Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET

It's Official: Samsung Will Not Acquire Blackberry

A week ago, a news report indicating that Samsung would purchase struggling smartphone maker Blackberry for $7.5 billion sent stock in the latter company surging by 30 percent. But it’s not true, Samsung co-CEO J.K. Shin now says. Instead, Samsung intends to expand its existing partnership with Blackberry.

“We want to work with BlackBerry and develop this partnership, not acquire the company,” Mr. Shin told the Wall Street Journal.

A Samsung/Blackberry tie-up was expected to bolster Samsung against increasingly powerful competitors via Blackberry’s $1.43 billion patent portfolio and enterprise products and services. But Shin contends that Samsung has already seen great success with the enterprise thanks to its Knox security technology, which Google has integrated into the latest version of Android, version 5.0.

The Samsung Knox mobile security platform was integrated into the latest version of Google Android. (Image: Samsung)
The Samsung Knox mobile security platform was integrated into the latest version of Google Android. (Image: Samsung)

“We are satisfied with the progress of Knox, including the quality of security and protection that it enables, and remain committed to Knox over the long term,” Shin told the Wall Street Journal.

Sponsored Content

Say Goodbye to Traditional PC Lifecycle Management

Traditional IT tools, including Microsoft SCCM, Ghost Solution Suite, and KACE, often require considerable custom configurations by T3 technicians (an expensive and often elusive IT resource) to enable management of a hybrid onsite + remote workforce. In many cases, even with the best resources, organizations are finding that these on-premise tools simply cannot support remote endpoints consistently and reliably due to infrastructure limitations.

Knox is designed to sandbox business apps and data against electronic snooping. But as that semi-defensive quote implies, this technology hasn’t helped Samsung obtain any major enterprise contracts so far. And compared to Blackberry’s strong relationship with businesses, governments, and other security-conscious entities, Knox remains more theory than successful business. Even the Android integration is essentially a Samsung contribution, and not a revenue-generating partnership.

As for the Samsung/Blackberry partnership, the two firms announced in November 2014 that they would sell each other’s mobile security technologies. But this isn’t a particularly unique deal, as Samsung has entered into similar agreements with Good Technology (part of Citrix), MobileIron, and AirWatch (part of VMWare).

Indeed, the only major mobile security player Samsung hasn’t partnered with is Microsoft, and one might suspect that the two firms’ ongoing licensing battle is playing a role in that omission. Microsoft sued Samsung in August 2014 because the handset maker had stopped making patent license royalty payments after Microsoft purchased Nokia’s devices and services businesses.

Related Topics:


Don't have a login but want to join the conversation? Sign up for a Petri Account

Comments (0)

Leave a Reply

Paul Thurrott is an award-winning technology journalist and blogger with over 20 years of industry experience and the author of over 25 books. He is the News Director for the Petri IT Knowledgebase, the major domo at, and the co-host of three tech podcasts: Windows Weekly with Leo Laporte and Mary Jo Foley, What the Tech with Andrew Zarian, and First Ring Daily with Brad Sams. He was formerly the senior technology analyst at Windows IT Pro and the creator of the SuperSite for Windows.
Live Webinar: Active Directory Security: What Needs Immediate Priority!Live on Tuesday, October 12th at 1 PM ET

Attacks on Active Directory are at an all-time high. Companies that are not taking heed are being punished, both monetarily and with loss of production.

In this webinar, you will learn:

  • How to prioritize vulnerability management
  • What attackers are leveraging to breach organizations
  • Where Active Directory security needs immediate attention
  • Overall strategy to secure your environment and keep it secured

Sponsored by: