Jamf Protect Features
Top Rated Jamf Protect Alternatives
(16)
4.9 out of 5
Visit Website
Sponsored
Jamf Protect Categories on G2
Filter for Features
Compliance
Multi-Factor Authentication | Requires a second level of authentication, such as sms messaging or customized tokens, to access data. | Not enough data | |
Access Management | Allows administrators to set user access privileges to permit approved parties to access sensitive data. | Not enough data | |
Security and Compliance | Abilities to set standards for database security and risk management. | Not enough data | |
Mobile Device Mangement | Ability to set standards for types of mobile devices and networks capable of accessing data. | Not enough data |
Protection
Data Encryption | Provide some level of encryption of data at rest, protecting sensitive data while it lives on a mobile device. | Not enough data | |
Data Transport | Protects data with some form of encryption as it leaves your secure or local network. | Not enough data | |
Mobile VPN | Provides a virtual private network (VPN) to secure remote access to networks | Not enough data | |
Backup | Stores data remotely, on-premise, or in cloud databases in case of recovery during disaster. | Not enough data | |
Attacks | Defends against threats such as phishing attempts, jailbreaking, man-in-the-middle (MITM) attacks, and malicious third-party applications. | Not enough data |