SlideShare a Scribd company logo
1 of 29
Download to read offline
These materials are © 2016 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
These materials are © 2016 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
SamsungKNOX™
by the Samsung KNOX Team
&
Lawrence C. Miller
Samsung Special Edition
Samsung KNOX™
For Dummies®
, Samsung Special Edition
Published by
John Wiley & Sons, Inc.
111 River St.
Hoboken, NJ 07030‐5774
www.wiley.com
Copyright © 2016 by John Wiley & Sons, Singapore Pte Ltd.
No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any
form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise,
except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without the
prior written permission of the Publisher. Requests to the Publisher for permission should be
addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ
07030, (201) 748‐6011, fax (201) 748‐6008, or online at http://www.wiley.com/go/permissions.
Trademarks: Wiley, For Dummies, the Dummies Man logo, The Dummies Way, Dummies.com,
Making Everything Easier, and related trade dress are trademarks or registered trademarks of John
Wiley & Sons, Inc., and/or its affiliates in the United States and other countries, and may not be used
without written permission. Samsung and Samsung KNOX are trademarks or registered trademarks
of Samsung Electronics Co., Ltd. in the United States and other countries. All rights reserved.
Specifications and designs are subject to change without notice. All other trademarks are the
­property of their respective owners. John Wiley & Sons, Inc., is not associated with any product or
vendor mentioned in this book.
LIMIT OF LIABILITY/DISCLAIMER OF WARRANTY: THE PUBLISHER AND THE AUTHOR MAKE
NO REPRESENTATIONS OR WARRANTIES WITH RESPECT TO THE ACCURACY OR
COMPLETENESS OF THE CONTENTS OF THIS WORK AND SPECIFICALLY DISCLAIM ALL
WARRANTIES, INCLUDING WITHOUT LIMITATION WARRANTIES OF FITNESS FOR A
PARTICULAR PURPOSE. NO WARRANTY MAY BE CREATED OR EXTENDED BY SALES OR
PROMOTIONAL MATERIALS. THE ADVICE AND STRATEGIES CONTAINED HEREIN MAY NOT BE
SUITABLE FOR EVERY SITUATION. THIS WORK IS SOLD WITH THE UNDERSTANDING THAT THE
PUBLISHER IS NOT ENGAGED IN RENDERING LEGAL, ACCOUNTING, OR OTHER PROFESSIONAL
SERVICES. IF PROFESSIONAL ASSISTANCE IS REQUIRED, THE SERVICES OF A COMPETENT
PROFESSIONAL PERSON SHOULD BE SOUGHT. NEITHER THE PUBLISHER NOR THE AUTHOR
SHALL BE LIABLE FOR DAMAGES ARISING HEREFROM. THE FACT THAT AN ORGANIZATION
OR WEBSITE IS REFERRED TO IN THIS WORK AS A CITATION AND/OR A POTENTIAL SOURCE
OF FURTHER INFORMATION DOES NOT MEAN THAT THE AUTHOR OR THE PUBLISHER
ENDORSES THE INFORMATION THE ORGANIZATION OR WEBSITE MAY PROVIDE OR
RECOMMENDATIONS IT MAY MAKE. FURTHER, READERS SHOULD BE AWARE THAT INTERNET
WEBSITES LISTED IN THIS WORK MAY HAVE CHANGED OR DISAPPEARED BETWEEN WHEN
THIS WORK WAS WRITTEN AND WHEN IT IS READ.
ISBN 978‐1‐119‐24725‐8 (pbk); ISBN 978‐1‐119‐24726‐5 (ebk)
Manufactured in the United States of America
10 9 8 7 6 5 4 3 2 1
For general information on our other products and services, or how to create a custom For Dummies
book for your business or organization, please contact our Business Development Department in
the U.S. at 877‐409‐4177, contact info@dummies.biz, or visit www.wiley.com/go/custompub.
For information about licensing the For Dummies brand for products or services, contact
BrandedRights&Licenses@Wiley.com.
Special Acknowledgments
This Samsung Special Edition would not have been possible without the outstanding
support and collaboration from the KNOX Team with special thanks to Janis Guthrie,
known throughout the world as the Goddess of Tech Writers.
These materials are © 2016 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
These materials are © 2016 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Introduction
As smartphones become more powerful and popular
trends such as bring your own device (BYOD) and
corporate‐owned personally enabled (COPE) become more
ubiquitous in the digital workplace, mobile threats have
become more powerful and ubiquitous, too. Security and
privacy concerns are now — or should be — top of mind for
everyone.
In 2012, Samsung engineers began developing Samsung
KNOX, the defense‐grade mobile security platform built into
Samsung’s flagship mobile devices. Today, there are more than
144 million KNOX‐enabled Samsung devices around the world.
These devices are literally born (well, manufactured) with built‐
in, mobile security. Enterprises large and small, in industries
like finance, government, healthcare, retail and many others,
can now empower their mobile workforces with the confidence
that only Samsung KNOX‐enabled devices can deliver.
About This Book
This book explains the story behind KNOX (Chapter 1), the
KNOX platform (Chapter 2), and KNOX products (Chapter 3),
and wraps up by giving an overview of a few Samsung KNOX
capabilities (Chapter 4).
Foolish Assumptions
It’s been said that most assumptions have outlived their use-
lessness, but I’ll assume a few things nonetheless:
✓✓ You want to learn more about mobile device security —
specifically, Samsung KNOX mobile device security.
✓✓ You work for an organization that is struggling to manage
the proliferation of smartphones in the workplace and
the associated security and privacy risks.
Samsung KNOX For Dummies, Samsung Special Edition 2
These materials are © 2016 John Wiley  Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
✓✓ You may have heard about Samsung KNOX, but you
need more information because you’re evaluating mobile
security solutions for your organization — or because
one of your executives has just slid this book to you in a
meeting!
Icons Used in This Book
Throughout this book, I occasionally use special icons to call
attention to important information. Here’s what to expect:
This icon points out information that you should commit to
your nonvolatile memory or your noggin.
You won’t find a map of the human genome or the blueprints
for the next‐generation Samsung Galaxy smartphone here (or
maybe you will . . . hmm), but if you seek to attain the seventh
level of NERD‐vana, perk up! This icon explains the jargon
beneath the jargon!
Thank you for reading, hope you enjoy the book, please take
care of your writers! Seriously, this icon points out helpful
suggestions and useful nuggets of information.
This icon points out the stuff your mother warned you about.
Okay, probably not. But you should take heed nonetheless —
you may just save yourself some time and frustration!
Beyond the Book
There’s only so much I can cover in 24 short pages, so if you
find yourself at the end of this book thinking, “Gosh, this was
an amazing book, where can I learn more?,” just go to www.
samsung.com/business.
These materials are © 2016 John Wiley  Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
TheSamsungKNOXStory
In This Chapter
▶▶ Recognizing the mobile threat and the need for KNOX security
▶▶ Taking a look at smartphone components and security functions
In this chapter, I survey the mobile threat landscape to
show you why Samsung created KNOX security, built on
the tenets of Trusted Computing.
Why KNOX Exists
In 2008, the first Android smartphone was introduced, and
in just a few short years, Android has become the dominant
operating system (OS) for smartphones. In 2014, approxi-
mately 75 percent of the more than 1.2 billion smartphones
sold worldwide were Android smartphones, of which nearly
25 percent were Samsung smartphones.
The Android OS is open‐source software that was originally
designed primarily for end‐users rather than for enterprise
adoption. Developers can directly modify the Android OS
source code, which makes it very powerful and popular for
building advanced functionality and custom apps but also
makes the OS vulnerable to attacks.
Open‐source software is nonproprietary software that can be
freely used, modified, and distributed by anyone (subject to
licensing under the Open Source Initiative).
The 2013 Juniper Networks Mobile Threat Center Third Annual
Mobile Threats Report found that mobile malware threats were
growing at an alarming rate of 614 percent (276,259 total mali-
cious apps). Aspect Security’s 2013 Global Application Security
Chapter 1
Samsung KNOX For Dummies, Samsung Special Edition 4
These materials are © 2016 John Wiley  Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Risk Report found that 98 percent of apps presented at least
one security risk, while the average app registered 22.4 risks.
Not surprisingly, due to their market dominance and open‐
source nature, Android smartphones and apps are the target
of the vast majority of mobile security threats and attacks.
The original Android approach to security was to simply iso-
late apps from each other. However, this approach alone isn’t
enough for enterprise security needs. End‐users could still do
irreversible harm to the device by “rooting” the phone or by
downloading unauthorized apps, software, and firmware.
Device rooting is the practice of intentionally exploiting privi-
leged software or OS functions to install custom firmware and
circumvent vendor restrictions (such as licensing). Rooting
compromises many of the security protections built into the
device and typically voids the device manufacturer’s warranty.
Samsung introduced KNOX in 2013, recognizing the perfect
storm that was developing due to
✓✓ The rapidly evolving mobile threat landscape
✓✓ The rising popularity of bring your own device (BYOD)
and corporate‐owned personally enabled (COPE) mobil-
ity trends in the enterprise
✓✓ The ineffectiveness of the traditional IT security model,
which was originally designed to protect enterprise net-
works and based on perimeter‐based security, instead of
mobile devices with anytime, anywhere access to corpo-
rate apps and data
The Samsung KNOX security solution (the brand including the
KNOX platform and KNOX security products and services) is
designed to be the most comprehensively secure and manage-
able mobile device solution for enterprises large and small.
Trusted Computing: The
Foundation of KNOX
The foundation of KNOX is hardware‐based device security
that is built on the principles of Trusted Computing.
Chapter 1: The Samsung KNOX Story 5
These materials are © 2016 John Wiley  Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
In other words, KNOX ensures that the device is running the
correct security software and hasn’t been tampered with or
disabled — either by an attacker (through an attack vector)
or by the owner (through device rooting), and provides the
following important security functions:
✓✓ Platform integrity: Ensures that no one has made
changes to the device and that the device is operating
in an allowed state (see Chapter 2).
✓✓ Application and data security: Provides a secure stor-
age vault for security certificates (for example, your
email application may have a digital certificate to prove
an email message is a legitimate message from you) and
encryption keys (used, for example, to protect the confi-
dentiality and integrity of data).
✓✓ Remote and wireless access security: Provides
hardware‐based security for remote access (such
as a virtual private network, or VPN) and wireless
connections (such as a secure Wi-Fi network).
Samsung KNOX For Dummies, Samsung Special Edition 6
These materials are © 2016 John Wiley  Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
These materials are © 2016 John Wiley  Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
TheKNOXPlatform
In This Chapter
▶▶ Starting with a secure device platform
▶▶ Providing secure assembly
▶▶ Ensuring authenticity and integrity during the boot process
▶▶ Loading software and applications securely
▶▶ Preventing attacks and malware at run‐time
▶▶ Keeping smartphone devices up to date
KNOX uses Trusted Computing principles throughout the
life cycle of KNOX‐enabled Samsung devices — from
the time of design, throughout the manufacturing process,
to boot‐time, load‐time, and run‐time — to ensure enterprise
devices, apps, and data are always safe and secure.
In this chapter, you learn about the foundational elements
of the KNOX platform that make Samsung smartphones the
most secure Android devices available, from inception to the
moment you turn the device on — and beyond.
Secure by Design
The KNOX platform was conceived and created using a
design philosophy that incorporates Trusted Computing
principles:
✓✓ Build trust. Establish security protections at the hardware
level (“Hardware Root of Trust”) and ensure security from
Chapter 2
Samsung KNOX For Dummies, Samsung Special Edition 8
These materials are © 2016 John Wiley  Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
the moment the device is turned on. A Hardware Root of
