Kandji Rebrands as Iru, Launches AI-Powered IT Security Platform for Modern Enterprises

Kandji Rebrands as Iru, Launches AI-Powered IT Security Plat - Major Rebranding and Platform Expansion Kandji, previously kno

Major Rebranding and Platform Expansion

Kandji, previously known as a popular Apple device management solution, has undergone a significant transformation into Iru, according to recent reports. Sources indicate the rebranding represents more than just a name change—it signals a fundamental shift toward becoming an AI-powered IT and security platform designed for contemporary workforce needs. The company is reportedly moving beyond its Apple management roots to embrace a broader vision that unifies identity, endpoint security, and compliance automation within a single platform.

Addressing IT Tool Sprawl with Unified Solution

Industry analysts suggest the rebranding comes at a critical time when organizations are increasingly struggling with tool proliferation. Reports show that nearly half of IT leaders identify overlapping tools as a primary challenge, creating inefficiencies and security gaps. Iru’s approach, according to company statements, aims to “collapse the stack” by integrating multiple functions under a unified interface. Instead of managing separate systems for different tasks, the platform promises to provide comprehensive visibility and control through what the company describes as “one pane of glass.”

AI-Powered Context Model and Core Products

The report states that artificial intelligence serves as the foundation of Iru’s new platform. Iru AI applies automated intelligence across identity, endpoint, and compliance domains, transforming raw data into actionable insights. The platform’s Context Model reportedly creates a dynamic map connecting users, devices, applications, and policies, turning this contextual understanding into operational intelligence and audit-ready documentation.

Six core products are launching with the new platform, according to the announcement: Workforce Identity, Endpoint Management, Endpoint Detection and Response, Vulnerability Management, Compliance Automation, and Trust Center. Analysts suggest these products are designed to integrate seamlessly while maintaining modular flexibility, allowing organizations to adopt individual components or the complete suite based on their specific requirements.

Leadership Vision and Customer Transition

“The stack is the problem. With Iru, we collapse the stack and give IT & security teams time and control back,” said Adam Pettit, CEO of Iru, in the company‘s statement. He further explained that “what made Kandji work was elegance through abstraction and automation as a force multiplier. With Iru, we’ve translated that approach into a new platform for the AI era.”

For existing Kandji customers, sources indicate the transition to Iru will occur gradually, with enhanced capabilities becoming available through the new platform. The company has emphasized that current systems will remain familiar to Kandji users while expanding support to include Windows and Android devices, though Apple reportedly remains central to the administrative experience.

Industry Implications and Future Outlook

The move reflects broader industry trends toward consolidation and AI integration in enterprise technology. As organizations seek to streamline operations and enhance security postures, platforms that unify traditionally separate functions are gaining traction. Iru’s emergence positions the company to compete in the rapidly evolving market for comprehensive IT and security solutions, particularly as artificial intelligence becomes increasingly embedded in enterprise operations.

Existing Kandji customers can reportedly expect a smooth transition process, with the company maintaining its commitment to Apple-focused organizations while expanding its capabilities to support multi-platform environments. The full impact of this strategic shift will likely become clearer as more organizations adopt the expanded platform and share their experiences with the unified approach to IT management and security.

References & Further Reading

This article draws from multiple authoritative sources. For more information, please consult:

This article aggregates information from publicly available sources. All trademarks and copyrights belong to their respective owners.

Note: Featured image is for illustrative purposes only and does not represent any specific product, service, or entity mentioned in this article.

Leave a Reply

Your email address will not be published. Required fields are marked *