White Paper: Samsung KNOX Value Propostion in the BYOD/COPE Market
|
|
|
- Noah Hawkins
- 10 years ago
- Views:
Transcription
1 : September 2013 Enterprise Mobility Solutions Samsung Electronics Co., Ltd.
2 Contents Acronyms 1 BYOD and COPE: The New Norm? 2 What 2 Introducing Samsung KNOX 3 An Overview of KNOX Security 4 Secure Boot 4 TIMA 4 SE for Android 5 ODE 5 VPN FIPS-Compliant Data Protection 5 Per-App VPN 5 KNOX Application Containers 6 How KNOX Addresses the 7 Providing Secure Mobile Access to a New Employee 7 Secure Access Via Intranet 8 Secure Access to SaaS Apps 8 Ensuring Security of Enterprise Data on the Mobile Device 9 Preventing File Security Data Leakage 9 Preventing Copy and Past Data Leakage 10 Secure App Data on a Device 10 Use of Smart Card Authentication 11 Ensuring Device Integrity 11 Improving Employee Productivity from a Mobile Device 12 Enabling SSO for Mobile Apps 12 Dual Persona in BYOD and COPE 13 Protecting Against a Temporarily Missing Device 15 Terminating Mobile Access when an Employee Leaves 15 Recovering from a Stolen Device 16 Summary 17 Additional Resources 17 About Samsung Electronics Co., Ltd. 18
3 Acronyms AES BYOD CAC COPE DAR DoD FIPS IKE MAC MDM NIST NSA ODE PBKDF2 ROM SaaS SE for Android SE Linux SSO TIMA VPN Advanced Encryption Standard Bring Your Own Device U.S. Common Access Card Corporate owned, personally enabled Data-at-Rest U.S. Department of Defense Federal Information Processing Standard Internet Key Exchange Mandatory Access Control Mobile Device Manager National Institute of Standards and Technology (US) National Security Agency On Device Encryption Password-Based Key Derivation Function 2 Read-Only Memory Software as a Service Security Enhancements for Android Security-Enhanced Linux Single Sign-On TrustZone-based Integrity Measurement Architecture Virtual Private Network 1 page
4 A successful BYOD or COPE program requires a strong, secure, yet flexible device security architecture. BYOD and COPE: The New Norm? Once smartphones began entering the marketplace in 2007, it was only a matter of time before programs like Bring Your Own Device (BYOD) and the subsequent Corporate-Owned, Personally Enabled (COPE) began to arise. With the desire for employees to be responsive to customers and colleagues 24/7, new technologies have provided employees the ability to access corporate databases, attend real-time company videoconferences, and view presentations all with their mobile device. BYOD refers to employees who take their personal device smartphone, laptop or tablet to work to connect to a corporate network in order to securely access company information. COPE, on the other hand, takes the opposite approach by allowing employees to put personal data on a company-owned, corporate liable (CL) work device of their choice. Essentially a morphing of BYOD and CL, COPE arose as an alternative offering for companies with concerns over potential security risks using BYOD in their organization. Some of the benefits both programs offer include: BYOD: IT: - Can shift costs to employee - Not responsible for maintenance and upkeep of device Employee: - Can use device of choice - Improvement in effenciency and productivity COPE: IT: - Selects preferred device(s) - Selects cost-sharing model Employee: - Devices kept up-to-date by IT - Have support of IT What Mixing personal and business applications and data has the potential to introduce malware such as viruses that can infect devices and potentially lead to corporate data being compromised. In addition, devices with sensitive corporate data on them may be lost or stolen. As a result, for a BYOD or COPE program to even be considered by an enterprise company, let alone be successful, a strong, secure, yet flexible device security architecture is required. One that gives enterprise IT administrators the power to control and protect their company's assets, while at the same time preserving a user's personal data and information. At a miminum, an enterprise company would expect the following requirements be met before implementing a BYOD or COPE program with their employees: Providing secure mobile access to a new employee Securing corporate interests Ensuring employee privacy Improving employee productivity from a mobile device Securing a lost or missing device Samsung KNOX meets each of these requirements. 2 page
5 "Samsung KNOX was developed to provide a more compelling and secure enterprise experience." Introducing Samsung KNOX Samsung KNOX is a new Android-based mobile solution designed specifically to satisfy enterprise requirements. Samsung KNOX retains full compatibility with Android and the Google ecosystem while integrating fundamental security and management enhancements. All of these advantages make Samsung KNOX the perfect choice for both regulated and general enterprise environments. Samsung KNOX features one of the most comprehensive Mobile Device Management (MDM) capabilities available. Samsung KNOX, combined with its unique application container technology, enables enterprises to support both BYOD, COPE, and Corporate-Liable models without compromising corporate security or employee privacy. In addition, Samsung KNOX is US Government and Department of Defense (DoD) approved for compliance with initiatives, requirements and standards for mobile device security to enable its use in government and other highly regulated enterprise environments. Note: This document discusses how Samsung KNOX can benefit an enterprise market. For more information on the Samsung KNOX platform itself, refer to the An Overview of Samsung KNOX white paper. 3 page
6 "KNOX addresses security at the operating system level in a comprehensive strategy." An Overview of KNOX Security Security is perhaps the most significant factor that will determine the success of BYOD and COPE. Samsung KNOX incorporates the following security functions that will help provide a more secure environment for these platforms: Trusted Boot TrustZone-based Integrity Measurement Architecture (TIMA) Security Enhancements for Android (SE for Android) On-Device Encryption (ODE) VPN Tursted Boot, TIMA and SE for Android form the first line of defense against malicious attacks on the kernel and core boot strap processes. KNOX Security Trusted Boot TIMA SE for Android ODE VPN Secure Boot is a security mechanism that prevents unauthorized boot loaders and operating systems from loading during the startup process. Firmware images, such as operating systems and other system components, that are cryptographically signed by known, trusted authorities are considered as authorized firmware. Nevertheless, Secure Boot is limited in that the evidence of authorized firmware is not preserved after the system boot. Furthermore, in some markets, due to the need to give consumers the freedom to put custom Android OS images on their devices, Secure Boot is not extended to the OS kernel. As a result, there is no guarantee for enterprise users that their Android system is enforcing OS level security protection, such as SE for Android, which is essential for protecting enterprise apps and data. Samsung KNOX implements Trusted Boot to address these limitations of Secure Boot. Trusted Boot provides recorded evidence of firmware running on the device in the form of measurements stored securely in