Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybersecurity Funding

Apple Device Management Firm Fleetsmith Raises $30 Million

Fleetsmith, a San Francisco-based company that provides device management solutions for Apple products, on Monday announced that it raised $30 million in a Series B funding round.

Fleetsmith, a San Francisco-based company that provides device management solutions for Apple products, on Monday announced that it raised $30 million in a Series B funding round.

The round was led by Menlo Ventures, with participation from Tiger Global Management, Upfront Ventures and Harrison Metal. This Series B brings the total raised by the company to over $40 million.

The funding will be used by Fleetsmith to improve its platform, expand its international presence, and hire people in various roles.

Fleetsmith’s solutions are designed to help organizations automate device setup, inventory, patching and security for their Apple devices. The company’s flagship product, Fleetsmith Intelligence, supports not only macOS devices, but also devices running iOS and tvOS.

The firm on Monday also unveiled a new admin console designed to provide more advanced visualization and performance capabilities. The new console, scheduled to become available in the next few months, will also introduce bulk editing and other features that should make it easier for system administrators to manage a large number of devices.

Fleetsmith says the new console will also anticipate common tasks, such as adding new devices.

“We were immediately impressed by Fleetsmith’s customer and product-centric mentality,” said Naomi Pilosof Ionita, a Menlo Ventures partner who will join Fleetsmith’s board of directors. “They are solving real pain points around device management and their product empowers IT, management, and security teams. Customers recognize the value of Fleetsmith in minutes—not weeks or months. It’s the way a modern product built for IT should work.”

Related: Intel Launches IoT Device Management Service

Advertisement. Scroll to continue reading.

Related: Macs in Enterprise Can Be Hacked on First Boot

Related: Attackers Target iPhones Using Open Source MDM Solution

Related: Researchers Find ‘Authentication Weakness’ in Apple’s Device Enrollment Program

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cybersecurity Funding

SecurityWeek investigates how political/economic conditions will affect venture capital funding for cybersecurity firms during 2023.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.