Photo of business professional using a laptop computer.

Samsung KNOX: A Serious Security Solution

17 Mar 2017 by Insight Editor

This article originally appeared on July 17, 2015, and has been revised to bring our readers the most up-to-date technology information.

Today, devices have become our firsthand companions. Unfortunately, while employees use laptops, tablets, notebooks and smartphones to streamline efficiency, hackers have become more sophisticated. At the end of the day, you shouldn’t have to compromise mobility for security.

Can you trust your droid?

Far more than a line from Star Wars, this is a question you should be asking your customers.  The good news is that the Android operating system is widely considered to be highly secure. Since Android now runs 82.8% of smartphones shipped globally (with Samsung being “the No. 1 contributor”), according to IDC, this is good news for the overwhelming majority of users.

There’s no such thing as perfect security.

It’s important to be realistic, and to point out that threats to mobile devices have been reported. In fact, as far back as July 2013, the U.S. Department of Homeland Security (DHS) circulated a Roll Call Release reporting some of these known threats, including: SMS (Texting) Trojans, Rootkits and fake Google Play domains.

However, there are steps you can take to reduce the risk of cyberthreats and ensure your team’s devices are equipped to detect and prevent breaches. 

Samsung KNOX is the Fort Knox of device security.

When you hear the name, you can’t help but conjure images of Fort KNOX, considered to be the most secure fortress imaginable, protecting the wealth of our nation. 

Samsung KNOX protects the integrity of the entire device — from the hardware to the application layer. This multilevel approach to security includes tamper-evident fuses built into the device from the factory, combined with Trusted Boot, TrustZone based Integrity Measurement Architecture (TIMA), and Security Enhancements for Android, providing real-time protections throughout the entire device lifecycle.

It’s trusted by the U.S. Department of Defense.

When Samsung refers to KNOX as “Defense-Grade Mobile Data & Network Security” they can readily prove it. 

The Defense Information Systems Agency (DISA) is considered “The IT Combat Support Agency” and is the lead agency for the U.S. Department of Defense (DOD) Mobility Capability.  On May 14, 2014, DISA distributed a press release announcing that they had “implemented its 2.0 release for Android/Samsung KNOX capability under the DOD Mobility Unclassified Capability (DMUC) to mission partners May 9,” and stating that “This incremental, agile implementation of 90-day spirals provides enhanced and assured mobile capability to the warfighter, while ensuring the agency methodically addresses the complexities involved in integrating a secure interface with DOD networks.”

The release continues, explaining that the announced implementation, “includes support to Android/Samsung KNOX platforms on a Mobile Device Management (MDM) system that will secure devices, allowing them to access DOD networks. The Samsung KNOX container supports access to Defense Enterprise Email (DEE), synched calendar and contacts in a For Official Use Only (FOUO) environment.”

This announcement from DISA demonstrates the confidence the U.S. DOD has in the security available from Samsung devices running the Android operating system with KNOX security.

It interfaces with MDM.

From the perspective of your managed services business, it’s good to know that KNOX offers integration with the most popular MDM, Single Sign-On (SSO) and Virtual Private Network (VPN) solutions in market, allowing you to preserve your existing infrastructure investment. Samsung KNOX devices also support the Android for Work program to deliver the most secure AndroiD solution in the marketplace.

It enables BYOD.

Customers seeking to secure their data when launching or improving a Bring Your Own Device (BYOD) initiative are challenged to keep their data separate from their user’s own personal data on the user’s personal device. With tremendous increases in productivity demonstrated in BYOD companies, you’ll also want to explain to your customers that KNOX enables them to separate work and personal data through various supported container solutions, including the award-winning KNOX Workspace.

It offers protection on hardware and software levels.

When you take responsibility for your customer’s mobile devices, you’ll be pleased to note that KNOX protects the integrity of the entire device, from the hardware to the application layer. This multilevel approach to security includes tamper-evident fuses built into the device from the factory, combined with TIMA and Security Enhancements for Android, providing real-time protections throughout the entire device lifecycle.

Unmatched device security

Enable your team to confidently work anytime and anywhere.

Learn more