<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet title="XSL_formatting" type="text/xsl" href="https://news.samsung.com/in/wp-content/plugins/btr_rss/btr_rss.xsl"?><rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:wfw="http://wellformedweb.org/CommentAPI/"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:atom="http://www.w3.org/2005/Atom"
     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
     xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>
	<channel>
		<title>Samsung Security &#8211; Samsung Newsroom India</title>
		<atom:link href="https://news.samsung.com/in/tag/samsung-security/feed" rel="self" type="application/rss+xml" />
		<link>https://news.samsung.com/in</link>
        <image>
            <url>https://img.global.news.samsung.com/image/newlogo/logo_samsung-newsroom_in.png</url>
            <title>Samsung Security &#8211; Samsung Newsroom India</title>
            <link>https://news.samsung.com/in</link>
        </image>
        <currentYear>2019</currentYear>
        <cssFile>https://news.samsung.com/in/wp-content/plugins/btr_rss/btr_rss_xsl.css</cssFile>
		<description>What's New on Samsung Newsroom</description>
		<lastBuildDate>Fri, 10 Apr 2026 13:03:34 +0000</lastBuildDate>
		<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
					<item>
				<title>5 Ways Samsung is Tackling Mobile Security with Knox</title>
				<link>https://news.samsung.com/in/5-ways-samsung-is-tackling-mobile-security-with-knox?utm_source=rss&amp;utm_medium=direct</link>
				<pubDate>Tue, 10 Dec 2019 14:45:23 +0000</pubDate>
						<category><![CDATA[B2B]]></category>
		<category><![CDATA[Data Analytics]]></category>
		<category><![CDATA[KNOX]]></category>
		<category><![CDATA[Knox 2.7]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Samsung KNOX]]></category>
		<category><![CDATA[Samsung Security]]></category>
                <guid isPermaLink="false">http://bit.ly/2E3PrGG</guid>
									<description><![CDATA[As we hurtle toward 2020, the range of mobile security threats targeting smartphone users — zero-day attacks, advanced persistent threats and ransomware — is]]></description>
																<content:encoded><![CDATA[<p>As we hurtle toward 2020, the range of mobile security threats targeting smartphone users — zero-day attacks, advanced persistent threats and ransomware — is only getting more varied and sophisticated. Fortunately, <a href="https://www.samsungknox.com/" target="_blank" rel="noopener">Samsung Knox</a> has been evolving even more quickly to help provide defense-grade protection for both devices and the data that resides on them.</p>
<p>&nbsp;</p>
<p>Although enterprises have always valued strong data encryption, it’s never been more critical than now. That’s because, in many cases, organizations have moved their most critical business systems and workflows to the cloud, and sensitive business data can be accessed and updated anywhere from smartphones and tablets.</p>
<p>&nbsp;</p>
<p>These mobile-powered <a href="https://insights.samsung.com/2019/08/07/keeping-pace-with-changing-workforce-note10/" target="_blank" rel="noopener"> digital transformation initiatives</a> yield significant benefits, helping enterprises become more agile, take greater advantage of analytics and deliver an improved customer experience. However, it means the mobile devices that business professionals use are tied even more directly to critical business outcomes — and that the consequences of falling victim to malware and other mobile security issues can be devastating.</p>
<p>&nbsp;</p>
<p>No matter how mobility fits into an organization’s priorities and strategies, Samsung Knox is designed to provide enterprise leaders with the peace of mind and the flexible solution set they need in an increasingly mobile world.</p>
<p>&nbsp;</p>
<p>Here are five key ways that Knox can keep your mobile devices secure.</p>
<h3></h3>
<p>&nbsp;</p>
<h3><span style="color: #000080;">1. Device integrity from the start</span></h3>
<p>&nbsp;</p>
<p>Any lingering doubts about Android’s ability to work in large organizations that put a premium on security have been laid to rest by the Samsung Knox platform. Knox provides enterprises with a rock-solid foundation as they begin a mobile initiative. A multilayered security platform, Knox extends up from the chipset (which features a <a href="https://www.samsungknox.com/en/secured-by-knox#security" target="_blank" rel="noopener"> Trusted Execution Environment</a>) to the operating system (the integrity of which is <a href="https://www.samsungknox.com/en/secured-by-knox#security" target="_blank" rel="noopener"> verified at boot</a> and during runtime) and application permissions.</p>