Trust-Zone. At system run time, TrustZone applications on the KNOX platform will use these measurements to make security critical decisions, such as verify the release of security keys, container activation, etc. KNOX Security Trusted Boot TIMA SE for Android ODE VPN KNOX utilizes SE for Android (Security Enhancements for Android) to enforce Mandatory Access Control (MAC) policies to isolate applications and data within the platform. SE for Android, however, relies on the assumption of OS kernel integrity. If the Linux kernel is compromised (by a perhaps as yet unknown future vulnerability), SE for Android security mechanisms could potentially be disabled and rendered ineffective. Samsung s TrustZone-based Integrity Measurement Architecture (TIMA) was developed to close this vulnerability. Introduced in Samsung KNOX as a unique feature on Samsung mobile devices, TIMA uses ARM TrustZone hardware and provides continuous integrity monitoring of the Linux kernel. The ARM TrustZone hardware effectively partitions memory and CPU resources into a secure and non-secure world. TIMA runs in the secure-world and cannot be disabled, while the SE for Android Linux kernel runs in the non-secure world. When TIMA detects that the integrity of the kernel or the boot loader is violated, it resonds with a policy-driven action. One of the policy actions disables the kernel and powers down the device. 4 page
7 KNOX Security Trusted Boot TIMA SE for Android ODE VPN Security-Enhanced Linux (SE Linux) is a technology invented by the NSA in 2000 and has long been established as the standard for securing enterprise Linux assets. Samsung R&D teams have worked very closely with the NSA to port and integrate this technology into Android. This port of SE Linux to Android is commonly referred to as Security Enhancements for Android, or SE for Android. SE for Android provides an enhanced mechanism to enforce the separation of information based on confidentiality and integrity requirements. This additional security, on top of Linux, reduces threats of tampering and bypassing of application security mechanisms. It also minimizes the amount of damage that can be caused by malicious or flawed applications, as applications are provided the minimum amount of permission required for their task. KNOX Security Trusted Boot TIMA SE for Android ODE VPN The On-device Encryption (ODE) feature allows users and enterprise IT administrators to encrypt data on the entire device, as well as any configured Samsung KNOX Container. The ODE feature on Samsung devices uses a Federal Information Processing Standard (FIPS) certified Advanced Encryption Standard (AES) cipher algorithm with a 256-bit key (AES-256) and offers the levels of security required by government and regulated industries such as healthcare and finance. The encryption feature spans both internal storage (system partition and internal SD card) as well as any user-installed external SD card. Note: KNOX Container data cannot be stored on an external SD card. KNOX Security Trusted Boot TIMA SE for Android ODE VPN Samsung KNOX offers a high level of comprehensive support for an enterprise virtual private network (VPN). This enables businesses to offer their employees an optimized, secure path to the enterprise intranet from their BYOD, or corporate-issued device. FIPS-Compliant Data Protection KNOX VPN is FIPS certified enabling its use in regulated environments like government, healthcare, and finance, and offers broad support for the IPSec protocol suite: Internet Key Exchange (IKE and IKEv2) Triple DES (56/168-bit), AES (128/256-bit) encryption Split tunneling mode NSA Suite B Cryptography Per-App VPN Another distinguishing feature of the KNOX VPN feature is the ability for enterprise IT administrators to configure, provision, and manage the use of VPN on a per-application basis. This capability allows the enterprise to automatically enforce the use of VPN only on a specific set of corporate applications. This has the benefit of ensuring that enterprise data is communicated on a secure connection while keeping the user s personal data from overloading the company s Internet connection. In addition, the per-app VPN feature allows personal-use applications to bypass the VPN and connect directly to the Internet, preserving the users privacy. The per-app VPN capability is also available for applications within a KNOX Container. Other features of a KNOX VPN implementation include: Up to 5 simultaneous VPN connections RSA SecureID support for Cisco VPN gateways Common Access Card (CAC) support for government use 5 page
8 "KNOX provides enterprises the ability to create and manage a secure Container within their employee s personal mobile device." KNOX Application Containers KNOX Application Containers A Samsung KNOX Container is a virtual Android environment within a mobile device, complete with its own home screen, launcher, applications, and widgets. Applications and data inside the Container are isolated from applications outside of it (a user's personal area), making this an ideal solution for companies that wish to implement a BYOD or COPE program for their employees. Likewise, applications inside the Container generally do not have the ability to interact with applications or access data outside the Container. However, some applications inside the Container can be granted read-only access to data outside the Container via a policy configuration. For example, photos taken from the camera inside the Container won t be viewable from the Gallery outside the Container in a user s personal area. Likewise, any contacts or bookmarks created outside the Container won t be available inside the Container. The same applies to calendar events and copying/pasting. A Samsung KNOX Container This total isolation of applications and data within the Container provides a solution for the data leakage associated with the BYOD model. Data leakage occurs when a user sends sensitive or critical information outside of the corporate network via a personal account, social network site, or public cloud storage system. Read more on data leakage in the "Ensuring Security of Enterprise Data on a Mobile Device" section of this document. KNOX allows a Work Container to be setup for corporate applications such as , calendar, browser, and storage clients. The Container will ensure that any data downloaded from the enterprise, such as attachments and files, cannot be accessed by applications outside the Container, All the data stored by applications inside the Container are encrypted via strong encryption algorithms (AES-256). A password is required to gain access to applications inside the Container. A KNOX Container is deeply integrated into the native Android platform. This deep integration enables a superior user experience that clearly separates the two environments to minimize user confusion, preserves the Android navigation paradigm in each environment for consistency, and provides a unified but privacy-aware view of notifications and active applications for efficiency. Furthermore, the deep integration allows the KNOX Container to execute at the system level and leverage additional security and isolation guarantees provided by SE for Android. 6 page
