Tech partner spotlight: Jamf and ZScaler

Learn how integrating Jamf and Zscaler improves your security posture with threat detection and remediation.

September 27 2024 by

Brianna Judge

White Jamf and Zscaler logos on a blue gradient background

Users now work from anywhere, and require seamless access to websites, SaaS apps, and private apps, whether they’re hosted in the cloud or a data center. To help workforces be productive and secure, organizations need to think beyond the network perimeter in favor of simpler, safer, zero-trust connectivity.

Improve your security with Jamf and Zscaler

When Jamf and ZScaler work together, this enables joint customers of ZScaler Client Connector (ZCC) and Jamf Security Cloud to utilize Jamf risk score assessments for their managed macOS and iOS devices within their ZCC access policies.

This integration, designed for threat detection, allows for the identification of various threats like phishing sites, spam, malicious apps and outdated operating systems, which can trigger risk scores. These Jamf-determined risk scores can then be utilized by ZCC to initiate preventive actions, including blocking access to protected resources for devices with compromised risk postures.

Jamf Security Cloud enables continuous monitoring and identification of security risks on managed macOS and iOS device. Customers can then block access to protected resources for devices with compromised risk postures, ensuring the security of their resources and providing a seamless integration with existing infrastructure.

Key benefits:

  • Support in identifying and mitigating security threats
  • Strong security policy enforcement
  • Secure access to protected resources
  • Effective macOS device management
  • Improved overall security posture

How does the integration work?

Jamf enhances Zscaler’s network access policies, allowing organizations to use Jamf’s security insights about Apple devices to restrict remote access to sensitive corporate resources. Together, they allow only authorized users to access your data.

Using this integration is simple:

  1. The device is activated in Jamf Security Cloud with Jamf Device Identity and security capabilities
  2. The Jamf Trust app and Zscaler client are installed.
  3. Jamf Security Cloud continuously evaluates device posture and determines risk level based on user activity. Note that risk evaluation is dependent on Jamf security capabilities owned by the customer.
  4. Zscaler observes risk score changes provided by Jamf on the device.
  5. Zscaler access policies approve/deny access to resources.

Jamf provides a security platform designed with Apple devices in mind. And now Zscaler customers who use Jamf can use their Jamf Protect integration to enhance access policy decisions.

About

Jamf

Jamf’s purpose is to simplify work by helping organizations manage and secure an experience that end users love and organizations can rely on. Jamf is the only company in the world that provides a complete management and security solution for an Apple-first environment that is enterprise secure, consumer simple and protects personal privacy. To learn more, visit www.jamf.com.

ZScaler

Zscaler is universally recognized as the leader in zero trust. Leveraging the largest security cloud on the planet, Zscaler anticipates, secures and simplifies the experience of doing business for the world's most established companies. To learn more, visit www.zscaler.com.

Integrate with and extend the Jamf platform with our marketplace apps.