Try our new research platform with insights from 80,000+ expert users

Jamf Protect vs OpenText Core Endpoint Protection​ comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jun 19, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Jamf Protect
Ranking in Endpoint Protection Platform (EPP)
30th
Average Rating
9.4
Reviews Sentiment
7.9
Number of Reviews
10
Ranking in other categories
No ranking in other categories
OpenText Core Endpoint Prot...
Ranking in Endpoint Protection Platform (EPP)
42nd
Average Rating
7.8
Reviews Sentiment
5.8
Number of Reviews
31
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of June 2025, in the Endpoint Protection Platform (EPP) category, the mindshare of Jamf Protect is 0.8%, up from 0.3% compared to the previous year. The mindshare of OpenText Core Endpoint Protection​ is 0.7%, down from 0.8% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Protection Platform (EPP)
 

Featured Reviews

Arunachalam S. - PeerSpot reviewer
Offers good monitoring features but needs to improve the support services offered
The tool's drawback is that it fails to offer support for Linux. The XDR and licensing parts of the tool are also areas of concern where improvements are required. XDR is for extensive detection and range of response. Jamf relies on signature-based access. If it is a known signature that just protects our devices, it is a kind of threat isolation. The tool does have behavioral analysis, but as the severity becomes less, the system gets loaded. It is not the same with CrowdStrike as it has a variety of strategies and is a fully cloud-native tool, which helps it to make sure it is a leader in Gartner Magic Quadrant. CrowdStrike goes with its set of practicalities. The kind of threat intelligence CrowdStrike follows is really expensive. With CrowdStrike, we can see which factors have been targeted in our organization. If we know our enemy, then it becomes so easy to cover up with the defense mechanism. The features in CrowdStrike get lagged when used with Jamf Protect. With Jamf Protect, there is a need to improve the security it offers.
Urs Schuerch - PeerSpot reviewer
A tool that offers good UI and documentation
Webroot Business Endpoint Protection had sent me a physical installation medium, which was very easy to obtain and deploy. It was also easy to configure, and it had a nice UI. I didn't have any problems with the product. I think that Webroot Business Endpoint Protection is very transparent about the pricing models offered to users. The tool also maintains transparency about the features and specifications. Previously, when I compared the two products with Webroot Business Endpoint Protection, I saw that with Trend Micro, it is very difficult to transparently find out what it offers and how much it charges for it.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The product's initial setup phase is straightforward and as simple as CrowdStrike."
"The behavioral detection is valuable."
"Jamf Protect's most effective features for threat detection include managing devices and applications, deploying and upgrading the OS, and its overall security features."
"The tool's tech support is helpful and efficient. It also has an active community."
"The product's initial setup phase has very simple steps."
"I rate the technical support a ten out of ten."
"Jamf Protect searches incoming and outgoing traffic for malware to monitor the network for security."
"We mainly use Jamf Protect to protect staff computers from malware and antivirus."
"I rate the initial setup phase a ten on a scale of one to ten, where one is difficult, and ten is easy."
"Low performance requirements."
"The initial setup was straightforward. It took five minutes. I installed the solution myself."
"The main reason we had Webroot is that it was cost-effective for our clients."
"We've not had any issues with scalability. If an organization needs to expand, they can do so quite easily."
"The feature we found most valuable is the AI functionality for maintaining endpoint security. This is very powerful."
"It is excellent endpoint protection for mobiles that does everything it says it will."
"Auto-Remediation"
 

Cons

"The scope of improvement will fall under the support hierarchy that the tool offers to the latest version that Apple derives for any of the latest operating systems to launch."
"The solution’s stability could be improved."
"The tool's drawback is that it fails to offer support for Linux."
"The dependency on Jamf Pro or SIEM or SOAR for some automations and integrations could be reduced."
"The product's price is an area of concern where improvements are required."
"Beginners need initial training."
"The solution's integration with other tools is slow."
"I'd really like to see some data loss prevention (DLP) capabilities. More visibility into user activity on laptops would be helpful."
"Webroot Business Endpoint Protection needs to improve its ability to detect threats."
"Webroot Business Endpoint Protection needs to improve its ability to detect threats."
"Webroot is very reactionary. It waits until the threat is active within memory to try and detect it. They need better pre-execution detection and prevention."
"Its detection capability for certain attacks should be improved. It should have better and wider detection for certain malware attacks. It could also have some sort of RMN."
"Webroot Business Endpoint Protection needs to focus on how they can widen their area of scope by not just being an antivirus tool anymore. The shortcoming in the customization area of the tool needs improvement."
"The only complaint I have with Webroot is its inability to prevent UoD phishing and its inability to check against bots or block anti-attacks. Plus the URL server is in zero-definition."
"Unified threat management (UTM) integration."
"It doesn't do anything proactive. The virus has to hit the machine before it detects it."
 

Pricing and Cost Advice

"Jamf Protect is an expensive solution."
"It's significantly cheaper than other options like ApexOne."
"The product is not an averagely priced tool."
"The licensing costs are yearly and expensive."
"Jamf Protect costs double the price that we were paying before."
"I rate the product price as a five on a scale of one to ten, where one is a low price, and ten is a high price."
"With Webroot Business Endpoint Protection, I can select a yearly billing cycle."
"We are on an annual subscription for the use of Webroot Business Endpoint Protection."
"The pricing is high."
"Its cost is not much per month. Our price is a couple of bucks a user."
"I can't recall the exact pricing, but I believe there is a monthly fee of $20-30 per user."
"From a pricing standpoint, I would rate it a four out of five."
"I rate the product's pricing a three on a scale of one to ten, where one is cheap, and ten is expensive. There are no costs in addition to the product's standard licensing fees."
"Get a trial, then a multi-year license."
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
859,438 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
16%
University
13%
Financial Services Firm
9%
Healthcare Company
5%
Computer Software Company
17%
Real Estate/Law Firm
13%
Comms Service Provider
7%
Manufacturing Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Jamf Protect?
Jamf Protect searches incoming and outgoing traffic for malware to monitor the network for security.
What is your experience regarding pricing and costs for Jamf Protect?
The product is not an averagely priced tool. If the organization is fully on Apple's fleet, they can consider Jamf Protect, but it is quite costly. Jamf Protect is costly compared with any other so...
What needs improvement with Jamf Protect?
The dependency on Jamf Pro or SIEM or SOAR for some automations and integrations could be reduced. In-built automation and remediation of behavior-based threats would be beneficial enhancements.
What do you like most about Webroot Business Endpoint Protection?
I haven't observed any of the instabilities in the solution. It is a stable solution.
What is your experience regarding pricing and costs for Webroot Business Endpoint Protection?
Webroot Business Endpoint Protection is probably on the cheaper side, so I would rate their pricing a one or a two out of ten.
What needs improvement with Webroot Business Endpoint Protection?
Webroot Business Endpoint Protection needs to improve its ability to detect threats. It does not do what it's advertised to do. Real-time threat detection also doesn't work as it should.
 

Also Known As

No data available
Webroot SecureAnywhere Business Endpoint Protection
 

Overview

 

Sample Customers

Information Not Available
Mytech Partners
Find out what your peers are saying about Jamf Protect vs. OpenText Core Endpoint Protection​ and other solutions. Updated: June 2025.
859,438 professionals have used our research since 2012.