<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet title="XSL_formatting" type="text/xsl" href="https://news.samsung.com/sg/wp-content/plugins/btr_rss/btr_rss.xsl"?><rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:wfw="http://wellformedweb.org/CommentAPI/"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:atom="http://www.w3.org/2005/Atom"
     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
     xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>
	<channel>
		<title>Microsoft &#8211; Samsung Newsroom Singapore</title>
		<atom:link href="https://news.samsung.com/sg/tag/microsoft/feed" rel="self" type="application/rss+xml" />
		<link>https://news.samsung.com/sg</link>
        <image>
            <url>https://img.global.news.samsung.com/image/newlogo/logo_samsung-newsroom_sg.png</url>
            <title>Microsoft &#8211; Samsung Newsroom Singapore</title>
            <link>https://news.samsung.com/sg</link>
        </image>
        <currentYear>2026</currentYear>
        <cssFile>https://news.samsung.com/sg/wp-content/plugins/btr_rss/btr_rss_xsl.css</cssFile>
		<description>What's New on Samsung Newsroom</description>
		<lastBuildDate>Fri, 17 Apr 2026 20:11:37 +0000</lastBuildDate>
		<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
					<item>
				<title>Leading the Way in Enterprise Mobile Security: Samsung’s Zero Trust Strategy</title>
				<link>https://news.samsung.com/sg/leading-the-way-in-enterprise-mobile-security-samsungs-zero-trust-strategy?utm_source=rss&amp;utm_medium=direct</link>
				<pubDate>Wed, 28 Jan 2026 10:31:30 +0000</pubDate>
						<category><![CDATA[Editorials]]></category>
		<category><![CDATA[Mobile]]></category>
		<category><![CDATA[B2B]]></category>
		<category><![CDATA[Cisco]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Enterprise]]></category>
		<category><![CDATA[Knox]]></category>
		<category><![CDATA[Knox Suite]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Samsung Knox]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Zero Trust]]></category>
                <guid isPermaLink="false">https://bit.ly/3Mau1OH</guid>
									<description><![CDATA[&#160; Today’s world is one of unprecedented innovation and rapidly evolving technology. It’s an era of endless possibilities, coupled with a new set of risks]]></description>
																<content:encoded><![CDATA[<div style="width: 1450px" class="wp-caption alignnone"><img title="[Editorial] Leading the Way in Enterprise Mobile Security: Samsung’s Zero Trust Strategy" src="https://api.samsungmobilepress.com/api/v1/file/05B57C0A5B0CD10A0E6C33AAAB813A029E87454A937D9C33F1F263A953C89859D21E3A4484358AFDB9C6DD9D2B3C4B43AABB0EB960E56A8BC4B761E53D6CA2976A097198974490C8CFA0F4B0BBA264242DE3041CA4BF97F50E0B477B57FDD3DF15007EA728FB75CEB88961D8D442E4C8696ECDEBF1723E515282AE2F675D16BB7110940654C7E0A39CF8785E91307AC44AD7960CC7A15C2387C822B4785E7C1884608F0466F428B02CB274862B1CCEAE1B6354C84A94C96BEBC213F9DE4605A8" alt="" width="1440" height="960" /><p class="wp-caption-text">Jerry Park leads Samsung’s global B2B mobile initiatives, overseeing enterprise-focused devices, platforms and services for business customers worldwide.</p></div>
<p>Today’s world is one of unprecedented innovation and rapidly evolving technology. It’s an era of endless possibilities, coupled with a new set of risks for security and privacy. At Samsung Electronics, we recognise that as we enter these uncharted territories, we must be prepared for potential threats that may arise. That’s why we stay deeply attuned to the ever-changing security landscape and champion a dynamic approach to enterprise security.</p>
<p>&nbsp;</p>
<p>The cybersecurity threats of today affect everyone, from consumers to businesses. Enterprise device fleets must be resilient against attacks of all kinds — from suspicious URLs, insider employee threats and malware, to emerging risks associated with AI usage in the workplace, including prompt injection and sensitive data leaks. As a growing number of employees across industries — from corporate offices to the frontlines — use devices to access enterprise networks and resources, these threats not only present significant security risks but may also lead to a substantial financial toll on businesses.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><img title="[Editorial] Leading the Way in Enterprise Mobile Security: Samsung’s Zero Trust Strategy" src="https://api.samsungmobilepress.com/api/v1/file/F85B3A5F6BC04F7F174476F1D4844EF78AFA136460428C3F526BCEA46B5F0916BBAF61E6572DF9A537704891E67BD4959357324C41D17CBF340BFDEEE8BD9DBBB6883D022DFB529FE6B4288458B9CAD2085529EBBFBCD147615BC0A5249B50FBABFC08BA00E6F3301009C5E528DAB12B5DE7B5E37FBA2971B235BD663A2FF0E9F5DA9318E17936DB0C10611DE50D254E0FE9C1D15587CE86C583168510584DD52E77529095A0BEEF4F3EB4ABBE84BFA5C826F326768A301C9D9267EEC0536AE1" alt="" /></p>