<p>&nbsp;</p>
<p>The strength of the Knox platform is validated by global research firm Gartner, which gave the Knox version 3.2 a total of 27 out of 30 “strong” ratings in its May 2019 <a href="https://www.gartner.com/en/documents/3913286" target="_blank" rel="noopener"> mobile security platform comparison report</a>.</p>
<p>&nbsp;</p>
<p>As governments and regulated industries continue to <a href="https://insights.samsung.com/2018/06/19/meeting-gdpr-requirements-with-mdm-solutions/" target="_blank" rel="noopener"> refine the security requirements</a> to protect data and privacy, Samsung is committed to making sure the Knox platform can help enterprises achieve compliance and mitigate risks.</p>
<p>&nbsp;</p>
<h3></h3>
<p><img class="alignnone wp-image-10789 size-full" src="https://img.global.news.samsung.com/in/wp-content/uploads/2019/12/S07_Finance_Ultrasonic20FingerprintS10.jpg" alt="" width="6016" height="4016" srcset="https://img.global.news.samsung.com/in/wp-content/uploads/2019/12/S07_Finance_Ultrasonic20FingerprintS10.jpg 6016w, https://img.global.news.samsung.com/in/wp-content/uploads/2019/12/S07_Finance_Ultrasonic20FingerprintS10-611x408.jpg 611w, https://img.global.news.samsung.com/in/wp-content/uploads/2019/12/S07_Finance_Ultrasonic20FingerprintS10-1024x684.jpg 1024w" sizes="(max-width: 6016px) 100vw, 6016px" /></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<h3><span style="color: #000080;">2. Business and personal data can coexist</span></h3>
<p>&nbsp;</p>
<p>One of the ongoing challenges of deploying mobile devices in the enterprise is recognizing that employees may want to run apps and store content for personal use in addition to accessing business applications and data.</p>
<p>&nbsp;</p>
<p>In the past, IT often instituted device use policies that prohibited or limited the use of particular apps and content. <a href="https://www.samsungknox.com/en/solutions/it-solutions/knox-platform-for-enterprise" target="_blank" rel="noopener"> Knox Platform for Enterprise (KPE)</a> provides a more effective alternative by introducing features to isolate and encrypt business apps and data in containers, both at rest and in motion.</p>
<p>&nbsp;</p>
<p>By deploying a separate enterprise container on the mobile device, administrators can ensure enterprise apps and data are protected against malicious apps inadvertently downloaded from third-party marketplaces and reduce risk of data leakage. If a device is lost or the employee leaves the organization, the dual persona provided by Knox Platform for Enterprise means the remote wipe tools can be used to erase the business partition and leave personal content and apps untouched.</p>
<p>&nbsp;</p>
<p><a href="https://www.samsungknox.com/en/knox-platform/knox-on-android" target="_blank" rel="noopener"> Knox 3.3</a>, released earlier this year, adds Knox Dual Data-at-Rest (DAR). Enterprises can now add two layers of encryption so that, whether a device is powered off or in an unauthenticated state, it can continue to be fully protected.</p>
<h3></h3>
<h3><span style="color: #000080;">3. Streamlining configuration</span></h3>
<p>&nbsp;</p>
<p>Every business has unique needs, and line of business leaders are constantly innovating new ways to create value through mobile devices and apps. The challenge for IT departments has been keeping up with the customization that the business demands, and then <a href="https://insights.samsung.com/2018/05/03/automating-mobile-device-configuration-how-knox-configure-boosts-it-productivity-and-security-2/" target="_blank" rel="noopener"> provisioning, securing and updating</a> large fleets of mobile devices.</p>
<p>&nbsp;</p>
<p><a href="https://www.samsungknox.com/en/solutions/it-solutions/knox-configure" target="_blank" rel="noopener"> Knox Configure</a> addresses this hurdle head-on by offering a <a href="https://insights.samsung.com/2019/06/07/device-customization-with-knox-configure-sbtv/" target="_blank" rel="noopener"> cloud-based approach</a> to setting up a profile and pushing it to thousands or even tens of thousands of devices. This can all be done remotely, reflecting the day-to-day realities of large global organizations with highly distributed workforces. This simplifies IT’s job not only when devices are first deployed, but as changes to configuration are made over time.</p>
