SlideShare a Scribd company logo
1 of 19
The most secure Android solution
2016 enterprise mobility trends
Android adoption in business continues to grow
IT and user mobility needs
do not easily align
User
Productivity
Privacy
Choice
IT
Security
Integration
Low cost
* Leading analytics firm
Android’s dominance is
expected to grow to 82%
of all phones by 2019.*
KNOX is Samsung’s defense-grade
mobile security platform built into our
new devices making them the most
secure Android devices available.
KNOX Platform
Real-time device protection from the moment you turn it on
KNOX Workspace
defense-grade container
• Isolate, encrypt, and protect corporate data.
• Defense-grade, dual persona container.
• IT control of security of corporate data and
resource access.
• Personal information controlled entirely by
user.
KNOX Cloud Solutions
(KNOX Express and KNOX Premium)
My KNOX
KNOX Workspace
KNOX Customization
SMB
Enterprise, Government
and other verticals
Security and productivity for all business users
Individuals
KNOX platform
KNOX Enabled App
KNOX maximizes Android security
Key differentiators:
• Defense-grade, hardware
anchored security
• Fully enterprise-ready
• Cost control and ease of
deployment
• Best end-user experience
Enterprise-ready
Deep IT Integration/support
and best end-user experience
Application security
Secure app access and
data protection
Device security
Secure hardware design and
manufacturing with boot, load,
and run-time defenses
What’s new in KNOX?
Key features in KNOX 2.6
Increased
end user
productivity
Industry-leading
Android for
Work support
and integration
A more
powerful
partner
ecosystem
Advanced
security
Granular
management
for tighter
control
Industry-leading Android for Work
support and integration
Google Play for Work support
KNOX Workspace supports Google Play for
Work for better IT app deployment and
employee app discovery and download.
Android for Work hardened by KNOX
Android for Work managed profiles now
integrates deeper into the KNOX platform for
boot and run time protections, enhanced
encryption, and improved security.
Advanced security
KNOX Mobile Enrollment improvements
More safety measures protect the process of bulk enrollment of
devices from network attacks.
VPN HTTP Proxy Authentication
HTTP Proxy configurations over VPN for KNOX Workspace now
support proxy authentication.
Kernel address space layout randomization
The KNOX platform now ensures that the memory address of kernel
data structures and code are randomized from one device to
another.
Enhanced Real-time Kernel Protection (RKP)
RKP monitors some critical kernel data structures to verify that they
are not exploited by attacks. This feature extends RKP security to
Namespace Data Structure protection.
Increased end-user productivity
Multi Window support
for KNOX
End users now can use apps in
KNOX Workspace alongside
apps outside KNOX
Workspace.
Enable speech-to-text
in KNOX Workspace
End users can use Google
Voice with apps inside KNOX
Workspace.
Clipboard / copy and
paste outside to inside
IT admins now can allow end
users to copy/ paste from
outside KNOX Workspace into
KNOX Workspace.
Granular management for tighter control
Trust Anchor
Management
On BYOD devices used for play
and work, the end user and IT
admin can choose to trust
different sets of Certification
Authority (CA) certificates.
Data Loss
Prevention (DLP)
Enables IT admins to enforce
tighter policies on the KNOX
container and its apps to restrict
and prevent enterprise data loss
or leakage.
Per-app roaming
control
Now IT admins can control
which apps are allowed to use
mobile data when the user is
connected to a roaming
network.
A more powerful
partner ecosystem
KNOX Enabled Apps enhancements
Enhancements to KEA give app developers
increased flexibility.
KNOX Customization SDK
App developers gain the ability to customize apps for
Standard and Premium SDKs.
Attestation API
Developers can use this to determine whether a device is
secure enough to enable their app to run.
KNOX works on many Samsung devices
30+ Samsung models supported in countries around the world
Wide support from leading MDM vendors
Strong community
of MDM partners
makes it possible
to quickly enable
KNOX in any
enterprise
Key partners
integrate their own
secure containers
with KNOX platform
3rd party
container
MDM
Ecosystem of enterprise solution partners
Business Apps
VPN Smart Card/CACAuthentication Secure Voice/SMS Enterprise Billing
Advanced Mobile SecurityIAM/SSO
The most secure Android – only with Samsung
Supports any business user on
innovative, widely adopted Samsung
devices.
Meets the security requirements of IT
and productivity needs of users –
maximizing Android security and
productivity.
New features supported with our latest
devices, including the Galaxy S7, S7
edge, S6, S6 edge, S6 edge+ and
Note 5.
For more information visit www.samsungknox.com

More Related Content

What's hot

Dell EMC PowerEdge iDRAC9 - 14 features for power users
Dell EMC PowerEdge  iDRAC9 - 14 features for power usersDell EMC PowerEdge  iDRAC9 - 14 features for power users
Dell EMC PowerEdge iDRAC9 - 14 features for power usersMark Maclean
 
Understanding the Windows Server Administration Fundamentals (Part-2)
Understanding the Windows Server Administration Fundamentals (Part-2)Understanding the Windows Server Administration Fundamentals (Part-2)
Understanding the Windows Server Administration Fundamentals (Part-2)Tuan Yang
 
