Select from the diverse portfolio of Knox-enabled Samsung devices and manage them with Workspace ONE, powered by industry-leading VMware Workspace ONE unified endpoint management technology. The combination produces an end-to-end solution that enables your devices with work-critical resources and multi-layered security from the device to the network.
Configure the Knox Workspace to lock the device into Container Only Mode where the entire device is restricted to the Workspace to isolate, encrypt and protect work data
Separate work and personal data through device and app containerization to prevent data from being shared fromt he work side to the personal side
Perform remote actions such as clear passcode and enterprise wipe to apply only to the Knox Workspace
Enable Google Mobile Services apps, such as Google Chrome, Google Play Store, Google Maps and more, inside the Workspace
Integrate with Knox Mobile Enrollment to register devices in bulk with a simplified user experience
Allow the use of only approved apps by configuring whitelists, blacklists and required apps groups
Configure secure, native email with additional policies such as encryption and digital certificate signatures
Select specific firmware versions that are updated to devices by leveraging Workspace ONE integration with Samsung Enterprise Firmware Over-the-Air (E-FOTA)
Empower employees with a digital workspace and deliver virtual apps and desktops in full screen mode with Samsung DeX integration
Enforce a Knox passcode and enable multifactor authentication which requires a pattern, PIN or passcode in addition to a fingerprint
Enable advanced security features such as enabling Common Criteria mode, enabling TIMA CCM KeyStore, SmartCard authentication, ODE Trusted Boot verification, and more
Secure network traffic specifically for applications inside the Knox Workspace by configuring per-app VPN for container applications
Detect rooted devices automatically and configure actions and escalations to remediate device compliance
Enterprise mobility management (EMM) is a device- and platform-agnostic solution that centralizes the management, configuration and security of all devices in an organization, both BYO and corporate-owned. EMM goes beyond traditional device management to include the management and configuration of enterprise apps and content.
A comprehensive EMM solution will include MDM, MAM, mobile content management (MCM), identity management for access control, and productivity apps for easy access to corporate email, calendar, contacts, content repositories and intranet sites. When done right, an EMM solution should supply both the technical capabilities to simplify management and security for IT as well as a pleasant user experience for the employee.
Unified endpoint management (UEM) enables IT to stop using separate tools to manage mobile, desktop and now Internet of Things (IoT) devices. UEM solutions provide a holistic and user-centric approach to managing all endpoints by combining traditional client management of desktop and PC systems with a modern enterprise mobility management (EMM) framework. A comprehensive UEM solution will enable IT to manage users and deliver a consistent experience across all endpoints, secure and manage the full device lifecycle, and do it all in a single, comprehensive platform.
Mobile device management (MDM) is a device lifecycle management technology that enables IT to deploy, configure, manage, support and secure mobile devices through MDM profiles installed on the devices. MDM software provides asset inventory, over-the- air configuration of email, apps and Wi-Fi, remote troubleshooting, and remote lock and wipe capabilities to secure the device and the enterprise data on it. MDM is the foundation of a comprehensive enterprise mobility management (EMM) solution.
Bring your own device (BYOD) is an IT policy that allows employees to use their personal devices for work purposes. EMM platforms enable organizations to implement a BYOD strategy without sacrificing security or employee privacy by providing separation of work and personal data on the device. This separation allows IT to manage and secure only the work data on an employee-owned device. If a device is ever compromised or when an employee leaves the company, IT is able to remove only the work-related data, leaving the personal items on the device intact.