<p>&nbsp;</p>
<p>Advanced configuration can improve both the user experience and the security of the device. Apps and settings can be preloaded so that everything is right there for the user from the moment they power up. To enhance security, device features that aren’t necessary for the specific business use case can be disabled or locked down. In a nutshell, Knox Configure lets you transform a smartphone into a fully customized business tool.</p>
<p>&nbsp;</p>
<h3><span style="color: #000080;">4. Simplifying mobile device management</span></h3>
<p>&nbsp;</p>
<p>As mobile usage at work has increased, most enterprises have moved quickly to invest in <a href="https://www.samsung.com/us/business/solutions/services/mobility-software/knox-manage/?cid=com-btb-sky-blg-122001" target="_blank" rel="noopener"> mobile device management</a> (MDM) tools to help monitor and secure all the new mobile endpoints tapping into their network.</p>
<p>&nbsp;</p>
<p>For small and medium-sized businesses that haven’t addressed this yet, Samsung Knox Manage provides an easy-to-use, cost-effective solution, handling everything from event-based management and device location tracking to <a href="https://insights.samsung.com/2018/08/07/whitelisting-and-blocklisting-mobile-applications-pros-and-cons/" target="_blank" rel="noopener"> app whitelisting and blocklisting</a>.</p>
<p>&nbsp;</p>
<p>Larger organizations don’t need to replace their existing MDM or <a href="https://www.samsung.com/us/business/solutions/topics/enterprise-mobility/?cid=com-btb-sky-blg-122001" target="_blank" rel="noopener"> enterprise mobile management solution</a> (EMM), however, since Samsung Knox already integrates closely with all the leading solutions, including BlackBerry, Citrix, IBM MaaS360, Microsoft Intune, MobileIron, SOTI and VMware.</p>
<p>&nbsp;</p>
<p>Knox 3.3, meanwhile, allows enterprises to configure EMM-based network platform analytics (NPA) tools to receive network statistics while the network is active and gather analytics efficiently for long sessions.</p>
<p>&nbsp;</p>
<h3><span style="color: #000080;">5. Staying current with updates and patches</span></h3>
<p>&nbsp;</p>
<p>Outdated device firmware represents one of the biggest points of vulnerability that can lead to malware infections and exploits. Managing the constant stream of patches, however, adds an additional burden on IT departments that may already be struggling to keep up with patching their desktop fleets.</p>
<p>&nbsp;</p>
<p><a href="https://www.samsungknox.com/en/solutions/it-solutions/samsung_e-fota" target="_blank" rel="noopener"> Samsung Knox Enterprise Firmware-Over-The-Air</a> (E-FOTA) not only helps IT teams <a href="https://insights.samsung.com/2018/12/31/managing-mobile-patches-and-updates-with-e-fota-adds-security-reliability/" target="_blank" rel="noopener"> deploy all the right patches on schedule</a>, but also lets them conduct testing first to ensure compatibility between apps and the latest versions of their mobile operating system. Best of all, E-FOTA allows this to happen without user interaction, meaning they don’t have to stop or interrupt their work in order to receive an update. Even unattended devices can be addressed so they’re ready the next time employees turn them on.</p>
<p>&nbsp;</p>
<p>Samsung Knox is the company’s commitment to ensuring enterprise customers’ data is safe on Galaxy mobile devices, providing IT administrators peace of mind, and users the freedom to work and play in any way they want.</p>
<p>&nbsp;</p>
<p><em> Find out how to safeguard your enterprise with an incident response plan by downloading this </em> <a href="https://docs.samsungknox.com/whitepapers/knox-platform/samsung-knox.htm" target="_blank" rel="noopener"> free white paper</a>.</p>
]]></content:encoded>
																				</item>
					<item>
				<title>Keep Your Business Safe with Mobile Security and Management</title>
				<link>https://news.samsung.com/in/keep-your-business-safe-with-mobile-security-and-management?utm_source=rss&amp;utm_medium=direct</link>
				<pubDate>Wed, 04 Dec 2019 11:01:45 +0000</pubDate>
						<category><![CDATA[Mobile]]></category>
		<category><![CDATA[Customization]]></category>
