Mobile Threat
Defense
Comprehensive protection of your devices, users and applications with Jamf's leading security capabilities.
Mobile Threat
Defense
Comprehensive protection of your devices, users and applications with Jamf's leading security capabilities.
Mobile Threat
Defense
Comprehensive protection of your devices, users and applications with Jamf's leading security capabilities.
What is Mobile Threat Defense?
Cloud services and mobility have completely changed the way employees work, providing speed and flexibility in accessing information, but also exposing enterprises to new threat vectors, including mobile-based malware, phishing, cryptojacking and more. As your employees go mobile, so does your data, and businesses need a security solution that provides comprehensive protection against both endpoint and network level threats.
Optus has partnered with Jamf to offer an advanced Mobile Threat Defense solution with comprehensive security against device, app, network and content risks. Jam Threat Defense is a purpose built solution to help protect your organisation from cloud and mobile threats, while minimising impact to the end-user experience.
Why choose Jamf
Powerful endpoint security
Mobile Threat Defense detects and remediates a broad range of endpoint threats including device vulnerabilities, malware, Man-In-The-Middle attacks and potentially risky apps. Comprehensive risk assessments are continuously performed to identify threats, enabling security policies to be enforced in real-time.


Network defenses protect users and data
Potential to stop attacks before they begin with in-network defenses. Content protection blocks malicious and unfamiliar zero-day phishing sites (such as those aiming to capture business credentials).

Adaptive access to your applications
Boost your security by only allowing secure and trusted devices to access business applications. Adaptive access polices can be enforced natively via a Zero Trust Network Access solution.


Comprehensive threat detection and prevention
Zero-day network prevention
Mobile Threat Defense can identify and block sophisticated attacks on the network, including zero-day phishing attempts, command and control communication and cyrptojacking. This service works with any app, web browser, email, social media and SMS.
Real-time risk assessments
Mobile Threat Defense continuously evaluates endpoint risk from malicious profiles and vulnerable operation systems, enabling organisations to quickly identify devices that breach compliance.
Detailed app insights
Mobile Threat Defense provides advanced app analytics that can be used for both app vetting workflows and security investigations. A risk score and detailed report is provided for every app, that provides information on user and organisational data at risk.
Dynamic data encryption
Mobile Threat Defense helps prevent WiFi infrastructure from exposing sensitive data by using real-time encryption. Data encryption operates quietly in the background without user interaction required.
Technical overview
Jamf Mobile Threat Defense is a comprehensive mobile security solution installed in the end user’s device via an application and in the network. Working with Jamf, the overall Optus solution, identifies and rates the threats into four categories:
- Configuration vulnerabilities: Outdated devices and vulnerable OS
- Infrastructure Threats: MITM and risky WiFi
- App Risks: Malware, vulnerable code and access permissions
- Data Attacks: Phishing and network traffic monitoring
- Analytics are supplied from the application and in-network to a portal which allows admins to configure, analyse and control the solution.
- Specifications
Endpoint Application
The Jamf application is installed on end user devices, and provides active detection of cyber threats, real-time notifications and reports to administrators and employees.In-network Protection
Block zero-day threats like phishing sites and malicious domains more quickly.
MI:RIAM Engine
Advanced machine learning and threat intelligence engine which identifies and addresses potential threats
Unrivalled Integrations
With a number of UEM & SIEM partnerships, plus the Jamf risk API can help maximise existing security investments and produce more comprehensive threat insights.
UEM Connector
An optional component of the Jamf architecture, which connects with your UEM, EMM, orMDM solution to provide remote, low-touch deployment additional security features such as conditional access and integrated compliance policies.
Device Support
Jamf works across variouscarriers and is available on mobile device operating systems including iOS, Windows 10 and Android.