Samsung Knox protects your devices and apps with our extensive security principles and deep partnerships.
We work relentlessly to ensure that you can trust Samsung Knox for the protection of your data.
Samsung Knox Security Principles
Trust from the hardware up
We build our Chain of Trust from tamper-resistant technology Root of Trust (RoT).
Our Root of Trust is deeply embedded in our chips and not exposed to the outside world while accessible only to a limited set of applications.
We ensure our primary software functions are not tampered with while offering end-to-end personal data protection.
Our hardware-backed security features allow our customers to feel safe and maintain peace of mind.
Provide a safe execution environment for security-sensitive software
We provide security hardware dedicated to processing sensitive and confidential data while protecting against malware attacks.
Protected Video Playback, User authentication, and Payment Applications run in our safe execution environment. For User Authentication Apps, our safe execution environment blocks unauthorized access to sensitive biometric information. For Payment Apps, our safe execution environment ensures the secure handling of payment transactions.
Keep sensitive data in fully isolated secure storage
Highly sensitive data such as biometrics, PIN values, or PII are stored in fully isolated secure storage that is robust towards data leakage threats.
Our Knox Vault Processor is separated from the primary processor and is resistant to side-channel attacks and physical tampering.
Adopt proven cryptography technologies
We adopt proven cryptographic algorithms and technology to offer data protection solutions.
Samsung's products and services use internationally recognized and standardized cryptographic technologies. We ensure the implementation of these cryptographic technologies through certifications such as the Federal Information Processing Standard (FIPS). Customers’ data is safely stored in encrypted form. Such data protection mechanisms are also applied to data-at-rest and data-in-transit.
Apply robust user authentication technologies
We apply robust authentication technologies that qualify only designated users to access our devices and services.
A broad range of user authentication technologies such as PIN, pattern, password, fingerprint, and iris recognition are used in combination to offer robust user authentication. In addition, Samsung Account can be used to control access to internet services, and our multi-authentication may be applied to allow only designated users to access and use devices, services, and data.
Proactively prevent tampering of code and data
Highly sensitive data such as biometrics, PIN values, or PII are stored in fully isolated secure storage that is robust towards data leakage threats.
Our fully isolated secure storage is also resistant to physical attacks.
Apply the latest security updates
We apply the latest security updates and patches to combat attacks from the ever-changing malware and hacking landscape.
Samsung products provide security updates through a variety of channels. We offer online Over-the-Network updates as well as periodic and urgent security updates to broadly and swiftly address vulnerabilities.
Follow a strict security development process
From concept to end of life, we follow a strict security development process that covers the entire lifespan of our products and customer experience.
Our security policies extend to classifying, handling, and processing how we protect personal data and other forms of confidential data. We go through rigorous security design reviews that consider all types of attack vectors. We constantly monitor the threat landscape for emerging threats over our devices and services.
Offer comprehensive security
with certified Knox security platform
Samsung’s Knox security platform is the foundation for protection in a personal device, enterprise business solution, and service.
The Knox security platform consists of multiple layers of defense and security mechanisms that protect data from malicious software and threats. The Knox security platform is proven and certified by numerous government agencies, security certification bodies, and third-party security vendors.
From the moment the customer powers on the device, the Knox security platform protects the device and services.
Knox security technology deeply embedded in our products
Samsung Knox provides a digital environment where customers can safely use our products and services.
「Secured by Knox」device protection
We maintain the highest level of security and assurance
Samsung works closely with security research communities around the world in pursuit of comprehensive security.
We receive security bugs and vulnerabilities from various channels, including e-mail and report site. We swiftly remediate threats and vulnerabilities.
We also operate Bug Bounty Program, which rewards the security communities for finding and reporting security vulnerabilities.