Jamf Security
A Wandrea Company
Data Capping
Data Capping controls
(incl. caps by country) - Configure data caps in MB when data thresholds have been reached. Set caps by user, group or country.
Data Alerts in MB
Set up fully customisable alerts and notifications for all your users and admins.
Usage Reports
Monitor usage in real-time and react to any spikes in data consumption.
Tethering
Understand how much data is being used on tethered traffic, to help you make policy decisions.
Jamf
Data Policy
Real-time Policy Control
Configure cap policies to be applied when data usage thresholds are reached. Customise alerts and notifications for users and admins.
Fully Customisable
Apply policies to individual users, groups, or the organisation as a whole. Tailor the predefined content filtering categories with customized allow and block lists.
Content Filtering
Set intelligent rules to prevent inappropriate websites and apps from being accessed. Ensure that usage is compliant with HR, IT, and regulatory policies.
Network Aware
Create and enforce policies for different networks. Data Policy automatically detects the network to allow Wi-Fi users to have content filtering applied without data management.
Any mobile device,
Any ownership model
Data Policy supports mobile devices and laptops, allowing you to choose the device that’s best for your business.
Real-time Insights
Monitor data usage without waiting for the bill using Jamf’s real-time insights and usage analysis tools.
Jamf Threat Defence
Powerful endpoint security
Threat Defense detects and remediates the broadest range of endpoint threats including device vulnerabilities, malware and risky apps. Comprehensive risk assessments are continuously performed to identify threats, enabling security policies to be enforced in real-time.
Adaptive access to your applications
Elevate your security posture by allowing only secure and trusted devices to access business applications. Threat Defense continously monitors a broad set of telemetry and contextual inputs that can be used to prevent application access when an endpoint is compromised or at high risk. Adaptive access policies can be enforced natively through the Zero Trust Network Access solution or Jamf’s management solution, Jamf Pro.