9 "Enterprises can customize KNOX to meet their specific mobility needs." How KNOX Addresses the The customizability of Samsung KNOX enables enterprises to tailor the deployment of KNOX to meet specific mobility needs. The following sections discuss typical enterprise use cases for mobility and how KNOX can address them. Providing secure mobile access to a new employee Ensuring security of enterprise data on the mobile device Improving employee productivity from a mobile device Protecting against a temporarily missing device device Terminating moble access when an employee quits Improvement of employee production Protecting against a temporarily missing device Terminating moble access when an employee leaves device Providing Secure Mobile Access to a New Employee The KNOX Container technology enables enterprises to create a secure zone within the device to host enterprise apps and data. The concept of a work zone is valuable in both BYOD and COPE environments. In BYOD environments, employees feel secure about their personal apps and data as the enterprise manages the Container representing the work zone and not the device. In COPE environments the enterprise can open up the corporate-issued device to employees, allowing them to install applications for personal use on the device, while maintaining full control of business apps and data in the work zone. Examples of KNOX features that enable this use case are: Remote Container creation Remote provisioning of the Exchange account inside the Container Remotely installing any custom enterprise applications These features are available as a result of KNOX providing the following: Secure access via intranet Secure access to SaaS apps 7 page
10 Improvement of employee production Protecting against a temporarily missing device Terminating moble access when an employee leaves device Secure Access Via Intranet Secure mobile access to server-based enterprise applications is a fundamental mobility requirement for the enterprise market, as compliance regulations and other factors require protection of data while in-transit. In addition, Virtual Private Network (VPN) access is crucial for personnel that travel or do field work, as data must be secure when using both cellular and Wi-Fi connectivity. As a result, KNOX VPN is FIPS certified with NSA Suite-B algorithms. Suite B is a set of cryptographic algorithms that serve as an interoperable cryptographic base for both unclassified and most classified information. In addition, the VPN client is integrated with the KNOX platform and provides broad VPN compatibility for most partner VPN solutions while spaning all levels of VPN security, including IPsec. Non-FIPS AES-256 IPSec VPN is available for MCM managed devices. Secure Access to SaaS Apps Access to Softare as a Service (SaaS) applications in the enterprise must be secured. In addition, combining enterprise and personal applications can consume precious resources, and classic split tunneling will not work as both destinations are in the cloud. Using the KNOX per-app VPN feature allows secure access to business applications and normal connectivity for personal applications while conserving enterprise resources. 8 page
11 Improvement of employee production Protecting against a temporarily missing device Terminating moble access when an employee leaves device Ensuring Security of Enterprise Data on a Mobile Device Samsung KNOX includes several features to ensure the security of enterprise data on the mobile device, both at-rest and in-transit. The security features provide broad coverage including protecting access to the work zone via a password, monitoring the device or work zone for unauthorized applications or tampering, encrypting application data on the device, and securing network connections to enterprise servers: Configure Container password requirements for the employee, for example minimum password length, use of special characters, expiry period, etc. Configure data encryption for the work zone, e.g. FIPS-mode for regulated enterprises Configure a VPN tunnel and specify what applications must use the VPN at all times Create a baseline of the device software and perform automatic periodic scans or on-demand scans to verify integrity of the system and enterprise applications KNOX safeguards and features designed to address these security aspects are described next. Preventing File Security Data Leakage When mixing personal and business use on the same mobile device, the threat of data leakage is increased. Data leakage, as explained earlier, occurs when a user sends sensitive or critical information outside of the corporate network via a personal account, social network site, or public cloud storage system. Examples of data leakage include: An is received with a file attachment that is downloaded and stored in memory /SD card. A file is downloaded to the device from enterprise storage and stored in memory/sd card. In both cases, the unsecured file is vulnerable to theft by malicious apps. The SD card can be stolen and file exploited (transferred to a PC via USB, etc.), or the attachment can be uploaded to a public cloud such as Facebook or Dropbox. KNOX also ensures that all mail attachments are secured and cannot leave the Container. Furthermore, the deep integration allows the KNOX Container to execute at the system level and leverage additional security and isolation guarantees provided by SE for Android. File sharing interaction is also restricted to enterprise storage resources only. 9 page
12 Improvement of employee production Protecting against a temporarily missing device Terminating moble access when an employee leaves devices Preventing Copy and Paste Data Leakage Data from a file can be copied within a Container and pasted into another application outside of the Container, such as S Memo. This can potentially expose sensitive, confidential corporate material in an unsecure environment. As a result, all Copy and Paste actions performed within the Container are prohibited outside of it. Thus, content copied within the KNOX Container can only be pasted into an application within the Container. In addition, the screen capture function in the Container has been deactivated. A KNOX Container is a virtual sandbox (or a Psuedo-Sandbox ) within the Android application layer which can control, manage, and restrict data and interactions between an application and the Android subsystem. In addition, the KNOX Container uses a separate file system completely isolated from the rest of the device. Securing App Data on a Device Enterprises must ensure that data stored on a mobile device is secure as devices can easily be lost or stolen. As a result, data can be exploited using USB or rooting techniques to steal data from a lost device. Hackers can even root a temporarily misplaced device and install malware that steals data. The Samsung KNOX FIPS certified encrypting file system offers protection of apps data. ODE enforcement is automatic within the KNOX Container, and is IT Policycontrolled outside of the KNOX Container. Additional protection can be provided through an optional Theft Recovery Service and SE for Android. For more information on wither one, refer to the "An Overview of KNOX Security" or "Securing a Lost or Missing Device" sections of this document. 10 page
