Samsung Knox addresses the risks of going mobile

November 14, 2017 • Mobile and Telecoms, Top Stories

Samsung Knox address the risks of going mobile.

Samsung Knox address the risks of going mobile. (image source:

Now more than before, our mobile devices keep us connected to the things that matter most. They store important information needed to manage our lives, conduct business and stay in touch with our friends and loved ones.

With so much data available and the ability of our devices to serve as access points to multiple networks, services and even other devices, it is vital to have security that fits our mobile lifestyle and not security that dictates it. This is particularly true with more sensitive apps and services ‘going mobile’ – it goes without saying that the need for device security is greater than ever.

With understanding the importance that mobile phones and devices hold for work, home and on-the-go lifestyles, Samsung has integrated its Knox security platform at multiple levels, from hardware and software to your favourite applications to ensure that your mobile life is protected from threats.

The Samsung Knox’s built-in security is in two-fold. The platform begins in the device’s chipset itself and extends through every single layer of a Samsung device, including the operating system and application layers. The platform also ensures Samsung devices have overlapping defence and security mechanisms that protect against intrusion, malware, viruses and many more malicious threats.

Samsung Knox allows the separation of professional information from personal on the same device through Secure Folder. Secure Folder uses Knox container technology to provide a secure space separate from other apps, messages and information creating an additional layer of security.

The security platform builds a digital fortress around your mobile device, which according to the company, shield sensitive information from unwarranted visitors and malware attacks. The Knox also brings additional defences against what would be attackers directly to your phone. Through monitoring, the platform aims to ensure that users card information is encrypted in a separate and secure data vault at all times.

Edited by Fundisiwe Maseko
Follow Fundsiwe Maseko on Twitter
Follow IT News Africa on Twitter

Comments are closed.

« »

Read previous post:
Cloud skills impending cloud adoption in Africa
Cloud 2.0 – The dawning of pragmatic cloud

South Africa’s cloud adoption rate is on the increase and we are rapidly moving from cloud-first to a cloud-only methodology....