<p>&nbsp;</p>
<p>Enterprise security incidents can arise across operations. However, the <span><a href="https://www.idc.com/" target="_blank" rel="noopener">International Data Corporation</a></span> (IDC)<a href="#_ftn1" name="_ftnref1"><sup><span>[1]</span></sup></a> found that an overwhelming 70 percent of successful breaches originate from endpoints — the devices that connect to networks like phones, laptops and tablets. Unfortunately, in today’s security operations landscape, IT administrators have much less visibility into mobile devices compared to PCs and servers. With mobile devices now being the most common method of employee network access, this has to change. A systematic, comprehensive approach is critical to ensuring seamless mobile capabilities and uncompromising protection. At Samsung, we’re setting a new standard for mobile enterprise security by committing to a collaborative Zero Trust strategy for endpoints in partnership with market leaders.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<h3><strong>Core Principles for Zero Trust Endpoint Security</strong></h3>
<p><strong> </strong></p>
<p>Samsung’s legacy of innovation is built upon our deep understanding of users. We’re constantly listening to feedback from consumers and businesses, anticipating the evolution of mobile technology. This is what enables us to pioneer industry-first solutions for consumers and businesses alike. As the Head of the Global Mobile B2B Team, I’m especially proud of how we’ve led the way in critical areas that deliver value to enterprises across the board. From advancing hardware-backed device attestation and threat detection to fully embracing the security principles of Zero Trust, we are constantly striving to provide our customers with mobile devices and solutions that exceed their security requirements.</p>
<p>&nbsp;</p>
<p>Zero Trust is a security framework that replaces implicit trust with explicit trust by continuously assessing security posture, risk and trust levels based on context. The current security solutions market is dominated by network-centric Zero Trust solutions that focus on securing access at the <em>network edge</em>. Unfortunately, this approach by itself neglects a critical blind spot: the <em>endpoint</em>. Endpoints have the largest attack surface and are the most challenging IT assets to protect against cyberattacks. In most cases, they are the most vulnerable points in an organisation’s IT ecosystem.</p>
<p>&nbsp;</p>
<p>Zero Trust principles for endpoints, when realised correctly, ensure that access requests from endpoints are handled based on context that correlates with the device’s security posture and the user’s needs, and are continuously verified in real time. Although there is no definitive list of core principles behind Zero Trust endpoint protection, the following principles are the most commonly adopted:</p>
<p>&nbsp;</p>
<ul>
<li><strong>“Never trust, always verify” approach for devices:</strong> Devices should no longer be implicitly trusted just because they are within the network boundary. Instead, each device needs to prove its trustworthiness before being granted access.</li>
<li><strong>Continuous risk assessment and enforcement:</strong> Endpoint protection must be agile and ready to adapt to constantly changing risk conditions. This means continuously evaluating context — such as location, time of access and the device’s security posture — and dynamically adjusting security policies accordingly. Suspicious activity needs to be addressed through enforcement actions such as access restrictions or complete isolation.</li>
<li><strong>Restricted privileges and narrowly scoped access:</strong> Endpoints must enforce access control in real time based on context while ensuring privileges are granted dynamically with a narrow scope.</li>
