Samsung Interface Font

Samsung Interface Font

KNOX The Next Secure Enterprise Mobile Platform Samsung 2013. All rights reserved. Significant Android Growth in Enterprise CAGR: Yearover-year growth rate over this period of time. *IDC, 2013, Worldwide Business Use of Smartphone Forecast 2 Android Acceptance in Enterprise is Low* Why? Consumer Enterprise

#1 Lack of Security #2 Limited Manageabili ty 75% Of smartphone users have Android phones # of enterprises deploying Android phones in the next

<10% 12 months *Gartner, Strategies to Solve Challenges of BYOD in Enterprise, 2013 3 Android Security Flaw Uncovered1 79% of Mobile Malware Targets Android2 Unclassified memo from the U.S. Department of Homeland Security and the Department of Justice Android Phones are Pocket-sized Data Mines3 Data-Tech, 7/16/2013, www.datatechitp.com/android-security-flawuncovered/,

2 Angela Moscaritolo, 8/28/2013, PC Magazine, www.pcmag.com/article2/0,2817,2423705,00.asp 3 Max Eddy, 7/8/2013, You Need Mobile Security for Android, But Not Because of Malware, http://www.pcmag.com/article2/0,2817,2421366,0 0.asp 1 4 As BYOD Explodes IT Has Reason to be Concerned Over 50% of CIOs indicated their secure IT network was breached due to employees using personal services Virgin Media Business, 2013, interviews with 500 leading British CIOs

5 Samsung KNOX Samsungs Secure Android Platform 6 Samsung KNOX | Secure Android Platform & Best in Class Device Manageability MDM Policies KNOX KNOX Container Container KNOX KNOX Framework Framework Security Security Enhancements for Android

Android TrustZone Integrity TrustZone Integrity Management Management Architecture Architecture Secure Secure Boot/Trusted Boot/Trusted Boot Boot ARM ARM TrustZone TrustZone Hardware Hardware Secure Android Mobile Platform

Over 500 MDM Policies Protected Apps & Information Powerful Control of Devices 7 Samsung KNOX | Secure Android Platform KNOX Container KNOX Framework Security Enhancements for Android TrustZone Integrity Management Architecture Secure Boot/Trusted Boot

Dual Persona for Work & Play MDM Policies, Data Encryption, VPN, Identity Management Security Enhancements for Android Hardware Assisted Rooting Prevention & Detection ARM TrustZone Hardware 8 Secure Platform | Security Built into Every Layer Android Open Source Project (AOSP) Application Layer KNOX Container Android Framework

KNOX Framework Android OS Linux Kernel Boot Loader Hardware Security Enhancements for Android TrustZone Integrity Management Architecture Secure Boot/Trusted Boot ARM TrustZone Hardware 9 Secure Platform | Secure Boot & Trusted Boot ARM TrustZone

If values match, key is released and device continues to boot Kernel verified and loaded Certificates are verified at each boot loader, once verified the next boot loader is loaded and verified 10 Secure Platform | TrustZone Integrity Measurement Architecture (TIMA) Linux Kernel

01010 01010 00100 00101 01100 01100 01010 01011 00100 00100 01101 01100 TIM A TIMA checks Linux Kernel at boot TIMA rechecks periodically as long as device is running 11 Secure Platform | SE for Android Protects Device & OS from Malicious Apps When a malicious app

roots an Android it can affect the entire device KNOX uses Mandatory Access Control (MAC) to prevent malicious apps from running and preventing system wide damage 12 Secure Platform | Defense Grade Security Approved by US DoD1 based on STIG2 FIPS3 -Certified VPN IM(Integrity

Management) CAC4 Support 1) 2) 3) 4) DOD: Department of Defense STIG: Security Technical Implementation Guide FIPS: Federal Information Processing Standard CAC: Common Access Card 13 Samsung KNOX | Secure Android Platform & Best in Class Device Manageability MDM Policies KNOX KNOX Container Container KNOX KNOX Framework Framework

Security Security Enhancements for Android Android TrustZone Integrity TrustZone Integrity Management Management Architecture Architecture Secure Secure Boot/Trusted Boot/Trusted Boot Boot ARM ARM TrustZone TrustZone Hardware Hardware Secure

Android Mobile Platform Over 500 MDM Policies Protected Apps & Information Powerful Control of Devices 14 Protected Data & Apps | Safe & Secure Container for Enterprise Apps & Data Enterpris e Separate container keeps

enterprise data & apps safe Personal Protected Data & Apps | Per App VPN Tunnel Enterpri se KNOX Encrypted Data Secure Through VPN Tunnel on Enterprise Network Persona l Completely Separate, Non-VPN Connection Frees Enterprise Resources & Ensures Privacy 16 Protected Data & Apps | On-device Data Encryption Protects Container Enterpris

e Personal Secure container is encrypted SD cards are encrypted 17 Protected Data & Apps | On-device Data Encryption Protects Entire Device Enterpris e Personal 18 Protected Data & Apps | Single Sign On* (SSO)