Understanding android security model
Understanding android security modelUnderstanding android security model
Understanding android security modelPragati Rai
 
Workgroup vs domain
Workgroup vs domainWorkgroup vs domain
Workgroup vs domaintameemyousaf
 
Getting Started with Splunk (Hands-On)
Getting Started with Splunk (Hands-On) Getting Started with Splunk (Hands-On)
Getting Started with Splunk (Hands-On) Splunk
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overviewCisco Canada
 
Virtual desktop infrastructure
Virtual desktop infrastructureVirtual desktop infrastructure
Virtual desktop infrastructureKavaskar Ganesan
 
Presentation citrix desktop virtualization
Presentation   citrix desktop virtualizationPresentation   citrix desktop virtualization
Presentation citrix desktop virtualizationxKinAnx
 
Forcepoint SD-WAN and NGFW + IPS
Forcepoint SD-WAN and NGFW + IPSForcepoint SD-WAN and NGFW + IPS
Forcepoint SD-WAN and NGFW + IPSLarry Austin
 
Android Security
Android SecurityAndroid Security
Android SecurityArqum Ahmad
 
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014SAMeh Zaghloul
 
Linux Kernel Development
Linux Kernel DevelopmentLinux Kernel Development
Linux Kernel DevelopmentPriyank Kapadia
 
IBM Power Systems Update
IBM Power Systems UpdateIBM Power Systems Update
IBM Power Systems UpdateDavid Spurway
 
Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)Cloudflare
 
Cisco Router and Switch Security Hardening Guide
Cisco Router and Switch Security Hardening GuideCisco Router and Switch Security Hardening Guide
Cisco Router and Switch Security Hardening GuideHarris Andrea
 

What's hot (20)

Dell EMC PowerEdge iDRAC9 - 14 features for power users
Dell EMC PowerEdge  iDRAC9 - 14 features for power usersDell EMC PowerEdge  iDRAC9 - 14 features for power users
Dell EMC PowerEdge iDRAC9 - 14 features for power users
 
Understanding the Windows Server Administration Fundamentals (Part-2)
Understanding the Windows Server Administration Fundamentals (Part-2)Understanding the Windows Server Administration Fundamentals (Part-2)
Understanding the Windows Server Administration Fundamentals (Part-2)
 
OPERATING SYSTEM.pptx
OPERATING SYSTEM.pptxOPERATING SYSTEM.pptx
OPERATING SYSTEM.pptx
 
Understanding android security model
Understanding android security modelUnderstanding android security model
Understanding android security model
 
Workgroup vs domain
Workgroup vs domainWorkgroup vs domain
Workgroup vs domain
 
Getting Started with Splunk (Hands-On)
Getting Started with Splunk (Hands-On) Getting Started with Splunk (Hands-On)
Getting Started with Splunk (Hands-On)
 
03 bit locker-mod03
03   bit locker-mod0303   bit locker-mod03
03 bit locker-mod03
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overview
 
Virtual desktop infrastructure
Virtual desktop infrastructureVirtual desktop infrastructure
Virtual desktop infrastructure
 
Windows Server 2019 -InspireTech 2019
Windows Server 2019 -InspireTech 2019Windows Server 2019 -InspireTech 2019
Windows Server 2019 -InspireTech 2019
 
Presentation citrix desktop virtualization
Presentation   citrix desktop virtualizationPresentation   citrix desktop virtualization
Presentation citrix desktop virtualization
 
Forcepoint SD-WAN and NGFW + IPS
Forcepoint SD-WAN and NGFW + IPSForcepoint SD-WAN and NGFW + IPS
Forcepoint SD-WAN and NGFW + IPS
 
Android Security
Android SecurityAndroid Security
Android Security
 
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
 
Linux Kernel Development
Linux Kernel DevelopmentLinux Kernel Development
Linux Kernel Development
 
IBM Power Systems Update
IBM Power Systems UpdateIBM Power Systems Update
IBM Power Systems Update
 
Overview of Microsoft Exchange Online
Overview of Microsoft Exchange OnlineOverview of Microsoft Exchange Online
Overview of Microsoft Exchange Online
 
Windows server
Windows serverWindows server
Windows server
 
Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)
 
Cisco Router and Switch Security Hardening Guide
Cisco Router and Switch Security Hardening GuideCisco Router and Switch Security Hardening Guide
Cisco Router and Switch Security Hardening Guide
 

Viewers also liked

[Infographic] IFA 2016: Samsung Knox
[Infographic] IFA 2016: Samsung Knox[Infographic] IFA 2016: Samsung Knox
[Infographic] IFA 2016: Samsung KnoxSamsung Biz Mobile
 
Samsung KNOX Customization: Transform Samsung Devices into Purpose-built Appl...
Samsung KNOX Customization: Transform Samsung Devices into Purpose-built Appl...Samsung KNOX Customization: Transform Samsung Devices into Purpose-built Appl...
Samsung KNOX Customization: Transform Samsung Devices into Purpose-built Appl...Samsung Biz Mobile
 
Galaxy S7/S7 Edge for Businesses
Galaxy S7/S7 Edge for Businesses Galaxy S7/S7 Edge for Businesses
Galaxy S7/S7 Edge for Businesses Samsung Biz Mobile
 
KNOX Customization for Aviation Industry
KNOX Customization for Aviation IndustryKNOX Customization for Aviation Industry
KNOX Customization for Aviation IndustrySamsung Biz Mobile
 
Perfectly Designed for Enterprise: the Galaxy S7/S7 Edge
Perfectly Designed for Enterprise: the Galaxy S7/S7 EdgePerfectly Designed for Enterprise: the Galaxy S7/S7 Edge
Perfectly Designed for Enterprise: the Galaxy S7/S7 EdgeSamsung Biz Mobile
 
KNOX Message: Collaborate Securely, Anywhere, Anytime
KNOX Message: Collaborate Securely, Anywhere, AnytimeKNOX Message: Collaborate Securely, Anywhere, Anytime
KNOX Message: Collaborate Securely, Anywhere, AnytimeSamsung Biz Mobile
 
KNOX Customization for Hospitality Industry
KNOX Customization for Hospitality Industry KNOX Customization for Hospitality Industry
KNOX Customization for Hospitality Industry Samsung Biz Mobile
 
KNOX Customization for Transportation Industry
KNOX Customization for Transportation Industry KNOX Customization for Transportation Industry
KNOX Customization for Transportation Industry Samsung Biz Mobile
 
Vertical offering with knox customization v1.0
Vertical offering with knox customization v1.0Vertical offering with knox customization v1.0
Vertical offering with knox customization v1.0Samsung Biz Mobile
 
KNOX Customization for Education Industry
KNOX Customization for Education Industry KNOX Customization for Education Industry
KNOX Customization for Education Industry Samsung Biz Mobile
 
KNOX Customization for Media Industry
KNOX Customization for Media Industry KNOX Customization for Media Industry
KNOX Customization for Media Industry Samsung Biz Mobile
 
The Galaxy S6 edge+ and Note 5. Ready for Business.
The Galaxy S6 edge+ and Note 5. Ready for Business. The Galaxy S6 edge+ and Note 5. Ready for Business.
The Galaxy S6 edge+ and Note 5. Ready for Business. Samsung Biz Mobile
 
KNOX Customization for Retail Industry
KNOX Customization for Retail Industry KNOX Customization for Retail Industry
KNOX Customization for Retail Industry Samsung Biz Mobile
 
Samsung Pay - Safe and secure mobile payments virtually anywhere you can swip...
Samsung Pay - Safe and secure mobile payments virtually anywhere you can swip...Samsung Pay - Safe and secure mobile payments virtually anywhere you can swip...
Samsung Pay - Safe and secure mobile payments virtually anywhere you can swip...Samsung Biz Mobile
 
White Paper: Balance Between Embedded Operating System Security Features and ...
White Paper: Balance Between Embedded Operating System Security Features and ...White Paper: Balance Between Embedded Operating System Security Features and ...
White Paper: Balance Between Embedded Operating System Security Features and ...Samsung Biz Mobile
 
Life going beyond the smart home
Life going beyond the smart homeLife going beyond the smart home
Life going beyond the smart homeCOMPUTEX TAIPEI
 
WhiteLabel Overview 2017
WhiteLabel Overview 2017WhiteLabel Overview 2017
WhiteLabel Overview 2017Chris Nagy
 

Viewers also liked (19)

[Infographic] IFA 2016: Samsung Knox
[Infographic] IFA 2016: Samsung Knox[Infographic] IFA 2016: Samsung Knox
[Infographic] IFA 2016: Samsung Knox
 
Knox Customization Sales Deck
Knox Customization Sales DeckKnox Customization Sales Deck
Knox Customization Sales Deck
 
Samsung KNOX Customization: Transform Samsung Devices into Purpose-built Appl...
Samsung KNOX Customization: Transform Samsung Devices into Purpose-built Appl...Samsung KNOX Customization: Transform Samsung Devices into Purpose-built Appl...
Samsung KNOX Customization: Transform Samsung Devices into Purpose-built Appl...
 
Galaxy S7/S7 Edge for Businesses
Galaxy S7/S7 Edge for Businesses Galaxy S7/S7 Edge for Businesses
Galaxy S7/S7 Edge for Businesses
 
KNOX Customization for Aviation Industry
KNOX Customization for Aviation IndustryKNOX Customization for Aviation Industry
KNOX Customization for Aviation Industry
 
Perfectly Designed for Enterprise: the Galaxy S7/S7 Edge
Perfectly Designed for Enterprise: the Galaxy S7/S7 EdgePerfectly Designed for Enterprise: the Galaxy S7/S7 Edge
Perfectly Designed for Enterprise: the Galaxy S7/S7 Edge
 
The KNOX Story
The KNOX StoryThe KNOX Story
The KNOX Story
 
KNOX Message: Collaborate Securely, Anywhere, Anytime
KNOX Message: Collaborate Securely, Anywhere, AnytimeKNOX Message: Collaborate Securely, Anywhere, Anytime
KNOX Message: Collaborate Securely, Anywhere, Anytime
 