Trust is important for several reasons:
•• Security is literally “built in” to the hardware
as opposed to being an add‐on software
component.
•• Hardware‐based security usually means an attacker
cannot compromise the device even with physical
access.
✓✓ Maintain trust. Actively monitor key aspects of the
device in real‐time and perform periodic checks to
ensure the ongoing “health” (integrity) of the device (like
immunizations).
✓✓ Prove trust. KNOX-enabled devices provide the MDM
with an attestation, a cryptographically verifiable
collection of device state measurements to prove trust
(you’ve got to show your immunization record to the
daycare center so you don’t get the other “kids” —
programs and services — sick).
KNOX security starts at the processor level. KNOX uses a
processor architecture known as ARM TrustZone to provide
built‐in, system‐wide strong authentication for users, apps,
and data through partitions called worlds.
In TrustZone, there are two worlds:
✓✓ Secure World: This world is reserved for highly sensitive
operations such as those involving cryptographic keys
(this is where KNOX comes in!).
✓✓ Normal World: Virtually all smartphone software as
we know it, including the OS kernel, middleware, and
apps, runs in this world. Software in the Normal World
can never directly access data used by Secure World
­software — it must ask for access.
KNOX uses Secure World capabilities to protect confidential
enterprise data and to monitor the OS kernel running in the
Normal World. The combination of TrustZone hardware and
software provides a Trusted Execution Environment (TEE).
The TEE is important because it ensures that sensitive data
and code are stored, processed, and protected in a separate
trusted environment for maximum security — like a safe
deposit box within a secure bank vault.
Chapter 2: The KNOX Platform 9
These materials are © 2016 John Wiley  Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
KNOX: Security from the hardware up
Samsung KNOX safely and securely
enables enterprise mobility
strategies by providing multiple
layers of protection for mobile
devices built on the KNOX platform.
The foundational layer of the
Samsung KNOX platform is the
Hardware Root of Trust. This layer
of security is literally built into the
device at the factory, providing a
strong base on which to build addi-
tional security layers. This founda-
tion is supported by the following
key elements:
✓✓ Device Unique Hardware Key
(DUHK): The DUHK (discussed
in the section “Controlling the
Manufacturing Process”) is a
cryptographic key that is unique
to each Samsung device. The
DUHK encrypts and decrypts
data and encrypts other crypto-
graphic keys on the device.
✓✓ Samsung Secure Boot Key
(SSBK): The SSBK (discussed
in the section “Controlling the
Manufacturing Process”) veri-
fies that boot components on the
device are approved.
✓✓ Device Root Key (DRK): The DRK
is another type of cryptographic
key that is unique to each
Samsung device. The DRK iden-
tifies the device and proves that
it is an authentic device manu-
factured by Samsung.
✓✓ KNOX Tamper‐Evident Fuse:
The KNOX Tamper‐Evident
Fuse (explained in the section
“On Your Mark! Boot‐time
(continued)
Samsung KNOX For Dummies, Samsung Special Edition 10
These materials are © 2016 John Wiley  Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Defenses”) verifies that
the device has never run
unapproved components or had
key security features disabled.
✓✓ Rollback Prevention (RP) Fuses:
RP fuses are hardware fuses that
encode the minimum acceptable
version of Samsung‐approved
programs for a particular device.
These fuses are set when
the device is manufactured
and prevent older, potentially
vulnerable versions of boot
programs from being loaded on
the device.
The next layer of security con-
sists of Secure Boot and Trusted
Boot (explained in the section “On
Your Mark! Boot‐time Defenses”).
Secure Boot and Trusted Boot run
sequentially as soon as a user turns
on the device. Secure Boot starts
each bootloader and ensures that
the bootloaders are authentic ver-
sions before it loads the Android OS
kernel. Trusted Boot takes “snap-
shots” (called measurements) of
all the bootloaders and OS kernels
while they’re running to ensure they
remain secure and to validate their
integrity.
The third layer of security,
“TrustZone” (discussed in the sec-
tion “Secure by Design”), creates
a “Secure World” and “Normal
World” partition in the device’s pro-
cessor architecture.
The fourth layer consists of
the TrustZone‐based Integrity
Measurement Architecture (TIMA)
and Real‐time Kernel Protection
(RKP), both explained in the sec-
tion “Go! Run‐time Defenses.” RKP
continuously monitors and protects
devices while they are running.
Finally, “Security Enhancements
for Android” protects apps and
uses policies to restrict access to
safe connections only. In addition,
it offers utilities and tools including
mobile device management (MDM),
KNOX Workspace, Active Directory
(AD), virtual private network (VPN),
and single sign‐on (SSO), among
others — all described in Chapters 3
and 4.
Thus, KNOX provides a multi‐tiered
platform that layers in protection for
mobile devices from the hardware
level all the way up to the applica-
tions running on the device.
(continued)
A “trusted environment” ensures that enterprise operations,
such as decrypting sensitive data, can occur only when the
device has been booted into an allowed state. The TEE helps
make this trusted environment possible.
In trusted computing, an allowed state is the normal, unal-
tered condition of the device’s hardware and software secu-
rity functions. If the security functions have been tampered
with in any way, the device is no longer in an allowed state. It’s
Chapter 2: The KNOX Platform 11
These materials are © 2016 John Wiley  Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
like a tamper‐evident seal on a bottle of aspirin or shrink wrap
on your favorite DVD movie — it gives you confidence that no
one messed with your medicine or replaced your DVD with a
defective copy.
Controlling the Manufacturing
Process
Samsung manufactures and configures all its devices in its
own factories. This means that Samsung has complete con-
trol over the devices and software leaving the factory, which
ensures both the quality and security of every Samsung
device throughout the manufacturing process.
In addition to developing and installing secure device
software, Samsung manufactures each device with special
cryptographic keys, which are crucial components in the
Hardware Root of Trust, and ensure the ongoing integrity of
Samsung devices even after they leave the factory. Two of
these keys are
✓✓ Device‐Unique Hardware Key (DUHK): This is the fin-
gerprint of the device — no two devices have the same
DUHK. The DUHK is built in to the device and provides
an additional level of security: Secure World data can
only be decrypted on that specific device.
✓✓ Samsung Secure Boot Key (SSBK): Another hardware
feature uses tamper‐evident fuses to verify that the
phone’s OS and software load safely every time the
device is powered on.
The additional steps that Samsung takes to protect the manu-
facturing process ensure a Trusted Computing environment
for every Samsung KNOX device. Other device vendors that
outsource manufacturing can’t guarantee the same end‐to‐end
control of these critical security elements.
When a user presses the On button of a device, several
critical processes must run sequentially before the device
is ready to be used. These processes include booting, load-
ing, and running. In the following sections, I explain how
Samsung KNOX For Dummies, Samsung Special Edition 12
These materials are © 2016 John Wiley  Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
KNOX protects devices at boot‐time, load‐time, run‐time,
and beyond.
On Your Mark! Boot‐Time
Defenses
One of the most important jobs of mobile security is to ensure
the software that is running on the device is authentic and
safe. This software, of course, includes the operating system,
but also any software or apps that are installed by the manu-
facturer, enterprise, or user. When a phone is turned on,
Secure Boot checks for safety and authenticity, but can some-
times be tricked by an older version of a bootloader.
To overcome this limitation, KNOX uses Trusted Boot.
Trusted Boot takes measurements (“snapshots”) to prove
whether the bootloaders are valid and running as expected.
Trusted Boot further protects the boot process by blowing a
tamper‐evident fuse if it detects an unauthorized modification
(“In case of emergency, break glass”) so that your data stays
encrypted and safe.
The KNOX Tamper‐Evident Fuse (sometimes referred to as
the “Warranty Bit”) is a one‐time programmable fuse that
indicates whether the device has ever been booted in a
non‐allowed state. If Trusted Boot detects that unapproved
components are used, or if certain critical security features
such as SE for Android are disabled, it “blows the fuse.” This
means that a “bit” is set to indicate the device is no longer
trusted or in an “allowed” state. Remember: KNOX wants
to ensure your device starts and stays in an allowed state.
Once the fuse is blown, the device can never successfully go
through the KNOX boot process. Access to the DUHK and
Device Root Key (DRK) in the TrustZone Secure World is
revoked and enterprise data on the device using the TIMA
key store (discussed in the next section) cannot be accessed
or recovered.
Chapter 2: The KNOX Platform 13
These materials are © 2016 John Wiley  Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Get Set! Load‐Time Defenses
The kernel isn’t the only attractive target for malware and
malicious users. Mobile devices have a lot of preloaded
system software beyond the kernel (think about all the apps
What’s in a smartphone?
Just like a desktop computer, at the
heart of every smartphone there are
one or more processors, where the
OS and apps run.
Processors
A processor runs in one of two
modes of execution (the privilege
level for a piece of software running
on the processor):
✓✓ User mode: When a user‐
installed app runs on the pro-
cessor, it runs in user mode.
In user mode, the app is not
allowed to directly access hard-
ware devices (such as a camera
or GPS) or resources (such as
memory) controlled by other
apps.
✓✓ Privileged mode: Critical OS soft-
ware runs in privileged mode. In
privileged mode, the system’s
software is allowed to directly
access hardware devices, as
well as all data held by the user’s
applications.
Operating systems
Operating systems use both user
and privileged modes for various
functions. The portion of the OS run-
ning in privileged mode is called the
kernel. Thus, gaining control of the
OS kernel is often an objective for
an attacker. With privileged mode
access, an attacker could tamper
with and steal potentially sensitive
data from any app on the device.
Middleware
In most operating systems, when
apps want to communicate with
each other, they ask the kernel to
set up the lines of communication for
them. To facilitate this communica-
tion, the Android OS uses another
layer of software, known as middle-
ware. Android middleware runs in
user mode and sits between the
kernel and the apps. This middleware
adds yet another layer of protection
to Android devices — preventing
apps from directly accessing the OS
kernel (and its privileged mode of
execution).
What does all of this mean? The
security features built into KNOX and
Android work together seamlessly
from the hardware layer to the
application layer, providing users
with the most secure experience
(see the sidebar “KNOX: Security
from the hardware up,” earlier in this
chapter).
Samsung KNOX For Dummies, Samsung Special Edition 14
your phone already has on it!). Unfortunately, it’s impractical
to verify the integrity and authenticity of all that software at
boot‐time, because it would (seemingly) take forever to the
user — like booting up a computer every time you want to use
your phone!
KNOX checks all this extra system software using an
enhanced version of the basic “DM‐Verity” software included
with the Google Android Lollipop OS release. KNOX verifies
the integrity of system software not covered by the boot‐time
checks (discussed in the previous section) and if a malicious
process or user is detected, it blocks any attempt to access
the modified software and data.
DM‐Verity is a Linux kernel driver for verifying the integrity of
a partition at run‐time.
Go! Run‐Time Defenses
More sophisticated attacks can compromise the device or
intercept data at run‐time (when you actually launch an app
or access data). To protect devices against run‐time attacks,
KNOX uses the TrustZone‐based Integrity Measurement
