At Jamf, we practice what we preach.
We understand that company and employee data protection is the top priority for not only our organization, but for all organizations. That's why we ensure our devices are secured with Jamf Pro, because we can't secure yours if we don't secure ours.
Like most organizations, our employees want to know how we're securing their devices, what we can and cannot access, and that their private information remains just that, private.
Take a deeper dive into our security overview and then check out the frequently asked questions that our IT staff receives from our employees. We have a feeling that yours might be similar.
Jamf security overview
Securing Apple since 2002. Download our security overview to learn more about Jamf Pro's device management capabilities and framework. Download PDF
Choose how you host your server.
At the heart of Jamf Pro is a management server running on Tomcat and MySQL, that hosts the management console and communicates with your devices over HTTPS.
Jamf Pro is available as a hosted solution, or you can host it yourself on-premise using a macOS, Windows, or Linux server. Visit our System Requirements for details and learn how to best secure Jamf Pro.
Jamf Now customers enjoy the simplicity of a SaaS hosted solution and the same security of Jamf Cloud.
Secure server and services hosting.
If your organization is growing like ours, the best option is to host Jamf Pro in the cloud.
By allowing us to worry about the infrastructure, you'll enjoy:
- Your own Jamf Pro environment hosted in a data center in North America or Europe
- 99.9% uptime and 24/7 availability
- Security — industry-standard security and auditing practices
- Simplicity — environment is patched and always kept up-to-date
Security Frequently Asked Questions (FAQ)
We get asked a lot of questions, we’ve gathered them together to make it easier for you. This section is regularly updated, so be sure to check back.
Is our data encrypted?
Data in transit is encrypted using TLS with Perfect Forward Security (PFS), and data at rest uses industry standard AES-256 to encrypt fields in the database that contain sensitive information, such as passwords and FileVault individual recovery keys.
Is TLS always used?
Yes, Jamf Cloud and the latest versions of Jamf Pro installers no longer include support for SSL v3.0. For existing on-premise installations, instructions are available on Jamf Nation for removing support for SSL v3.0 and configuring supported cipher suites for Tomcat HTTPS connections:
How are our passwords stored?
Passwords for local Jamf Pro user accounts are hashed using SHA-512 with a unique, random salt for each user, and all other passwords are encrypted using industry standard AES-256 with a unique, random key for each database.
Where are Jamf Cloud data centers located?Jamf Cloud relies on Amazon Web Services (AWS) to provide infrastructure as a service (IaaS) within different geographic regions, including the United States and Germany. Data at rest remains in the region in which the Jamf Cloud instance was created.
Does Jamf use a secure Software Development Lifecycle (SDLC)?
Yes. We use an Agile methodology that incorporates cross-functional teams with members from Product Management, Engineering, Quality, and Technical Communications. Overarching Release and Quality processes ensure necessary oversight and consistency throughout the organization.
Does the Jamf Cloud hosting service have a SOC 2 Type 2 report?
We are currently preparing for a SOC 2 Type 2 report that is expected in 2017.
Does Jamf audit its security?
Jamf Pro is tested for common vulnerabilities prior to each public release, and independent third-party security assessments are periodically performed on key system components, including the Jamf Pro server and client binary. For Jamf Cloud, Jamf relies on the Amazon Web Services (AWS) Shared Responsibility Model to ensure the security of the underlying infrastructure that is provided by AWS: AWS Shared Responsibility Model
Can we undertake our own security testing?
Security testing on your own systems and networks is permitted within the terms of the End User License and Service Agreement (EULSA).
Have questions that we didn't cover? Please don't hesitate to reach out to us and talk security.