We compared Jamf Connect and Prisma Access by Palo Alto Networks across several parameters based on our users' reviews. After reading the collected data, you can find our conclusion below:
Comparison Results: When comparing Jamf Connect and Prisma Access by Palo Alto Networks, Jamf Connect provides a user-friendly setup process and comprehensive documentation. It prioritizes accessibility, convenience, and password management. However, users have encountered issues with device restarts and minor glitches. On the other hand, Prisma Access offers robust security features, global performance, and integration capabilities with other Palo Alto platforms. It may be more challenging to set up and configure, and some users have faced difficulties with the user interface and updates. Jamf Connect is considered reasonably priced, while Prisma Access is seen as higher-priced but worth it for its quality. Customer support for both products has received mixed feedback, with room for improvement according to some users.
"Jamf Connect is an identity provider, and once you log in, you will have all the device's access."
"The most valuable feature is ease of access. It's convenient to do things like resetting passwords. Previously, users were bound to their domain. We had to bind the user to the domain and log them in through the AD. Now, using Jamf Connect, we don't face any of these challenges. Resetting passwords is hassle-free so we can regularly rotate passwords according to best practices."
"It's connection with Azure is the most valuable. It is easy to deploy and connect."
"I would rate the product's scalability an eight out of ten."
"It's a good and stable tool, so you should use it if you have a need."
"The tool supports different types of authentication. It also integrates seamlessly if you are using other Jamf products."
"Jamf Connect allows for easy and seamless joining of Mac devices to Azure AD, eliminating the need for third-party involvement or support engineer assistance."
"The solution is scalable."
"The tool's consolidation is pretty quick."
"It's great that we can make sure a machine meets the minimum requirements before users are allowed to log in."
"Prisma Access protects all app traffic, so that users can gain access to all apps and that's very important because we need to be able to access everything. It also allows us to access non-web apps; anything internal that we need access to, we can access."
"The solution has all its capabilities in a single cloud delivery platform which is great and it provides overall good protection."
"The most valuable features of the solution stem from the fact that it offers stability and scalability while being a very secure product."
"The features I find most valuable is WildFire, user integration, and the basic technology features."
"We have an application called ADEM that helps us troubleshoot network-related issues. It helps us to isolate an issue whether it is on the ISP level, endpoint level, or system access level."
"The performance is good."
"Overall, there is a lack of consistent experience sometimes with some of their features."
"The solution's UI could be more user-friendly for the setup process."
"The configuration could be faster."
"We have faced issues with the product's configuration. If we use the tool with other business manager solutions, then there is the issue of naming conventions. The tool needs to be careful with newer updates so that it doesn't break any of the existing configurations."
"We've had some issues when users restart their devices because the device asks for credentials afterward. Jamf Connect asks for a username, password, and MFA."
"The logs are an area with a shortcoming."
"The solution needs to improve its licensing."
"Jamf Connect is beginning to implement Multi-Factor Authentication for offline authentication, but the setup documentation is insufficient."
"Sometimes, we encountered a portal crash. When we told Palo Alto they said it might be the browser or cache, but I think they need to improve it on their side."
"If you compare Prisma SaaS against other products, such as Cloud Log, it's a little bit tricky to understand, but it offers different functionality that other products don't have. From a user usability point of view, you need some training for this product, as an admin, you need a couple of demos."
"It is a managed firewall. When you run into issues and have to troubleshoot, there is a fair amount of restriction. You run into a couple of restrictions where you don't have any visibility on what is happening on the Palo Alto managed infrastructure, and you need to get on a call to get technical assistance from Palo Alto's technical support. You have to get them to work with you to fix the problem. I would definitely like them to work on the visibility into what happens inside Palo Alto's infrastructure. It is not about getting our hands onto their infrastructure to do troubleshooting or fixing problems; it is just about getting more visibility. This will help us in guiding technical support folks to the area where they need to work."
"Dependencies of applications sometimes is a bit confusing."
"They automatically update and they should give us time to fully understand what they're updating so that we can make sure it doesn't impact production."
"Palo Alto needs to improve the GlobalProtect agent to work as a secure web gateway agent, not only as a VPN agent because some companies would want only a secure gateway. They wouldn't want a full VPN. So, Palo Alto has to make the VPN agent work as a secure web gateway agent for those customers who want only the secure web gateway solution."
"We are using the SaaS offering. We use our applications for microservices. We use Twistlock to scan containers, and it displays these results in Prisma, which is a good feature because we can see vulnerabilities with respect to these containers. We can see everything in a very detailed manner. However, when you have different environments for a single application, such as DEV, QA, PROD, and TEST, all these environments run multiple containers, which can lead to a very high number of containers. In such a scenario, it shows you the alerts for all those containers that have vulnerabilities. If you show the results of all the containers that share the same image, it is not going to add any value. Therefore, they should narrow down the alerts based on a container. It should show information for a single container. Otherwise, the person who is looking at the results gets the impression that he has to fix all these issues. This is something that they can improve."
"While Palo Alto has understood the essence of building capabilities around cloud technology and have come up with a CASB offering, that is a very new product. There are other companies that have better offerings for understanding cloud applications and have more graceful controls. That's something that Palo Alto needs to work on."
More Prisma Access by Palo Alto Networks Pricing and Cost Advice →
Jamf Connect is ranked 9th in ZTNA as a Service with 10 reviews while Prisma Access by Palo Alto Networks is ranked 1st in ZTNA as a Service with 55 reviews. Jamf Connect is rated 9.4, while Prisma Access by Palo Alto Networks is rated 8.4. The top reviewer of Jamf Connect writes "Enhances user convenience by streamlining login processes". On the other hand, the top reviewer of Prisma Access by Palo Alto Networks writes "Integration with Palo Alto platforms such as Cortex Data Lake and Autofocus gives us visibility into our attack surface". Jamf Connect is most compared with Zscaler Private Access, Microsoft Intune, VMware Workspace ONE, Netskope Private Access and Zimperium, whereas Prisma Access by Palo Alto Networks is most compared with Netskope , Cisco Umbrella, Zscaler SASE, Zscaler Private Access and Prisma SD-WAN. See our Jamf Connect vs. Prisma Access by Palo Alto Networks report.
See our list of best ZTNA as a Service vendors.
We monitor all ZTNA as a Service reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.