KNOX Customization for Hospitality Industry
KNOX Customization for Hospitality Industry KNOX Customization for Hospitality Industry
KNOX Customization for Hospitality Industry
 
KNOX Customization for Transportation Industry
KNOX Customization for Transportation Industry KNOX Customization for Transportation Industry
KNOX Customization for Transportation Industry
 
Vertical offering with knox customization v1.0
Vertical offering with knox customization v1.0Vertical offering with knox customization v1.0
Vertical offering with knox customization v1.0
 
KNOX Customization for Education Industry
KNOX Customization for Education Industry KNOX Customization for Education Industry
KNOX Customization for Education Industry
 
KNOX Customization for Media Industry
KNOX Customization for Media Industry KNOX Customization for Media Industry
KNOX Customization for Media Industry
 
The Galaxy S6 edge+ and Note 5. Ready for Business.
The Galaxy S6 edge+ and Note 5. Ready for Business. The Galaxy S6 edge+ and Note 5. Ready for Business.
The Galaxy S6 edge+ and Note 5. Ready for Business.
 
KNOX Customization for Retail Industry
KNOX Customization for Retail Industry KNOX Customization for Retail Industry
KNOX Customization for Retail Industry
 
Samsung Pay - Safe and secure mobile payments virtually anywhere you can swip...
Samsung Pay - Safe and secure mobile payments virtually anywhere you can swip...Samsung Pay - Safe and secure mobile payments virtually anywhere you can swip...
Samsung Pay - Safe and secure mobile payments virtually anywhere you can swip...
 
White Paper: Balance Between Embedded Operating System Security Features and ...
White Paper: Balance Between Embedded Operating System Security Features and ...White Paper: Balance Between Embedded Operating System Security Features and ...
White Paper: Balance Between Embedded Operating System Security Features and ...
 
Life going beyond the smart home
Life going beyond the smart homeLife going beyond the smart home
Life going beyond the smart home
 
WhiteLabel Overview 2017
WhiteLabel Overview 2017WhiteLabel Overview 2017
WhiteLabel Overview 2017
 

Similar to Samsung KNOX - The Most Secure Android Solution

Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile AuthenticationFIDO Alliance
 
Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0Javier Gonzalez
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleDavid Fuchs
 
BT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonBT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonDigital Catapult
 
A Quick Introduction to Microsoft Azure Public Cloud
A Quick Introduction to Microsoft Azure Public CloudA Quick Introduction to Microsoft Azure Public Cloud
A Quick Introduction to Microsoft Azure Public CloudZNetLive
 
sb-checkpoint-matrix42
sb-checkpoint-matrix42sb-checkpoint-matrix42
sb-checkpoint-matrix42Wayne Phillips
 
Storware KODO - Enterprise Endpoint Data Protection v3.6
Storware KODO - Enterprise Endpoint Data Protection v3.6Storware KODO - Enterprise Endpoint Data Protection v3.6
Storware KODO - Enterprise Endpoint Data Protection v3.6Bartosz Bredy
 
Samsung beyond basic android online 0
Samsung beyond basic android online 0Samsung beyond basic android online 0
Samsung beyond basic android online 0Javier Gonzalez
 
Ebc collab portfolio_master
Ebc collab portfolio_masterEbc collab portfolio_master
Ebc collab portfolio_masterdakins090174
 
Knox premium for customer
Knox premium for customerKnox premium for customer
Knox premium for customerJavier Gonzalez
 
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...BlackBerry
 
Cisco Fog Computing Solutions: Unleash the Power of the Internet of Things
Cisco Fog Computing Solutions: Unleash the Power of the Internet of ThingsCisco Fog Computing Solutions: Unleash the Power of the Internet of Things
Cisco Fog Computing Solutions: Unleash the Power of the Internet of ThingsHarshitParkar6677
 
Computing solutions
Computing solutionsComputing solutions
Computing solutionsToufik Kaci
 
AirWatch Solution Overview Presentation - VMware Branded - (1).pptx
AirWatch Solution Overview Presentation - VMware Branded - (1).pptxAirWatch Solution Overview Presentation - VMware Branded - (1).pptx
AirWatch Solution Overview Presentation - VMware Branded - (1).pptxHaekalAufar1
 

Similar to Samsung KNOX - The Most Secure Android Solution (20)

Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
 
Insecure mag-19
Insecure mag-19Insecure mag-19
Insecure mag-19
 
Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0
 
Checkpoint Overview
Checkpoint OverviewCheckpoint Overview
Checkpoint Overview
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made Simple
 
Partner Welcome Kit
Partner Welcome KitPartner Welcome Kit
Partner Welcome Kit
 
BT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonBT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob Rowlingson
 
A Quick Introduction to Microsoft Azure Public Cloud
A Quick Introduction to Microsoft Azure Public CloudA Quick Introduction to Microsoft Azure Public Cloud
A Quick Introduction to Microsoft Azure Public Cloud
 
Value Journal - September 2020
Value Journal - September 2020Value Journal - September 2020
Value Journal - September 2020
 
sb-checkpoint-matrix42
sb-checkpoint-matrix42sb-checkpoint-matrix42
sb-checkpoint-matrix42
 
