Newsletters
News & Information for Technology Purchasers NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Click for more information, or
Home Enterprise I.T. Cloud Computing Applications Hardware More Topics...
Neustar, Inc.
Protect your website & network
using real-time information & analysis

www.neustar.biz
Mobile Tech
See data differently
Average Rating:
Rate this article:  
Samsung
Samsung's Knox Separates Personal from Work in Android

By Barry Levine
February 26, 2013 11:23AM

    Bookmark and Share
The separation between work and personal information provided by Samsung's Knox uses Security Enhanced Android and file-system-level encryption. Users can access the Knox container via a home screen icon, and therein access enterprise applications. With Samsung Knox, existing Android apps can automatically gain enterprise integration and validation.
 



As James Bond villain Goldfinger knew, Fort Knox is synonymous with the ultimate in security. Which is why Samsung's new end-to-end secure solution for Android devices, unveiled Monday at the Mobile World Congress in Barcelona, goes by the name of Samsung Knox.

Mobile security, especially with so many devices and platforms to support as a result of the "bring your own device" trend, consistently ranks among IT departments' top headaches. Samsung said that its solution provided "security hardening from the hardware through the application layer" through the use of integrity management services and Security Enhanced (SE) Android, developed by the U.S. National Security Agency. The company said its solution is compatible with mobile data management systems, virtual private networking and directory services.

Knox is being compared to a new enterprise feature that Blackberry highlighted when it launched its new BB10 platform in late January -- the ability to separate business from personal data on a mobile device. This kind of solution meets IT's needs, while allowing users to maintain their personal photos, e-mail and other info outside of IT's control.

'Harmony' Between Control, Satisfaction

Samsung said its separation uses SE Android and file-system-level encryption. Users can access the Knox container via a home screen icon, and therein access enterprise applications -- e-mail, a browser, contacts, calendar, file sharing, collaboration, CRM and business intelligence apps. With Knox, existing Android apps can automatically gain enterprise integration and validation, and Samsung said it allows companies to avoid developing individual enterprise features, such as FIPS compliant VPN, on-device encryption, Enterprise Single Sign On, Active Directory support and Smart Card-based multi-factor authentication.

JK Shin, president and head of Samsung's IT and Mobile Communications Division, said in a statement that businesses are "understandably" raising security and privacy issues as barriers to BYOD, while users want to use their own devices. He said that the Knox solution combines "the business and personal in a single device," achieving a "harmony between enterprise control and employee satisfaction."

BlackBerry's solution, called BlackBerry Balance, similarly separates and secures work and personal information. Apps and data from an organization are restricted from being accessed by personal apps, and vice versa. IT can remotely wipe all information on the device, or just work-related information.

'Makes Sense in Theory'

Laura DiDio, an analyst with Information Technology Intelligence Consulting, said the separation of work and personal info and apps on the same mobile device "makes sense in theory," but it needs to be backed up by clear company policy and procedures. Part of the reason for this need for accepted practices, she said, is because of what ITIC's research has shown -- "the walls between personal and business information are coming down."

She also pointed out that, while containerization has been around a while, this approach by Samsung and BlackBerry supports the trend toward "self-service IT," where users, once the policies have been made clear, can make some of the decisions about what data remains personal. This approach "is easier for app developers to implement," DiDio said, but it also has to be "easy for users and administrators."
 

Tell Us What You Think
Comment:

Name:



You have the experience and skills, let an ISACA® certification demonstrate your value. Our certifications announce that you have the expertise and insight to speak with authority. ISACA certification is more than a credential; it's a platform that can elevate your career. Register for an Exam Today.


 Mobile Tech
1.   LG Unrolls a TV Screen That Rolls Up
2.   Silent Circle Offers Roam-Free Plan
3.   LinkedIn Replaces Contacts Mobile App
4.   Is Apple Dumping iPhones on eBay?
5.   Data Recovered from 'Wiped' Phones


advertisement
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Report: Chinese Hackers Hit U.S. Personnel Networks
Hackers from China broke into the computer networks of the U.S. Office of Personnel Management earlier this year with the intention of accessing the files of tens of thousands of federal employees.
 
Charges: Russian Stole Data from U.S. Restaurants, Zoo
A Russian man arrested on bank fraud and other charges hacked into computers at restaurants in Washington, hundreds of other retail businesses, and even the Phoenix Zoo, authorities say.
 
Another Month, Another IE-Focused Patch Tuesday
Microsoft rolled out 59 vulnerabilities for Internet Explorer in June. But the IE-patching party is not over yet. Redmond published six new security bulletins on Tuesday; two, critical; three, important.
 

Navigation
NewsFactor Network
Home/Top News | Enterprise I.T. | Cloud Computing | Applications | Hardware | Mobile Tech | Big Data | Communications
World Wide Web | Network Security | Data Storage | Small Business | Microsoft/Windows | Apple/Mac | Linux/Open Source | Personal Tech
Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters | XML/RSS Feed

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.