Architecture (TIMA), a proprietary security technology
­developed by Samsung. The TIMA components include
the following:
✓✓ Periodic Kernel Measurement (PKM): PKM performs
continuous periodic monitoring of the kernel to detect
if legitimate kernel code and data have been modified
by malicious software. PKM is analogous to a scheduled
scan in traditional antivirus or antimalware software for
desktop computers.
✓✓ Real‐Time Kernel Protection (RKP): RKP performs ongo-
ing, real‐time monitoring of the OS from within TrustZone
to prevent kernel tampering. RKP is analogous to real‐
time, on‐demand antivirus or antimalware software
scanning that is triggered when a USB thumb drive, for
example, is connected to a desktop computer.
RKP and PKM are essential in protecting Android devices
against unknown future threats. Flagging suspicious activi-
ties is the first step in identifying and preventing security
Chapter 2: The KNOX Platform 15
breaches. These real‐time checks give enterprises confidence
that devices are continuously monitored for breaches, and
that IT is alerted if corporate devices have been compromised.
Update Protection
Rollback prevention is a feature of KNOX that blocks
the device from loading a valid but older version of boot
components. Older versions of software may contain
vulnerabilities that attackers can exploit. KNOX rollback
prevention checks the version of the bootloader and kernel
during both boot and updates, and blocks these processes
from continuing if versions are unacceptably old. KNOX
further secures this process by using hardware features
installed at the factory.
The KNOX security platform is built in to flagship Samsung
mobile devices and protects the device right out of the box,
throughout the entire device life cycle.
Samsung KNOX For Dummies, Samsung Special Edition 16
These materials are © 2016 John Wiley  Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
These materials are © 2016 John Wiley  Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
KNOXDataProtection
Products
In This Chapter
▶▶ Securing enterprises, government, and regulated industries with
KNOX Workspace
▶▶ Empowering individual users with My KNOX
Beyond the KNOX platform (discussed in Chapter 2),
which provides built‐in hardware‐based protection — at
no cost — from the moment you turn the device on, Samsung
offers optional products to address your unique security
requirements. Two of these products are KNOX Workspace
and My KNOX, which I explain in this chapter.
KNOX Workspace
Samsung KNOX Workspace is a defense‐grade dual persona
container product designed to separate, isolate, encrypt, and
protect enterprise data on a device from attackers. This work/
play environment ensures that work data and personal data
are separated and that only the work container is managed by
the enterprise. Personal information such as photos and mes-
sages are not managed or controlled by the IT department.
Once activated, KNOX Workspace is tightly integrated into the
KNOX platform.
KNOX Workspace provides this separate environment within
the mobile device, complete with its own home screen,
launcher, apps, and widgets.
Chapter 3
Samsung KNOX For Dummies, Samsung Special Edition 18
These materials are © 2016 John Wiley  Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Apps and data inside KNOX Workspace are isolated from
apps outside KNOX Workspace — apps outside KNOX
Workspace cannot use Android inter‐process communication
or data‐sharing methods with apps inside KNOX Workspace.
For example, photos taken with the camera inside KNOX
Workspace are not viewable in the Gallery outside KNOX
Workspace. The same restriction applies to copying and
pasting. When allowed by IT policy, some app data such as
contacts and calendar data can be shared across the KNOX
Workspace boundary. The end‐user can choose whether to
share contacts and calendar notes between KNOX Workspace
and his or her personal space on the device; however, IT
policy ultimately controls this option.
The enterprise can manage KNOX Workspace like any other
IT asset using a mobile device management (MDM) solution;
this container management process is called Mobile Container
Management (MCM). Samsung KNOX supports many of the
leading MDM solutions on the market. MCM is affected by set-
ting policies in the same fashion as traditional MDM policies.
Samsung KNOX Workspace includes a rich set of policies for
authentication, data security, virtual private network (VPN),
email, application blacklisting, whitelisting, and so on.
KNOX Workspace can also be configured for container‐only
mode. In this mode, the entire device experience is restricted
to the KNOX Workspace. This mode is suitable for industries
such as healthcare, finance, and others that provide devices
for employees and seek to restrict access to business apps.
KNOX Workspace also has a two‐factor authentication pro-
cess that can be configured with MDM. The user can configure
the KNOX Workspace to accept a fingerprint as the primary
authentication factor for the container with a PIN, password,
or pattern as a second factor.
Two‐factor authentication uses two of the following methods
to establish identity: something you know (such as a pass-
word or PIN), something you have (such as a token), or some-
thing you are (such as a fingerprint).
The KNOX platform also supports multiple containers, thus
meeting the needs of professionals who have multiple employ-
ers, such as doctors or consultants.
Chapter 3: KNOX Data Protection Products 19
These materials are © 2016 John Wiley  Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
KNOX is continuously being updated with popular features
and new additions, including the following:
✓✓ Bluetooth: Bluetooth support enables users to com-
municate with other connected devices, and do more
than just listen to music and make calls inside the KNOX
Workspace. Examples include printing, file sharing, and
external card readers. IT administrators can enable secu-
rity restrictions on external SD cards.
✓✓ Near field communication (NFC): NFC enables a device
to act as a SmartCard‐based credential for use cases such
as physical access and access to IT accounts.
Finally, IT administrators can configure KNOX caller ID to dis-
play caller ID information derived from personal contacts and
KNOX Workspace contacts for incoming calls when the user is
using the device in personal mode.
My KNOX
My KNOX is a personal, encrypted workspace that allows
you to securely separate your work/play apps and data while
taking full advantage of the KNOX security platform built in to
your device. You can think of this as your personal version of
KNOX Workspace without all the IT people messing with your
device.
My KNOX is a free product that can be downloaded from
Google Play and managed via the My KNOX User website at
http://my.samsungknox.com.
Key features of My KNOX include the following:
✓✓ Support for most email and PIM (Personal Information
Manager) account types, such as Gmail and Hotmail, and
email communication protocols including EAS (Exchange
ActiveSync), POP3 (Post Office Protocol Version 3), and
IMAP (Internet Message Access Protocol)
✓✓ A separate workspace on the device for email and app
connectivity
✓✓ A simple end‐user website for device management, includ-
ing remote wipe, lock, and find‐my‐device tools
Samsung KNOX For Dummies, Samsung Special Edition 20
These materials are © 2016 John Wiley  Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Securely mobilizing a major Canadian
healthcare provider
The customer
Saint Elizabeth Health Care has been
an active participant in the develop-
ment of community health since 1908.
Today, Saint Elizabeth provides a full
range of integrated care solutions for
client, community, and health system
needs across Canada, employing
more than 8,000 people and visiting
more than 18,000 clients every day.
The challenge
Outfit the mobile workforce with a
powerful, secure mobility solution
that includes KNOX Workspace to
improve in‐home care.
“As our staff are delivering world‐
class care, Samsung’s mobile
devices are bringing innovation
and efficiency to their everyday
offices  — which can often be a
kitchen table, parked vehicle, or
patient’s home at any given time.”
—Shirlee Sharkey,
CEO, Saint Elizabeth
The benefits
✓✓ Protects workers’ personal
information in a separate
container from patient data and
applications
✓✓ Requires health workers to input
a password and one additional
identifier to ensure only autho-
rized personnel are accessing
patient data
✓✓ Allows IT staff to centrally
manage security and remotely
troubleshoot any issues through
MDM integration
These materials are © 2016 John Wiley  Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Ten(OrSo)Essential
CapabilitiesforEnterprise
Readiness
Here are ten (or so) key capabilities of KNOX-enabled
Samsung mobile devices for enterprises:
✓✓ Protect enterprise Data‐at‐Rest by default: Samsung
KNOX does not depend on users to secure their own
BYOD devices in case of loss or theft. KNOX defines
two classes of data — protected and sensitive. All data
written by apps in the secure Workspace is considered
protected and is encrypted on disk when the device is
powered off. Decryption is tied to the device hardware
meaning protected data can only be recovered on the
same device.
Even stronger protection is applied to sensitive data.
Sensitive data remains encrypted as long as the
Workspace is locked, even if the device is powered on.
Sensitive Data Protection (SDP) allows sensitive data
to be decrypted only when a user unlocks his KNOX
Workspace with his password and the decryption key
is tied to the hardware. When the user re‐locks the
Workspace, SDP keys are cleared, and access can only be
regained using the same device hardware.
✓✓ On‐device encryption: The KNOX platform further
strengthens the full‐device encryption capability offered
by the Android platform by allowing the IT Manager to
tie the encryption key to a secret maintained in trusted
hardware. TrustZone‐based on‐device encryption (ODE)
also enables enterprises to ensure that all device data is
protected in the unlikely event that the operating system
is compromised.
Chapter 4
Samsung KNOX For Dummies, Samsung Special Edition 22
These materials are © 2016 John Wiley  Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
✓✓ Container isolation: KNOX enables complete isolation of
work‐related and personal apps and data. This dual per-
sona capability ensures that apps installed by individual
users do not compromise the security of corporate apps
and data. Container isolation also keeps IT administra-
tors from accessing individual users’ private data (such
as photos, contacts, and text messages).
✓✓ Virtual private network (VPN): KNOX offers comprehen-
sive support for enterprise VPNs, enabling individuals to
connect to corporate resources from their KNOX‐enabled
smartphones over an optimized, secure path. The KNOX
platform supports both IPSec and Secure Sockets Layer
(SSL) VPNs.
✓✓ SmartCard framework: Public key infrastructure (PKI)
certificates enable documents to be digitally signed, email
messages to be encrypted and decrypted, and secure
network connections to be established. PKI certificates
are typically stored on a SmartCard, known as a Common
Access Card (CAC). Samsung KNOX provides apps with
access to the hardware certificates on the CAC and pro-
vides improved SmartCard compatibility via a software
framework that allows third‐party SmartCard and reader
providers to install their solutions into the framework.
✓✓ Single sign‐on (SSO): SSO allows a user to log in once and
have access to all the SSO‐enabled apps on the device
without being prompted to log in again. For example, SSO
allows access to the KNOX Workspace container (and
participating apps that require credentials within the
container) with one password.
✓✓ Active Directory integration: KNOX provides an option to
choose an Active Directory password as the unlock method
for KNOX containers. This has two important benefits:
•• It allows IT administrators to use a one‐password
management policy for desktop and mobile devices.
•• The end‐user needs to remember only one password
to access all services offered by the employer.
Active Directory is the most widely deployed enterprise‐
grade directory service that has built‐in support for
Kerberos.
✓✓ Mobile device management (MDM): KNOX provides hun-
dreds of MDM security policies for fine‐grained control
of devices, designed to lower cost and improve usability
and manageability for small or medium enterprises.
These materials are © 2016 John Wiley  Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
WILEY END USER LICENSE AGREEMENT
Go to www.wiley.com/go/eula to access Wiley’s ebook EULA.