Storware KODO - Enterprise Endpoint Data Protection v3.6
Storware KODO - Enterprise Endpoint Data Protection v3.6Storware KODO - Enterprise Endpoint Data Protection v3.6
Storware KODO - Enterprise Endpoint Data Protection v3.6
 
Samsung beyond basic android online 0
Samsung beyond basic android online 0Samsung beyond basic android online 0
Samsung beyond basic android online 0
 
Ebc collab portfolio_master
Ebc collab portfolio_masterEbc collab portfolio_master
Ebc collab portfolio_master
 
Knox premium for customer
Knox premium for customerKnox premium for customer
Knox premium for customer
 
DIGIPASS for Apps
DIGIPASS for AppsDIGIPASS for Apps
DIGIPASS for Apps
 
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
 
Cisco Fog Computing Solutions: Unleash the Power of the Internet of Things
Cisco Fog Computing Solutions: Unleash the Power of the Internet of ThingsCisco Fog Computing Solutions: Unleash the Power of the Internet of Things
Cisco Fog Computing Solutions: Unleash the Power of the Internet of Things
 
Computing solutions
Computing solutionsComputing solutions
Computing solutions
 
Secure enterprise mobility
Secure enterprise mobilitySecure enterprise mobility
Secure enterprise mobility
 
AirWatch Solution Overview Presentation - VMware Branded - (1).pptx
AirWatch Solution Overview Presentation - VMware Branded - (1).pptxAirWatch Solution Overview Presentation - VMware Branded - (1).pptx
AirWatch Solution Overview Presentation - VMware Branded - (1).pptx
 

More from Samsung Biz Mobile

[EU] Samsung Enterprise Tech Support
[EU] Samsung Enterprise Tech Support[EU] Samsung Enterprise Tech Support
[EU] Samsung Enterprise Tech SupportSamsung Biz Mobile
 
Samsung Knox Configure: Understanding the Features
Samsung Knox Configure: Understanding the FeaturesSamsung Knox Configure: Understanding the Features
Samsung Knox Configure: Understanding the FeaturesSamsung Biz Mobile
 
White Paper: Anytime, anywhere secure email access with Samsung mobile devices
White Paper: Anytime, anywhere secure email access with Samsung mobile devices White Paper: Anytime, anywhere secure email access with Samsung mobile devices
White Paper: Anytime, anywhere secure email access with Samsung mobile devices Samsung Biz Mobile
 
Android Security Maximized by Samsung KNOX
Android Security Maximized by Samsung KNOXAndroid Security Maximized by Samsung KNOX
Android Security Maximized by Samsung KNOXSamsung Biz Mobile
 

More from Samsung Biz Mobile (8)

[EU] Samsung Enterprise Tech Support
[EU] Samsung Enterprise Tech Support[EU] Samsung Enterprise Tech Support
[EU] Samsung Enterprise Tech Support
 
Knox Manage Tech Sheet
Knox Manage Tech SheetKnox Manage Tech Sheet
Knox Manage Tech Sheet
 
Knox Manage Sales Brochure
Knox Manage Sales BrochureKnox Manage Sales Brochure
Knox Manage Sales Brochure
 
Knox Manage Sales Deck
Knox Manage Sales DeckKnox Manage Sales Deck
Knox Manage Sales Deck
 
Samsung Knox Configure: Understanding the Features
Samsung Knox Configure: Understanding the FeaturesSamsung Knox Configure: Understanding the Features
Samsung Knox Configure: Understanding the Features
 
Knox Configure Sales Deck
Knox Configure Sales DeckKnox Configure Sales Deck
Knox Configure Sales Deck
 
White Paper: Anytime, anywhere secure email access with Samsung mobile devices
White Paper: Anytime, anywhere secure email access with Samsung mobile devices White Paper: Anytime, anywhere secure email access with Samsung mobile devices
White Paper: Anytime, anywhere secure email access with Samsung mobile devices
 
Android Security Maximized by Samsung KNOX
Android Security Maximized by Samsung KNOXAndroid Security Maximized by Samsung KNOX
Android Security Maximized by Samsung KNOX
 

Recently uploaded

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 

Recently uploaded (20)

