Samsung Knox is securely built to protect the chipset, OS, and app against hacking attempts and unauthorized access. Saved user data are protected real-time while the devices are booted and used.
Our Root of Trust is deeply embedded in our chips and not exposed to the outside world while accessible only to a limited set of applications. We ensure our primary software functions are not tampered with while offering end-to-end personal data protection. Our hardware-backed security features allow our customers to feel safe and maintain peace of mind.
Protected Video Playback, User authentication, and Payment Applications run in our safe execution environment. For User Authentication Apps, our safe execution environment blocks unauthorized access to sensitive biometric information. For Payment Apps, our safe execution environment ensures the secure handling of payment transactions.
Our fully isolated secure storage is also resistant to physical attacks.
Samsung's products and services use internationally recognized and standardized cryptographic technologies. We ensure the implementation of these cryptographic technologies through certifications such as the Federal Information Processing Standard(FIPS). Customers’ data is safely stored in encrypted form. Such data protection mechanisms are also applied to data-at-rest and data-in-transit.
A broad range of user authentication technologies such as PIN, pattern, password, fingerprint, and iris recognition are used in combination to offer robust user authentication. In addition, Samsung Account can be used to control access to internet services, and our multi-authentication may be applied to allow only designated users to access and use devices, services, and data.
We proactively build mechanisms that notify and alert users of these activities to prevent any potential threats to users. We detect and prevent tampering attempts launched on our products to ensure that each and every product remains safe and sound. We verify the integrity of the executed software at boot-up time using secure boot. Our software verification technology carries over to software updates preventing non-verified installation of software updates. Our real-time protection technology provides always-on protection over run-time software and sensitive data.
Samsung products provide security updates through a variety of channels. We offer online Over-the-Network updates as well as periodic and urgent security updates to broadly and swiftly address vulnerabilities.
Our security policies extend to classifying, handling, and processing how we protect personal data and other forms of confidential data. We implement rigorous security design reviews that consider all types of attack vectors. We constantly monitor the threat landscape for emerging threats over our devices and services.
Samsung Knox provides global customers with advanced, targeted security solutions that are accredited by different governments and meet the strict requirements of corporations around the world.