13 Improvement of employee production Protecting against a temporarily missing device Terminating moble access when an employee leaves device Using Smart Card Authentication US DoD and government personnel use Common Access Cards (CACs) for identification and dualfactor Public Key Infrastructure (PKI) authentication to access government resources: PKI certificates are stored on CAC in a Samsung device and used to digitally sign and encrypt s. Two-factor authentication tests the user's identity by verifying both what they have (CAC) and what they know (PIN). The user must have the smart card (paired and registered with the device and within the Bluetooth range) and also input the PIN for the CAC smartcard for a successful authentication to occur. Larger enterprises may wish to use Smart cards for Single Sign-On (SSO) access to enterprise resources that require strong security. Stronger authentication requires a stronger PIN and a stronger card. Samsung KNOX solution offers enhanced Mobile Device Management (MDM) policies that support Smart Card authentication. This provides applications access to the certificates on the CAC via standards-based Public Key Cryptography Standard (PKCS) #11. These policies are specifically intended for CAC access to VPN, , lockscreen, and browser functionality. Ensuring Device Integrity Enterprises must ensure mobile device integrity to protect against rooting, malicious removal of essential apps, and the installation of unauthorized apps. Enterprises must also ensure that they are compliant with IT policies. When enterprises use the KNOX Integrity Service, IT Admins are notified of any loss of device integrity through their MDM console via a snapshot. Once a snapshot is taken for a baseline, the system reports any changes from that baseline, including the detection of the following threats: Rooting Any attempt at malicious removal of critical apps The installation of any unauthorized apps The Security Watcher feature of Samsung TIMA ensures that the kernel cannot be manipulated after it is loaded and that unauthorized Loadable Kernel Modules (LKMs) will not execute in the OS kernel. TIMA also guarantees the detection of any attacks that involve loading new code or modifying existing code by watchdogging virtual memory. Read more about TIMA in the "An Overview of KNOX Security" section of this document. IT Policies that support device integrity include those that support whitelisting and blacklisting. 11 page
14 Improvement of employee production Protecting against a temporarily missing device Terminating moble access when an employee leaves device Improving Employee Productivity from a Mobile Device Samsung KNOX enables increased employee productivity with features such as SSO, a preinstalled set of business applications, access to a curated set of applications from an Enterprise App Store, and work/personal area separation: Enable SSO for compatible applications such as Box. Access popular enterprise services such as Microsoft Sharepoint and Lync, SAP, Salesforce. com, etc. from within the work zone. Collaborate using Cisco Webex, Citrix GotoMeeting, Samsung SmartConference, Samsung Enterprise IM, Salesforce.com, and so on, within the work zone. Allow employees to download high-quality enterprise-specific applications from the Samsung Enterprise App Store, while avoiding the application-conjested Andoid Store. Complete separation of the work environment from an employee's personal area. Enabling SSO for Mobile Apps Almost all enterprise apps require authentication. Entering passwords repeatedly is cumbersome and can negatively affect the user experience, while password sprawl can cause Helpdesk issues related to password resets. Just as important, caching passwords in apps is not safe. KNOX offers a SSO service that utilizes SSO-enabled applications inside the KNOX Container (from the KNOX App Store) that supports both cloud and Intranet-based apps. IT Policies can be applied to enable SSO for apps as well. 12 page
15 Improvement of employee production Protecting against a temporarily missing device Terminating moble access when an employee leaves device Dual Personal in BYOD and COPE As mentioned earlier, a KNOX Container provides a separate Android environment within the mobile device, completed with its own home screen, launcher, applications, and widgets. Applications and data inside the Container are isolated from applications outside the Container, and vice versa However, some applications inside the Container can be granted read-only access to data outside the container via a policy configuration. The following lists the applications available in a KNOX Container, and illustrates how KNOX separates content and information located within the KNOX Container from a user s personal area: Core applications The KNOX Container comes complete with the following pre-installed applications: App Store Camera Contacts Downloads Gallery Internet My Files Phone Polaris Office 5 S Memo S Calendar S Planner Samsung KNOX Apps Application Isolation The following shows examples of how some of the core applications function within and outside of a KNOX Container. Camera The camera in the KNOX Container is the same camera app available for use in your personal environment. Photos that you take with the KNOX Camera cannot be accessed outside of the Container environment (just as photos taken with the camera in your personal environment cannot be accessed within the KNOX Container). Phone The Phone app in the KNOX Container is same Phone app available for use in your personal environment. Phone contact information within the KNOX Container cannot be accessed outside of the Container environment (just as phone contact data stored in your personal environment cannot be accessed within the KNOX Container). The client in the KNOX Container is a Microsoft Exchange-compatible app that supports business mail for the KNOX user. Enterprise mail, attachments, and other data cannot be accessed outside of the Container environment. 13 page
16 Improvement of employee production Protecting against a temporarily missing device Terminating moble access when an employee leaves device EXCEPTIONS Some applications inside the container can be granted read-only access to data outside the container via a policy configuration. For example, calendar events and contacts created outside the container are viewable inside the container. Calendar The Container s Calendar can receive event details from the user s personal calendar on a read-only basis. Both business and personal appointments are consolidated in the Container calendar view. Business events do not appear in the calendar in the personal environment. When using the calendar inside the KNOX Container: Events created within the Container are displayed with complete descriptions Personal events are shown with complete descriptions When using the calendar in the personal area: Events created within the personal area are displayed with complete descriptions No corporate events are shown Contacts The Contacts client in the KNOX Container is same Contacts app available for use in your personal environment. As a result, contacts created within personal area will appear in the KNOX Container. However, contacts created within the KNOX Container will not appear in a user's personal environment. When viewing contacts inside the KNOX Container: IT-installed company directory is displayed Contacts added within the Container are displayed Personal contacts are displayed When viewing contacts in the personal area: Personal contacts are displayed Contacts added while in the personal area are displayed Personal contacts added within the Container are not displayed 14 page