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 

Samsung KNOX - The Most Secure Android Solution

  • 1. The most secure Android solution
  • 2. 2016 enterprise mobility trends Android adoption in business continues to grow IT and user mobility needs do not easily align User Productivity Privacy Choice IT Security Integration Low cost * Leading analytics firm Android’s dominance is expected to grow to 82% of all phones by 2019.*
  • 3.
  • 4. KNOX is Samsung’s defense-grade mobile security platform built into our new devices making them the most secure Android devices available. KNOX Platform Real-time device protection from the moment you turn it on
  • 5. KNOX Workspace defense-grade container • Isolate, encrypt, and protect corporate data. • Defense-grade, dual persona container. • IT control of security of corporate data and resource access. • Personal information controlled entirely by user.
  • 6. KNOX Cloud Solutions (KNOX Express and KNOX Premium) My KNOX KNOX Workspace KNOX Customization SMB Enterprise, Government and other verticals Security and productivity for all business users Individuals KNOX platform KNOX Enabled App
  • 7. KNOX maximizes Android security Key differentiators: • Defense-grade, hardware anchored security • Fully enterprise-ready • Cost control and ease of deployment • Best end-user experience Enterprise-ready Deep IT Integration/support and best end-user experience Application security Secure app access and data protection Device security Secure hardware design and manufacturing with boot, load, and run-time defenses
  • 8.
  • 9. What’s new in KNOX? Key features in KNOX 2.6 Increased end user productivity Industry-leading Android for Work support and integration A more powerful partner ecosystem Advanced security Granular management for tighter control
  • 10. Industry-leading Android for Work support and integration Google Play for Work support KNOX Workspace supports Google Play for Work for better IT app deployment and employee app discovery and download. Android for Work hardened by KNOX Android for Work managed profiles now integrates deeper into the KNOX platform for boot and run time protections, enhanced encryption, and improved security.
  • 11. Advanced security KNOX Mobile Enrollment improvements More safety measures protect the process of bulk enrollment of devices from network attacks. VPN HTTP Proxy Authentication HTTP Proxy configurations over VPN for KNOX Workspace now support proxy authentication. Kernel address space layout randomization The KNOX platform now ensures that the memory address of kernel data structures and code are randomized from one device to another. Enhanced Real-time Kernel Protection (RKP) RKP monitors some critical kernel data structures to verify that they are not exploited by attacks. This feature extends RKP security to Namespace Data Structure protection.
  • 12. Increased end-user productivity Multi Window support for KNOX End users now can use apps in KNOX Workspace alongside apps outside KNOX Workspace. Enable speech-to-text in KNOX Workspace End users can use Google Voice with apps inside KNOX Workspace. Clipboard / copy and paste outside to inside IT admins now can allow end users to copy/ paste from outside KNOX Workspace into KNOX Workspace.
  • 13. Granular management for tighter control Trust Anchor Management On BYOD devices used for play and work, the end user and IT admin can choose to trust different sets of Certification Authority (CA) certificates. Data Loss Prevention (DLP) Enables IT admins to enforce tighter policies on the KNOX container and its apps to restrict and prevent enterprise data loss or leakage. Per-app roaming control Now IT admins can control which apps are allowed to use mobile data when the user is connected to a roaming network.
  • 14. A more powerful partner ecosystem KNOX Enabled Apps enhancements Enhancements to KEA give app developers increased flexibility. KNOX Customization SDK App developers gain the ability to customize apps for Standard and Premium SDKs. Attestation API Developers can use this to determine whether a device is secure enough to enable their app to run.
  • 15. KNOX works on many Samsung devices 30+ Samsung models supported in countries around the world
  • 16.
  • 17. Wide support from leading MDM vendors Strong community of MDM partners makes it possible to quickly enable KNOX in any enterprise Key partners integrate their own secure containers with KNOX platform 3rd party container MDM
  • 18. Ecosystem of enterprise solution partners Business Apps VPN Smart Card/CACAuthentication Secure Voice/SMS Enterprise Billing Advanced Mobile SecurityIAM/SSO
  • 19. The most secure Android – only with Samsung Supports any business user on innovative, widely adopted Samsung devices. Meets the security requirements of IT and productivity needs of users – maximizing Android security and productivity. New features supported with our latest devices, including the Galaxy S7, S7 edge, S6, S6 edge, S6 edge+ and Note 5. For more information visit www.samsungknox.com