<li><strong>Incorporation of user identity, device posture and behavioural signals:</strong> A Zero Trust-compliant solution needs to make granular and informed trust decisions to enforce tight access controls. To enable such decisions, Zero Trust’s continuous evaluation of context integrates user identity, device posture and behavioural signals.</li>
</ul>
<p>&nbsp;</p>
<p>While the Zero Trust security strategy is growing in adoption, Samsung is fully embracing it. By doing so, we are helping to protect the most vulnerable points in an organisation’s IT landscape. Risks related to endpoint security are constantly increasing as cloud-based applications, Bring Your Own Device (BYOD) programs and remote work prevail in the modern workplace environment. Samsung recognises the critical nature of this problem and is proactively addressing it in collaboration with partners.</p>
<p><strong> </strong></p>
<p>&nbsp;</p>
<h3><strong>Innovation and Collaboration for Security at Every Level</strong></h3>
<p><strong> </strong></p>
<p><img title="[Editorial] Leading the Way in Enterprise Mobile Security: Samsung’s Zero Trust Strategy" src="https://api.samsungmobilepress.com/api/v1/file/7BBEC983EF12D7DCDAC6B719FB92D1C0CA79B51FB29D51745159E319794AE102AA6598749CCFE5E60EA74A4A2F23DC32C22C072D0562396B5247FE4E996D8995546DEB3C8711B44406221335551AA713A1F14AEBE6C324065E4A5C88EF5FA9A62A366133EE4AAD8D5E29B42ADCC1B90C146ECCC93BBDDF661FF9031E500C4DD17FC129F379494A8E691F662BD9440456FC80B6E9C4FBCAF99F485C072F96F8CD8F303A9032AAB263D6E6F685C434D92F5970E288ECD91C47615A4242D852D6C2" alt="" /></p>
<p>How does this work in practice? From the hardware level and all the way to the operating system and secure interface, Zero Trust security principles are built into the architecture of Samsung Galaxy devices, enhancing protection at every layer while intuitively integrating with a business’s existing security infrastructure. Together, these practices empower enterprises to administer proper threat detection and response securely and reliably.</p>
<p>&nbsp;</p>
<p>At Samsung, we recognise that <span><a href="https://www.samsungmobilepress.com/feature-stories/editorial-there-is-no-privacy-without-stronger-security-thats-why-were-joining-forces-with-the-security-community-to-keep-you-safe" target="_blank" rel="noopener">security is a collective effort</a></span>. It is only through open collaboration with partners that we can bring the most advanced solutions to our customers. In my time at Samsung, we’ve made extensive strides in bringing forth versatile, optimised and secure solutions<a href="#_ftn2" name="_ftnref2"><sup><span>[2]</span></sup></a> for enterprises of all kinds.</p>
<p>&nbsp;</p>
<p>In 2024, we integrated Samsung Knox — our defence-grade, multilayer security management platform — with Cisco Secure Access, an innovative Security Service Edge solution. <span><a href="https://www.samsungknox.com/en/blog/samsung-cisco-collaboration" target="_blank" rel="noopener">This collaboration</a></span> delivers a secure and flexible employee access experience, enabling organisations to verify user identity, device posture and context before granting access.</p>
<p>&nbsp;</p>
<p>We also have a strong partnership with Microsoft, defined by a shared vision of reimagining mobile device security for business customers. The <span><a href="https://www.samsungmobilepress.com/press-releases/samsung-and-microsoft-unveil-first-on-device-attestation-solution-for-enterprise" target="_blank" rel="noopener">first step</a></span> of this strategic plan began in 2023, when we integrated Samsung Knox with Microsoft Intune, creating the industry’s first on-device mobile hardware-backed device attestation solution that works equally well on both company and personal devices. This solution <span><a href="https://www.samsungknox.com/en/blog/samsung-knox-on-device-attestation-now-default-in-microsoft-intune" target="_blank" rel="noopener">is now enabled by default in all new Android App Protection Policies</a></span>, empowering organisations to bolster the security posture of all Samsung devices in their fleet. In yet another step forward in our partnership with Microsoft, Samsung has become the industry’s first mobile manufacturer to offer a direct-to-security operations centre (SOC) connector. This was achieved through the <span><a href="https://www.samsungknox.com/en/blog/knox-asset-intelligence-for-microsoft-sentinel" target="_blank" rel="noopener">integration of Knox Asset Intelligence<u></u></a><u><a href="#_ftn3" name="_ftnref3"><sup><span>[3]</span></sup></a> and Microsoft Sentinel</u></span>, a scalable, cloud-native security information and event management (SIEM) solution. This integration delivers unprecedented visibility into mobile security threats, providing centralised monitoring and protection across enterprise device fleets.</p>