More Related Content

What's hot

An Introduction To Jenkins
An Introduction To JenkinsAn Introduction To Jenkins
An Introduction To JenkinsKnoldus Inc.
 
VMware Tanzu Introduction
VMware Tanzu IntroductionVMware Tanzu Introduction
VMware Tanzu IntroductionVMware Tanzu
 
Monitoring Kubernetes with Prometheus (Kubernetes Ireland, 2016)
Monitoring Kubernetes with Prometheus (Kubernetes Ireland, 2016)Monitoring Kubernetes with Prometheus (Kubernetes Ireland, 2016)
Monitoring Kubernetes with Prometheus (Kubernetes Ireland, 2016)Brian Brazil
 
Inter-process communication of Android
Inter-process communication of AndroidInter-process communication of Android
Inter-process communication of AndroidTetsuyuki Kobayashi
 
A deep dive into Android OpenSource Project(AOSP)
A deep dive into Android OpenSource Project(AOSP)A deep dive into Android OpenSource Project(AOSP)
A deep dive into Android OpenSource Project(AOSP)Siji Sunny
 
Kubermatic CNCF Webinar - start.kubermatic.pdf
Kubermatic CNCF Webinar - start.kubermatic.pdfKubermatic CNCF Webinar - start.kubermatic.pdf
Kubermatic CNCF Webinar - start.kubermatic.pdfLibbySchulze
 
Effective DevOps:一場文化與技術的轉型運動
Effective DevOps:一場文化與技術的轉型運動Effective DevOps:一場文化與技術的轉型運動
Effective DevOps:一場文化與技術的轉型運動Chen Cheng-Wei
 
Ceph Block Devices: A Deep Dive
Ceph Block Devices:  A Deep DiveCeph Block Devices:  A Deep Dive
Ceph Block Devices: A Deep DiveRed_Hat_Storage
 
Cloud-Native Fundamentals: An Introduction to 12-Factor Applications
Cloud-Native Fundamentals: An Introduction to 12-Factor ApplicationsCloud-Native Fundamentals: An Introduction to 12-Factor Applications
Cloud-Native Fundamentals: An Introduction to 12-Factor ApplicationsVMware Tanzu
 
OpenShift 4 installation
OpenShift 4 installationOpenShift 4 installation
OpenShift 4 installationRobert Bohne
 
Zfs Nuts And Bolts
Zfs Nuts And BoltsZfs Nuts And Bolts
Zfs Nuts And BoltsEric Sproul
 
Debian or Yocto Project? Which is the best for your Embedded Linux project?
Debian or Yocto Project? Which is the best for your Embedded Linux project?Debian or Yocto Project? Which is the best for your Embedded Linux project?
Debian or Yocto Project? Which is the best for your Embedded Linux project?Chris Simmonds
 
U2F Tutorial - Authentication Tokens for Enterprise and Consumers
U2F Tutorial - Authentication Tokens for Enterprise and ConsumersU2F Tutorial - Authentication Tokens for Enterprise and Consumers
U2F Tutorial - Authentication Tokens for Enterprise and ConsumersFIDO Alliance
 
What is Cloud Native Explained?
What is Cloud Native Explained?What is Cloud Native Explained?
What is Cloud Native Explained?jeetendra mandal
 
왜 컨테이너인가? - OpenShift 구축 사례와 컨테이너로 환경 전환 시 고려사항
왜 컨테이너인가? - OpenShift 구축 사례와 컨테이너로 환경 전환 시 고려사항왜 컨테이너인가? - OpenShift 구축 사례와 컨테이너로 환경 전환 시 고려사항
왜 컨테이너인가? - OpenShift 구축 사례와 컨테이너로 환경 전환 시 고려사항rockplace
 

What's hot (20)

An Introduction To Jenkins
An Introduction To JenkinsAn Introduction To Jenkins
An Introduction To Jenkins
 
Android ppt
Android pptAndroid ppt
Android ppt
 
VMware Tanzu Introduction
VMware Tanzu IntroductionVMware Tanzu Introduction
VMware Tanzu Introduction
 
Monitoring Kubernetes with Prometheus (Kubernetes Ireland, 2016)
Monitoring Kubernetes with Prometheus (Kubernetes Ireland, 2016)Monitoring Kubernetes with Prometheus (Kubernetes Ireland, 2016)
Monitoring Kubernetes with Prometheus (Kubernetes Ireland, 2016)
 
Inter-process communication of Android
Inter-process communication of AndroidInter-process communication of Android
Inter-process communication of Android
 
A deep dive into Android OpenSource Project(AOSP)
A deep dive into Android OpenSource Project(AOSP)A deep dive into Android OpenSource Project(AOSP)
A deep dive into Android OpenSource Project(AOSP)
 
Kubermatic CNCF Webinar - start.kubermatic.pdf
Kubermatic CNCF Webinar - start.kubermatic.pdfKubermatic CNCF Webinar - start.kubermatic.pdf
Kubermatic CNCF Webinar - start.kubermatic.pdf
 
Effective DevOps:一場文化與技術的轉型運動
Effective DevOps:一場文化與技術的轉型運動Effective DevOps:一場文化與技術的轉型運動
Effective DevOps:一場文化與技術的轉型運動
 
Virtual Container - Docker
Virtual Container - Docker Virtual Container - Docker
Virtual Container - Docker
 
Ceph Block Devices: A Deep Dive
Ceph Block Devices:  A Deep DiveCeph Block Devices:  A Deep Dive
Ceph Block Devices: A Deep Dive
 
Cloud-Native Fundamentals: An Introduction to 12-Factor Applications
Cloud-Native Fundamentals: An Introduction to 12-Factor ApplicationsCloud-Native Fundamentals: An Introduction to 12-Factor Applications
Cloud-Native Fundamentals: An Introduction to 12-Factor Applications
 
OpenShift 4 installation
OpenShift 4 installationOpenShift 4 installation
OpenShift 4 installation
 
Zfs Nuts And Bolts
Zfs Nuts And BoltsZfs Nuts And Bolts
Zfs Nuts And Bolts
 
CI/CD with GitHub Actions
CI/CD with GitHub ActionsCI/CD with GitHub Actions
CI/CD with GitHub Actions
 
DevOps
DevOps DevOps
DevOps
 
Debian or Yocto Project? Which is the best for your Embedded Linux project?
Debian or Yocto Project? Which is the best for your Embedded Linux project?Debian or Yocto Project? Which is the best for your Embedded Linux project?
Debian or Yocto Project? Which is the best for your Embedded Linux project?
 
U2F Tutorial - Authentication Tokens for Enterprise and Consumers
U2F Tutorial - Authentication Tokens for Enterprise and ConsumersU2F Tutorial - Authentication Tokens for Enterprise and Consumers
U2F Tutorial - Authentication Tokens for Enterprise and Consumers
 
Power Management from Linux Kernel to Android
Power Management from Linux Kernel to AndroidPower Management from Linux Kernel to Android
Power Management from Linux Kernel to Android
 
What is Cloud Native Explained?
What is Cloud Native Explained?What is Cloud Native Explained?
What is Cloud Native Explained?
 
왜 컨테이너인가? - OpenShift 구축 사례와 컨테이너로 환경 전환 시 고려사항
왜 컨테이너인가? - OpenShift 구축 사례와 컨테이너로 환경 전환 시 고려사항왜 컨테이너인가? - OpenShift 구축 사례와 컨테이너로 환경 전환 시 고려사항
왜 컨테이너인가? - OpenShift 구축 사례와 컨테이너로 환경 전환 시 고려사항
 

Viewers also liked

presentation 1
presentation 1presentation 1
presentation 1missbluez
 
NACD Southern California 2010 Directors in a Digital World
NACD Southern California 2010 Directors in a Digital WorldNACD Southern California 2010 Directors in a Digital World
NACD Southern California 2010 Directors in a Digital WorldFayFeeney
 
We have iPads, now what? #DLTV2014
We have iPads, now what? #DLTV2014We have iPads, now what? #DLTV2014
We have iPads, now what? #DLTV2014Rebecca Davies
 
Cellutions ptt lone worker protection
Cellutions ptt lone worker protectionCellutions ptt lone worker protection
Cellutions ptt lone worker protectionpittand
 
Samsung KNOX™ Meets Evolving Enterprise Mobility Challenges
Samsung KNOX™ Meets Evolving Enterprise Mobility ChallengesSamsung KNOX™ Meets Evolving Enterprise Mobility Challenges
Samsung KNOX™ Meets Evolving Enterprise Mobility ChallengesSamsung at Work
 
GWAVACon 2015: BlackBerry - Vorratsdatenspeicherung - Was bedeutet das für mo...
GWAVACon 2015: BlackBerry - Vorratsdatenspeicherung - Was bedeutet das für mo...GWAVACon 2015: BlackBerry - Vorratsdatenspeicherung - Was bedeutet das für mo...
GWAVACon 2015: BlackBerry - Vorratsdatenspeicherung - Was bedeutet das für mo...GWAVA
 
Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0Javier Gonzalez
 
Citirx Day 2013: Citrix Enterprise Mobility
Citirx Day 2013: Citrix Enterprise MobilityCitirx Day 2013: Citrix Enterprise Mobility
Citirx Day 2013: Citrix Enterprise MobilityDigicomp Academy AG
 
Push to-talk-android
Push to-talk-androidPush to-talk-android
Push to-talk-androidAnjali Jain
 
Samsung KNOX - The Most Secure Android Solution
Samsung KNOX - The Most Secure Android SolutionSamsung KNOX - The Most Secure Android Solution
Samsung KNOX - The Most Secure Android SolutionSamsung Biz Mobile
 
[Infographic] IFA 2016: Samsung Knox
[Infographic] IFA 2016: Samsung Knox[Infographic] IFA 2016: Samsung Knox
[Infographic] IFA 2016: Samsung KnoxSamsung Biz Mobile
 
TEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of WorkTEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of WorkVolker Hirsch
 

Viewers also liked (14)

The KNOX Story
The KNOX StoryThe KNOX Story
The KNOX Story
 
presentation 1
presentation 1presentation 1
presentation 1
 
NACD Southern California 2010 Directors in a Digital World
NACD Southern California 2010 Directors in a Digital WorldNACD Southern California 2010 Directors in a Digital World
NACD Southern California 2010 Directors in a Digital World
 
We have iPads, now what? #DLTV2014
We have iPads, now what? #DLTV2014We have iPads, now what? #DLTV2014
We have iPads, now what? #DLTV2014
 
Cellutions ptt lone worker protection
Cellutions ptt lone worker protectionCellutions ptt lone worker protection
Cellutions ptt lone worker protection
 
Samsung KNOX™ Meets Evolving Enterprise Mobility Challenges
Samsung KNOX™ Meets Evolving Enterprise Mobility ChallengesSamsung KNOX™ Meets Evolving Enterprise Mobility Challenges
Samsung KNOX™ Meets Evolving Enterprise Mobility Challenges
 
GWAVACon 2015: BlackBerry - Vorratsdatenspeicherung - Was bedeutet das für mo...
GWAVACon 2015: BlackBerry - Vorratsdatenspeicherung - Was bedeutet das für mo...GWAVACon 2015: BlackBerry - Vorratsdatenspeicherung - Was bedeutet das für mo...
GWAVACon 2015: BlackBerry - Vorratsdatenspeicherung - Was bedeutet das für mo...
 
Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0Samsung knox security_solution_v1_10_0
Samsung knox security_solution_v1_10_0
 
Citirx Day 2013: Citrix Enterprise Mobility
Citirx Day 2013: Citrix Enterprise MobilityCitirx Day 2013: Citrix Enterprise Mobility
Citirx Day 2013: Citrix Enterprise Mobility
 
Push to-talk-android
Push to-talk-androidPush to-talk-android
Push to-talk-android
 
Samsung KNOX - The Most Secure Android Solution
Samsung KNOX - The Most Secure Android SolutionSamsung KNOX - The Most Secure Android Solution
Samsung KNOX - The Most Secure Android Solution
 
[Infographic] IFA 2016: Samsung Knox
[Infographic] IFA 2016: Samsung Knox[Infographic] IFA 2016: Samsung Knox
[Infographic] IFA 2016: Samsung Knox
 
Key Digital Trends for 2017
Key Digital Trends for 2017Key Digital Trends for 2017
Key Digital Trends for 2017
 
TEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of WorkTEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of Work
 

Similar to Samsung KNOX for Dummies

Endpoint Detection and Response for Dummies
Endpoint Detection and Response for DummiesEndpoint Detection and Response for Dummies
Endpoint Detection and Response for DummiesLiberteks
 
Cloud Security for Dumies
Cloud Security for DumiesCloud Security for Dumies
Cloud Security for DumiesLiberteks
 
CloudSecurityForDummies_Netskope (1)
CloudSecurityForDummies_Netskope (1)CloudSecurityForDummies_Netskope (1)
CloudSecurityForDummies_Netskope (1)Sean Dickson
 
Cloud Security For Dummies Netskope
Cloud Security For Dummies NetskopeCloud Security For Dummies Netskope
Cloud Security For Dummies NetskopeSamuel Najar
 
Ransomware defense-for-dummies
Ransomware defense-for-dummiesRansomware defense-for-dummies
Ransomware defense-for-dummiesshadaab umair
 
Ransomware Defense for Dummies
Ransomware Defense for DummiesRansomware Defense for Dummies
Ransomware Defense for DummiesLiberteks
 
Ransomware defense-for-dummies
Ransomware defense-for-dummiesRansomware defense-for-dummies
Ransomware defense-for-dummiesJorge Mosquera
 
Building an Enterprise Cloud for Dummies
Building an Enterprise Cloud for DummiesBuilding an Enterprise Cloud for Dummies
Building an Enterprise Cloud for DummiesLiberteks
 
Cloud Information Management for Dummies
Cloud Information Management for DummiesCloud Information Management for Dummies
Cloud Information Management for DummiesLiberteks
 
Cybersecurity for dummies
Cybersecurity for dummiesCybersecurity for dummies
Cybersecurity for dummiesPaulo R
 
Vulnerability Management for Dummies
Vulnerability Management for DummiesVulnerability Management for Dummies
Vulnerability Management for DummiesLiberteks
 
341972038-Vulnerability-Management-2nd-edition-pdf.pdf
341972038-Vulnerability-Management-2nd-edition-pdf.pdf341972038-Vulnerability-Management-2nd-edition-pdf.pdf
341972038-Vulnerability-Management-2nd-edition-pdf.pdfHarkeemShaw1
 
Web Session Intelligence for Dummies
Web Session Intelligence for DummiesWeb Session Intelligence for Dummies
Web Session Intelligence for DummiesEMC
 
network monitoring_for_dummies_solar_winds_special_edition
network monitoring_for_dummies_solar_winds_special_editionnetwork monitoring_for_dummies_solar_winds_special_edition
network monitoring_for_dummies_solar_winds_special_editionAlejandro Reyes
 
Web Application Security for Dummies
Web Application Security for DummiesWeb Application Security for Dummies
Web Application Security for DummiesLiberteks
 
Multi-Cloud for Dummies
Multi-Cloud for DummiesMulti-Cloud for Dummies
Multi-Cloud for DummiesLiberteks
 
VoIP Security for Dummies
VoIP Security for DummiesVoIP Security for Dummies
VoIP Security for DummiesAvaya Inc.
 