Editor's Notes

  1. Today we are going to give you an overview of our latest advancements with Samsung KNOX, the most secure Android solution – delivered through the most popular Android device manufacturer, Samsung 
  2. Our approach to security and management addresses real-world challenges that enterprises are faced with when it comes to mobility solutions. Most enterprises are offering a BYOD or COPE program today. And Android devices are heavily in demand by users. Eight of every 10 phones on the market are Android devices, and that trend is expected to hold steady through to 2019. And yet, there is a clear division of what is important to business users and IT when it comes  to mobility. IT wants devices that:  Provide strong security and control Integrate easily with existing infrastructure Keep deployment, maintenance and upgrade costs low Users, on the other hand, want devices that: - Make me productive - Protect my privacy - Give me a wide choice of features In many cases, these requirements are working against each other. That is what makes KNOX so valuable in enterprise scenarios. Using KNOX, you get the best of both worlds – the security and control IT is looking for and the sleek design, productivity, and cutting edge features that users want in Galaxy smartphones and tablets.  
  3. Samsung manufactures and configures its devices in its own factories, which gives Samsung total control over the state of the device software leaving the factory. From the hardware root of trust to the Android framework and all the layers in between, Samsung KNOX has security and protection measures in place. • Device integrity to ensure devices have not been compromised at any point from manufacturer to user. • Trusted boot process to guarantee that the precise, full set of allowed software is loaded and run. • Corporate data security to keep strict separation and isolation of personal and corporate applications and data. • Enterprise-ready features, such as SSL VPN support, On-Device Encryption, and Single Sign-On, to meet mobile security compliance requirements. With Samsung KNOX you get real time device protection from the moment you turn on the device. From the hardware root of trust to the Android framework and all the layers in between, Samsung KNOX has security and protection measures in place.
  4. KNOX Workspace is a defense-grade dual persona container product designed to separate, isolate, encrypt and protect work data from attackers.  This work/play environment ensures work data and personal data don’t mix and that only the work container can be managed by the company.  Personal information such as pictures and messages are not managed or controlled by the IT department.  The KNOX Workspace product is tightly integrated into the KNOX platform when activated.
  5. Samsung offers solutions built on the KNOX platform to meet the needs of any industry or organization type. Samsung also offers protection for third-party apps with the KNOX Enabled App container solution. KNOX solutions deliver security for individual users (My KNOX), for SMB organizations (KNOX Express and KNOX Premium) that need cloud-based options to reduce administrative overhead, and for enterprises and governments (KNOX Workspace) that require highly customized and locked down mobility solutions (KNOX Customization).
  6. As the clear leader in security and enterprise readiness among all Android OEMs, Samsung KNOX builds on Android to deliver a comprehensive security solution that addresses these real-world issues for the most demanding enterprise customers. The most secure Android solution is delivered by Samsung, on Samsung devices with KNOX. Key differentiators include: Defense grade, hardware anchored security foundation Hardware to application level security – Security measures in every layer of the Android stack and Samsung device hardware OEM controlled (e.g. root key and certificates) Internationally recognized certifications including: FIPS* 140-2 : US Federal Gov’t Requirement (Nov, 2011) DISA* STIG* : US DoD Security Requirement (May, 2013) Common Criteria* MDFPP* : Requirement to access US classified information (Feb, 2014) DISA* Approved Product List : Approved Mobile Product in US DoD systems (Jun, 2014) CSFC* List : the only Approved mobile product to access US classified data (Sep, 2014) ISCCC : Security solution certificate by the China Information Security Certification Center (December 2015) ANSII: First level security certification from the French national security agency (December 2015) Ensures that system software is authentic (come from a trusted source and it is not been modified) Fully enterprise-ready: Extensive support and integration with popular IT solutions Deeper integration with key MDM solutions Wide range of VPN support (Cisco, F5, Juniper, Strongswan, Mocana, etc..) Single Sign On (Microsoft, Kerberos, CA, Centrify, More to come  vs google set of services only) Rich integration with Exchange email (certificate based authentication) Microsoft AD for container login Cost control and ease of deployment Enterprise billing capabilities Bulk enrollment of devices with KNOX Mobile Enrollment        The best end user experience Familiar and intuitive experience for apps with options for preferred UI layout (e.g. folder view that makes it even more seamless/easy to access work apps) Many of the great Samsung device end user security and productivity features (e.g. multi-tasking, fingerprint scanner, S-pen, keyboard case accessory) work with KNOX Details on Certifications below: -------------------------------------------- FIPS 140-2 National Institute of Standards and Technology (NIST) publication FIPS 140-2 defines security requirements for cryptographic modules. Samsung Kernel Cryptographic Module (Cert #1915) Samsung Kernel Cryptographic Module (Cert #2214) Samsung devices also make use of FIPS certified cryptography ... Certification UK CESG CESG is the National Technical Authority for Information Assurance within the UK. CESG has published the following End User Device (EUD) security guidance for Samsung devices. Samsung Devices with Android 4.2 Samsung devices with KNOX Samsung devices with KNOX 2.x Additional resources Samsung KNOX ... Certification Common Criteria Common Criteria certification that complies with the Protection Profile for Mobile Device Fundamentals. ... with KNOX 2 Samsung has obtained the following Common Criteria certification that complies ... Certification Australian Signals Directorate ASD has published the following announcement endorsing the Protection Profile for Mobile Device Fundamentals as well as recognizing evaluations against this Protection Profile. Samsung Galaxy Devices with Qualcomm Snapdragon Processors including the Galaxy S4, Galaxy Note 3, and the Galaxy NotePRO ... Certification Finland Finnish Communications Regulatory Authority (FICORA) has successfully evaluated Samsung Knox against protective level IV defined by the Finnish Security Auditing Criteria (KATAKRI II).-8 ... Certification U.S. Department of Defense (DoD) The DoD Defense Information Systems Agency ’s (DISA) Field Security Office (FSO) publishes Security Technical Implementation Guide (STIG). Samsung has obtained approval for the following STIGs. Samsung Android (with KNOX 1.0) STIG Version 1  Zip file Checklist details Samsung Android (with KNOX 1.x ...
