businesses to make informed decisions, streamline workflows, and ensure effective device management. From spotting trends to evaluating user activity,
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Jamf
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Other
- Other data at rest protection approach
- The information is available once a suitable NDA has been signed and agreed upon by both parties. Online security portals also provide information
- Data sanitisation process
- No
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Customers can download and retrieve their from the Jamf console using a supported browser in pre defined formats
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- Tsv
- Xml
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- Jamf provide 99.9% uptime and 24/7 availability. 30 days of secure backups.
- Approach to resilience
- The information is available once a suitable NDA has been signed and agreed upon by both parties. Online security portals also provide information
- Outage reporting
-
Public Dashbaord - https://status.jamf.com/
Users can subscribe to Email Alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Access restrictions in management interfaces and support channels
-
Role based access control can be configured when an identity provider has been configured.
Granular access can be applied to limit access to certain services - Access restriction testing frequency
- Less than once a year
- Management access authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- The information is available once a suitable NDA has been signed and agreed upon by both parties. Online security portals also provide information
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- The information is available once a suitable NDA has been signed and agreed upon by both parties. Online security portals also provide information
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- The information is available once a suitable NDA has been signed and agreed upon by both parties. Online security portals also provide information
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- The information is available once a suitable NDA has been signed and agreed upon by both parties. Online security portals also provide information
- Incident management type
- Supplier-defined controls
- Incident management approach
- The information is available once a suitable NDA has been signed and agreed upon by both parties. Online security portals also provide information
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
As a company that focuses on sustainability at the core of its operations, We assess the environmental impact of our products and services, ensuring sustainability drives our decision-making processes. Products and services are evaluated not only on performance but also on its environmental footprint, pushing for smarter, eco-friendlier choices across all business aspects.
As a cloud-first organisation, we harness the power of cloud technology to replace outdated, high-energy systems with modern, efficient alternatives. This shift reduces the need for physical infrastructure, minimising our overall carbon footprint. We advocate for digital technologies to decrease unnecessary travel and further lessen our environmental impact.
Our sustainable practices and cloud-first approach are not only transforming how we do business but also how we support the UK government's ambition to achieve net-zero greenhouse gas emissions.Covid-19 recovery
At Postremo IT, we are dedicated to empowering communities to overcome the challenges posed by Covid 19. Our mission is to enhance employment in the technology sector, strengthen community resilience, and promote health and well-being through innovative IT solutions. Our expert team is committed to providing adaptable tools that enable businesses and communities to thrive in changing circumstances. We offer remote working solutions as required, supporting flexibility and environmental sustainability by reducing the necessity for daily commutes. Through these focused initiatives, Postremo IT is striving to make a substantial impact, creating a stronger and more resilient future for everyone.Tackling economic inequality
Committed to economic growth, we actively create new businesses, jobs, and skills through each contract delivered. We focus on generating employment opportunities, particularly for those facing barriers to employment and develop training programs that address industry-specific skills shortages, leading to recognised qualifications.
In addition, we strengthen our supply chain by incorporating a variety of business partners, including start-ups, small and medium-sized enterprises (SMEs), as well as community and social enterprises. This strategy promotes the use of innovative technologies to enhance the quality and reduce the costs of goods and services. Our approach ensures collaborative and responsible interactions with all partners, while we proactively manage cybersecurity risks to maintain the integrity and resilience of our operations. Through these efforts, we influence our staff, suppliers, customers, and communities, driving resilience and capacity building across high-growth sectors.Equal opportunity
We are committed to creating an inclusive workplace that embraces and promotes diversity. We recognise the unique contributions of each individual and are dedicated to empowering all employees to reach their full potential. Our approach to managing a diverse workforce is centred on respect, value, and the recognition that diversity is crucial to our success.
We are proactive in offering opportunities for career development to differently abled employees, career sustainability, and self-sufficiency are supported. Postremo IT champions an environment of respect and acceptance, embracing diversity in all its forms. We actively work to eliminate unconscious bias and promote transparency across all levels of our organisation.
As an equal opportunity employer, all aspects of employment at Postremo IT, including hiring, promotion, discipline, or dismissal, are based on merit, competence, performance, and business needs. We do not discriminate based on race, colour, religion, marital status, age, national origin, ancestry, physical or mental disability, medical condition, pregnancy, genetic information, gender, sexual orientation, gender identity or expression, or any other status protected under law. We ensure that organisations within our supply chain also demonstrate a commitment to equal opportunity principles.Wellbeing
We are committed to promoting a positive workplace atmosphere that actively encourages and supports the welfare of its personnel. We implement proactive measures to create a work environment that promotes healthier decision-making and raises awareness about mental health at every organisational level. This dedication establishes secure and transparent channels of communication for personnel encountering health issues, guaranteeing that all individuals feel encouraged and esteemed.
We ensured the financial and physical well-being of our personnel was a priority during the COVID-19 pandemic, allowing them to maintain their health and continue providing exceptional service to our customers. Provisions for remote work are incorporated into our adaptable arrangements, allowing our team members to operate securely from their homes. Consistent health check sessions and daily team communications conducted via video reinforce our dedication to the physical, mental, and emotional welfare of our employees.
Pricing
- Price
- £3 to £12 a device a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
-
A full version of Jamf Pro is included, contact Postremo IT for more information about setting up the trial.
Trial is valid for 30 days - Link to free trial
- https://www.jamf.com/request-trial/