<p>&nbsp;</p>
<p>Working together with partners, Samsung is addressing key challenges in multiple areas — securing mobile devices, minimising damage from potential attacks and empowering employees to work efficiently and effectively without security concerns getting in their way.</p>
<p>&nbsp;</p>
<h3><strong>Holistic Security for Enhanced Privacy</strong></h3>
<p><strong> </strong></p>
<p>We’re constantly innovating, refining and developing <span><a href="https://www.samsungmobilepress.com/press-releases/samsung-knox-native-solution-sets-a-new-standard-in-secure-communications-for-governments-and-enterprises" target="_blank" rel="noopener">Samsung Knox solutions</a></span> in order to bring our customers enhanced control, greater transparency and better protection against cyber threats.</p>
<p>&nbsp;</p>
<p><span><a href="https://www.samsungknox.com/en/blog/enabling-uncompromising-security-for-every-zero-trust-journey" target="_blank" rel="noopener">By embodying Zero Trust as a core pillar of Samsung Knox</a></span>, every measure is being taken to help secure mobile devices and data. At the same time, Samsung is breaking new ground with first-to-market solutions by constantly keeping a pulse on the ever-changing threat landscape.</p>
<p>&nbsp;</p>
<p>As threats become increasingly complex with AI and hyperconnectivity taking centre stage, security and privacy are more important now than ever before. Today’s business landscape is constantly being threatened by an increasing volume of cyberattacks that aim to exploit IT vulnerabilities, with mobile devices and other endpoints quickly becoming prime targets.</p>
<p>&nbsp;</p>
<p>That’s why Samsung is working with market-leading companies to provide security solutions that work seamlessly with existing infrastructure, offering true end-to-end protection. These collaborative solutions are a testament to our commitment to not only adhere to industry standards but to also drive their continued development when it comes to Zero Trust endpoint security. This is just the beginning.</p>
<p>&nbsp;</p>
<p>To learn more about Samsung Knox’s approach to mobile security, visit <span><a href="https://www.samsungknox.com/en/secured-by-knox" target="_blank" rel="noopener">samsungknox.com</a></span>.</p>
<p>&nbsp;</p>
<p><sub><a href="#_ftnref1" name="_ftn1"><sup><span>[1]</span></sup></a> <em>The Hacker News</em>, “<span><a href="https://thehackernews.com/2024/04/10-critical-endpoint-security-tips-you.html">10 Critical Endpoint Security Tips You Should Know</a></span>,” April 26, 2024 (reporting IDC data)</sub></p>
<p><sub><a href="#_ftnref2" name="_ftn2"><sup><span>[2]</span></sup></a> Cisco Secure Access, Microsoft Intune and Microsoft Sentinel are third-party solutions and paid offerings.</sub></p>
<p><sub><a href="#_ftnref3" name="_ftn3"><sup><span>[3]</span></sup></a> Knox Asset Intelligence is a paid offering available through Knox Suite Plans.</sub></p>
]]></content:encoded>
																				</item>
					<item>
				<title>Samsung and Microsoft Unveil First On-Device Attestation Solution for Enterprise</title>
				<link>https://news.samsung.com/sg/samsung-and-microsoft-unveil-first-on-device-attestation-solution-for-enterprise?utm_source=rss&amp;utm_medium=direct</link>
				<pubDate>Mon, 31 Jul 2023 13:59:06 +0000</pubDate>
						<category><![CDATA[Mobile]]></category>
		<category><![CDATA[Press Release]]></category>
		<category><![CDATA[Knox Security]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Samsung Knox]]></category>
		<category><![CDATA[Security]]></category>
                <guid isPermaLink="false">https://bit.ly/44TlMuM</guid>