		<category><![CDATA[KNOX]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Samsung KNOX]]></category>
		<category><![CDATA[Samsung Security]]></category>
		<category><![CDATA[secured by knox]]></category>
		<category><![CDATA[Small and Medium Business]]></category>
                <guid isPermaLink="false">http://bit.ly/2DKlPOs</guid>
									<description><![CDATA[As smartphone and tablet use continues to expand in the business landscape, organizations have become more aware than ever of the threat of mobile security]]></description>
																<content:encoded><![CDATA[<p>As smartphone and tablet use continues to expand in the business landscape, organizations have become more aware than ever of the threat of mobile security attacks. While different, what these companies all share is a sense of helplessness — that it’s only a matter of time before someone finds a way to infect their smartphones and tablets with malware or fall victim to phishing.</p>
<p>&nbsp;</p>
<p>In some cases, that feeling of helplessness is real, particularly if you’re working for a smaller business that doesn’t have a formal security role or a dedicated team to assess and mitigate potential risks.</p>
<p>&nbsp;</p>
<p>However, fending off potential security issues is especially important for these small and midsize firms. Given that their employees tend to juggle multiple responsibilities, they rely on mobile devices to go wherever they’re needed while staying connected to corporate data and applications.</p>
<p>&nbsp;</p>
<p>Here are 10 ways your organization can remain proactive in its approach to mobile security and management.</p>
<p>&nbsp;</p>
<h2><strong>1. Make upgrading a priority</strong></h2>
<p>&nbsp;</p>
<p>According to the most recent <a href="https://www.npd.com/wps/portal/npd/us/news/press-releases/2018/the-average-upgrade-cycle-of-a-smartphone-in-the-u-s--is-32-months---according-to-npd-connected-intelligence/">NPD Connected Intelligence Mobile Connectivity Report</a>, the average upgrade cycle for smartphones in the U.S. is 32 months — nearly three years. That reflects how often consumers make the move to a new device, and it’s up from 25 months the year before.</p>
<p>&nbsp;</p>
<p>That kind of cadence might be fine for people who are only using their devices for personal apps and content, but businesses need to approach upgrade decisions differently. Security researchers learn a lot about the changing tactics of malware authors, distributed denial of service (DDoS) attackers and ransomware campaigns in a three-year period. So do device manufacturers, who are building in protections that specifically address common attack vectors as networks <a href="https://insights.samsung.com/2019/04/03/5g-is-real-and-its-here-now-will-it-offer-something-for-everyone/">evolve to 5G</a>.</p>
<p>&nbsp;</p>
<p>In BYOD environments, it’s critical to set minimum requirements for the devices that are allowed to access corporate systems and apps. Beyond three years from initial release, many devices stop receiving regular OS updates and security patches, making them more vulnerable to new exploits.</p>
<p>&nbsp;</p>
<p>If you’re dealing with constrained IT resources, you have to determine the tradeoff between trying to figure out a mobile security strategy on your own and simply making use of what is already market-ready and available to businesses.</p>
<p>&nbsp;</p>
<h2><strong>2. Make MDM a mainstay</strong></h2>
<p>Companies have always made sure they could keep track of the equipment they’ve purchased, but there’s a difference between monitoring what happens on an oil rig that never moves and a fleet of smartphones that have been deployed to on-the-go employees.</p>
<p>&nbsp;</p>
<p>While <a href="https://www.samsung.com/us/business/solutions/services/mobility-software/knox-manage/?cid=com-btb-sky-blg-122001">mobile device management</a> (MDM) has been adopted by most enterprises, smaller firms have plenty of reasons to explore it as well. MDM tools can be helpful to companies that offer a <a href="https://insights.samsung.com/2018/10/04/how-to-accelerate-byod-with-mobile-device-management/">bring your own device (BYOD)</a> program but want to make sure employee devices don’t open them up to security threats.</p>
<p>&nbsp;</p>
<p>While choosing an MDM solution will take some research, midsize firms can get a head start by making sure the devices they deploy or recommend to employees incorporate security capabilities <a href="https://insights.samsung.com/2019/06/27/the-most-secure-phone-samsung-knox-is-setting-a-high-bar-2/">from the chip up</a>.</p>