No SSO Enterprise Accounts Enterprise Active Directory Server Enterprise Accounts *Provided by Centrify 19 Protected Data & Apps | Hundreds of Popular Business Apps at KNOX Apps Store OfficeSuite 7 Pro GoFormz Evernote ClickMobile

SAP Travel Expense Report Citrix Receiver harmon.ie CloudON Conversion Calculator powerOne Business Calculator - Lite Onvelop Dropbox powerOne Finance

GotoAssist Customer docLinker Scan & Fill Podio ISO 14971 Audit GotoMyPC SAP Payment Approvals Clarizen Business Card Reader ShareFile More added every day 20

Samsung KNOX | Secure Android Platform & Best in Class Device Manageability MDM Policies KNOX KNOX Container Container KNOX KNOX Framework Framework Security Security Enhancements for Android Android TrustZone Integrity TrustZone Integrity Management Management Architecture Architecture

Secure Secure Boot/Trusted Boot/Trusted Boot Boot ARM ARM TrustZone TrustZone Hardware Hardware Secure Android Mobile Platform Over 500 MDM Policies Protected Apps & Information Powerful Control of Devices

21 Mobile Device Management | Over 500 Policies Implemented From Over 1000 APIs KNOX empowers enterprises to manage security in these areas: Container Apps SE for Android Exchange

Integrity Management VPN VPN Restrict Access Single Sign-On (SSO) Kiosk

Common Access Card (CAC) or SmartCard Geo Fencing Enterprise License Management (ELM) Data Password 22 Mobile Device Management | MDM Partners 23

Secure Platform| Enterprise Ready MDM Policies Enterprise Ecosystem MDM Agent MDM Server IT Admin Active Directory Server VPN Gateway SSO Proxy SSO Server Single Sign On FIPS

Certified VPN 24 Samsung KNOX | Active Directory Based Management* AD-based Group Policy management for Containers and Devices Cloud-based service deploys in minutes leveraging existing infrastructure Lower cost of ownership with self-service with full lifecycle automation

Supports SAFE v4 policies and KNOX policies Unified cross-platform device & desktop management *Provided by Centrify 25 Samsung KNOX | Samsung Mobile Devices NOTE 3 GALAXY S4 NOTE 2 GALAXY S3

NOTE 10.1 (2014) Many more to come 26 Samsung KNOX | Find Out More www.samsungknox.com/ 27 28 The Next Secure Enterprise Mobile Platform 29

Recently Viewed Presentations

  • Monday Oct - Wofford College

    Monday Oct - Wofford College

    After a powerstroke, ATP must bind to the myosin head before the crossbridge can detach from actin. The duration of a muscle twitch depends on how rapidly Ca++ is actively transported back into the T-tubule. There are two isozymes of...
  • Introduction to Antigone

    Introduction to Antigone

    The tragic hero possesses a defect or tragic flaw, that contributes to his or her downfall. This flaw may be poor judgment, pride, weakness, or an excess of an admirable quality. The tragic hero recognizes his or her tragic flaw...
  • Wisconsin Department of Health Services Wisconsin Collaborative Bringing

    Wisconsin Department of Health Services Wisconsin Collaborative Bringing

    Wisconsin Collaborative - Bringing Quality Improvement to Assisted Living Communities. Heather Bruemmer, Executive Director/State Ombudsman, Wisconsin Board on Aging & Long Term Care . Kevin Coughlin, Policy Initiative Advisor-Executive, Wisconsin Department of Health Services (DHS)
  • A2 Physiology Revision Exam Questions - Weebly

    A2 Physiology Revision Exam Questions - Weebly

    At low level of exercise energy comes from a mixture of fats and carbohydrates; ... refinement of skills/ maintenance of fitness levels/quality rather than quantity/relevant examples. of training modifications. ... A2 Physiology Revision Exam Questions
  • Making Money On the Sidelines: Package Your Passion

    Making Money On the Sidelines: Package Your Passion

    Making Money On the Sidelines: Package Your Passion AAPAR-AAHPERD Convention San Diego, CA 4.1.11
  • Statistics for the Behavioral and Social Sciences: A Brief ...

    Statistics for the Behavioral and Social Sciences: A Brief ...

    In multiple regression, not the same in bivariate describes the unique distinctive contribution of the predictor variable excluding any overlap with other predictor variables. Multiple correlation coefficient (R) overall correlation between criterion variable and all predictor variables R is usually...
  • Evidence Based Approaches for Reducing Restrictive Practices

    Evidence Based Approaches for Reducing Restrictive Practices

    Who currently uses an articulated ethical decision making process for making decisions about the use of planned restrictive practice? My experience is decision by one or two people who then instruct others in what to do without consideration for even...
  • Skin Observation Protocolfor Delegating Nurses

    Skin Observation Protocolfor Delegating Nurses

    hcs. dda. cm send referral form in 2 business days. cm send referral form in 2 business days. 48 hours respond to referral. rnd has 1 day to accept and 2 days schedule visit. 5 days return documentation to case...