Skip to the main content.

1 min read

Zones teams with Samsung to market KNOX mobile security platform

Zones and Samsung delivering secure solutions for the mobile enterprise workforce

On February 10, Zones announced its authorization as a Platinum Reseller of the Samsung KNOX security platform for the Samsung Galaxy line of mobile devices.

Samsung KNOX is a multi-layered security technology that provides leading device security, data and application protection technology to enable a secure and productive workspace for mobile professionals. Since its introduction in September 2013, the KNOX platform has found wide acceptance around the world.

As a Platinum Reseller, Zones is now authorized to provide the KNOX platform to organizations across a broad array of industries that rely on mobile devices in their corporate IT infrastructures.

Explaining the customer value of the partnership, Greg Parsonson, Zones vice president of partner and product marketing said, “Whether they are on a laptop, tablet or any other mobile device, security is of paramount importance to all users. Samsung KNOX offers a secure platform on which our customers can rely, extending and securing their enterprise and mobile infrastructures. We are proud to offer Samsung KNOX to our customers.”

Key features of Samsung KNOX:

  • Multi-layered security built from the hardware up: KNOX offers a comprehensive set of defense-grade security features including rooting prevention and detection, real-time kernel protection, remote attestation, ARM TrustZone-based key store and certificate management and generalized VPN support including SSL and IPSec, On-Device Encryption and SE for Android and two-factor biometric authentication.
  • Government certifications: KNOX has a growing list of demonstrated compliance certifications within the highly-regulated government and defense markets worldwide. No other android device can claim this level of acceptance. These certifications include MDFPP Common Criteria (NIAP), FIPS 104-2 Level 1 (NIST), STIG (DISA), UK EUD Security Guidance (CESG) and Finnish Security Auditing Criteria (FICORA).
  • Separation of work and play with a hardware root of trust: KNOX provides a completely secure area on the device for work usage separate from the personal area of the device. The security properties of data and application protection of KNOX stem from a hardware layer root of trust built in during the device manufacturing process.
  • Secure applications within the KNOX workspace: While all Android applications run in the KNOX workspace, KNOX allows custom designed applications to take advantage of TrustZone-based security features for applications to effortlessly leverage features like Trusted User Interface and biometric authentication.

 

How Does Migrating to Microsoft SharePoint Catalyze Growth for SMBs

How Does Migrating to Microsoft SharePoint Catalyze Growth for SMBs

Data migration is crucial for SMBs to efficiently manage and analyze large volumes of data. Enabling a seamless shift during platform upgrades or...

Read More
ITAD – Facing Challenges and Discovering Opportunities for the Mid-Market

ITAD – Facing Challenges and Discovering Opportunities for the Mid-Market

As mid-market businesses work to stay competitive, they face challenges when disposing of old IT equipment. This process, known as IT Asset...

Read More
The 15-Inch MacBook Air 2023: A Masterpiece of Innovation

The 15-Inch MacBook Air 2023: A Masterpiece of Innovation

The 15-inch MacBook Air is a pinnacle of tech innovation, offering a stunning Liquid Retina display for immersive visuals, powerful performance with...

Read More