App and Data Protection – Enterprise Productivity Apps

App and Data Protection – Enterprise Productivity Apps

Mobile apps have changed the way we work by providing new channels of communication, innovating customer engagement, and empowering organizations with critical data in real-time. Samsung Knox devices include a set of productivity apps for both personal and business use.

 

Business-critical apps include Samsung Email, Internet browser, Calendar, and Contacts. Enterprise IT admins can secure these apps within the Knox Workspace, along with other apps used by the enterprise.

 

The Knox Platform secures enterprise apps and protects con app data through these methods:

 

App installations and updates:

Apps are pre-inst within the mobile device’s secure Knox Workspace a can update these apps independent of […] Read more

Remote Control & Unique Advantages of Knox Remote Control

Remote Control & Unique Advantages of Knox Remote Control

With the increasing complexity of problems that IT admins must solve, Knox Remote Control provides IT admins a powerful way to quickly and remotely fix issues. Not only can IT admins have real-time access to what the remote device screen is displaying, but also control it by injecting actions such as finger, keyboard, and mouse events. Although other mobile platforms also offer remote viewing of remote device displays, only Knox provides built-in remote control of devices without requiring third-party solutions.

 

Here is an example use case:

An enterprise employee is on a business trip. On encountering a problem with the company-issued mobile […] Read more

Granular Device Management – Custom Boot Banner

Granular Device Management – Custom Boot Banner

Samsung Knox is the only mobile platform that allows an enterprise to natively change the device boot logo. In many industries, such as government or defense, this change is mandatory for compliance. Through the Knox Platform, enterprise IT admins and developers can customize the following:

 

Samsung boot up display
Splash screen animation, when the device is turned on or off
Lockscreen image, which can provide an enterprise logo or contact info for lost phones

 

Enterprises can use these capabilities to mitigate problems such as the following:

Phone is lost and found:

Owner information is available by simply powering on the device. There is no need to […] Read more

Granular Device Management – Split Billing (Dual APN)

Granular Device Management – Split Billing (Dual APN)

Split billing separates enterprise and personal data usage.

 

In Bring Your Own Device (BYOD) deployments, enterprise billing allows employees to be properly compensated for data costs generated from work-related app usage.
In Corporately Owned, Personally Enabled (COPE) deployments, enterprise billing allows employers to pay for data usage incurred only for work purposes.

 

Split billing also works with dual SIM devices, by mapping some apps to using the data plan from one SIM, and other apps to the other SIM’s data plan.

[lvca_spacer] […] Read more

Bring Your Own Device doesn’t come without risk

Bring Your Own Device doesn’t come without risk

The growing adoption of mobile devices in business, boosted by trends such as Bring Your Own Device doesn’t come without risk. Devices, holding your companies’ deepest secrets, get lost or stolen.

It happened to NASA a couple years ago when a laptop holding an unencrypted list of employee contacts got stolen. Another tragic incident which it happened a hospital in Connecticut that lost 9000 patient. Find out more:https://www.awingu.com/what-is-the-true-cost-of-a-lost-mobile-device/ records.

[…] Read more

Granular Device Management – Remote Admin Lock of Device

Granular Device Management – Remote Admin Lock of Device

This feature allows an IT admin to remotely lock out a device, for example, when the device is out of compliance. Once the device is locked, only an IT admin can unlock it and not a device user. This functionality solves two problems:

 

Prevents unauthorized users from accessing the device if it gets lost or stolen.
Prevents users with valid login credentials from using the device, for example, if the credentials are stolen or the user is no longer allowed to use the device.

 

With stock Android, an IT admin can lock a device only if it is currently unlocked. If the device […] Read more

Device Software Update Management – Knox Control over User Updates

Device Software Update Management – Knox Control over User Updates

A wide range of EMM partners support Samsung’s firmware management features, integrating firmware management with other asset management activities. IT admins can use these tools to test and deploy software updates in a consistent and low-risk way. Through EMM solutions, enterprises can restrict users from loading unauthorized firmware, through their devices or USB- connected computers.

 

Through the Knox Platform, enterprises can:

 

Prevent firmware rollback:

This option prevents valid, but out-of-date firmware versions from being maliciously or accidentally installed onto an enterprise’s devices. On Samsung Knox devices, a Rollback Prevention fuse encodes the minimum acceptable version of Samsung-approved software. With specific updates, the next […] Read more

New Data Finds Poor Enterprise Mobility Connectivity and Performance Costs Companies $20,000 Per Year, Per Mobile Worker

New Data Finds Poor Enterprise Mobility Connectivity and Performance Costs Companies $20,000 Per Year, Per Mobile Worker

More than 50 percent of today’s workforce is mobile and relies on technology to do their jobs – putting increased pressure on companies to find solutions that support productivity, reduce workforce downtime and provide clear ROI. Get insights from the latest research in this Computerworld article:

 

Sources: Soti

[lvca_spacer] […] Read more