Knox Deep Dive: Real-time Kernel Protection (RKP)

Knox Deep Dive: Real-time Kernel Protection (RKP)

The Knox platform’s patented Real-time Kernel Protection (RKP) is the industry’s strongest protection against kernel threats and exploits. RKP works seamlessly out-of-the-box, with no setup required. Simply powering on a Samsung Knox device provides world-class threat protection and attack mitigation. RKP supports the rest of the Knox security offerings to provide full security coverage without the typical gaps anticipated with mobile devices.

 

Why does kernel protection matter?

 

Kernel protection is central to device security and enterprise data protection.

 

A compromised kernel can leak sensitive data and even allow remote monitoring and control of the affected device. Other more commonplace protections like Secure Boot […] Read more

Knox Platform for Enterprise goes beyond Android Enterprise

Knox Platform for Enterprise goes beyond Android Enterprise

Samsung and Google have been diligently working to advance and secure enterprise mobility, and today we see improvements around both Google’s Android operating system and Samsung’s Knox platform that make it easier than ever for businesses to stay connected, protected, and productive.

 

Samsung launched Knox in 2013, designing a mobile security platform that was embedded into the hardware and software of most of its Android tablets and smartphones. We built a suite of IT solutions that leverage this platform and address a variety of business needs through the entire device life cycle. Today, we call this evolved platform Knox Platform for Enterprise (KPE).

 

During this time, Google […] Read more

App and Data Protection – Enterprise Productivity Apps

App and Data Protection – Enterprise Productivity Apps

Mobile apps have changed the way we work by providing new channels of communication, innovating customer engagement, and empowering organizations with critical data in real-time. Samsung Knox devices include a set of productivity apps for both personal and business use.

 

Business-critical apps include Samsung Email, Internet browser, Calendar, and Contacts. Enterprise IT admins can secure these apps within the Knox Workspace, along with other apps used by the enterprise.

 

The Knox Platform secures enterprise apps and protects con app data through these methods:

 

App installations and updates:

Apps are pre-inst within the mobile device’s secure Knox Workspace a can update these apps independent of […] Read more

Data Protection

Data Protection

Enterprises can protect personal and enterprise data on mobile devices using a rich set of Knox features:

 

User authentication:

Samsung Knox devices support not just password, PIN, and pattern authentication but also the latest biometric authentication: fingerprints, iris, face, and Intelligent Scan. Options are available for both device lockscreen authentication and separate Knox Workspace authentication. Through the Knox Platform, you can provide enforce two-factor authentication for the Knox Workspace or enterprise AD credentials to ensure stronger data protection.

 

Encryption of device data:

Samsung Knox devices provide data encryption through Sensitive Data Protection that binds to the hardware-backed Root of Trust and user authentication. This […] Read more

Knox Platform Differentiators

Knox Platform Differentiators

The Knox Platform provides a robust set of features that are a superset of features on top of the basic Android platform, to fill security and management gaps, resolve pain points identified by enterprises, and meet the strict requirements of highly regulated industries. The following summarizes the key differentiating features:

 

Security highlights

The following sections describe how the Knox Platform provides an industry-leading ecosystem of products and services to secure and ease mobile device management.

 

 

Hardware-backed security

 

The Knox Platform defends against security threats and protects enterprise data through layers of security built on top of a hardware-backed trusted environment.

 

Trusted environment:        […] Read more