What do you like best about JumpCloud?
As a JumpCloud admin, I rely heavily on its cloud-native directory platform to manage our distributed environment efficiently and securely. The ability to configure and control Device Groups allows us to segment and enforce policies based on organizational roles and risk profiles, improving our operational structure and endpoint hygiene.
We're leveraging RADIUS-as-a-Service to authenticate users on our network infrastructure, which eliminates the complexity of managing on-prem NPS servers and ensures secure Wi-Fi and VPN access using centralized credentials. With Policy Management, I can deploy and enforce device security baselines—such as screen lock timers, encryption, and firewall settings—at scale across macOS and Windows systems, using templated or custom policies.
Mobile Device Management (MDM) gives us full lifecycle control of our Apple devices, enabling zero-touch enrollment, configuration profiles, and remote wipe capabilities. Meanwhile, Software Management allows us to automate package deployments and updates across fleets, drastically reducing time spent on manual installs and patching.
We’ve also structured our access model using User and System Groups, which simplifies the application of SSO, command scripts, and policies with granular control. JumpCloud’s architecture supports our Zero Trust initiatives, while significantly reducing the complexity and cost associated with traditional domain controllers or hybrid AD setups.
Overall, JumpCloud empowers our IT operations with scalable, policy-driven management, making identity and device control seamless across our hybrid cloud environment. Review collected by and hosted on G2.com.
What do you dislike about JumpCloud?
JumpCloud is excellent for unified identity and device management across platforms, but it still lacks:
Granular admin roles
Deep MDM/MAM features
Enterprise-level compliance tooling
Advanced analytics and real-time monitoring
It’s perfect for cloud-first, mid-size teams with mixed OS environments—but large enterprises or orgs with heavy compliance or Apple/Windows specialization may need complementary tools. Review collected by and hosted on G2.com.