The standard for Apple in Enterprise

We have seen the demand for Apple devices from our customers grow in recent times. Working with Jamf gives organisations the ability to let their employees choose the technology they want to work with.

We know organisations must ensure users’ have secure access to the resources they need and provide IT teams with a management solution that delivers the functionality they require to provide information security with the peace of mind that devices and data are protected at all times.

Regardless of the size or complexity of your organisation, we have an Apple business solution for you.

Trustmarque and Jamf

Trustmarque is a Jamf Gold Partner, the highest-level partner status. Working together we deliver effective and secure device management with a full range of management solutions to our customers. As we see customers diversify their choices in hardware and devices it’s important to offer a modern workplace offering to facilitate zero-touch device deployment and device security management for our customers.

Jamf Gold reseller - white

Safely connect your staff to the devices, applications and data they need

Jamf Connect

Simple user provisioning using cloud identity services

Multi-factor authentication

Multi-factor authentication

Users can access a single cloud identity on any Apple device to gain immediate access to the resources they need.

Account provisioning

Account provisioning

Whether it’s during setup or in day-to-day use, Connect ensures a single identity is being used to access a user’s device and applications – without the need to bind to Active Directory.

Identity management

Identity management

Connect provides IT administrators with the ability to keep an eye on all company devices and who is accessing them, when and from what device.

Password synchronization

Password synchronization

User’s cloud identity passwords are synchronized down to the local account level with Connect, even when the password is changed.

Jamf Private Access

Safely connect workers to the devices, apps and data they need to be productive

Jamf Connect and Jamf Private Access ensures organisations can secure users access to company resources whose devices are rarely being connected from within a traditional network perimeter.

Jamf Connect allows users to use their single identity and biometrics to access their Mac and cloud applications.

Jamf Private Access is a true Zero Trust Network Access solution that replaces legacy conditional access and VPN technology.

When a user authenticates into their device, the Jamf platform secures business connections while enabling non-business applications to route directly to the Internet, preserving end-user privacy and optimising network infrastructure, making deploying servers, managing certificates and configuring IP addresses redundant.

Jamf Private Access features:

  • Identity-centric security model
  • Application-based micro tunnels
  • Modern cloud infrastructure
  • Integration with your identity services
  • Risk-aware access policies
  • Unified access policy
  • Fast and efficient connectivity
  • Intelligent split tunnelling
  • Lightweight application

Jamf Pro

Enterprise Management Solution

As Apple device adoption continues to increase for organisations across the globe, the need for an enterprise Apple management solution has never been greater.

Jamf Pro is designed to automate device management for you while driving end-user productivity and creativity, leverages native Apple technology to preserve the Apple experience end-users know and love, and empowers IT professionals.

With same-day delivery of Apple operating system compatibility releases, you can rest assured you and your end users have immediate access to new productivity and management features.

Daily team management meeting

Jamf Protect

Maintain compliance. Prevent malware. Detect and remediate threats. Minimise impact on users.

Jamf Protect assists security and IT teams protect their organisation’s Mac devices, apps, and OS environment.

Prevent. Halt. Stop.


Using comprehensive insight, Jamf Protect prevents all known Mac-specific malware from running on your devices and quarantines them for later analysis.

finger print


Gain full visibility into security events on devices and halt sophisticated attacks on your Mac whether online, offline, or remote.



See granular insights of your Mac fleet’s activities for threat hunting and compliance, and always be aware when devices deviate from your OS normal configurations.



Isolating machines, eradicating unwanted files, and getting devices back into a trusted state after an alert is easy and automated, with minimal disruption to users and their devices.

Jamf Threat Defence

Protect your users, devices, and organisational data from malicious intent

Apple builds one of the strongest out-of-the-box secure platforms on the market. However, Apple is a growing platform target for determined attackers.

Jamf Protect helps maintain Mac endpoint compliance, address antivirus needs by preventing macOS malware, and detect and remediate Mac-specific threats.

Jamf Threat Defence protects iOS endpoints from being compromised through mobile threat detection and zero-day phishing prevention with a first-class app for notifications and remediation.

Together, Jamf Protect and Jamf Threat Defence form a complete purpose-built solution to protect Apple users from malicious intent — all while maintaining minimal impact to the end-user experience.

Jamf Threat Defence features:

  • Advanced machine
  • In-network protection
  • Real-time insights
  • Unrivalled integrations
  • User privacy
  • Any device and ownership model

Jamf Data Policy

Automate, enforce and manage usage policies and data consumption

Device management requires more than just the basics, especially for businesses supporting remote and hybrid workers. Corporate mobile devices provide the freedom to work anytime, anywhere, but the rise of streaming services is causing data pools to drain rapidly and go against acceptable usage policies for remote users.

Jamf Data Policy offers a new level of management capability. It takes the notion of policies even further and empowers organisations to enforce acceptable usage policies to eliminate shadow IT and block risky content — while also managing data consumption with real-time analytics and granular reporting.

Jamf Data Policy features:

  • Data capping and alerts
  • Content filtering
  • Roaming
  • Compression
  • Fully customizable
  • Any device and ownership model

Cloud Security Report 2021

A close look at the threats that will impact your organization’s data via your most critical assets — your endpoints, users, and your remote access tools — plus practical advice on how to configure business tools to ensure fast and safe connectivity for all users in 2021.

Download the eBook

How Apple Enterprise Management Goes Beyond Mobile Device Management

How Apple Enterprise Management Goes Beyond Mobile Device Management

Download the eBook to discover why a scalable and automated solution — designed specifically for Apple — is the best method to connect, manage and protect an entire Apple fleet. And in the new landscape of remote workforces with a rise in BYOD/employee choice programs, Apple devices — whether iPhone, iPad, or Mac — require management that is designed specifically for their operating systems.

Jamf case study

Scrive Case Study

Improved efficiency and a better security posture with Jamf

Scrive is a rapidly growing global electronic signature and ID business. As is often the case, with rapid growth came new challenges. Scrive needed to scale its operations from eight to more than 100 remote employees around the world in a flexible and secure manner. Tim Ellis, Scrive’s CISO found a solution that empowered them to do exactly that. Read more…