Optimizing Database Storage Performance for Dummies
Optimizing Database Storage Performance for DummiesOptimizing Database Storage Performance for Dummies
Optimizing Database Storage Performance for DummiesLiberteks
 
Software-Defined WAM for Dummies
Software-Defined WAM for DummiesSoftware-Defined WAM for Dummies
Software-Defined WAM for DummiesLiberteks
 
Cybersecurity for Dummies
Cybersecurity for DummiesCybersecurity for Dummies
Cybersecurity for DummiesLiberteks
 

Similar to Samsung KNOX for Dummies (20)

Endpoint Detection and Response for Dummies
Endpoint Detection and Response for DummiesEndpoint Detection and Response for Dummies
Endpoint Detection and Response for Dummies
 
Cloud Security for Dumies
Cloud Security for DumiesCloud Security for Dumies
Cloud Security for Dumies
 
CloudSecurityForDummies_Netskope (1)
CloudSecurityForDummies_Netskope (1)CloudSecurityForDummies_Netskope (1)
CloudSecurityForDummies_Netskope (1)
 
Cloud Security For Dummies Netskope
Cloud Security For Dummies NetskopeCloud Security For Dummies Netskope
Cloud Security For Dummies Netskope
 
Ransomware defense-for-dummies
Ransomware defense-for-dummiesRansomware defense-for-dummies
Ransomware defense-for-dummies
 
Ransomware Defense for Dummies
Ransomware Defense for DummiesRansomware Defense for Dummies
Ransomware Defense for Dummies
 
Ransomware defense-for-dummies
Ransomware defense-for-dummiesRansomware defense-for-dummies
Ransomware defense-for-dummies
 
Building an Enterprise Cloud for Dummies
Building an Enterprise Cloud for DummiesBuilding an Enterprise Cloud for Dummies
Building an Enterprise Cloud for Dummies
 
Cloud Information Management for Dummies
Cloud Information Management for DummiesCloud Information Management for Dummies
Cloud Information Management for Dummies
 
Cybersecurity for dummies
Cybersecurity for dummiesCybersecurity for dummies
Cybersecurity for dummies
 
Vulnerability Management for Dummies
Vulnerability Management for DummiesVulnerability Management for Dummies
Vulnerability Management for Dummies
 
341972038-Vulnerability-Management-2nd-edition-pdf.pdf
341972038-Vulnerability-Management-2nd-edition-pdf.pdf341972038-Vulnerability-Management-2nd-edition-pdf.pdf
341972038-Vulnerability-Management-2nd-edition-pdf.pdf
 
Web Session Intelligence for Dummies
Web Session Intelligence for DummiesWeb Session Intelligence for Dummies
Web Session Intelligence for Dummies
 
network monitoring_for_dummies_solar_winds_special_edition
network monitoring_for_dummies_solar_winds_special_editionnetwork monitoring_for_dummies_solar_winds_special_edition
network monitoring_for_dummies_solar_winds_special_edition
 
Web Application Security for Dummies
Web Application Security for DummiesWeb Application Security for Dummies
Web Application Security for Dummies
 
Multi-Cloud for Dummies
Multi-Cloud for DummiesMulti-Cloud for Dummies
Multi-Cloud for Dummies
 
VoIP Security for Dummies
VoIP Security for DummiesVoIP Security for Dummies
VoIP Security for Dummies
 
Optimizing Database Storage Performance for Dummies
Optimizing Database Storage Performance for DummiesOptimizing Database Storage Performance for Dummies
Optimizing Database Storage Performance for Dummies
 
Software-Defined WAM for Dummies
Software-Defined WAM for DummiesSoftware-Defined WAM for Dummies
Software-Defined WAM for Dummies
 
Cybersecurity for Dummies
Cybersecurity for DummiesCybersecurity for Dummies
Cybersecurity for Dummies
 

More from Samsung Business USA

13 tricks to get the most out of the S Pen
13 tricks to get the most out of the S Pen13 tricks to get the most out of the S Pen
13 tricks to get the most out of the S PenSamsung Business USA
 
6 ways Samsung’s Interactive Display powered by Android changes the classroom
6 ways Samsung’s Interactive Display powered by Android changes the classroom6 ways Samsung’s Interactive Display powered by Android changes the classroom
6 ways Samsung’s Interactive Display powered by Android changes the classroomSamsung Business USA
 
10 reasons to choose Galaxy Tab S9 for work on the go
10 reasons to choose Galaxy Tab S9 for work on the go10 reasons to choose Galaxy Tab S9 for work on the go
10 reasons to choose Galaxy Tab S9 for work on the goSamsung Business USA
 
10 reasons to upgrade to Samsung’s Galaxy S23
10 reasons to upgrade to Samsung’s Galaxy S2310 reasons to upgrade to Samsung’s Galaxy S23
10 reasons to upgrade to Samsung’s Galaxy S23Samsung Business USA
 
13 things you didn’t know you could do with the S Pen
13 things you didn’t know you could do with the S Pen13 things you didn’t know you could do with the S Pen
13 things you didn’t know you could do with the S PenSamsung Business USA
 
8 ways ViewFinity monitors set the standard for professionals
8 ways ViewFinity monitors set the standard for professionals8 ways ViewFinity monitors set the standard for professionals
8 ways ViewFinity monitors set the standard for professionalsSamsung Business USA
 
10 field-ready features of Galaxy XCover6 Pro
10 field-ready features of Galaxy XCover6 Pro10 field-ready features of Galaxy XCover6 Pro
10 field-ready features of Galaxy XCover6 ProSamsung Business USA
 
5 Ways Smart Hospital Rooms Can Improve The Patient Experience
5 Ways Smart Hospital Rooms Can Improve The Patient Experience5 Ways Smart Hospital Rooms Can Improve The Patient Experience
5 Ways Smart Hospital Rooms Can Improve The Patient ExperienceSamsung Business USA
 
INFOGRAPHIC_10-field-ready-features-of-the-Tab-Active4_FINAL.pdf
INFOGRAPHIC_10-field-ready-features-of-the-Tab-Active4_FINAL.pdfINFOGRAPHIC_10-field-ready-features-of-the-Tab-Active4_FINAL.pdf
INFOGRAPHIC_10-field-ready-features-of-the-Tab-Active4_FINAL.pdfSamsung Business USA
 
10 ways to fuel productivity with Galaxy Book
10 ways to fuel productivity with Galaxy Book10 ways to fuel productivity with Galaxy Book
10 ways to fuel productivity with Galaxy BookSamsung Business USA
 
The best monitors for teachers: 5 features every educator needs
The best monitors for teachers: 5 features every educator needsThe best monitors for teachers: 5 features every educator needs
The best monitors for teachers: 5 features every educator needsSamsung Business USA
 
6 smart ways Samsung's 85-inch Interactive Display changes the classroom
6 smart ways Samsung's 85-inch Interactive Display changes the classroom6 smart ways Samsung's 85-inch Interactive Display changes the classroom
6 smart ways Samsung's 85-inch Interactive Display changes the classroomSamsung Business USA
 
13 things you didn't know you could do with the S Pen
13 things you didn't know you could do with the S Pen13 things you didn't know you could do with the S Pen
13 things you didn't know you could do with the S PenSamsung Business USA
 
10 reasons to choose Galaxy Tab S8 for work on the go
10 reasons to choose Galaxy Tab S8 for work on the go10 reasons to choose Galaxy Tab S8 for work on the go
10 reasons to choose Galaxy Tab S8 for work on the goSamsung Business USA
 
10 reasons to upgrade to Galaxy S22 Ultra
10 reasons to upgrade to Galaxy S22 Ultra10 reasons to upgrade to Galaxy S22 Ultra
10 reasons to upgrade to Galaxy S22 UltraSamsung Business USA
 
9 benefits of mobilizing patient care with hospital technology
9 benefits of mobilizing patient care with hospital technology9 benefits of mobilizing patient care with hospital technology
9 benefits of mobilizing patient care with hospital technologySamsung Business USA
 
6 ways Samsung Kiosk gives retailers an all-in-one self-service solution
6 ways Samsung Kiosk gives retailers an all-in-one self-service solution6 ways Samsung Kiosk gives retailers an all-in-one self-service solution
6 ways Samsung Kiosk gives retailers an all-in-one self-service solutionSamsung Business USA
 
7 ways displays create a connected campus
7 ways displays create a connected campus7 ways displays create a connected campus
7 ways displays create a connected campusSamsung Business USA
 

More from Samsung Business USA (20)

13 tricks to get the most out of the S Pen
13 tricks to get the most out of the S Pen13 tricks to get the most out of the S Pen
13 tricks to get the most out of the S Pen
 
6 ways Samsung’s Interactive Display powered by Android changes the classroom
6 ways Samsung’s Interactive Display powered by Android changes the classroom6 ways Samsung’s Interactive Display powered by Android changes the classroom
6 ways Samsung’s Interactive Display powered by Android changes the classroom
 
10 reasons to choose Galaxy Tab S9 for work on the go
10 reasons to choose Galaxy Tab S9 for work on the go10 reasons to choose Galaxy Tab S9 for work on the go
10 reasons to choose Galaxy Tab S9 for work on the go
 
10 reasons to upgrade to Samsung’s Galaxy S23
10 reasons to upgrade to Samsung’s Galaxy S2310 reasons to upgrade to Samsung’s Galaxy S23
10 reasons to upgrade to Samsung’s Galaxy S23
 
13 things you didn’t know you could do with the S Pen
13 things you didn’t know you could do with the S Pen13 things you didn’t know you could do with the S Pen
13 things you didn’t know you could do with the S Pen
 
10 ways to fuel productivity
10 ways to fuel productivity10 ways to fuel productivity
10 ways to fuel productivity
 
8 ways ViewFinity monitors set the standard for professionals
8 ways ViewFinity monitors set the standard for professionals8 ways ViewFinity monitors set the standard for professionals
8 ways ViewFinity monitors set the standard for professionals
 
10 field-ready features of Galaxy XCover6 Pro
10 field-ready features of Galaxy XCover6 Pro10 field-ready features of Galaxy XCover6 Pro
10 field-ready features of Galaxy XCover6 Pro
 
5 Ways Smart Hospital Rooms Can Improve The Patient Experience
5 Ways Smart Hospital Rooms Can Improve The Patient Experience5 Ways Smart Hospital Rooms Can Improve The Patient Experience
5 Ways Smart Hospital Rooms Can Improve The Patient Experience
 
INFOGRAPHIC_10-field-ready-features-of-the-Tab-Active4_FINAL.pdf
INFOGRAPHIC_10-field-ready-features-of-the-Tab-Active4_FINAL.pdfINFOGRAPHIC_10-field-ready-features-of-the-Tab-Active4_FINAL.pdf
INFOGRAPHIC_10-field-ready-features-of-the-Tab-Active4_FINAL.pdf
 
10 ways to fuel productivity with Galaxy Book
10 ways to fuel productivity with Galaxy Book10 ways to fuel productivity with Galaxy Book
10 ways to fuel productivity with Galaxy Book
 
The best monitors for teachers: 5 features every educator needs
The best monitors for teachers: 5 features every educator needsThe best monitors for teachers: 5 features every educator needs
The best monitors for teachers: 5 features every educator needs
 
To BYOD or not to BYOD?
To BYOD or not to BYOD?To BYOD or not to BYOD?
To BYOD or not to BYOD?
 
