Novembro 20, 2018

Knox Deep Dive: Real-time Kernel Protection (RKP)

Samsung Knox News

The Knox platform's patented Real-time Kernel Protection (RKP) is the industry's strongest protection against kernel threats and exploits. RKP works seamlessly out-of-the-box, with no setup required. Simply powering on a Samsung Knox device provides world-class threat protection and attack mitigation. RKP supports the rest of the Knox security offerings to provide full security coverage without the typical gaps anticipated with mobile devices.

 

Why does kernel protection matter?

Kernel protection is central to device security and enterprise data protection.

A compromised kernel can leak sensitive data and even allow remote monitoring and control of the affected device. Other more commonplace protections like Secure Boot or hardware-backed keystores are of little value if the kernel itself is compromised at runtime. After a device boots and decrypts sensitive content, a kernel compromise can result in data leaks that directly impact an enterprise’s data integrity.

 

RKP design and structure

As part of the Knox platform's security offerings, RKP employs a security monitor within an isolated execution environment. Depending on the device model, either a dedicated hypervisor or the hardware-backed secure world provided by ARM TrustZone technology provides the isolated execution environment.

RKP knox diagram

RKP’s isolation from the kernel shrinks the Trusted Computing Base (TCB) and helps secure it from attacks designed to compromise the kernel. This unique ability enables RKP to detect and prevent the most common kernel attacks. RKP protections are grouped into three areas:

  • Kernel code - RKP prevents modification of kernel code and logic.
  • Kernel data - RKP prevents modification of critical kernel data structures.
  • Kernel control flow - RKP prevents Return-Oriented Programming (ROP) and Jump-Oriented Programming (JOP) attacks that reuse existing kernel logic to piece together exploits from the kernel’s own code.

 

How is kernel protection possible?

RKP uniquely employs a kernel security monitor within an isolated execution environment.

Running within an isolated execution environment would normally compromise a security mechanism's ability to see into the kernel and monitor activities at runtime. However, RKP succeeds by utilizing patented techniques to control device memory management and by intercepting and inspecting critical kernel actions before allowing them to execute.

With RKP, customers can significantly reduce the severity of kernel attacks and limit the effectiveness of exploits that would typically cripple a mobile device.

 

Full security coverage

Each year, Samsung’s research and development teams add the latest runtime protections to a growing list of unique capabilities found only within RKP.

Although RKP is only one piece of Samsung’s holistic security solution, it successfully demonstrates the unique security guarantees possible when combining hardware, software, and advanced security research. Ensuring security claims are low maintenance, highly effective, and industry-leading is what provides enterprise customers the trust they need to deploy mobile devices in high-security environments.

 

Next steps

[Icon] fechar

Comece a usar o Samsung Knox

[Icon] mala
Você é revendedor, provedor de soluções ou provedor de serviços?

Torne-se um parceiro Knox e comece a expandir seus negócios hoje.

[Icon] informações

Selecione um produto Knox para começar:

Pacote completo
Knox Suite
Reformulação da marca e personalização
Knox Configure
Proteção contra fraude e roubo
Knox Guard
Plano de proteção do dispositivo
Samsung Care+ for Business
Outros produtos e serviços

Comece a usar o

[Image] Knox Suite

Pacote de solução multifuncional para mobilidade empresarial.

  • Obtenha uma avaliação gratuita de 90 dias para até 30 dispositivos.
  • Um conjunto completo de ferramentas para proteger, implantar, gerenciar e analisar seus dispositivos corporativos.
  • Experimente os recursos poderosos fornecidos com o Knox Suite.

O Knox Suite inclui:

Knox Mobile Enrollment Gratuito
Knox Manage
Knox E-FOTA
Knox Asset Intelligence
Knox Platform for Enterprise Gratuito
Knox Remote Support
Knox Capture
Knox Authentication Manager

Comece a usar o

[Image] Logotipo do Knox Configure

Reformule e personalize seus dispositivos Samsung.

  • Obtenha uma avaliação gratuita de 90 dias para até 30 dispositivos.
  • Configure remotamente dispositivos Samsung em massa e adapte-os às necessidades específicas, imediatamente.
  • Configure seus dispositivos para implantação única ou atualize-os quantas vezes quiser.

Comece a usar o

[Icon] Logotipo do Knox Guard

Proteção contra fraude e roubo para dispositivos Samsung.

  • Obtenha uma avaliação gratuita de 90 dias para até 30 dispositivos.
  • Reduza os riscos financeiros e proteja os ativos por meio do controle remoto dos dispositivos Samsung.
  • Experimente todos os recursos do Knox Guard, inclusive controle do SIM e bloqueio de dispositivo.

Comece a usar o

[Image] Logotipo do Samsung Care Plus for Business

Planos de proteção para seus dispositivos Samsung.

  • Limite as interrupções dos negócios com trocas e reparos rápidos de dispositivo. Entre em contato com a equipe de vendas da Samsung para começar.
  • Veja todas as informações sobre reivindicações e cobertura do dispositivo em um só lugar.
  • Já adquiriu o Samsung Care+ for Business? Crie uma conta e acesse seu plano no console do Samsung Care+ for Business.

Outros produtos e serviços

[Image] Outros logotipos

Soluções modernas para atender às suas necessidades exclusivas.

CONTATO PARA VENDAS