Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Funding/M&A

Apple Acquires Device Management Company Fleetsmith

Apple has acquired Fleetsmith, a San Francisco-based company that specializes in solutions designed to help organizations manage the Apple devices used by their employees.

Fleetsmith’s enterprise device management solution automates setup, patching, intelligence and security for Macs, iPhones, iPads and Apple TV devices.

Apple has acquired Fleetsmith, a San Francisco-based company that specializes in solutions designed to help organizations manage the Apple devices used by their employees.

Fleetsmith’s enterprise device management solution automates setup, patching, intelligence and security for Macs, iPhones, iPads and Apple TV devices.

“We’re thrilled to join Apple. Our shared values of putting the customer at the center of everything we do without sacrificing privacy and security, means we can truly meet our mission, delivering Fleetsmith to businesses and institutions of all sizes, around the world,” Fleetsmith said in a blog post announcing the acquisition.

Apple has not shared any information about the deal, but Fleetsmith’s blog post says that the company will continue to deliver its product to existing and new customers. It’s not uncommon for larger companies to acquire the technology of smaller firms, integrate it into their own solutions, and then terminate the smaller company’s products. However, that doesn’t appear to be the case with Apple’s acquisition of Fleetsmith, at least for now.

Financial terms of the deal have not been disclosed.

Founded in 2016, Fleetsmith has raised over $40 million, including $30 million in a Series B funding round last year.

Related: Corellium: Apple Sued Us After Failed Acquisition Attempt

Related: Macs in Enterprise Can Be Hacked on First Boot

Advertisement. Scroll to continue reading.

Related: Apple Releases Open Source Password Manager Resources

Related: Researcher Claims Apple Paid $100,000 for ‘Sign in With Apple’ Vulnerability

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cybersecurity Funding

SecurityWeek investigates how political/economic conditions will affect venture capital funding for cybersecurity firms during 2023.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.