									<description><![CDATA[Strategic partnership leads to improved enterprise mobile device security for the modern workplace   Samsung Electronics Co., Ltd. today announced the first]]></description>
																<content:encoded><![CDATA[<h3 style="text-align: center;"><em>Strategic partnership leads to improved enterprise mobile device security for the modern workplace</em></h3>
<p><strong> </strong></p>
<p>Samsung Electronics Co., Ltd. today announced the first step in a plan to reimagine mobile device security for business customers in partnership with Microsoft. This collaboration has led to the industry’s first on-device, mobile hardware-backed device attestation solution that works equally well on both company and personally owned devices.</p>
<p>&nbsp;</p>
<p>Device attestation can help ensure a device’s identity and health, verifying that it has not been compromised. On-device, mobile hardware-backed device attestation — available on Samsung Galaxy<a href="#_ftn1" name="_ftnref1"><sup>[1]</sup></a> devices and combined with protection from Microsoft Intune — now adds enhanced security and flexibility. For enterprises, this is an extra layer of protection against compromised devices falsely claiming to be known and healthy, gaining access to sensitive corporate data. Additionally, organizations can now enable employees to bring their own device (BYOD) to work with the confidence that they are protected with the same level of security as company owned devices. For employees, this means added flexibility for their personal Galaxy devices to safely access their work environment.</p>
<p>&nbsp;</p>
<p>In a rapidly evolving landscape with changing work habits and increasingly sophisticated cyber threats, <span><a href="https://www.samsungknox.com/en/blog/the-role-of-the-endpoint-in-zero-trust">Zero Trust</a></span> is a security model based on three principles: always assume breach, verify explicitly and provide least privilege access. Implementation of Zero Trust has become mandated by regulated industries and public sector customers, such as the United States government.<a href="#_ftn2" name="_ftnref2"><sup>[2]</sup></a> This requires a new approach for enforcing security end-to-end, from apps to the network and the device itself, regardless of device ownership and enrollment.</p>
<p>&nbsp;</p>
<p>Together, Samsung and Microsoft are uniquely positioned to enable this. Samsung is the industry leader for global smartphones. <span><a href="https://news.samsung.com/global/introducing-knox-matrix-10-years-of-samsung-knox-security-and-samsungs-vision-for-a-safer-future/">The Samsung Knox security platform is 10 years old.</a></span> In that time, Samsung Knox has been activated on more than a billion Samsung Galaxy devices. That’s more than 30,000 businesses in 110 markets relying on Samsung Knox to protect their devices from cyberattacks. Microsoft is the industry leader in unified endpoint management software market share<a href="#_ftn3" name="_ftnref3"><sup>[3]</sup></a> and delivers end-to-end cross-cloud, cross-platform security solutions, which integrate different categories across security, compliance, identity, device management and privacy, informed by more than 65 trillion threat signals each day.<a href="#_ftn4" name="_ftnref4"><sup>[4]</sup></a> With this partnership, the first mobile hardware-backed device attestation bridges the consumer and the world of work, allowing people to safely bring their personal devices to work.</p>
<p>&nbsp;</p>
<p>“Samsung is committed to meaningful innovations that are as secure as they are versatile and optimized,” said KC Choi, EVP and Head of Global Mobile B2B Team, MX Business at Samsung Electronics. “As work habits evolve and people are working from virtually anywhere on any device, we are paving the way for the future of enterprise device security and democratizing the means for businesses to better protect their information.”</p>
<p><img class="aligncenter wp-image-3983 size-large" src="https://img.global.news.samsung.com/sg/wp-content/uploads/2023/07/Samsung_MS_B2B-joint_PR_dl2-1024x683.jpg" alt="" width="1024" height="683" srcset="https://img.global.news.samsung.com/sg/wp-content/uploads/2023/07/Samsung_MS_B2B-joint_PR_dl2-1024x683.jpg 1024w, https://img.global.news.samsung.com/sg/wp-content/uploads/2023/07/Samsung_MS_B2B-joint_PR_dl2-845x563.jpg 845w, https://img.global.news.samsung.com/sg/wp-content/uploads/2023/07/Samsung_MS_B2B-joint_PR_dl2-768x512.jpg 768w, https://img.global.news.samsung.com/sg/wp-content/uploads/2023/07/Samsung_MS_B2B-joint_PR_dl2.jpg 1440w" sizes="(max-width: 1024px) 100vw, 1024px" /></p>
