What are the security risks of rooting your smartphone?
Companies allowing employees to bring their own device (BYOD) for work purposes are toeing a fine line: providing workers with ability to use the smartphone or tablet...
Knox Platform and Android Enterprise
A little over six years ago, Samsung set out on a journey to solve two critical issues facing our customers who wished to adopt Android devices...
Knox Deep Dive: Common Criteria Mode
Simplifying the correct configuration of endpoints for high-security deployments saves time and prevents mistakes that can lead to misconfigurations and added security risks...
Managing and securing business data with wearables
From restaurant servers to field workers to cleaning and maintenance staff, having a hands-free communication device that is always accessible can greatly increase productivity...
Is your small business taking mobile security seriously?
As mobile devices become an increasingly key part of business processes, smartphones and tablets have become richer targets for exploitation, especially since we carry...
How mobile apps and data are empowering first responders
Fire, rescue and EMS organizations are utilizing mobile devices and apps like never before, gaining access to real-time data that significantly improves incident readiness...
Samsung Knox’s impact after five years: Read the industry report
Samsung Knox has elevated the stature of the Android operating system as secure, stable, and enterprise-capable, writes global market intelligence firm IDC in a new report...
Knox Deep Dive: Certification Enrollment Protocols
CEPs provision and support digital certificates for apps within Samsung devices. This feature enables EMMs and third-party vendors to provide complete certificate enrollment...
VMware integrates Knox E-FOTA into the Workspace ONE UEM console
VMware, a leading innovator in enterprise software, worked with Samsung Knox to integrate Knox E-FOTA into its VMware Workspace ONE digital workspace platform...
How to pick your first MDM
Once you recognize that you should have more visibility into and control over your enterprise mobile devices, it’s time to evaluate your options for mobile device management (MDM)...
Knox Deep Dive: Knox Verified Boot
With the most recent Knox 3.3 version release, the Samsung Knox team is pleased to introduce Knox Verified Boot...
Making the case for Samsung DeX in police cars
Across the country, more and more public safety agencies are finding that a mobile-first approach increases overall officer effectiveness by providing always-on, ready access to real-time information...
What's new in Knox 3.3?
Pushing boundaries to enhance security and usability is Samsung’s newest Knox platform release—Knox 3.3.
Zimperium announces an extended partnership with Samsung to provide advanced protection against sophisticated mobile attacks
Zimperium partners with Samsung to provide advanced protection against sophisticated mobile attacks.
From phones to fridges: The evolution of Samsung Knox
We spoke with Nick Dawson, Director of Knox Strategy and Business Development, on the floor of MWC 2019. We asked him about the evolution of Samsung Knox...
One device, two lifestyles: How small businesses can leverage Secure Folder
There’s no one silver bullet to solve all security problems, but Samsung Knox mobile security suite includes a variety of options that even small business owners can utilize.
Samsung and Google Enhance Cooperation in the Enterprise Market
Samsung Electronics and Google continue to diligently harmonize our core enterprise platforms: Samsung Knox and Android Enterprise.
Samsung Knox Platform for Enterprise: Evolution to 5G, Enterprise IoT, and AI
Beginning in 2019, KPE will evolve to secure 5G networks, Enterprise IoT, and deliver AI-powered security.
Knox Deep Dive: Knox DualDAR Encryption
The new Samsung smartphones–scheduled to reach consumers in early 2019–add support for File-based Encryption (FBE), which is a feature of the Android OS. Along with adding support for FBE, the Knox framework also adds a new feature called Knox DualDAR encryption...
Answering your questions about Knox
What is Samsung Knox? And why is it on my phone? We hear this question and others like it quite often. We’d like to help answer some of your most frequently asked questions about Knox below...
Essential mobile device policy considerations for growing businesses
More mobility is almost always good for business, but companies need to take control of mobile usage to manage risk...
Android security in the enterprise: Fact or fiction?
IT managers are now coming around to understanding that they can trust mobile devices based on Android to be as secure as — if not more secure than — their Windows desktops and laptops.
Knox Deep Dive: Sensitive Data Protection
Protecting Data-At-Rest (DAR) on mobile devices is a major concern. While the industry standard is to encrypt all data on a device, that data is decrypted and accessible...
5 ways to use Knox Configure during your free trial
Whether it’s BYOD or CYOD, companies going mobile all share one common challenge: the secure, efficient provisioning of smartphones, tablets and smartwatches...
Introducing Role-Based Access Control (RBAC) for Knox Cloud Services
The Samsung Knox Cloud Services (KCS) team is pleased to introduce a new Role-Based Access Control (RBAC) service allowing customer...
Lessons from 2018: Handling the next mobile security breach
As mobile adoption soars, malicious hackers are evolving their tactics to match user behaviors. The past 12 months hosted a new...
Knox Workspace 3.2.1: New tab-based UI in Android P
Knox now uses a tabbed UI to show personal and work apps, which aligns with the app drawer changes in Android P...
Knox Deep Dive: Real-time Kernel Protection (RKP)
Why does kernel protection matter? A compromised kernel can leak sensitive data and even allow remote monitoring and control of the affected device. Other more commonplace protections like Secure Boot or hardware-backed keystores are of little value if the kernel itself...
IoT. 5G. AI. Disruption is happening now. Are you ready?
Currently emerging and evolving technology trends are about to massively disrupt entire industries. These trends are evolving independently, but they all converge perfectly in the mobile space...
