Commentary Mobile Security
Samsung Knox Raises Android Security Game
Following the BlackBerry announcement of BES 10 as a general-purpose mobile management solution, Samsung has expanded its SAFE program to include EMM features like MAM and business/personal partitioning. These companies are advancing the technology for customers. Where are Microsoft and Apple in this?
The handset makers are making a play to standardize management and security of their devices in enterprises and especially in BYOD scenarios. Well, some of them are making more of a play than others.
|Join us at Interop Las Vegas where the mobility track will explore best practices for management of mobile computing today and what's coming in the future. Register today!|
More Security Insights
- Information Protection: The Impact Of Big Data
- Cloud-based data backup: A buyer's guide - How to choose a third-party provider for development, management of your data backup solution
- Informed CIO: SDN and Server Virtualization on a Collision Course
- InformationWeek 2013 IT Spending Priorities Survey
- The Untapped Potential of Mobile Apps for Commercial Customers
- Using InfoSphere Information Server to Integrate and Manage Big Data
The first big example we got of this was BlackBerry and BES 10. As I explained last week, BES 10 includes some of the new techniques of EMM (Enterprise Mobility Management) such as MAM (Mobile Application Management) and a separation of user and business personalities. These are emerging as the two key technologies in the next generation of mobile device management.
Now Samsung has announced similar capabilities for their phones. It's called Samsung Knox — it's not an acronym, I guess it's an allusion to Fort Knox (where, since 1937, the Treasury Department has stored the highly-secure United States Bullion Depository). There's more to Knox than MAM and personal/user "partitioning," as they call it, but I think these are the most appealing.
Read the full article here.
Larry Seltzer is the editorial director for BYTE, Dark Reading, and Network Computing.
Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.