6 smart ways Samsung's 85-inch Interactive Display changes the classroom
6 smart ways Samsung's 85-inch Interactive Display changes the classroom6 smart ways Samsung's 85-inch Interactive Display changes the classroom
6 smart ways Samsung's 85-inch Interactive Display changes the classroom
 
13 things you didn't know you could do with the S Pen
13 things you didn't know you could do with the S Pen13 things you didn't know you could do with the S Pen
13 things you didn't know you could do with the S Pen
 
10 reasons to choose Galaxy Tab S8 for work on the go
10 reasons to choose Galaxy Tab S8 for work on the go10 reasons to choose Galaxy Tab S8 for work on the go
10 reasons to choose Galaxy Tab S8 for work on the go
 
10 reasons to upgrade to Galaxy S22 Ultra
10 reasons to upgrade to Galaxy S22 Ultra10 reasons to upgrade to Galaxy S22 Ultra
10 reasons to upgrade to Galaxy S22 Ultra
 
9 benefits of mobilizing patient care with hospital technology
9 benefits of mobilizing patient care with hospital technology9 benefits of mobilizing patient care with hospital technology
9 benefits of mobilizing patient care with hospital technology
 
6 ways Samsung Kiosk gives retailers an all-in-one self-service solution
6 ways Samsung Kiosk gives retailers an all-in-one self-service solution6 ways Samsung Kiosk gives retailers an all-in-one self-service solution
6 ways Samsung Kiosk gives retailers an all-in-one self-service solution
 
7 ways displays create a connected campus
7 ways displays create a connected campus7 ways displays create a connected campus
7 ways displays create a connected campus
 

Recently uploaded

Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...Niamh verma
 
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceanilsa9823
 
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Pooja Nehwal
 
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceanilsa9823
 
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝soniya singh
 
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...wyqazy
 
9892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x79892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x7Pooja Nehwal
 

Recently uploaded (7)

Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
 
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
 
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
 
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
 
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Shalimar Bagh Delhi reach out to us at 🔝8264348440🔝
 
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
 
9892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x79892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x7
 

