Samsung protects every aspect of your life to guarantee your safety and comfort with our powerful security solutions.
Samsung’s purpose is not just to make better performing products, but to change the everyday lives of users and help them to live a better life thanks to our products, services, and technologies. This is the value that Samsung considers most important, with security solutions that care for users first.
The more involved we become with digital devices, the more personal information is stored in these devices—from phone numbers to personally identifiable information (PII), bank accounts and credit card numbers, and biometric information recorded on a daily basis. In today’s world, all of the information representing your identity as an individual is recorded and stored in digital devices.
Samsung is committed to delivering reliable security solutions in various user environments based on our leading technologies. We think one step ahead of changes, and protect users with our array of safeguards from end to end. Samsung’s security solutions ensure speed and accuracy, and preemptively block all risk factors.
As the digitation of everyday life continues to expand, digital security and privacy confront the growing challenges. Accordingly, we are giving our best efforts to developing technologies to solve today’s security issues, while at the same time preparing for the future. We are making a difference for a better life, not just by researching and developing technologies, but also with consideration for ethics of technology, human rights, and social ideals.
Adaptive security
To ensure that users can enjoy their digital environment with their minds at ease, Samsung builds a security system that considers the entire usage process. We cover all products and systems—from manufacturing to end use—and provide solutions tailored to users. Samsung realizes the values of security based on the following four principles:
-
Prevention &
hardening -
Detection
-
Response
-
Prediction
Prevention & Hardening
We configure our security system under strict standards
With the growing number of online services, the importance of information stored in devices is also rising. As such, methods of stealing data are becoming more sophisticated and diversified. To counteract these advances, Samsung has added hardware chipsets created with our original technology to mobile devices to prepare in case of any physical hacking. We have built our own security system—from manufacturing to end use—providing a security processor dedicated to handling sensitive data.
Detection
We do not miss a single moment
Hacking and information leakage take place in a split second. That is why we closely monitor events in digital devices and networks to detect any malicious intrusion and set up an instantaneous defense system. Furthermore, we detect and preemptively block any risks in everyday life such as malware apps or phishing in order to keep user data safe and secure.
Response
We respond quickly and accurately
Samsung strives to respond quickly to any problem and minimize damage from such problems. We collect environments where users have discovered security issues and analyze various hacking attempts using our security control system until solutions are developed. We provide security patches through detection by our in-house security experts and provide our latest security solutions for application by users.
Prediction
We stay a step ahead in preparing for the future
Because it is necessary to stay prepared in responding to evolving risk factors, we validate our solutions with regular vulnerability assessments. To reinforce and prepare for an expanding scope of security, we combine our globally recognized mobile security expertise with big data analytics and artificial intelligence (AI) for enhanced security solutions.
Security development life cycle
-
01
Planning
Security requirements
identificationRequirements specification
-
02
Design
Threat modeling
Security design and review
Set up security controls
-
03
Implementation
Secure coding
Development security
guideCode security diagnosis
Improvement
-
04
Verification
Vulnerability diagnosis
Mock test
-
05
Operatin and
maintenanceMonitoring
Security Patch
Threat Analytics Platform
Threat analytics platform
-
Forums
-
Devices
Bug
bounty
-
SNS,
Blogs
-
Code
Repositories
-
Threat
feeds
-
Private
sharing
- ㆍUp-to-date threat situation awareness
- ㆍOn-going attack awareness
- ㆍPredicting potential threat
Threat analytics platform
-
Forums
-
Devices Bug
bounty -
SNS,
Blogs -
Code
Repositories -
Threat
feeds -
Private
sharing
- ㆍUp-to-date threat situation awareness
- ㆍOn-going attack awareness
- ㆍPredicting potential threat
The basic principles of Knox security platforms
-
Hardware
root-of-trust
-
Validated
cryptography
-
Protected
communication
-
Hardware backed
security
-
Authentication
-
Disable
backdoors
-
Protected
storage
-
Secure firmware
update
-
Device integrity
protection and
detection
Hardware
root-of-trust
Validated
cryptography
Protected
communication
Hardware backed
security
Authentication
Disable
backdoors
Protected
storage
Secure firmware
update
Device integrity
protection and
detection