  7. Samsung continually updates the KNOX portfolio to address requirements for enabling secure mobility in a way that satisfies IT’s need for control, while also bolstering worker productivity. We’ve just released several significant updates that we’ll cover in the next few slides, but the value these new capabilities provide help organizations capitalize on the potential offered by Android 6.0 Marshmallow. We’ve grouped these features into five key themes that we’ll address over the next few slides…
  8. In KNOX 2.4 we introduced support for Android for Work, allowing users to install both services on their devices without any conflict. In KNOX 2.6 we’ve further augmented that support with deeper integration between KNOX and AfW. Google Play for Work inside KNOX Workspace: Allows Enterprises/IT admins to perform app management (silent install/uninstall, whitelist/blacklist) using Google Play for work inside KNOX workspace. Play for work shows filtered list of apps for the users to download. AfW hardened by KNOX: By default, the Managed Profile on a Samsung device now benefits from KNOX as follows: - Access to the Managed profile is contingent on the integrity of the device - Sensitive Data Protection can be utilized by apps inside managed profile without any need for additional license activation - Managed profile uses TIMA Keystore for storing certificates by default - Certificates are stored, by default, in the TIMA Keystore - Exposes and uses Secure Data Policy APIs for AfW apps
  9. Our priority around KNOX 2.6 was to reinforce our already robust platform and address potential vulnerabilities. KNOX products and services continue to evolve to address new mobile security threats. We’ve improved the security around KNOX Mobile Enrollment to address network and enrollment time vulnerabilities. These include certificate pinning and mutual authentication of network requests made from the device to the Samsung Mobile Enrollment server. For KNOX Workspace, HTTP Proxy configurations over VPN now support proxy authentication via NT LAN Manager and basic authentication. The NT LM provides a suite of authentication and session protocols for HTTP Proxy over VPN. We’ve also enhanced real time kernel protection, which monitors critical kernel data structures to verify they are not exploited by attacks. It also prevents access to privileged mode and prevents privileged folders from being moved to a different location. This new enhancement extends RKP protection to the Security Data Structure and Namespace data. With kernel address space layout randomization (or KASLR), we’ve randomized and obfuscated the address space layout of kernel modules and data. Attacks on kernel data structures in part depend on determining the address of the data the attackers wish to modify. On devices without KASLR, the data structures are identical, making it an easy job for attackers. KASLR protects and reinforces the KNOX platform by randomizing the memory address of kernel data structures and code.  
  10. KNOX Workspace supports key productivity features for more seamless work and personal interactions. Our new Multi Window support means end users can view a video on the personal side of their device, while taking notes on an app inside the container. Google Voice now works on apps inside the KNOX Workspace container, allowing users to dictate speech into text. And IT admins can now set permissions to allow users to copy and paste text from outside the KNOX Workspace into apps inside the KNOX Workspace container. Copying from the container to the personal space remains restricted, keeping confidential data confidential.
  11. We’ve created more tools for IT admins to manage apps and data on devices including policies to enforce security updates and other app controls. Trust Anchor Management allows IT admins and end users to choose different sets of CA certificates on BYOD devices. This provides both groups with the freedom of choice to control their own space. IT can now also determine which apps are allowed to use mobile data when a device is connected to a roaming network. This ensures that a user’s personal apps don’t use enterprise mobile data during business travel, helping manage costs. We’ve added Data Loss Protection, a set of policies and associated APIs that enables enterprises to enforce file and document management policies for apps in the container. These include expiration dates, forwarding rules, app whitelisting and more. What this means is if a user downloads and stores an email attachment using an email app in the KNOX container, they will not be able to forward that attachment to their personal email. This helps enterprises have tighter control of their content, and helps mitigate human error or data breaches.
  12. And also in KNOX 2.6 we’ve created more tools to better enable our ISV, SO and MDM partners to build secure and custom solutions for their customers. Enhancements to KNOX Enabled App have been designed to give developers more flexibility. New features include user access to internal memory in personal mode, and the ability for users to save app data and settings when an app is upgraded to KEA. We’ve upgraded the KNOX Customization SDK to allow for even more customization capabilities. This includes enhanced system control to add or remove widgets and shortcuts to the home screen, auto-boot on power-on, add or remove items from the status bar, and allow removal of the Edit button. Partners may also add items in Settings for Professional Kiosk mode. In addition, the new Attestation API enables ISVs and individual developers to establish an attestation server with an attestation-only license. This allows them to determine device functionality before proceeding with the sensitive functionality of the application.
  13. KNOX works on many Samsung devices – including the new Galaxy S7 and S7 edge, the Galaxy S6 phones, and Note 5 – so that you can be assured that your devices are fully secured and equipped for business. We will continue to expand support for KNOX across as many Samsung mobile devices as we can.    
  14. KNOX also has strong support for our partner community.  MDM vendor support means that IT can centrally monitor and manage Samsung devices and enforce security and compliance controls. Samsung works closely with each of these vendors to ensure they can rapidly take advantage of any new features in the KNOX platform. These MDM vendors have added important functionality to enterprise mobility, leveraging KNOX features to ensure: - Manageability of KNOX Workspace - Planned support for Galaxy S6 edge+ and Note 5 - KNOX 2.x integration
  15. From a solution and app perspective, Samsung also works closely with a broad set of ISVs to ensure that you can arm your workers with the applications they need to be secure and productive. There also are popular business productivity and security apps available on Google Play.
  16. So to recap, KNOX makes it possible to support any business user – whether an individual, an SMB, or an enterprise – on many of the wildly popular, innovative mobile devices that Samsung has in the market. It maximizes the baseline security available in Android, ensuring that companies have all of the data security, application security, and enterprise-ready features necessary to enable Samsung devices to interact securely with their networks. The new features available for IT administrators and users are available now with Galaxy S7, S7 edge, S6, S6 edge, S6 edge+ and Note 5 devices. In the meantime, you can visit samsungknox.com for the latest information.