Samsung KNOX for Dummies

  • 1.
  • 2. These materials are © 2016 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
  • 3. These materials are © 2016 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited. SamsungKNOX™ by the Samsung KNOX Team & Lawrence C. Miller Samsung Special Edition
  • 4. Samsung KNOX™ For Dummies® , Samsung Special Edition Published by John Wiley & Sons, Inc. 111 River St. Hoboken, NJ 07030‐5774 www.wiley.com Copyright © 2016 by John Wiley & Sons, Singapore Pte Ltd. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without the prior written permission of the Publisher. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748‐6011, fax (201) 748‐6008, or online at http://www.wiley.com/go/permissions. Trademarks: Wiley, For Dummies, the Dummies Man logo, The Dummies Way, Dummies.com, Making Everything Easier, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc., and/or its affiliates in the United States and other countries, and may not be used without written permission. Samsung and Samsung KNOX are trademarks or registered trademarks of Samsung Electronics Co., Ltd. in the United States and other countries. All rights reserved. Specifications and designs are subject to change without notice. All other trademarks are the ­property of their respective owners. John Wiley & Sons, Inc., is not associated with any product or vendor mentioned in this book. LIMIT OF LIABILITY/DISCLAIMER OF WARRANTY: THE PUBLISHER AND THE AUTHOR MAKE NO REPRESENTATIONS OR WARRANTIES WITH RESPECT TO THE ACCURACY OR COMPLETENESS OF THE CONTENTS OF THIS WORK AND SPECIFICALLY DISCLAIM ALL WARRANTIES, INCLUDING WITHOUT LIMITATION WARRANTIES OF FITNESS FOR A PARTICULAR PURPOSE. NO WARRANTY MAY BE CREATED OR EXTENDED BY SALES OR PROMOTIONAL MATERIALS. THE ADVICE AND STRATEGIES CONTAINED HEREIN MAY NOT BE SUITABLE FOR EVERY SITUATION. THIS WORK IS SOLD WITH THE UNDERSTANDING THAT THE PUBLISHER IS NOT ENGAGED IN RENDERING LEGAL, ACCOUNTING, OR OTHER PROFESSIONAL SERVICES. IF PROFESSIONAL ASSISTANCE IS REQUIRED, THE SERVICES OF A COMPETENT PROFESSIONAL PERSON SHOULD BE SOUGHT. NEITHER THE PUBLISHER NOR THE AUTHOR SHALL BE LIABLE FOR DAMAGES ARISING HEREFROM. THE FACT THAT AN ORGANIZATION OR WEBSITE IS REFERRED TO IN THIS WORK AS A CITATION AND/OR A POTENTIAL SOURCE OF FURTHER INFORMATION DOES NOT MEAN THAT THE AUTHOR OR THE PUBLISHER ENDORSES THE INFORMATION THE ORGANIZATION OR WEBSITE MAY PROVIDE OR RECOMMENDATIONS IT MAY MAKE. FURTHER, READERS SHOULD BE AWARE THAT INTERNET WEBSITES LISTED IN THIS WORK MAY HAVE CHANGED OR DISAPPEARED BETWEEN WHEN THIS WORK WAS WRITTEN AND WHEN IT IS READ. ISBN 978‐1‐119‐24725‐8 (pbk); ISBN 978‐1‐119‐24726‐5 (ebk) Manufactured in the United States of America 10 9 8 7 6 5 4 3 2 1 For general information on our other products and services, or how to create a custom For Dummies book for your business or organization, please contact our Business Development Department in the U.S. at 877‐409‐4177, contact info@dummies.biz, or visit www.wiley.com/go/custompub. For information about licensing the For Dummies brand for products or services, contact BrandedRights&Licenses@Wiley.com. Special Acknowledgments This Samsung Special Edition would not have been possible without the outstanding support and collaboration from the KNOX Team with special thanks to Janis Guthrie, known throughout the world as the Goddess of Tech Writers. These materials are © 2016 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
  • 5. These materials are © 2016 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited. Introduction As smartphones become more powerful and popular trends such as bring your own device (BYOD) and corporate‐owned personally enabled (COPE) become more ubiquitous in the digital workplace, mobile threats have become more powerful and ubiquitous, too. Security and privacy concerns are now — or should be — top of mind for everyone. In 2012, Samsung engineers began developing Samsung KNOX, the defense‐grade mobile security platform built into Samsung’s flagship mobile devices. Today, there are more than 144 million KNOX‐enabled Samsung devices around the world. These devices are literally born (well, manufactured) with built‐ in, mobile security. Enterprises large and small, in industries like finance, government, healthcare, retail and many others, can now empower their mobile workforces with the confidence that only Samsung KNOX‐enabled devices can deliver. About This Book This book explains the story behind KNOX (Chapter 1), the KNOX platform (Chapter 2), and KNOX products (Chapter 3), and wraps up by giving an overview of a few Samsung KNOX capabilities (Chapter 4). Foolish Assumptions It’s been said that most assumptions have outlived their use- lessness, but I’ll assume a few things nonetheless: ✓✓ You want to learn more about mobile device security — specifically, Samsung KNOX mobile device security. ✓✓ You work for an organization that is struggling to manage the proliferation of smartphones in the workplace and the associated security and privacy risks.
  • 6. Samsung KNOX For Dummies, Samsung Special Edition 2 These materials are © 2016 John Wiley Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited. ✓✓ You may have heard about Samsung KNOX, but you need more information because you’re evaluating mobile security solutions for your organization — or because one of your executives has just slid this book to you in a meeting! Icons Used in This Book Throughout this book, I occasionally use special icons to call attention to important information. Here’s what to expect: This icon points out information that you should commit to your nonvolatile memory or your noggin. You won’t find a map of the human genome or the blueprints for the next‐generation Samsung Galaxy smartphone here (or maybe you will . . . hmm), but if you seek to attain the seventh level of NERD‐vana, perk up! This icon explains the jargon beneath the jargon! Thank you for reading, hope you enjoy the book, please take care of your writers! Seriously, this icon points out helpful suggestions and useful nuggets of information. This icon points out the stuff your mother warned you about. Okay, probably not. But you should take heed nonetheless — you may just save yourself some time and frustration! Beyond the Book There’s only so much I can cover in 24 short pages, so if you find yourself at the end of this book thinking, “Gosh, this was an amazing book, where can I learn more?,” just go to www. samsung.com/business.
  • 7. These materials are © 2016 John Wiley Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited. TheSamsungKNOXStory In This Chapter ▶▶ Recognizing the mobile threat and the need for KNOX security ▶▶ Taking a look at smartphone components and security functions In this chapter, I survey the mobile threat landscape to show you why Samsung created KNOX security, built on the tenets of Trusted Computing. Why KNOX Exists In 2008, the first Android smartphone was introduced, and in just a few short years, Android has become the dominant operating system (OS) for smartphones. In 2014, approxi- mately 75 percent of the more than 1.2 billion smartphones sold worldwide were Android smartphones, of which nearly 25 percent were Samsung smartphones. The Android OS is open‐source software that was originally designed primarily for end‐users rather than for enterprise adoption. Developers can directly modify the Android OS source code, which makes it very powerful and popular for building advanced functionality and custom apps but also makes the OS vulnerable to attacks. Open‐source software is nonproprietary software that can be freely used, modified, and distributed by anyone (subject to licensing under the Open Source Initiative). The 2013 Juniper Networks Mobile Threat Center Third Annual Mobile Threats Report found that mobile malware threats were growing at an alarming rate of 614 percent (276,259 total mali- cious apps). Aspect Security’s 2013 Global Application Security Chapter 1
  • 8. Samsung KNOX For Dummies, Samsung Special Edition 4 These materials are © 2016 John Wiley Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited. Risk Report found that 98 percent of apps presented at least one security risk, while the average app registered 22.4 risks. Not surprisingly, due to their market dominance and open‐ source nature, Android smartphones and apps are the target of the vast majority of mobile security threats and attacks. The original Android approach to security was to simply iso- late apps from each other. However, this approach alone isn’t enough for enterprise security needs. End‐users could still do irreversible harm to the device by “rooting” the phone or by downloading unauthorized apps, software, and firmware. Device rooting is the practice of intentionally exploiting privi- leged software or OS functions to install custom firmware and circumvent vendor restrictions (such as licensing). Rooting compromises many of the security protections built into the device and typically voids the device manufacturer’s warranty. Samsung introduced KNOX in 2013, recognizing the perfect storm that was developing due to ✓✓ The rapidly evolving mobile threat landscape ✓✓ The rising popularity of bring your own device (BYOD) and corporate‐owned personally enabled (COPE) mobil- ity trends in the enterprise ✓✓ The ineffectiveness of the traditional IT security model, which was originally designed to protect enterprise net- works and based on perimeter‐based security, instead of mobile devices with anytime, anywhere access to corpo- rate apps and data The Samsung KNOX security solution (the brand including the KNOX platform and KNOX security products and services) is designed to be the most comprehensively secure and manage- able mobile device solution for enterprises large and small. Trusted Computing: The Foundation of KNOX The foundation of KNOX is hardware‐based device security that is built on the principles of Trusted Computing.
  • 9. Chapter 1: The Samsung KNOX Story 5 These materials are © 2016 John Wiley Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited. In other words, KNOX ensures that the device is running the correct security software and hasn’t been tampered with or disabled — either by an attacker (through an attack vector) or by the owner (through device rooting), and provides the following important security functions: ✓✓ Platform integrity: Ensures that no one has made changes to the device and that the device is operating in an allowed state (see Chapter 2). ✓✓ Application and data security: Provides a secure stor- age vault for security certificates (for example, your email application may have a digital certificate to prove an email message is a legitimate message from you) and encryption keys (used, for example, to protect the confi- dentiality and integrity of data). ✓✓ Remote and wireless access security: Provides hardware‐based security for remote access (such as a virtual private network, or VPN) and wireless connections (such as a secure Wi-Fi network).
  • 10. Samsung KNOX For Dummies, Samsung Special Edition 6 These materials are © 2016 John Wiley Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
  • 11. These materials are © 2016 John Wiley Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited. TheKNOXPlatform In This Chapter ▶▶ Starting with a secure device platform ▶▶ Providing secure assembly ▶▶ Ensuring authenticity and integrity during the boot process ▶▶ Loading software and applications securely ▶▶ Preventing attacks and malware at run‐time ▶▶ Keeping smartphone devices up to date KNOX uses Trusted Computing principles throughout the life cycle of KNOX‐enabled Samsung devices — from the time of design, throughout the manufacturing process, to boot‐time, load‐time, and run‐time — to ensure enterprise devices, apps, and data are always safe and secure. In this chapter, you learn about the foundational elements of the KNOX platform that make Samsung smartphones the most secure Android devices available, from inception to the moment you turn the device on — and beyond. Secure by Design The KNOX platform was conceived and created using a design philosophy that incorporates Trusted Computing principles: ✓✓ Build trust. Establish security protections at the hardware level (“Hardware Root of Trust”) and ensure security from Chapter 2
  • 12. Samsung KNOX For Dummies, Samsung Special Edition 8 These materials are © 2016 John Wiley Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited. the moment the device is turned on. A Hardware Root of Trust is important for several reasons: •• Security is literally “built in” to the hardware as opposed to being an add‐on software component. •• Hardware‐based security usually means an attacker cannot compromise the device even with physical access. ✓✓ Maintain trust. Actively monitor key aspects of the device in real‐time and perform periodic checks to ensure the ongoing “health” (integrity) of the device (like immunizations). ✓✓ Prove trust. KNOX-enabled devices provide the MDM with an attestation, a cryptographically verifiable collection of device state measurements to prove trust (you’ve got to show your immunization record to the daycare center so you don’t get the other “kids” — programs and services — sick). KNOX security starts at the processor level. KNOX uses a processor architecture known as ARM TrustZone to provide built‐in, system‐wide strong authentication for users, apps, and data through partitions called worlds. In TrustZone, there are two worlds: ✓✓ Secure World: This world is reserved for highly sensitive operations such as those involving cryptographic keys (this is where KNOX comes in!). ✓✓ Normal World: Virtually all smartphone software as we know it, including the OS kernel, middleware, and apps, runs in this world. Software in the Normal World can never directly access data used by Secure World ­software — it must ask for access. KNOX uses Secure World capabilities to protect confidential enterprise data and to monitor the OS kernel running in the Normal World. The combination of TrustZone hardware and software provides a Trusted Execution Environment (TEE). The TEE is important because it ensures that sensitive data and code are stored, processed, and protected in a separate trusted environment for maximum security — like a safe deposit box within a secure bank vault.
  • 13. Chapter 2: The KNOX Platform 9 These materials are © 2016 John Wiley Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited. KNOX: Security from the hardware up Samsung KNOX safely and securely enables enterprise mobility strategies by providing multiple layers of protection for mobile devices built on the KNOX platform. The foundational layer of the Samsung KNOX platform is the Hardware Root of Trust. This layer of security is literally built into the device at the factory, providing a strong base on which to build addi- tional security layers. This founda- tion is supported by the following key elements: ✓✓ Device Unique Hardware Key (DUHK): The DUHK (discussed in the section “Controlling the Manufacturing Process”) is a cryptographic key that is unique to each Samsung device. The DUHK encrypts and decrypts data and encrypts other crypto- graphic keys on the device. ✓✓ Samsung Secure Boot Key (SSBK): The SSBK (discussed in the section “Controlling the Manufacturing Process”) veri- fies that boot components on the device are approved. ✓✓ Device Root Key (DRK): The DRK is another type of cryptographic key that is unique to each Samsung device. The DRK iden- tifies the device and proves that it is an authentic device manu- factured by Samsung. ✓✓ KNOX Tamper‐Evident Fuse: The KNOX Tamper‐Evident Fuse (explained in the section “On Your Mark! Boot‐time (continued)
  • 14. Samsung KNOX For Dummies, Samsung Special Edition 10 These materials are © 2016 John Wiley Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited. Defenses”) verifies that the device has never run unapproved components or had key security features disabled. ✓✓ Rollback Prevention (RP) Fuses: RP fuses are hardware fuses that encode the minimum acceptable version of Samsung‐approved programs for a particular device. These fuses are set when the device is manufactured and prevent older, potentially vulnerable versions of boot programs from being loaded on the device. The next layer of security con- sists of Secure Boot and Trusted Boot (explained in the section “On Your Mark! Boot‐time Defenses”). Secure Boot and Trusted Boot run sequentially as soon as a user turns on the device. Secure Boot starts each bootloader and ensures that the bootloaders are authentic ver- sions before it loads the Android OS kernel. Trusted Boot takes “snap- shots” (called measurements) of all the bootloaders and OS kernels while they’re running to ensure they remain secure and to validate their integrity. The third layer of security, “TrustZone” (discussed in the sec- tion “Secure by Design”), creates a “Secure World” and “Normal World” partition in the device’s pro- cessor architecture. The fourth layer consists of the TrustZone‐based Integrity Measurement Architecture (TIMA) and Real‐time Kernel Protection (RKP), both explained in the sec- tion “Go! Run‐time Defenses.” RKP continuously monitors and protects devices while they are running. Finally, “Security Enhancements for Android” protects apps and uses policies to restrict access to safe connections only. In addition, it offers utilities and tools including mobile device management (MDM), KNOX Workspace, Active Directory (AD), virtual private network (VPN), and single sign‐on (SSO), among others — all described in Chapters 3 and 4. Thus, KNOX provides a multi‐tiered platform that layers in protection for mobile devices from the hardware level all the way up to the applica- tions running on the device. (continued) A “trusted environment” ensures that enterprise operations, such as decrypting sensitive data, can occur only when the device has been booted into an allowed state. The TEE helps make this trusted environment possible. In trusted computing, an allowed state is the normal, unal- tered condition of the device’s hardware and software secu- rity functions. If the security functions have been tampered with in any way, the device is no longer in an allowed state. It’s