Samsung Knox featured on CNN Europe
You could be the biggest security risk to your company, Samsung Knox’s Nick Dawson told CNN Europe in an interview on Nov. 1...
Knox Platform for Enterprise goes beyond Android Enterprise
Samsung and Google have been diligently working to advance and secure enterprise mobility, and today we see improvements around both Google's Android operating system and Samsung's Knox platform that make it easier...
What's new in Knox 3.2
Samsung continues to evolve mobile device enterprise security and manageability with its newest Knox Platform – Knox 3.2.
EMM, MDM or UEM? Do they mean the same thing?
The need to manage corporate devices across business environments is greater than ever, as the volume and frequency of information we share with one another continues to grow. Whether you manage Android devices or iOS smartphones, you’ve probably come across a range of seemingly interchangeable acronyms for this practice.
Samsung Knox to release a major update with redesigned KME, KC, KDP consoles
The Samsung Knox team is introducing new consoles of our industry-leading Knox Configure (KC), Knox Mobile Enrollment (KME) and the Knox Deployment Program (KDP) for participating resellers.
Deprecated Knox features with the Galaxy S8 (Knox 2.8) release
The Samsung Knox team is continually introducing new and improved features, in response to customer feedback and market trends. This is to help you leverage the latest emerging technologies, enhance productivity...
Samsung Galaxy S8 and S8+ unveiled at Unpacked 2017
Samsung Electronics has launched the Galaxy S8 and S8+ at the Galaxy Unpacked 2017 event in New York on March 29th. The Galaxy S8 is available in 5.8-inch Galaxy S8 and...
Samsung releases two new tablets at MWC 2017 - Galaxy Tab S3, Galaxy Book
Mobile World Congress took place in Barcelona from February 27 to March 2, where Samsung Electronics reaffirmed its commitment to building products that transform how users connect and remain productive while...
Knox security is open to all developers
Ensuring strong security can be a tough component when developing mobile apps. For each industry, vertical, or specialty, you need to consider what needs to be secured, how to secure it, and what security certifications and standards need to be met. The good news is, you don’t have to do it all yourself. By integrating with Samsung Knox, developers can take advantage of Knox’s ready-made security platform to better tailor solutions to meet industry and company needs.
Android for Work hardened by Knox on Samsung device
People stay connected with their worlds through their mobile devices and the lines between their work and personal lives have blurred. Accommodating work and play on one phone is more than just a trend, it’s a necessity. Android provides a great solution for this through Work Profiles*, and when combined with a Samsung device is a great option as it’s hardened by Samsung Knox platform security.
A winning business with BYOD
It is no surprise that the trend of Bring Your Own Device (BYOD) continues to trend favorably among businesses large and small. A properly executed BYOD strategy can save a company money, increase productivity, and increase employee job satisfaction. All of these benefits can be obtained without the loss of corporate security or an increase in the leakage of important company information. For the individual, a BYOD policy gives you extra flexibility in selecting the devices that best fit your particular needs.
Samsung and Citrix extend technology partnership for EMM
I’m excited to share with you some new ways that XenMobile and Samsung are working together to provide industry leading application and data security for Android environments. This joint solution, on display next week at Citrix Synergy 2016, allows IT to take advantage of core security and management features of Samsung Knox at no additional cost, with optional support for the Knox Workspace container.
Your business is your castle: Protect it
With all the stories about hacking, stolen credentials, and more, you’d think the best course of action would be to just use two cans with a string in order to communicate with people, especially your business customers.
The Great Debate: Privacy vs. Convenience
Every minute of every day, people of all walks of life, young and old, make the great trade-off multiple times a day: privacy versus convenience.
Samsung Knox receives the most "Strong" ratings of any platform in Gartner Mobile Security Report
In the business of enterprise mobility, platform security is a must. Each day enterprise users carry mobile devices that contain or have access to confidential, sensitive information. Security professionals are committed to staying one step ahead of the rise of global data breaches and require the most secure operating system platforms for their businesses.
Security, misconceptions, and you
We live in a world where your privacy and personal data are constantly under attack. Now, more than ever, knowing and taking steps to protect yourself can mean the difference between a safe mobile experience, and not.
Samsung Developer Conference 2016
Join us at the annual Samsung Developer Conference (SDC) in San Francisco on April 27 and 28 to learn about new technologies and future innovations around Samsung Knox.
Real-time Kernel Protection (RKP)
The security of the kernel is essential to the security of the whole system. An attack that compromises the kernel has the ability to arbitrarily access system sensitive data, hide malicious activities, escalate the privilege of malicious user processes, change the system behavior or simply take control of the system. As mentioned previously, Trusted Boot measurements can be used to determine what kernel was loaded and run when the device was started. However, this protection does not guarantee the integrity of the kernel after the system runs and starts to interact with potential attackers. Clever attackers can sometimes exploit an already booted and running kernel. In such cases, it is important to continuously monitor the kernel during the system runtime in order to detect and prevent modifications to the kernel code or critical data structures.
What's new in Knox 2.6?
Knox 2.6, the latest version of our mobile security platform is now available. The 2.6 release of the Knox platform is optimized for Android M and contains a number of features that enhance security, user productivity, and the Knox developer toolkit.
Samsung Galaxy Unpacked 2016
Samsung reveals the next Galaxy at Unpacked in Barcelona on Feb. 21.