Chipset Security
Samsung manufactures and configures its devices in its own factories, and has designed them so that all critical security mechanisms are anchored from the device chipset.
Integrity Monitoring
Booting components are always tested for integrity, while Run Time Protection blocks any code changes to the kernel, and ensures the integrity of the data in system partition.
Warranty Bit
If hacking or rooting is detected on the device, our one-time e-fuse blows, disallowing any user access and securing all data. Attestation allows IT admins to remotely check if a device is trustworthy.
Multi-layered security

SE for Android

TrustZone

Secure Boot & Trusted Boot

Hardware Root of Trust

Multi-layered security

Knox is a multi-layered technology built into both the hardware and software of Samsung’s latest devices. From the Hardware Root of Trust to the Android Framework, Knox constantly verifies the integrity of the device and detects any tampering, ensuring your data is more secure.

SE for Android

Security Enhancements for Android protect applications and data by strictly defining what each process is allowed to do, and what data it can access. SE for Android help to secure a device by using domains, rights, security policies and Mandatory Access Control.

TrustZone

Knox leverages a processor architecture known as ARM TrustZone. In TrustZone, there are two worlds: the Normal World, and the Secure World. Virtually all smartphone software as we know today still runs in Normal World. The Secure World is reserved for highly sensitive computations, and is used extensively by Knox for protecting confidential enterprise data.
 
TrustZone consists of three core components:
  • TIMA KeyStore
  • Real-time Kernel Protection
  • Attestation

Secure Boot & Trusted Boot

Secure Boot prevents unauthorized bootloaders and kernels from being loaded onto the device. This means that your device has not been tampered with and the Knox container can be loaded.

Trusted Boot ensures that the bootloader and OS kernel are the originals from the factory. This is done by recording the original device measurements and consistently checking the device at the start up to make sure these measurements haven't changed.

Hardware Root of Trust

The Hardware Root of Trust is a set of security mechanisms built into device hardware that flag any time the device's default controls have been altered. These include Secure Boot Key and Device Root Key, which perform authentication and encryption operations associated with the device.

CERTIFICATIONS


Government and related organizations around the world have some of the most stringent information and technology security requirements. Samsung Electronics works closely with these organizations on a continuous basis to ensure that our products and solutions meet and exceed these requirements.

ENTERPRISE SOLUTIONS


Build on the Knox platform with extra security, management policies, and advanced device customization. Knox solutions allow businesses of any size to deploy Samsung mobile devices to meet their business needs.
 

View solutions