Tech notes


PDF

Android for Work on a Samsung Knox device

Learn how the security of the Samsung Knox platform is extended to Android for Work on a Samsung device.

PDF

DM-Verity

Samsung Knox uses a customized implementation of DM-Verity. Learn how this prevents unauthorized modification to the system partition and performs integrity checks

PDF

Hardware Root of Trust

The foundation of Knox security is something called Hardware Root of Trust. Learn how security checks are rooted in, or begin with hardware checks

PDF

Real-time Kernel Protection (RKP)

Learn why it’s important to continuously monitor the kernel during the system runtime in order to detect and prevent modifications to the kernel code or critical data structures.

PDF

Run-time protections

Learn how Knox security tools detect kernel attacks to ensure that your sensitive data is protected.

PDF

Samsung Knox boot-time protections

Secure Boot and Trusted Boot have their trust rooted in hardware. Learn the difference between Secure Boot and Trusted Boot and how they provide boot-time protections.

PDF

Sensitive Data Protection (SDP)

Knox Sensitive Data Protection creates a Container Master Key (CMK) that can only be decrypted with user input. 

Once Workspace is locked, SDP clears all keys in memory after a configurable timeout (five seconds by default).

PDF

What is Knox?

Samsung Knox protects enterprise data using the principles of software integrity, least privilege, data storage protection, network protection, and data isolation.

PDF

Disabling Facial Recognition Device Unlock

The Samsung Galaxy S8 and S8+ provide several types of biometric authentication.