Try our new research platform with insights from 80,000+ expert users

Cybereason Endpoint Detection & Response vs Jamf Protect comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 9, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cybereason Endpoint Detecti...
Ranking in Endpoint Protection Platform (EPP)
35th
Average Rating
8.0
Reviews Sentiment
7.9
Number of Reviews
21
Ranking in other categories
Endpoint Detection and Response (EDR) (24th)
Jamf Protect
Ranking in Endpoint Protection Platform (EPP)
26th
Average Rating
9.4
Reviews Sentiment
7.9
Number of Reviews
10
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of July 2025, in the Endpoint Protection Platform (EPP) category, the mindshare of Cybereason Endpoint Detection & Response is 0.8%, down from 1.1% compared to the previous year. The mindshare of Jamf Protect is 0.9%, up from 0.3% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Protection Platform (EPP)
 

Featured Reviews

AtulChaurasia - PeerSpot reviewer
Scalable platform with intuitive features for detecting malicious files
The initial setup process is straightforward. We have to install the agent, create a package, and deploy it on servers. It has a prebuilt console managed by the cloud team of Cybereason. We don't have to worry about the console and concentrate on endpoint implementation. It takes ten days to deploy it on 10,000 devices.
Arunachalam S. - PeerSpot reviewer
Offers good monitoring features but needs to improve the support services offered
The tool's drawback is that it fails to offer support for Linux. The XDR and licensing parts of the tool are also areas of concern where improvements are required. XDR is for extensive detection and range of response. Jamf relies on signature-based access. If it is a known signature that just protects our devices, it is a kind of threat isolation. The tool does have behavioral analysis, but as the severity becomes less, the system gets loaded. It is not the same with CrowdStrike as it has a variety of strategies and is a fully cloud-native tool, which helps it to make sure it is a leader in Gartner Magic Quadrant. CrowdStrike goes with its set of practicalities. The kind of threat intelligence CrowdStrike follows is really expensive. With CrowdStrike, we can see which factors have been targeted in our organization. If we know our enemy, then it becomes so easy to cover up with the defense mechanism. The features in CrowdStrike get lagged when used with Jamf Protect. With Jamf Protect, there is a need to improve the security it offers.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Immediately we can pick up the computers in the network if any malicious operation that is triggered."
"We didn't have the visibility that we now have. It has increased our visibility by a lot. So, we put a lot more time into really looking at our environment and what is happening throughout our different networks. It has increased our visibility by around fivefold."
"Their EDR solution, the ability to mitigate issues through their command line, is probably the best feature that we've had. We use that all the time. It's very useful for doing investigations."
"The interface is user-friendly."
"The most valuable feature is the capability of the command used by the machine so that we see the kind of performance that is running."
"What I find most valuable is the clarity of the platform."
"I haven't had any issues with the solution. Stability-wise, I rate the solution a ten out of ten."
"They do a very good job of providing multi-stage visualizations of malicious operations that immediately show all attack details across all devices and users. Since it is MalOp-centric model, you can see if there has been a similar operation across multiple machines. If it is the same thing appearing on multiple machines, you see all the machines and users affected in one screen."
"The quick updates are really good. If a new OS update drops today, I'll have the Jamf Protect update within a few hours. It's also compatible with all Mac OS versions, and there's zero lag or performance impact."
"I rate the technical support a ten out of ten."
"We mainly use Jamf Protect to protect staff computers from malware and antivirus."
"The product's initial setup phase is straightforward and as simple as CrowdStrike."
"The tool's tech support is helpful and efficient. It also has an active community."
"Jamf Protect is a security product that helps us with CIS benchmarks and threat prevention."
"Jamf Protect searches incoming and outgoing traffic for malware to monitor the network for security."
"Jamf Protect's most effective features for threat detection include managing devices and applications, deploying and upgrading the OS, and its overall security features."
 

