Tech partner spotlight: Jamf and ZScaler
Learn how integrating Jamf and Zscaler improves your security posture with threat detection and remediation.

Users now work from anywhere and require seamless access to websites, SaaS apps and private apps — whether they’re hosted in the cloud or a data center. To help workforces be productive and secure, organizations need to think beyond the network perimeter in favor of simpler, safer, zero-trust connectivity.
Improve your security with Jamf and Zscaler
When Jamf and Zscaler work together, this enables joint customers of Zscaler Client Connector (ZCC) and Jamf Security Cloud to utilize Jamf risk score assessments for their managed macOS devices within their ZCC access policies.
This integration, designed for threat detection, allows for the identification of various threats like phishing sites, spam, malicious apps and outdated operating systems, which can trigger risk scores from Jamf Protect. These Jamf-determined risk scores can then be utilized by ZCC to initiate preventive actions, including blocking access to protected resources for devices with compromised risk postures.
Jamf Security Cloud enables continuous monitoring and identification of security risks on managed macOS devices. Admins can then block access to protected resources on devices with compromised risk postures, ensuring the security of their resources and providing a seamless integration with existing infrastructure.
Key benefits:
-
Support in identifying and mitigating security threats
-
Strong security policy enforcement
-
Secure access to protected resources
-
Effective macOS device management
-
Improved overall security posture
How does the integration work?
Jamf enhances Zscaler’s network access policies, allowing organizations to use Jamf’s macOS security insights to restrict remote access to sensitive corporate resources. Together, they allow only authorized users to securely access your company data.
Using this integration is simple:
-
The device is activated in Jamf Security Cloud with Jamf device identity and security capabilities.
-
The Jamf Trust app and Zscaler client are installed.
-
Jamf Security Cloud continuously evaluates device posture and determines risk level based on user activity. Note that risk evaluation is dependent on Jamf security capabilities owned by the customer.
-
Zscaler observes risk score changes provided by Jamf on the device.
-
Zscaler access policies approve/deny access to resources.
Jamf provides alerts from a security platform designed with Apple devices in mind. And now Zscaler customers who use Jamf can leverage the integration to enhance access policy decisions.
Integrate with and extend the Jamf platform with our marketplace apps.