<p>&nbsp;</p>
<h2><strong>3. Whitelisting and blocklisting</strong></h2>
<p>&nbsp;</p>
<p>Many security threats penetrate companies due to user errors which are often just honest mistakes. Employees might not realize by downloading an app, for instance, that they are effectively leaving the door open to have corporate data stolen from their smartphone.</p>
<p>&nbsp;</p>
<p><a href="https://insights.samsung.com/2018/08/07/whitelisting-and-blocklisting-mobile-applications-pros-and-cons/">Whitelisting and blocklisting apps via MDM</a> helps protect employees — and their employers — from these kinds of risks by making it clear which apps and sites are safe.</p>
<p>&nbsp;</p>
<p>Blocklists give IT departments peace of mind by blocking access to certain apps and sending notifications when an attempt is made. Whitelists, on the other hand, may be more effective for highlighting the mobile tools employees should be prioritizing over games and social media.</p>
<p>&nbsp;</p>
<h2><strong>4. Two-factor authentication and biometrics</strong></h2>
<p>&nbsp;</p>
<p>Weak and easily forgotten passwords can make it simple for rogue third parties to gain access to mobile devices. Two-factor authentication is a straightforward way for small and midsized businesses to begin developing a layered mobile security strategy.</p>
<p>&nbsp;</p>
<p>While tokens have sometimes been used as part of two-factor authentication, <a href="https://insights.samsung.com/2019/03/19/which-biometric-authentication-method-is-the-most-secure/">fingerprints and other biometric identifiers</a> are quickly gaining ground. In fact, 70 percent of businesses will use biometrics for workforce access by 2022, according to market research firm <a href="https://www.gartner.com/en/newsroom/press-releases/2019-02-05-gartner-predicts-increased-adoption-of-mobile-centric">Gartner</a>. Biometrics can be used in tandem with the data separation technologies discussed below.</p>
<p>&nbsp;</p>
<h2><strong>5. Get comfortable with customization</strong></h2>
<p>&nbsp;</p>
<p>When new hires are brought on board, they usually aren’t given keys to every filing cabinet, the company’s banking credentials or other proprietary data that require a certain level of seniority or privilege. In the same way, it doesn’t make sense to grant every employee unfettered access to all manner of corporate apps and data.</p>
<p>&nbsp;</p>
<p>IT managers can get around this with tools that let them customize mobile devices before they are handed out to their workforce. A good example is Samsung’s <a href="https://www.samsungknox.com/en/solutions/it-solutions/knox-configure">Knox Configure</a>, which enables businesses to create a myriad of simple-use scenarios, from customizing boot-up screens to creating dedicated-use devices with only work-related apps.</p>
<p>&nbsp;</p>
<h2><strong>6. Separate work and play</strong></h2>
<p>&nbsp;</p>
<p>Even if they don’t have a dedicated desk with their own drawers, companies often offer employees a safe place of some kind where they can place personal items and secure them until they’re needed at the end of the day. Strong mobile security involves taking a very similar approach to the way data and apps are partitioned on the device.</p>
<p>&nbsp;</p>
<p>Containerization, for example, allows smartphones to create <a href="https://insights.samsung.com/2019/06/24/how-to-keep-data-safe-with-knox-platform-for-enterprise-sbtv/">separate workspaces</a> of business apps and content that can be centrally protected and managed. Administrators don’t need access to an employee’s personal apps or data and can therefore provide the optimum mix of flexibility and security. This lets IT departments lock down sensitive company information, while letting employees maintain confidence in their personal privacy.</p>
<p>&nbsp;</p>
<h2><strong>7. Ease the updating process</strong></h2>
<p>&nbsp;</p>
<p>Just as new security threats are constantly cropping up, companies are simultaneously developing fixes that can be applied to mobile devices. Unfortunately, that often puts the burden on a company’s IT resources (which can be scarce or spread thin in midsized firms) to apply all the right patches on a regular basis. According to <a href="https://www.globenewswire.com/news-release/2019/07/31/1894927/0/en/Security-Priorities-Investments-Outlined-in-Latest-IDG-Research.html">IDG’s 2019 Security Priorities Study</a>, patch management is still one of the most widely used methods for large enterprises to combat security threats, and smaller firms should do the same.</p>