  • 15. Chapter 2: The KNOX Platform 11 These materials are © 2016 John Wiley Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited. like a tamper‐evident seal on a bottle of aspirin or shrink wrap on your favorite DVD movie — it gives you confidence that no one messed with your medicine or replaced your DVD with a defective copy. Controlling the Manufacturing Process Samsung manufactures and configures all its devices in its own factories. This means that Samsung has complete con- trol over the devices and software leaving the factory, which ensures both the quality and security of every Samsung device throughout the manufacturing process. In addition to developing and installing secure device software, Samsung manufactures each device with special cryptographic keys, which are crucial components in the Hardware Root of Trust, and ensure the ongoing integrity of Samsung devices even after they leave the factory. Two of these keys are ✓✓ Device‐Unique Hardware Key (DUHK): This is the fin- gerprint of the device — no two devices have the same DUHK. The DUHK is built in to the device and provides an additional level of security: Secure World data can only be decrypted on that specific device. ✓✓ Samsung Secure Boot Key (SSBK): Another hardware feature uses tamper‐evident fuses to verify that the phone’s OS and software load safely every time the device is powered on. The additional steps that Samsung takes to protect the manu- facturing process ensure a Trusted Computing environment for every Samsung KNOX device. Other device vendors that outsource manufacturing can’t guarantee the same end‐to‐end control of these critical security elements. When a user presses the On button of a device, several critical processes must run sequentially before the device is ready to be used. These processes include booting, load- ing, and running. In the following sections, I explain how
  • 16. Samsung KNOX For Dummies, Samsung Special Edition 12 These materials are © 2016 John Wiley Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited. KNOX protects devices at boot‐time, load‐time, run‐time, and beyond. On Your Mark! Boot‐Time Defenses One of the most important jobs of mobile security is to ensure the software that is running on the device is authentic and safe. This software, of course, includes the operating system, but also any software or apps that are installed by the manu- facturer, enterprise, or user. When a phone is turned on, Secure Boot checks for safety and authenticity, but can some- times be tricked by an older version of a bootloader. To overcome this limitation, KNOX uses Trusted Boot. Trusted Boot takes measurements (“snapshots”) to prove whether the bootloaders are valid and running as expected. Trusted Boot further protects the boot process by blowing a tamper‐evident fuse if it detects an unauthorized modification (“In case of emergency, break glass”) so that your data stays encrypted and safe. The KNOX Tamper‐Evident Fuse (sometimes referred to as the “Warranty Bit”) is a one‐time programmable fuse that indicates whether the device has ever been booted in a non‐allowed state. If Trusted Boot detects that unapproved components are used, or if certain critical security features such as SE for Android are disabled, it “blows the fuse.” This means that a “bit” is set to indicate the device is no longer trusted or in an “allowed” state. Remember: KNOX wants to ensure your device starts and stays in an allowed state. Once the fuse is blown, the device can never successfully go through the KNOX boot process. Access to the DUHK and Device Root Key (DRK) in the TrustZone Secure World is revoked and enterprise data on the device using the TIMA key store (discussed in the next section) cannot be accessed or recovered.
  • 17. Chapter 2: The KNOX Platform 13 These materials are © 2016 John Wiley Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited. Get Set! Load‐Time Defenses The kernel isn’t the only attractive target for malware and malicious users. Mobile devices have a lot of preloaded system software beyond the kernel (think about all the apps What’s in a smartphone? Just like a desktop computer, at the heart of every smartphone there are one or more processors, where the OS and apps run. Processors A processor runs in one of two modes of execution (the privilege level for a piece of software running on the processor): ✓✓ User mode: When a user‐ installed app runs on the pro- cessor, it runs in user mode. In user mode, the app is not allowed to directly access hard- ware devices (such as a camera or GPS) or resources (such as memory) controlled by other apps. ✓✓ Privileged mode: Critical OS soft- ware runs in privileged mode. In privileged mode, the system’s software is allowed to directly access hardware devices, as well as all data held by the user’s applications. Operating systems Operating systems use both user and privileged modes for various functions. The portion of the OS run- ning in privileged mode is called the kernel. Thus, gaining control of the OS kernel is often an objective for an attacker. With privileged mode access, an attacker could tamper with and steal potentially sensitive data from any app on the device. Middleware In most operating systems, when apps want to communicate with each other, they ask the kernel to set up the lines of communication for them. To facilitate this communica- tion, the Android OS uses another layer of software, known as middle- ware. Android middleware runs in user mode and sits between the kernel and the apps. This middleware adds yet another layer of protection to Android devices — preventing apps from directly accessing the OS kernel (and its privileged mode of execution). What does all of this mean? The security features built into KNOX and Android work together seamlessly from the hardware layer to the application layer, providing users with the most secure experience (see the sidebar “KNOX: Security from the hardware up,” earlier in this chapter).
  • 18. Samsung KNOX For Dummies, Samsung Special Edition 14 your phone already has on it!). Unfortunately, it’s impractical to verify the integrity and authenticity of all that software at boot‐time, because it would (seemingly) take forever to the user — like booting up a computer every time you want to use your phone! KNOX checks all this extra system software using an enhanced version of the basic “DM‐Verity” software included with the Google Android Lollipop OS release. KNOX verifies the integrity of system software not covered by the boot‐time checks (discussed in the previous section) and if a malicious process or user is detected, it blocks any attempt to access the modified software and data. DM‐Verity is a Linux kernel driver for verifying the integrity of a partition at run‐time. Go! Run‐Time Defenses More sophisticated attacks can compromise the device or intercept data at run‐time (when you actually launch an app or access data). To protect devices against run‐time attacks, KNOX uses the TrustZone‐based Integrity Measurement Architecture (TIMA), a proprietary security technology ­developed by Samsung. The TIMA components include the following: ✓✓ Periodic Kernel Measurement (PKM): PKM performs continuous periodic monitoring of the kernel to detect if legitimate kernel code and data have been modified by malicious software. PKM is analogous to a scheduled scan in traditional antivirus or antimalware software for desktop computers. ✓✓ Real‐Time Kernel Protection (RKP): RKP performs ongo- ing, real‐time monitoring of the OS from within TrustZone to prevent kernel tampering. RKP is analogous to real‐ time, on‐demand antivirus or antimalware software scanning that is triggered when a USB thumb drive, for example, is connected to a desktop computer. RKP and PKM are essential in protecting Android devices against unknown future threats. Flagging suspicious activi- ties is the first step in identifying and preventing security
  • 19. Chapter 2: The KNOX Platform 15 breaches. These real‐time checks give enterprises confidence that devices are continuously monitored for breaches, and that IT is alerted if corporate devices have been compromised. Update Protection Rollback prevention is a feature of KNOX that blocks the device from loading a valid but older version of boot components. Older versions of software may contain vulnerabilities that attackers can exploit. KNOX rollback prevention checks the version of the bootloader and kernel during both boot and updates, and blocks these processes from continuing if versions are unacceptably old. KNOX further secures this process by using hardware features installed at the factory. The KNOX security platform is built in to flagship Samsung mobile devices and protects the device right out of the box, throughout the entire device life cycle.
  • 20. Samsung KNOX For Dummies, Samsung Special Edition 16 These materials are © 2016 John Wiley Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
  • 21. These materials are © 2016 John Wiley Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited. KNOXDataProtection Products In This Chapter ▶▶ Securing enterprises, government, and regulated industries with KNOX Workspace ▶▶ Empowering individual users with My KNOX Beyond the KNOX platform (discussed in Chapter 2), which provides built‐in hardware‐based protection — at no cost — from the moment you turn the device on, Samsung offers optional products to address your unique security requirements. Two of these products are KNOX Workspace and My KNOX, which I explain in this chapter. KNOX Workspace Samsung KNOX Workspace is a defense‐grade dual persona container product designed to separate, isolate, encrypt, and protect enterprise data on a device from attackers. This work/ play environment ensures that work data and personal data are separated and that only the work container is managed by the enterprise. Personal information such as photos and mes- sages are not managed or controlled by the IT department. Once activated, KNOX Workspace is tightly integrated into the KNOX platform. KNOX Workspace provides this separate environment within the mobile device, complete with its own home screen, launcher, apps, and widgets. Chapter 3
  • 22. Samsung KNOX For Dummies, Samsung Special Edition 18 These materials are © 2016 John Wiley Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited. Apps and data inside KNOX Workspace are isolated from apps outside KNOX Workspace — apps outside KNOX Workspace cannot use Android inter‐process communication or data‐sharing methods with apps inside KNOX Workspace. For example, photos taken with the camera inside KNOX Workspace are not viewable in the Gallery outside KNOX Workspace. The same restriction applies to copying and pasting. When allowed by IT policy, some app data such as contacts and calendar data can be shared across the KNOX Workspace boundary. The end‐user can choose whether to share contacts and calendar notes between KNOX Workspace and his or her personal space on the device; however, IT policy ultimately controls this option. The enterprise can manage KNOX Workspace like any other IT asset using a mobile device management (MDM) solution; this container management process is called Mobile Container Management (MCM). Samsung KNOX supports many of the leading MDM solutions on the market. MCM is affected by set- ting policies in the same fashion as traditional MDM policies. Samsung KNOX Workspace includes a rich set of policies for authentication, data security, virtual private network (VPN), email, application blacklisting, whitelisting, and so on. KNOX Workspace can also be configured for container‐only mode. In this mode, the entire device experience is restricted to the KNOX Workspace. This mode is suitable for industries such as healthcare, finance, and others that provide devices for employees and seek to restrict access to business apps. KNOX Workspace also has a two‐factor authentication pro- cess that can be configured with MDM. The user can configure the KNOX Workspace to accept a fingerprint as the primary authentication factor for the container with a PIN, password, or pattern as a second factor. Two‐factor authentication uses two of the following methods to establish identity: something you know (such as a pass- word or PIN), something you have (such as a token), or some- thing you are (such as a fingerprint). The KNOX platform also supports multiple containers, thus meeting the needs of professionals who have multiple employ- ers, such as doctors or consultants.
  • 23. Chapter 3: KNOX Data Protection Products 19 These materials are © 2016 John Wiley Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited. KNOX is continuously being updated with popular features and new additions, including the following: ✓✓ Bluetooth: Bluetooth support enables users to com- municate with other connected devices, and do more than just listen to music and make calls inside the KNOX Workspace. Examples include printing, file sharing, and external card readers. IT administrators can enable secu- rity restrictions on external SD cards. ✓✓ Near field communication (NFC): NFC enables a device to act as a SmartCard‐based credential for use cases such as physical access and access to IT accounts. Finally, IT administrators can configure KNOX caller ID to dis- play caller ID information derived from personal contacts and KNOX Workspace contacts for incoming calls when the user is using the device in personal mode. My KNOX My KNOX is a personal, encrypted workspace that allows you to securely separate your work/play apps and data while taking full advantage of the KNOX security platform built in to your device. You can think of this as your personal version of KNOX Workspace without all the IT people messing with your device. My KNOX is a free product that can be downloaded from Google Play and managed via the My KNOX User website at http://my.samsungknox.com. Key features of My KNOX include the following: ✓✓ Support for most email and PIM (Personal Information Manager) account types, such as Gmail and Hotmail, and email communication protocols including EAS (Exchange ActiveSync), POP3 (Post Office Protocol Version 3), and IMAP (Internet Message Access Protocol) ✓✓ A separate workspace on the device for email and app connectivity ✓✓ A simple end‐user website for device management, includ- ing remote wipe, lock, and find‐my‐device tools
  • 24. Samsung KNOX For Dummies, Samsung Special Edition 20 These materials are © 2016 John Wiley Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited. Securely mobilizing a major Canadian healthcare provider The customer Saint Elizabeth Health Care has been an active participant in the develop- ment of community health since 1908. Today, Saint Elizabeth provides a full range of integrated care solutions for client, community, and health system needs across Canada, employing more than 8,000 people and visiting more than 18,000 clients every day. The challenge Outfit the mobile workforce with a powerful, secure mobility solution that includes KNOX Workspace to improve in‐home care. “As our staff are delivering world‐ class care, Samsung’s mobile devices are bringing innovation and efficiency to their everyday offices  — which can often be a kitchen table, parked vehicle, or patient’s home at any given time.” —Shirlee Sharkey, CEO, Saint Elizabeth The benefits ✓✓ Protects workers’ personal information in a separate container from patient data and applications ✓✓ Requires health workers to input a password and one additional identifier to ensure only autho- rized personnel are accessing patient data ✓✓ Allows IT staff to centrally manage security and remotely troubleshoot any issues through MDM integration
  • 25. These materials are © 2016 John Wiley Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited. Ten(OrSo)Essential CapabilitiesforEnterprise Readiness Here are ten (or so) key capabilities of KNOX-enabled Samsung mobile devices for enterprises: ✓✓ Protect enterprise Data‐at‐Rest by default: Samsung KNOX does not depend on users to secure their own BYOD devices in case of loss or theft. KNOX defines two classes of data — protected and sensitive. All data written by apps in the secure Workspace is considered protected and is encrypted on disk when the device is powered off. Decryption is tied to the device hardware meaning protected data can only be recovered on the same device. Even stronger protection is applied to sensitive data. Sensitive data remains encrypted as long as the Workspace is locked, even if the device is powered on. Sensitive Data Protection (SDP) allows sensitive data to be decrypted only when a user unlocks his KNOX Workspace with his password and the decryption key is tied to the hardware. When the user re‐locks the Workspace, SDP keys are cleared, and access can only be regained using the same device hardware. ✓✓ On‐device encryption: The KNOX platform further strengthens the full‐device encryption capability offered by the Android platform by allowing the IT Manager to tie the encryption key to a secret maintained in trusted hardware. TrustZone‐based on‐device encryption (ODE) also enables enterprises to ensure that all device data is protected in the unlikely event that the operating system is compromised. Chapter 4
  • 26. Samsung KNOX For Dummies, Samsung Special Edition 22 These materials are © 2016 John Wiley Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited. ✓✓ Container isolation: KNOX enables complete isolation of work‐related and personal apps and data. This dual per- sona capability ensures that apps installed by individual users do not compromise the security of corporate apps and data. Container isolation also keeps IT administra- tors from accessing individual users’ private data (such as photos, contacts, and text messages). ✓✓ Virtual private network (VPN): KNOX offers comprehen- sive support for enterprise VPNs, enabling individuals to connect to corporate resources from their KNOX‐enabled smartphones over an optimized, secure path. The KNOX platform supports both IPSec and Secure Sockets Layer (SSL) VPNs. ✓✓ SmartCard framework: Public key infrastructure (PKI) certificates enable documents to be digitally signed, email messages to be encrypted and decrypted, and secure network connections to be established. PKI certificates are typically stored on a SmartCard, known as a Common Access Card (CAC). Samsung KNOX provides apps with access to the hardware certificates on the CAC and pro- vides improved SmartCard compatibility via a software framework that allows third‐party SmartCard and reader providers to install their solutions into the framework. ✓✓ Single sign‐on (SSO): SSO allows a user to log in once and have access to all the SSO‐enabled apps on the device without being prompted to log in again. For example, SSO allows access to the KNOX Workspace container (and participating apps that require credentials within the container) with one password. ✓✓ Active Directory integration: KNOX provides an option to choose an Active Directory password as the unlock method for KNOX containers. This has two important benefits: •• It allows IT administrators to use a one‐password management policy for desktop and mobile devices. •• The end‐user needs to remember only one password to access all services offered by the employer. Active Directory is the most widely deployed enterprise‐ grade directory service that has built‐in support for Kerberos. ✓✓ Mobile device management (MDM): KNOX provides hun- dreds of MDM security policies for fine‐grained control of devices, designed to lower cost and improve usability and manageability for small or medium enterprises.
  • 27. These materials are © 2016 John Wiley Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
  • 28.
  • 29. WILEY END USER LICENSE AGREEMENT Go to www.wiley.com/go/eula to access Wiley’s ebook EULA.