We compared Jamf Connect and Prisma Access by Palo Alto Networks across several parameters based on our users' reviews. After reading the collected data, you can find our conclusion below:
Comparison Results: When comparing Jamf Connect and Prisma Access by Palo Alto Networks, Jamf Connect provides a user-friendly setup process and comprehensive documentation. It prioritizes accessibility, convenience, and password management. However, users have encountered issues with device restarts and minor glitches. On the other hand, Prisma Access offers robust security features, global performance, and integration capabilities with other Palo Alto platforms. It may be more challenging to set up and configure, and some users have faced difficulties with the user interface and updates. Jamf Connect is considered reasonably priced, while Prisma Access is seen as higher-priced but worth it for its quality. Customer support for both products has received mixed feedback, with room for improvement according to some users.
"Jamf Connect allows for easy and seamless joining of Mac devices to Azure AD, eliminating the need for third-party involvement or support engineer assistance."
"Jamf Connect is an identity provider, and once you log in, you will have all the device's access."
"The solution is scalable."
"The most valuable feature is the synchronization of passwords with a local password, which works well."
"I would rate the product's scalability an eight out of ten."
"It's connection with Azure is the most valuable. It is easy to deploy and connect."
"The tool supports different types of authentication. It also integrates seamlessly if you are using other Jamf products."
"Jamf Connect is a pretty simple and straightforward tool overall."
"Overall, the cost savings, ease of deployment, and better VPN user experience and performance are valuable."
"I like it because it's very easy to use. You install the client and you have to know your gateway, but that's something we give to our users. Beyond that, it takes about three seconds to train them on how to use it. And it just works well. That's great for us because it means less administrative time."
"Prisma helped us build a moat around our production systems. It's now impossible to log into our production from a non-MDM laptop. Prisma Access provides decent security overall."
"The solution's most valuable features were the model's reduced complexity on the client side and its capability to provide security."
"You have the ability to create your own expressions for your data. Palo Alto understands that DLP is not the same for all consumers. You might have a particular need to fulfill, and they give you the opportunity to create a custom expression to match the specific format that you have. For a confidential file property that you have in your files, you can add a metadata field. It gives you that opportunity to create that."
"The visibility perspective is pretty cool. If I want to know how much data is being used for a specific project, I can look at how much data has been used, from which region, and which users have been connected. That visibility is very good so that I can see how many licenses we have and how many are used."
"A feature I've found very helpful is run time security because most of the products on the market will look at security during the build time, and they don't really look at what happens once you're going into production."
"The solution is not very complex and is easy to manage for people who may or may not have knowledge about Palo Alto Networks."
"The solution’s technical support is bad and should be improved."
"When a Mac is joined to Azure, the generic Pro console in the MDM should accurately display the Mac as joined to Azure in the inventory section. Currently, it shows "no domain account found," which can be misleading."
"The logs are an area with a shortcoming."
"The solution's UI could be more user-friendly for the setup process."
"The solution needs to improve its licensing."
"We've had some issues when users restart their devices because the device asks for credentials afterward. Jamf Connect asks for a username, password, and MFA."
"We have faced issues with the product's configuration. If we use the tool with other business manager solutions, then there is the issue of naming conventions. The tool needs to be careful with newer updates so that it doesn't break any of the existing configurations."
"Jamf Connect is beginning to implement Multi-Factor Authentication for offline authentication, but the setup documentation is insufficient."
"Though the monitoring is fine, the solution should improve its application graphs and interface monitoring."
"They automatically update and they should give us time to fully understand what they're updating so that we can make sure it doesn't impact production."
"Sometimes, we encountered a portal crash. When we told Palo Alto they said it might be the browser or cache, but I think they need to improve it on their side."
"It applies commits to the firewalls slowly. There isn't an API you can use for anything. We've previously had trouble with the egress IP addresses though we expressed to engineering that those mustn't change. They changed several times without warning, causing a lot of headaches."
"They can add some new characteristics. For example, when an incident triggers, they can automatically send a template for a particular match that is related to the policy. We don't have that right now. It is something to improve. There could be more automation for certain actions. For example, for a particular group, it can send an administrator alert to their manager. It was one of the concerns of our customers."
"The solution needs to be more compatible with other solutions. This is specifically a problem for us when it comes to healthcare applications. They have proprietary connection types and things of that nature that make compatibility a challenge sometimes."
"Palo Alto needs to improve the GlobalProtect agent to work as a secure web gateway agent, not only as a VPN agent because some companies would want only a secure gateway. They wouldn't want a full VPN. So, Palo Alto has to make the VPN agent work as a secure web gateway agent for those customers who want only the secure web gateway solution."
"The price can be reduced to make it more competitive."
More Prisma Access by Palo Alto Networks Pricing and Cost Advice →
Jamf Connect is ranked 8th in ZTNA as a Service with 10 reviews while Prisma Access by Palo Alto Networks is ranked 2nd in ZTNA as a Service with 57 reviews. Jamf Connect is rated 9.4, while Prisma Access by Palo Alto Networks is rated 8.2. The top reviewer of Jamf Connect writes "Enhances user convenience by streamlining login processes". On the other hand, the top reviewer of Prisma Access by Palo Alto Networks writes "Integration with Palo Alto platforms such as Cortex Data Lake and Autofocus gives us visibility into our attack surface". Jamf Connect is most compared with Zscaler Zero Trust Exchange, VMware Workspace ONE, Netskope Private Access, Microsoft Intune and Zimperium, whereas Prisma Access by Palo Alto Networks is most compared with Zscaler Zero Trust Exchange, Netskope , Cisco Umbrella, Zscaler Internet Access and Prisma SD-WAN. See our Jamf Connect vs. Prisma Access by Palo Alto Networks report.
See our list of best ZTNA as a Service vendors.
We monitor all ZTNA as a Service reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.