<p>&nbsp;</p>
<p>Technologies such as <a href="https://insights.samsung.com/2018/12/31/managing-mobile-patches-and-updates-with-e-fota-adds-security-reliability/">electronic firmware over-the-air (E-FOTA)</a> mean employees don’t have to wait while patches or other updates are being pushed to their devices. Instead, updates can be scheduled across the entire team, ensuring all updates are tested and compatible, and all devices are uniform.</p>
<p>&nbsp;</p>
<h2><strong>8. Keep policies current</strong></h2>
<p>&nbsp;</p>
<p>If employees fall victim to a <a href="https://insights.samsung.com/2018/10/09/what-is-phishing-and-how-do-i-stop-it/">phishing scheme</a> and get locked out of their devices, or data loss occurs because settings were somehow tampered with, a company will probably be quick to outline an updated mobile security policy for everyone to follow.</p>
<p>&nbsp;</p>
<p>Rather than wait until disaster strikes, however, the most successful organizations stay on top of security issues and get in front of them from a policy perspective. At least every six months, <a href="https://www.samsung.com/us/business/short-form/incident-response-playbook-for-mobile-devices/?cid=com-btb-sky-blg-122001">review your mobile security posture</a>, from your ability to monitor device usage, points of vulnerability and the age of your smartphone fleet.</p>
<p>&nbsp;</p>
<p>Then, look forward to new devices that might be integrated into your workforce as part of new hire onboarding or upgrades across a department. Make sure updated policies are well documented. Of course, make sure employees are held accountable for reviewing and adhering to the policy as well.</p>
<p>&nbsp;</p>
<h2><strong>9. User training and security awareness</strong></h2>
<p>&nbsp;</p>
<p>The IDG study showed that almost a third of those surveyed, or 31 percent, cited employee training as one of the top areas where they fall short. “This speaks to the perpetual problem of employees as a security risk,” the authors wrote.</p>
<p>&nbsp;</p>
<p>Training and security awareness is never a once-and-done activity, but something that should be treated as an ongoing work in progress. The companies that do this successfully make sure the content is easy to understand and available through different channels depending on their preference. Examples could include tips in an employee newsletter, an instructional video on a company intranet or even push notifications sent to all employee smartphones.</p>
<p>&nbsp;</p>
<h2><strong>10. Seek a scaleable path</strong></h2>
<p>&nbsp;</p>
<p>A small company might not be small forever. Growth can come quickly via a strategic initiative to expand into a new market or territory, an M&amp;A or some other tipping point. What won’t change is the need for your workforce to be equipped with the best tools available to do their jobs from wherever they are.</p>
<p>&nbsp;</p>
<p>Of course, configuring and provisioning devices one by one is a nonstarter for IT departments, so think about how you can find an MDM tool or related application that will streamline this process as the organization evolves.</p>
<p>&nbsp;</p>
<p>Fortunately, none of the Android mobile security tips outlined here have to be developed from scratch. Solutions such as <a href="https://www.samsungknox.com/en/solutions/it-solutions/knox-manage">Knox Manage</a> and <a href="https://www.samsungknox.com/en/solutions/it-solutions/knox-configure">Knox Configure</a> were deliberately designed to help organizations from small firms to large enterprises with the ability to secure, manage and provision smartphones successfully.</p>
]]></content:encoded>
																				</item>
					<item>
				<title>For Your Eyes Only: Galaxy S7, Galaxy S7 edge Get Secure Folder</title>
				<link>https://news.samsung.com/in/for-your-eyes-only-galaxy-s7-galaxy-s7-edge-get-secure-folder?utm_source=rss&amp;utm_medium=direct</link>
				<pubDate>Fri, 17 Mar 2017 08:25:45 +0000</pubDate>
						<category><![CDATA[Mobile]]></category>
		<category><![CDATA[KNOX]]></category>
		<category><![CDATA[Samsung Galaxy S7 edge]]></category>
		<category><![CDATA[Samsung Galaxy Secure Folder]]></category>
