Interested? Contact a specialist
Your Office, Wherever You Are
Together, Samsung KNOX and Microsoft® Office® 365 give you the freedom to work from anywhere on the Office applications you know, with the confidence that your business data is secure. Contact us for information and pricing, or watch the video to learn more about KNOX.
Defense-Grade, Hardware-Anchored Mobile Security for Your Business
Samsung KNOX provides relentless mobile data protection by protecting the integrity of the entire device, from the hardware to the application layer.
Today, with the rising popularity of BYOD, employees are “always on.” For you, that means always vulnerable. The development of Samsung KNOX, however, brings a degree of BYOD security to employees’ Android™ mobile devices. And without invading their privacy thanks to the separation of personal and business data. Your team can easily switch between the password-protected work container and personal apps, with the freedom to customize their device for an optimal user experience.
KNOX is Samsung’s defense-grade mobile security platform built into our Galaxy devices making them some of the most secure Android™ devices available. And while it provides a secure area where you can manage, maintain and protect enterprise intelligence, KNOX is much more than a container—it’s a platform. It provides enhanced mobile security by protecting the integrity of the entire device, from the hardware to the application layer. Protect your infrastructure with a multilevel approach to security that includes Trusted Boot and TrustZone based Integrity Measurement Architecture (TIMA), which provides continuous integrity monitoring of the Linux kernel. Additionally, KNOX eliminates OS compromise and enables you to monitor and control devices on your network across multiple mobile service providers.
Tailored for Your Organization
With cost control including enterprise billing capabilities and bulk enrollment of devices with KNOX Mobile Enrollment, Samsung KNOX is easy to manage and deploy across your organization. And with our KNOX Customization Program, we’ll work together with your business to address specific needs and deploy purpose-built solutions that not only secure data, but also improve customer relationships, drive sales and power mobile productivity. From the enterprise to government, healthcare, financial and other regulated institutions, as well as retail and travel businesses, the versatility of Samsung KNOX is unprecedented and it is actively being adopted by some of the world’s largest organizations.
Testament to the effectiveness of Samsung KNOX is numerous internationally recognized certifications and accreditations. We work closely with governments and related organizations on a continuous basis to ensure that our products and solutions meet and exceed the most stringent information and technology security requirements. Our team of security and compliance experts consistently monitors the varying needs of our customers and ensures that KNOX solutions have the right certifications and accreditations for the right customers.
“The technology behind this product is a genuine and significant step forward in providing verifiable security on mobile devices.”
– GSMA Judges, Global Mobile Awards, MWC 2015
Work & Play
KNOX Resource Center
Business Protection. Personal Privacy. One Device.
Find more information on how Samsung KNOX provides enhanced security for your network and business intelligence.
FIPS and Common Criteria Certifications
Samsung has vigorously pursued and achieved validation for multiple devices through these rigorous certification programs.
Balancing Mobile Security and Efficiency in Government
Learn how Samsung mobile devices and Samsung KNOX are addressing mobile security concerns for government agencies.
© 2015 Samsung Electronics America, Inc. Samsung and Samsung KNOX are both trademarks of Samsung Electronics Co., Ltd. Other company names, product names and marks mentioned herein are the property of their respective owners and may be trademarks or registered trademarks. Screen images simulated. Appearance of devices may vary.