17 Improvement of employee production Protecting against a temporarily missing device Terminating moble access when an employee leaves device App Store The App Store in the KNOX Container is preloaded with a variety of business apps from Independent Software Vendors (ISVs) such as Cisco, Salesforce, Dropbox, and so on. You can browse the app store and select an app for download/installation in the same manner as any commercial app store (for example, Google Play). Improvement of employee production Protecting against a temporarily missing device Terminating moble access when an employee leaves device With recent statistics illustrating that over 40% of all robberies are smartphone-related, enterprises are rightfully concerned about their devices being lost or stolen. Once missing, a device can be sold, and any confidential information on it can be compromised. The user also has no way of disabling the device once it s gone. When devices are stolen, enterprises face the loss of physical asset from a device that potentially can contain intellectual property and/or assets. The financial impact on the enterprise due to theft can potentially be significant. Protecting Against a Temporarily Missing Device KNOX enables the enterprise to safeguard against accidental misuse of business data if the employee has temporarily lost custody of the device, e.g. leaving it at home before a business trip, leaving the device behind at a friend or relative s house, etc. The IT admin may invoke one or more of the following features to protect against data theft and misuse: Remotely lock the Container to prevent anyone from accessing the work zone. Remotely uninstall apps that access the corporate network or cloud services. Remotely disable VPN access. Terminating Mobile Access when an Employee Leaves In a BYOD environment, KNOX allows the enterprise to gracefully de-register the employee s personal device from the enterprise without affecting any personal applications or data: Remotely wipe and destroy the work zone Container, preserving all personal applications and content. Remotely remove VPN access if enabled for applications outside the KNOX Container. Remotely remove any policies affecting the use of the camera, Bluetooth, Wi-Fi or other hardware feature. 15 page
18 Improvement of employee production Protecting against a temporarily missing device Terminating moble access when an employee leaves device Recovering from a Stolen Device Factors behind the increasing numbers of smartphone thefts include the high resale value of the device as well as the personal and corporate information that may be used for identity theft or corporate espionage. KNOX offers a comprehensive anti-theft service that includes both tracking as well as law-enforcement assisted recovery of the stolen device: Remotely lock the device and/or the container to prevent the thief from using the device or extracting personal and business data Remotely wipe the device and/or Container to eliminate information theft using memory extraction techniques. The KNOX THEFT RECOVERY SOLUTION The optional Samsung KNOX Theft Recovery Service is supported by Absolute Software s Computrace solution. Each KNOX device contains the Absolute Persistence Service embedded in its firmware, and protects against circumventing the service, even if a factory reset is performed. The Computrace Mobile Agent is installed at the time of subscription and enables device tracking. Computrace also works with law enforcement agencies to recover the device. 16 page
19 Summary The Samsung KNOX service offers an extensible feature set that supports enterprise business needs for mobile security and management. As a result, KNOX is ideal to support the rigid security requirements of BYOD/COPE programs that many companies have or soon will be incorporating. Samsung KNOX features an Application Container technology that can be used to create a secure work zone on an employee s device for corporate applications and data. This means that all corporate-installed applications and data inside the KNOX Work Container are isolated from a user s personal applications and data outside the Container. This Container technology, in conjunction with other features like per-app VPN and Single-Sign-On, enables Samsung KNOX to offer the most secure solution for corporations and employees interested in using one mobile device for both work and personal use. Additional Resources More information on Samsung KNOX can be found in the following documentation: Introducing Samsung KNOX brochure An Overview of Samsung KNOX white paper 17 page
20 About Samsung Electronics Co., Ltd. Samsung Electronics Co., Ltd. is a global leader in technology, opening new possibilities for people everywhere. Through relentless innovation and discovery, we are transforming the worlds of televisions, smartphones, personal computers, printers, cameras, home appliances, LTE systems, medical devices, semiconductors and LED solutions. We employ 236,000 people across 79 countries with annual sales exceeding KRW 201 trillion. To discover more, please visit For more information about Samsung KNOX, Visit Copyright 2013 Samsung Electronics Co. Ltd. All rights reserved. Samsung is a registered trademark of Samsung Electronics Co. Ltd. Specifications and designs are subject to change without notice. Non-metric weights and measurements are approximate. All data were deemed correct at time of creation. Samsung is not liable for errors or omissions. All brand, product, service names and logos are trademarks and/or registered trademarks of their respective owners and are hereby recognized and acknowledged. Samsung Electronics Co., Ltd. 416, Maetan 3-dong, Yeongtong-gu Suwon-si, Gyeonggi-do , Korea 18 page
White Paper : An Overview of Samsung KNOX
: An Overview of Samsung KNOX April 2013 Enterprise Mobility Solutions Samsung Electronics Co., Ltd. Contents Acronyms Android and the Enterprise Introducing Samsung KNOX Technology Overview 1. Platform
White Paper : An Overview of Samsung KNOX
: An Overview of Samsung KNOX June 2013 Enterprise Mobility Solutions Samsung Electronics Co., Ltd. Contents Acronyms Android and the Enterprise Introducing Samsung KNOX Technology Overview 1. Platform
White Paper : An Overview of Samsung KNOX
: An Overview of Samsung KNOX September 2013 Enterprise Mobility Solutions Samsung Electronics Co., Ltd. Contents Acronyms Android and the Enterprise Introducing Samsung KNOX Technology Overview 1. Platform
White Paper: An Overview of the Samsung KNOX TM 2.0 Platform
: An Overview of the Samsung KNOX TM 2.0 Platform March 2014 Enterprise Mobility Solutions Samsung Electronics Co., Ltd. Contents Acronyms Introducing the Samsung KNOX 2.0 Platform What's New in the KNOX
In-Depth Look at Capabilities: Samsung KNOX and Android for Work
In-Depth Look at Capabilities: Samsung KNOX and Android for Work Silent Install Using the Samsung KNOX Workspace Mobile Device Management (MDM) APIs, IT admins can install and enable applications automatically.
