Knox Deep Dive: Real-time Kernel Protection (RKP)

Knox Deep Dive: Real-time Kernel Protection (RKP)

The Knox platform’s patented Real-time Kernel Protection (RKP) is the industry’s strongest protection against kernel threats and exploits. RKP works seamlessly out-of-the-box, with no setup required. Simply powering on a Samsung Knox device provides world-class threat protection and attack mitigation. RKP supports the rest of the Knox security offerings to provide full security coverage without the typical gaps anticipated with mobile devices.

 

Why does kernel protection matter?

 

Kernel protection is central to device security and enterprise data protection.

 

A compromised kernel can leak sensitive data and even allow remote monitoring and control of the affected device. Other more commonplace protections like Secure Boot […] Read more

Knox Platform for Enterprise goes beyond Android Enterprise

Knox Platform for Enterprise goes beyond Android Enterprise

Samsung and Google have been diligently working to advance and secure enterprise mobility, and today we see improvements around both Google’s Android operating system and Samsung’s Knox platform that make it easier than ever for businesses to stay connected, protected, and productive.

 

Samsung launched Knox in 2013, designing a mobile security platform that was embedded into the hardware and software of most of its Android tablets and smartphones. We built a suite of IT solutions that leverage this platform and address a variety of business needs through the entire device life cycle. Today, we call this evolved platform Knox Platform for Enterprise (KPE).

 

During this time, Google […] Read more

Unique Advantages of Knox App Management

Unique Advantages of Knox App Management

What sets the Knox platform apart from other mobile platforms are the advanced app management features not found in other solutions, providing additional advantages that enable enterprises to be fully efficient and productive.

 

App control

Clear cache data:

Remove cache memory for an individual or list of apps to help optimize space and have complete control over your data.

Set default apps by intent:

Set an app as the primary app for a given task. For example, ensure your solution only uses a certain Internet browser or force your SMS service to comply with your strict company policies.

Admin privilege:

An admin can prevent the activation […] Read more

App and Data Protection – Enterprise Productivity Apps

App and Data Protection – Enterprise Productivity Apps

Mobile apps have changed the way we work by providing new channels of communication, innovating customer engagement, and empowering organizations with critical data in real-time. Samsung Knox devices include a set of productivity apps for both personal and business use.

 

Business-critical apps include Samsung Email, Internet browser, Calendar, and Contacts. Enterprise IT admins can secure these apps within the Knox Workspace, along with other apps used by the enterprise.

 

The Knox Platform secures enterprise apps and protects con app data through these methods:

 

App installations and updates:

Apps are pre-inst within the mobile device’s secure Knox Workspace a can update these apps independent of […] Read more

Remote Control & Unique Advantages of Knox Remote Control

Remote Control & Unique Advantages of Knox Remote Control

With the increasing complexity of problems that IT admins must solve, Knox Remote Control provides IT admins a powerful way to quickly and remotely fix issues. Not only can IT admins have real-time access to what the remote device screen is displaying, but also control it by injecting actions such as finger, keyboard, and mouse events. Although other mobile platforms also offer remote viewing of remote device displays, only Knox provides built-in remote control of devices without requiring third-party solutions.

 

Here is an example use case:

An enterprise employee is on a business trip. On encountering a problem with the company-issued mobile […] Read more

Granular Device Management – Custom Boot Banner

Granular Device Management – Custom Boot Banner

Samsung Knox is the only mobile platform that allows an enterprise to natively change the device boot logo. In many industries, such as government or defense, this change is mandatory for compliance. Through the Knox Platform, enterprise IT admins and developers can customize the following:

 

Samsung boot up display
Splash screen animation, when the device is turned on or off
Lockscreen image, which can provide an enterprise logo or contact info for lost phones

 

Enterprises can use these capabilities to mitigate problems such as the following:

Phone is lost and found:

Owner information is available by simply powering on the device. There is no need to […] Read more

Indah Water Konsortium Venture into Digitization with Digi and Syndes®

Indah Water Konsortium Venture into Digitization with Digi and Syndes®

#SYNDES crews together with Digi conduct #Knox training today to Indah Water Konsortium Sdn Bhd team on device management. We all took a big leap forward to integrate digitalization.

Making a leap in digital transformation is not an overnight sensation, but take a systematic approach with step-wise practices. #digitalization #productivity#mobility #Samsung

Follow us on our official Instagram @syndesbiz (www.instagram.com/syndesbiz) to know-how a great digital leap forward add up overall business value in the different dimension

[…] Read more

Granular Device Management – Split Billing (Dual APN)

Granular Device Management – Split Billing (Dual APN)

Split billing separates enterprise and personal data usage.

 

In Bring Your Own Device (BYOD) deployments, enterprise billing allows employees to be properly compensated for data costs generated from work-related app usage.
In Corporately Owned, Personally Enabled (COPE) deployments, enterprise billing allows employers to pay for data usage incurred only for work purposes.

 

Split billing also works with dual SIM devices, by mapping some apps to using the data plan from one SIM, and other apps to the other SIM’s data plan.

[…] Read more

Bring Your Own Device doesn’t come without risk

Bring Your Own Device doesn’t come without risk

The growing adoption of mobile devices in business, boosted by trends such as Bring Your Own Device doesn’t come without risk. Devices, holding your companies’ deepest secrets, get lost or stolen.

It happened to NASA a couple years ago when a laptop holding an unencrypted list of employee contacts got stolen. Another tragic incident which it happened a hospital in Connecticut that lost 9000 patient. Find out more:https://www.awingu.com/what-is-the-true-cost-of-a-lost-mobile-device/ records.

[…] Read more

Granular Device Management – Remote Admin Lock of Device

Granular Device Management – Remote Admin Lock of Device

This feature allows an IT admin to remotely lock out a device, for example, when the device is out of compliance. Once the device is locked, only an IT admin can unlock it and not a device user. This functionality solves two problems:

 

Prevents unauthorized users from accessing the device if it gets lost or stolen.
Prevents users with valid login credentials from using the device, for example, if the credentials are stolen or the user is no longer allowed to use the device.

 

With stock Android, an IT admin can lock a device only if it is currently unlocked. If the device […] Read more