Cons

"There is room for improvement in the product features related to device control, particularly USB management."
"It initially took some time to deploy."
"They need to improve their technical support services."
"Ad hoc higher-level reporting to senior management can be improved or can be implemented. That's definitely an area of improvement that they need to focus on."
"I feel that the product lacks reporting features and needs improvement."
"The deployment on individual endpoints is more geared toward larger organizations. It might prove to be a bit too complicated for a smaller organization. You need to know what you're doing when you're deploying the sensor."
"Its Microsoft PowerShell protections still need some compatibility improvements. We have run across just a few. It is compatible with 90% of what we have in our network, but there is that 10% that we are still struggling with as far as compatibility with the type of PowerShell scripts needed to run our day-to-day business."
"It should be more stable, and the sensor needs improvement in terms of connectivity."
"The product's price is an area of concern where improvements are required."
"The solution’s stability could be improved."
"The solution's integration with other tools is slow."
"The tool's drawback is that it fails to offer support for Linux."
"Beginners need initial training."
"The scope of improvement will fall under the support hierarchy that the tool offers to the latest version that Apple derives for any of the latest operating systems to launch."
"Jamf Protect protects just Mac devices, and we would love to have one solution for other platforms and not just Mac devices."
"Jamf Protect needs to improve its pricing."
 

Pricing and Cost Advice

"In terms of pricing, it's a good solution."
"The pricing is manageable."
"In terms of cost, this is a good choice for our needs."
"I had to go through a third-party to purchase it, which I wasn't really pleased about."
"I do not have experience with the licensing of the product."
"We considered a few other solutions. Some were ridiculously overpriced, while others didn't have solutions for Mac endpoints. That was a deal-breaker because most of our organization is on Mac. It came down to two vendors: Cybereason and another. They had similar pitches and almost identical approaches, but in the end, Cybereason gave us the best value for our money."
"This product is somewhat expensive and should be cheaper."
"Though it is not the cheapest solution but it fits our budget. We pay an annual licensing fee."
"It's significantly cheaper than other options like ApexOne."
"Jamf Protect is an expensive solution."
"The licensing costs are yearly and expensive."
"I rate the product price as a five on a scale of one to ten, where one is a low price, and ten is a high price."
"The product is not an averagely priced tool."
"Jamf Protect costs double the price that we were paying before."
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
861,524 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
16%
Financial Services Firm
11%
Manufacturing Company
8%
Government
6%
Computer Software Company
17%
University
13%
Financial Services Firm
9%
Healthcare Company
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What is your experience regarding pricing and costs for Cybereason Endpoint Detection & Response?
Comparison with other products showed it be cheaper than some larger competitors. Set up cost for us were cheaper as we already had users experienced with the product in other business units. Initi...
What is your primary use case for Cybereason Endpoint Detection & Response?
We use it to improve detection in the whole industrial sector. We are a big energy company. Across multiple endpoints, we deploy the EDR to secure all, improve detection, and also attempt to automa...
What do you like most about Jamf Protect?
Jamf Protect searches incoming and outgoing traffic for malware to monitor the network for security.
What is your experience regarding pricing and costs for Jamf Protect?
The product is not an averagely priced tool. If the organization is fully on Apple's fleet, they can consider Jamf Protect, but it is quite costly. Jamf Protect is costly compared with any other so...
What needs improvement with Jamf Protect?
The dependency on Jamf Pro or SIEM or SOAR for some automations and integrations could be reduced. In-built automation and remediation of behavior-based threats would be beneficial enhancements.
 

Also Known As

Cybereason EDR, Cybereason Deep Detect & Respond
No data available
 

Overview

 

Sample Customers

Lockheed Martin, Spark Capital, DocuSign, Softbank Capital
Information Not Available
Find out what your peers are saying about Cybereason Endpoint Detection & Response vs. Jamf Protect and other solutions. Updated: July 2025.
861,524 professionals have used our research since 2012.