Samsung Telecommunications America. Samsung KNOX : KNOX Glossary of Terms and Acronyms
Samsung Telecommunications America Samsung KNOX : KNOX Glossary of Terms and Acronyms Copyright Notice Copyright 2013, Samsung Electronics. All rights reserved. Document Information This document was created
Samsung Mobile Security
Samsung Mobile Security offering enhanced core capabilities for enterprise mobility Samsung Enterprise Mobility Enterprise-ready Mobility management for your business Samsung Mobile Security offers enterprise
Flyer 1. Meet evolving enterprise mobility challenges with Samsung KNOX
Flyer 1 Meet evolving enterprise mobility challenges with Samsung KNOX Solve today s dynamic enterprise mobility demands with the right solution platform Enterprise Mobility Trends The growth of enterprise
White Paper: An Overview of the Samsung KNOX TM Platform
: An Overview of the Samsung KNOX TM Platform March 2015 Enterprise Mobility Solutions Samsung Electronics Co., Ltd. Contents Samsung KNOX Platform 2 Technology Overview 3 Platform Security 3 Hardware
Samsung KNOX 2. UK Government EUD Guidance Whitepaper
Samsung KNOX 2 UK Government EUD Guidance Whitepaper December 2014 Copyright Notice Copyright 2014 Samsung Electronics Co. Ltd. All rights reserved. Samsung is a registered trademark of Samsung Electronics
Samsung KNOX User Guide KNOX for Consumers Edition
Samsung KNOX User Guide KNOX for Consumers Edition Version 1.3 Jan 07, 2015 Copyright Notice Copyright 2013 Samsung Electronics Co. Ltd. All rights reserved. Samsung is a registered trademark of Samsung
USER TRAINING. Enterprise Mobility Solutions October 23, 2013
USER TRAINING Enterprise Mobility Solutions October 23, 2013 Using Samsung KNOX Samsung KNOX is a new Android-based platform designed specifically to overcome the shortcomings of the current open source
Samsung SED Security in Collaboration with Wave Systems
Samsung SED Security in Collaboration with Wave Systems Safeguarding sensitive data with enhanced performance, robust security, and manageability Samsung Super-speed Drive Secure sensitive data economically
PULSE SECURE FOR GOOGLE ANDROID
DATASHEET PULSE SECURE FOR GOOGLE ANDROID Product Overview In addition to enabling network and resource access for corporate managed mobile devices, many enterprises are implementing a Bring Your Own Device
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
Mobile App Containers: Product Or Feature?
ANALYST BRIEF Mobile App Containers: Product Or Feature? APPLE AND SAMSUNG HAVE TAKEN BIG STEPS WITH CONTAINERIZATION Author Andrew Braunberg Overview Secure workspaces, or containers, used for isolating
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Android security maximized by Samsung KNOX. Safeguard enterprise mobility with tightly integrated security, compliance, and control features
Android security maximized by Samsung KNOX Safeguard enterprise mobility with tightly integrated security, compliance, and control features Contents Google Android Lollipop 3 Samsung KNOX 3 KNOX is always
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
White Paper: An Overview of the Samsung KNOX TM Platform
: An Overview of the Samsung KNOX TM Platform June 2015 Enterprise Mobility Solutions Samsung Electronics Co., Ltd. Contents Samsung KNOX Platform 2 Technology Overview 3 Platform Security 3 Hardware Root
Samsung SDS. Enterprise Mobility Management
Samsung SDS Enterprise Mobility Samsung SDS Enterprise Mobility Faster and Safer Samsung SDS Enterprise Mobility provides stronger security for enterprise mobility without Compromising usability of mobile
Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.
White Paper Securing Today s Mobile Workforce Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2012, Juniper Networks, Inc. 1 Table
Mobile First Government
Mobile First Government An analysis of NIST and DISA requirements for the adoption of commercially available mobility platforms by government agencies August 2013 415 East Middlefield Road Mountain View,
CHOOSING AN MDM PLATFORM
CHOOSING AN MDM PLATFORM Where to Start the Conversation Whitepaper 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than
Symantec Mobile Management Suite
Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Windows Phone 8.1 Mobile Device Management Overview
Windows Phone 8.1 Mobile Device Management Overview Published April 2014 Executive summary Most organizations are aware that they need to secure corporate data and minimize risks if mobile devices are
Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.
Data Loss Prevention Whitepaper When Mobile Device Management Isn t Enough Your Device Here. Good supports hundreds of devices. Contents Shifting Security Landscapes 3 Security Challenges to Enterprise
MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES
MOBILITY & INTERCONNECTIVITY Features SECURITY OF INFORMATION TECHNOLOGIES Frequent changes to the structure of enterprise workforces mean that many are moving away from the traditional model of a single
Windows Phone 8 Security Overview
Windows Phone 8 Security Overview This white paper is part of a series of technical papers designed to help IT professionals evaluate Windows Phone 8 and understand how it can play a role in their organizations.