		<category><![CDATA[Samsung Secure Folder]]></category>
		<category><![CDATA[Samsung Security]]></category>
                <guid isPermaLink="false">http://bit.ly/2n4C9m1</guid>
									<description><![CDATA[On February 24, Samsung Electronics officially released a downloadable version of Secure Folder, a robust security solution that helps mobile users protect]]></description>
																<content:encoded><![CDATA[<p>On February 24, Samsung Electronics officially released a downloadable version of Secure Folder, a robust security solution that helps mobile users protect their valuable data and information.</p>
<p>&nbsp;</p>
<p>Secure Folder leverages the defense-grade Samsung Knox security platform to create a private, encrypted space on a Samsung Galaxy smartphone. Apps and data moved to Secure Folder are sandboxed separately on the device and gain an additional layer of security and privacy, thus further protecting them from malicious attacks. Furthermore, users must use an authentication method such as PIN, pattern, passcode or biometric verification such as fingerprint authentication to access and manage Secure Folder.</p>
<p>&nbsp;</p>
<p><a href="https://img.global.news.samsung.com/in/wp-content/uploads/2017/03/sf.jpg"><img class="alignnone size-thumbnail wp-image-2473" src="https://img.global.news.samsung.com/in/wp-content/uploads/2017/03/sf-704x334.jpg" alt="" width="704" height="334" /></a></p>
<p>&nbsp;</p>
<p>Users may leverage this feature to store and encrypt personal and private content, such as apps, images and documents, and keep them hidden. They can also make copies of their favorite apps and easily access them via alternate profiles. Any notes, photos, contacts or browsing history within the apps stored in Secure Folder will remain separate from the same apps outside Secure Folder.</p>
<p>&nbsp;</p>
<p>This is especially useful for those who want to ensure that banking information or apps that store large amounts of personal data stay private when lending out their phones to friends, family members or colleagues.</p>
<p>&nbsp;</p>
<p>With a simple design along with easy setup using a Samsung Account, Secure Folder is as convenient as it is secure. Sensitive data can easily be moved to Secure Folder by selecting Move to Secure Folder from native apps such as Gallery, My files, or Contacts, or by tapping Add files inside Secure Folder.</p>
<p>&nbsp;</p>
<p>For additional privacy, users can also customize their Secure Folder by changing its name and icon. They can also hide the Secure Folder icon from their home screen altogether using Quick Panel.</p>
<p>&nbsp;</p>
<div id="attachment_2462" style="width: 714px" class="wp-caption alignnone"><a href="https://img.global.news.samsung.com/in/wp-content/uploads/2017/03/sf2.jpg"><img class="size-thumbnail wp-image-2462" src="https://img.global.news.samsung.com/in/wp-content/uploads/2017/03/sf2-704x334.jpg" alt="" width="704" height="334" /></a><p class="wp-caption-text">Users can customize Secure Folder by changing its name and icon (left), or hide the Secure Folder icon from their home screen altogether via the Quick Panel (middle, right).</p></div>
<p>&nbsp;</p>
<p>Secure Folder also supports cloud-based backup and restore (BnR) to provide users with an easy way to migrate to a new device. Backup data in the Secure Folder is isolated from other general backup files. Therefore, backup data can only be restored through the Settings inside Secure Folder, and only by the original <a href="https://account.samsung.com/membership/service/getServieInfoList.do">Samsung Account user</a>.</p>
<p>&nbsp;</p>
<p><a href="https://img.global.news.samsung.com/in/wp-content/uploads/2017/03/sf-sunil2.jpg"><img class="alignnone size-thumbnail wp-image-2471" src="https://img.global.news.samsung.com/in/wp-content/uploads/2017/03/sf-sunil2-704x334.jpg" alt="" width="704" height="334" /></a></p>
<p>&nbsp;</p>
<p>Secure Folder is available for download from Galaxy Apps, and is compatible with the Galaxy S7 and Galaxy S7 edge smartphones supporting Android OS 7.0 or later versions. Samsung plans to extend support to additional devices soon.</p>
<p>&nbsp;</p>
<div class="youtube_wrap"><iframe src="https://www.youtube.com/embed/jCc4zeuz2W4" width="300" height="150" frameborder="0" allowfullscreen="allowfullscreen"></iframe></div>
]]></content:encoded>
																				</item>
			</channel>
</rss>