<h3></h3>
<h3><strong>Flexibility for Enterprises and End Users</strong></h3>
<p><strong> </strong></p>
<p>For enterprise IT managers, mobile hardware-backed device attestation with Intune provides strong protection for corporate needs without impacting the user experience. With this integration, even highly regulated organizations can adopt a BYOD policy with this additional layer of protection on the Samsung devices widely used by consumers and professionals for work. This increases worker productivity, provides better experiences for users, and simplifies administration.</p>
<p>&nbsp;</p>
<p>This joint Samsung-Microsoft solution works on both managed and unmanaged devices regardless of ownership.<a href="#_ftn5" name="_ftnref5"><sup>[5]</sup></a> Traditional device attestation mainly works on managed devices as it is server-based and requires network connectivity, meaning the entire device has to be enrolled into the corporate system.</p>
<p>&nbsp;</p>
<p>With mobile hardware-backed attestation, enterprises can verify a device’s integrity and allow access to the corporate system whether it is managed or unmanaged. The user experience is also streamlined to enable employees to bring their personal devices to work and safely access the corporate system without extra security steps.</p>
<p>&nbsp;</p>
<p>“Samsung’s industry-leading hardware and software solutions, coupled with the power of the Microsoft Cloud and Intune, uniquely position us to empower defenders with end-to-end capabilities to help stop sophisticated bad actors and improve Zero Trust security posture,” said Michael Wallent, CVP Microsoft Security – Management. “With this partnership, we are committed to continuous innovation that will ensure the most security-minded organizations have the best possible mobile device protection.”</p>
<p><strong> </strong></p>
<p>For further details, please refer to <span><a href="https://aka.ms/KnoxIntuneAttestation">https://aka.ms/KnoxIntuneAttestation</a></span>.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><a href="#_ftnref1" name="_ftn1"><sup>[1]</sup></a> Supported on select Samsung Galaxy smartphones and tablets, including “Security by Knox” devices with Android OS 10 or later. To be eligible, devices must have run Android OS 9 or later at time of launch.</p>
<p><a href="#_ftnref2" name="_ftn2"><sup>[2]</sup></a> &#8220;Improving the Nation&#8217;s Cybersecurity,&#8221; Executive Order No. 14028, 86 Fed. Reg. 26633 (May 17, 2021) <span><a href="https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/">https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/</a></span> and Young, Shalanda D. &#8220;Moving the U.S. Government Toward Zero Trust Cybersecurity Principles,&#8221; White House, Memo No. M-22-09, January 26, 2022 <span><a href="https://www.whitehouse.gov/wp-content/uploads/2022/01/M-22-09.pdf">https://www.whitehouse.gov/wp-content/uploads/2022/01/M-22-09.pdf</a></span></p>
<p><a href="#_ftnref3" name="_ftn3"><sup>[3]</sup></a> Source: <span><a href="https://www.idc.com/getdoc.jsp?containerId=US50467223&amp;pageType=PRINTFRIENDLY#US50467223-S-0002">Worldwide Unified Endpoint Management Software Market Shares, 2022: A Tactical Management Tool Evolves into Strategic Data Platform &#8211; Printer-friendly &#8211; US50467223 (idc.com)</a></span></p>
<p><a href="#_ftnref4" name="_ftn4"><sup>[4]</sup></a> Source: Microsoft earnings release FY22 Q2. <a href="https://www.microsoft.com/en-us/investor/earnings/FY-2022-Q2/press-release-webcast">https://www.microsoft.com/en-us/investor/earnings/FY-2022-Q2/press-release-webcast</a></p>
<p><a href="#_ftnref5" name="_ftn5"><sup>[5]</sup></a> Mobile hardware-backed device attestation, enabled by Samsung Knox hardware and Microsoft Intune app policies, is compatible with both Mobile Device Management (MDM) and Mobile Application Management (MAM) systems, for use on company-owned devices as well as personally-owned devices.</p>
]]></content:encoded>
																				</item>
			</channel>
</rss>