Whitepaper: Samsung KnoxTM Security Solution

Personal smartphones and mobile devices permit employee access to corporate email and network resources, but add a vulnerable entry point that can be exploited. Additionally, document sharing enables mobile devices to further proliferate corporate resources outside of a potentially compromised network infrastructure. The evolution of (BYOD) and (COPE) strategies started slowly, and then accelerated with the proliferation of apps for every business and personal need. While enterprise employees enjoyed the freedom and productivity of continuous connectivity, IT admins on the other hand were blind-sided with protecting corporate owned devices from the massive amounts of insecure personal data employees began keeping on their phones.

Legacy enterprise IT admin security models were designed to protect the integrity of the enterprise network and company-issued PCs, not the personal smartphones and tablets utilized by the enterprise’s employees. With both BYOD/COPE and cyber-attacks increasing, the scramble to analyze the facts and ö gures ensued in hopes of ö nding a way to manage the escalating problem and complexity of mobile device security

Whitepaper: Samsung KnoxTM Security Solution