Information Security

At Jamf, we practice what we preach.

Cloud Security

Security is built in to all Jamf products. We employ numerous industry-leading security controls to safeguard your data including:

Product Security

We understand that company and employee data protection is the top priority for not only our organization, but for all organizations.

Secure development

Jamf’s engineering team follows a secure software development lifecycle policy which addresses the areas of preliminary analysis or feasibility study; risk identification and mitigation; systems analysis; technical design; development; quality assurance and acceptance testing; implementation; and post-implementation maintenance and review. This methodology ensures that the software will be adequately documented and tested before it is used in customer environments.

Availability & Business Continuity

Business continuity

Jamf Cloud is built on industry leading platforms that offer cloud availability and dependability. We monitor system availability in real-time to ensure compliance with availability and uptime commitments. In addition, built-in redundancies and disaster recovery plans are in place and tested periodically.

System status

For high-level Jamf Cloud availability information, visit our Jamf Cloud Status page. Refer to our Hosted Services Availability Commitment to learn more about our customer’s use and access to Jamf’s Hosted Services.

Certifications

View our corporate compliance certifications and initiatives or request security questionnaires and/or assurance reports (CAIQ, SOC 2, ISO certificate).