IBM Endpoint Manager for Mobile Devices
IBM Endpoint Manager for Mobile Devices A unified platform for managing mobile devices together with your traditional endpoints Highlights Address business and technology issues of security, complexity
Choosing an MDM Platform
Whitepaper Choosing an MDM Platform Where to Start the Conversation 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than
Guideline on Safe BYOD Management
CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version
Release Notes. KNOX Premium SDK. Version 2.5
Release Notes Premium SDK 2.5 September 2015 Copyright Notice Copyright 2015 Samsung Electronics Co. Ltd. All rights reserved. Samsung is a registered trademark of Samsung Electronics Co. Ltd. Samsung
Kaspersky Security for Mobile Administrator's Guide
Kaspersky Security for Mobile Administrator's Guide APPLICATION VERSION: 10.0 SERVICE PACK 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful and that
Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite
WHITE PAPER Mobile Device Security in the Enterprise Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite Copyright 2010, Juniper Networks, Inc. Table of Contents
Secure Mobile Solutions
Secure Mobile Solutions Manage workloads securely on the move [email protected] 01347 812100 www.softbox.co.uk Contents Secure Mobile Solutions Key Features and Benefits Integration and Management
How To Protect Your Mobile Devices From Security Threats
Back to the Future: Securing your Unwired Enterprise By Manoj Kumar Kunta, Global Practice Leader - Security Back to the Future: Securing your Unwired Enterprise The advent of smartphones and tablets has
COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING
COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING INFORMATION TECHNOLOGY STANDARD Name Of Standard: Mobile Device Standard Domain: Security Date Issued: 09/07/2012 Date Revised:
Whitepaper: Samsung KNOX TM Security Solution
Whitepaper: Samsung KNOX TM Security Solution March 2016 Samsung Research America Samsung Electronics Co., Ltd. Contents Section 1: BYOD and mobile security 3 Section 2: Background: What s in a smartphone?
What We Do: Simplify Enterprise Mobility
What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable
Securing Office 365 with MobileIron
Securing Office 365 with MobileIron Introduction Office 365 is Microsoft s cloud-based productivity suite. It includes online versions of Microsoft s most popular solutions, like Exchange and SharePoint,
The ForeScout Difference
The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete
Addressing NIST and DOD Requirements for Mobile Device Management
Addressing NIST and DOD Requirements for Mobile Device Management Whitepaper 2013 ForeScout Technologies, Inc. All rights reserved. Call Toll-Free: 1.866.377.8771 www.forescout.com Contents 1. OVERVIEW
Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices
Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices It s common today for law enforcement
ForeScout MDM Enterprise
Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify
An Overview of Samsung KNOX Active Directory and Group Policy Features
C E N T R I F Y W H I T E P A P E R. N O V E M B E R 2013 An Overview of Samsung KNOX Active Directory and Group Policy Features Abstract Samsung KNOX is a set of business-focused enhancements to the Android
Xperia TM. Read about how Xperia TM devices can be administered in a corporate IT environment
peria TM in Business Mobile Device Management Read about how peria TM devices can be administered in a corporate IT environment Device management clients March 2015 Exchange ActiveSync The my peria service
White Paper: An Overview of the Samsung KNOX TM Platform
: An Overview of the Samsung KNOX TM Platform September 2015 Enterprise Mobility Solutions Samsung Electronics Co., Ltd. Contents Samsung KNOX Platform 2 Technology Overview 3 Platform Security 3 Hardware
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
Guidance End User Devices Security Guidance: Apple ios 7
GOV.UK Guidance End User Devices Security Guidance: Apple ios 7 Updated 10 June 2014 Contents 1. Changes since previous guidance 2. Usage Scenario 3. Summary of Platform Security 4. How the Platform Can
Mobile Security: Threats and Countermeasures
Mobile Security: Threats and Countermeasures Introduction Mobile devices are rapidly becoming the primary end-user computing platform in enterprises. The intuitive user-experience, robust computing capabilities,
WIND RIVER SECURE ANDROID CAPABILITY
WIND RIVER SECURE ANDROID CAPABILITY Cyber warfare has swiftly migrated from hacking into enterprise networks and the Internet to targeting, and being triggered from, mobile devices. With the recent explosion
ADDING STRONGER AUTHENTICATION for VPN Access Control
ADDING STRONGER AUTHENTICATION for VPN Access Control Adding Stronger Authentication for VPN Access Control 1 ADDING STRONGER AUTHENTICATION for VPN Access Control A VIRTUAL PRIVATE NETWORK (VPN) allows
Securing Corporate Email on Personal Mobile Devices
Securing Corporate Email on Personal Mobile Devices Table of Contents The Impact of Personal Mobile Devices on Corporate Security... 3 Introducing LetMobile Secure Mobile Email... 3 Solution Architecture...
Kaspersky Security for Mobile
Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months
Complying with PCI Data Security
Complying with PCI Data Security Solution BRIEF Retailers, financial institutions, data processors, and any other vendors that manage credit card holder data today must adhere to strict policies for ensuring
BlackBerry 10.3 Work and Personal Corporate
GOV.UK Guidance BlackBerry 10.3 Work and Personal Corporate Published Contents 1. Usage scenario 2. Summary of platform security 3. How the platform can best satisfy the security recommendations 4. Network
Cortado Corporate Server
Cortado Corporate Server 100 % On Premise Installed & Run Entirely On Your Corporate Network Feature Mobile Device Device Policy Application E-mail Push Wi-Fi Configuration Push Enable secure BYOD and
Enterprise Mobility as a Service
Service Description: Insert Title Enterprise Mobility as a Service Multi-Service User Management for Mobility 1. Executive Summary... 2 2. Enterprise Mobility as a Service Overview... 3 3. Pricing Structure...
Endpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
Securing Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper
Securing Patient Data in Today s Mobilized Healthcare Industry Securing Patient Data in Today s Mobilized Healthcare Industry 866-7-BE-GOOD good.com 2 Contents Executive Summary The Role of Smartphones
How To Use A Microsoft Mobile Security Software For A Corporate Account On A Mobile Device
Technical FAQ McAfee Enterprise Mobility Management (McAfee EMM ) 12.0 Frequently Asked Questions Q. What types of mobile devices does McAfee Enterprise Mobility Management (McAfee EMM ) support? A. McAfee
An Overview of Samsung KNOX Active Directory-based Single Sign-On
C E N T R I F Y W H I T E P A P E R. S E P T E M B E R 2013 An Overview of Samsung KNOX Active Directory-based Single Sign-On Abstract Samsung KNOX is a set of business-focused enhancements to the Android
EasiShare Whitepaper - Empowering Your Mobile Workforce
Accessing files on mobile devices and sharing them with external parties presents serious security risks for companies. However, most current solutions are either too cumbersome or not secure enough for
Deploying iphone and ipad Security Overview
Deploying iphone and ipad Security Overview ios, the operating system at the core of iphone and ipad, is built upon layers of security. This enables iphone and ipad to securely access corporate services
Google Identity Services for work
INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new
BYOD Guidance: BlackBerry Secure Work Space
GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.
Feature List for Kaspersky Security for Mobile
Feature List for Kaspersky Security for Mobile Contents Overview... 2 Simplified Centralized Deployment... 2 Mobile Anti-Malware... 3 Anti-Theft / Content Security... Error! Bookmark not defined. Compliance
Kony Mobile Application Management (MAM)
Kony Mobile Application Management (MAM) Kony s Secure Mobile Application Management Feature Brief Contents What is Mobile Application Management? 3 Kony Mobile Application Management Solution Overview
The Cloud App Visibility Blindspot
The Cloud App Visibility Blindspot Understanding the Risks of Sanctioned and Unsanctioned Cloud Apps and How to Take Back Control Introduction Today, enterprise assets are more at risk than ever before
PLATFORM ENCRYPTlON ARCHlTECTURE. How to protect sensitive data without locking up business functionality.
PLATFORM ENCRYPTlON ARCHlTECTURE How to protect sensitive data without locking up business functionality. 1 Contents 03 The need for encryption Balancing data security with business needs Principles and
White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com
Protecting Mobile Apps with Citrix XenMobile and MDX citrix.com Mobility is a top priority for organizations as more employees demand access to the apps and data that will make them productive. Employees
Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments
Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments Efficiently and Cost- Effectively Managing Mobility Risks in the Age of IT Consumerization Table of Contents EXECUTIVE
{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com
{ipad Security} plantemoran.com for K-12 Understanding & Mitigating Risk Plante Moran The ipad is in K-12. Since its debut in April 2010, the ipad has quickly become the most popular tablet, outselling
HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY
GOLD EMM SUBSCRIPTIONS Experience the most secure mobility management solution with BES12 and Gold Enterprise Mobility Management (EMM) subscriptions. HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY
Data Protection: From PKI to Virtualization & Cloud
Data Protection: From PKI to Virtualization & Cloud Raymond Yeung CISSP, CISA Senior Regional Director, HK/TW, ASEAN & A/NZ SafeNet Inc. Agenda What is PKI? And Value? Traditional PKI Usage Cloud Security
UNCLASSIFIED. Trademark Information
SAMSUNG KNOX ANDROID 1.0 SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) OVERVIEW Version 1, Release 1 3 May 2013 Developed by Samsung Electronics Co., Ltd.; Fixmo, Inc.; and General Dynamics C4 Systems,
Xperia TM. Read about how Xperia TM devices can be administered in a corporate IT environment
Xperia TM in Business Mobile Device Management Read about how Xperia TM devices can be administered in a corporate IT environment Device management clients Xperia TM T3 Exchange ActiveSync The my Xperia
Symantec Mobile Security
Advanced threat protection for mobile devices Data Sheet: Endpoint Management and Mobility Overview The combination of uncurated app stores, platform openness, and sizeable marketshare, make the Android
iphone in Business Security Overview
iphone in Business Security Overview iphone can securely access corporate services and protect data on the device. It provides strong encryption for data in transmission, proven authentication methods
BYOD: End-to-End Security
BYOD: End-to-End Security Alen Lo MBA(CUHK), BSc(HKU), CISA, CCP, CISSP, CISM, CEH IRCA Certified ISMS Lead Auditor, itsmf ISO 20000 Auditor Principal Consultant i-totalsecurity Consulting Limited [email protected]
End User Devices Security Guidance: Apple OS X 10.10
GOV.UK Guidance End User Devices Security Guidance: Apple OS X 10.10 Published Contents 1. Changes since previous guidance 2. Usage scenario 3. Summary of platform security 4. How the platform can best
When enterprise mobility strategies are discussed, security is usually one of the first topics
Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced
Guidance End User Devices Security Guidance: Apple OS X 10.9
GOV.UK Guidance End User Devices Security Guidance: Apple OS X 10.9 Published 23 January 2014 Contents 1. Changes since previous guidance 2. Usage Scenario 3. Summary of Platform Security 4. How the Platform
APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION
APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION Response Code: Offeror should place the appropriate letter designation in the Availability column according
