We compared Jamf Connect and Prisma Access by Palo Alto Networks across several parameters based on our users' reviews. After reading the collected data, you can find our conclusion below:
Comparison Results: When comparing Jamf Connect and Prisma Access by Palo Alto Networks, Jamf Connect provides a user-friendly setup process and comprehensive documentation. It prioritizes accessibility, convenience, and password management. However, users have encountered issues with device restarts and minor glitches. On the other hand, Prisma Access offers robust security features, global performance, and integration capabilities with other Palo Alto platforms. It may be more challenging to set up and configure, and some users have faced difficulties with the user interface and updates. Jamf Connect is considered reasonably priced, while Prisma Access is seen as higher-priced but worth it for its quality. Customer support for both products has received mixed feedback, with room for improvement according to some users.
"It's connection with Azure is the most valuable. It is easy to deploy and connect."
"Jamf Connect allows for easy and seamless joining of Mac devices to Azure AD, eliminating the need for third-party involvement or support engineer assistance."
"Jamf Connect is a pretty simple and straightforward tool overall."
"The tool supports different types of authentication. It also integrates seamlessly if you are using other Jamf products."
"The most valuable feature is ease of access. It's convenient to do things like resetting passwords. Previously, users were bound to their domain. We had to bind the user to the domain and log them in through the AD. Now, using Jamf Connect, we don't face any of these challenges. Resetting passwords is hassle-free so we can regularly rotate passwords according to best practices."
"Jamf Connect is an identity provider, and once you log in, you will have all the device's access."
"I would rate the product's scalability an eight out of ten."
"It's a good and stable tool, so you should use it if you have a need."
"You have the ability to create your own expressions for your data. Palo Alto understands that DLP is not the same for all consumers. You might have a particular need to fulfill, and they give you the opportunity to create a custom expression to match the specific format that you have. For a confidential file property that you have in your files, you can add a metadata field. It gives you that opportunity to create that."
"A feature I've found very helpful is run time security because most of the products on the market will look at security during the build time, and they don't really look at what happens once you're going into production."
"The solution is not very complex and is easy to manage for people who may or may not have knowledge about Palo Alto Networks."
"Prisma Access protects all app traffic, so that users can gain access to all apps and that's very important because we need to be able to access everything. It also allows us to access non-web apps; anything internal that we need access to, we can access."
"It protects all app traffic so that users can gain access to all apps. Unlike other solutions that only work from ports 80 and 443, which are predominantly for web traffic, Prisma Access covers all protocols and works on all traffic patterns... The most sophisticated attacks can arise from sources that are not behind 80/443."
"It supports auto-scaling for mobile users. It auto-scales depending on the mobile user traffic. For example, if 1,000 people are working from home today, and tomorrow, the number increases to 2,000, it is not going to be an issue."
"The most valuable feature of Prisma Cloud-native, in my opinion, is that it assists in identifying, analyzing, and remediating vulnerabilities."
"The most valuable feature is the ability to join your network and provide access through the VPN."
"The logs are an area with a shortcoming."
"We've had some issues when users restart their devices because the device asks for credentials afterward. Jamf Connect asks for a username, password, and MFA."
"The solution's UI could be more user-friendly for the setup process."
"The solution’s technical support is bad and should be improved."
"Overall, there is a lack of consistent experience sometimes with some of their features."
"When a Mac is joined to Azure, the generic Pro console in the MDM should accurately display the Mac as joined to Azure in the inventory section. Currently, it shows "no domain account found," which can be misleading."
"We have faced issues with the product's configuration. If we use the tool with other business manager solutions, then there is the issue of naming conventions. The tool needs to be careful with newer updates so that it doesn't break any of the existing configurations."
"The solution needs to improve its licensing."
"It applies commits to the firewalls slowly. There isn't an API you can use for anything. We've previously had trouble with the egress IP addresses though we expressed to engineering that those mustn't change. They changed several times without warning, causing a lot of headaches."
"The solution’s stability could be improved."
"The product's price is an area of concern where improvements are required. The solution's price should be lowered."
"They automatically update and they should give us time to fully understand what they're updating so that we can make sure it doesn't impact production."
"Their next release should provide solutions for the mobile environment."
"It's not very easy to use. Sometimes it's buggy and there are problems when doing updates. The user interface is okay, but some configuration items are difficult. I would like it to be less buggy and easier to configure, to better streamline the user experience."
"We've run into some challenges, having hit a lot of bugs over the past year in the deployment of GlobalProtect. We've had our fair share of issues that I haven't been happy with. We're working with the support organization to remediate them and waiting for updated releases. The response on getting the bugs fixed has not been what I would consider adequate for a product like this."
"There is some particular traffic that the security team wants to filter out and apply their own policies and they cannot."
More Prisma Access by Palo Alto Networks Pricing and Cost Advice →
Jamf Connect is ranked 8th in ZTNA as a Service with 10 reviews while Prisma Access by Palo Alto Networks is ranked 2nd in ZTNA as a Service with 55 reviews. Jamf Connect is rated 9.4, while Prisma Access by Palo Alto Networks is rated 8.4. The top reviewer of Jamf Connect writes "Enhances user convenience by streamlining login processes". On the other hand, the top reviewer of Prisma Access by Palo Alto Networks writes "Integration with Palo Alto platforms such as Cortex Data Lake and Autofocus gives us visibility into our attack surface". Jamf Connect is most compared with Zscaler Zero Trust Exchange, VMware Workspace ONE, Netskope Private Access, Microsoft Intune and Zimperium, whereas Prisma Access by Palo Alto Networks is most compared with Zscaler Zero Trust Exchange, Netskope , Cisco Umbrella, Zscaler Internet Access and Prisma SD-WAN. See our Jamf Connect vs. Prisma Access by Palo Alto Networks report.
See our list of best ZTNA as a Service vendors.
We monitor all ZTNA as a Service reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.