Feeds

Not so fast, BlackBerry. Now Samsung wants your tasty biz mobe pie

KNOX Android: Business at the front, party in the back

Choosing a cloud hosting partner with confidence

MWC 2013 Samsung is touting a new package called KNOX that attempts to split an Android device in two separate halves, one for business and the other for personal use.

Fresh from tussling with Apple for global smartphone supremacy, the South Koreans are now ready to tear into BlackBerry and invade its home turf of enterprise users.

Announced at MWC and available on forthcoming handsets, KNOX creates a container on an Android handset with its own calendar, email, web browser and applications, entirely separated and protected from the user's own personal data. The corporate container is under control of the enterprise's sysadmins, allowing employees to take their handsets to work and use them in confidence as long as they all come from Samsung.

KNOX needs additional hardware to provide proper separation and encryption, so it's not going to work on just any Android phone but it will work on forthcoming Galaxy devices. So that's the brand companies will be able to recommend to employees who want to subsidise the corporate IT budget by providing their own hardware.

The system is part of SAFE - Samsung For Enterprise - which is itself a component of the company's ongoing campaign to ensure there's no part of the mobile world without a Samsung logo on it.

While the containers used by KNOX are based on the "Security Enhanced" spin of Android, developed by the US National Security Agency, much of the usability comes from Centrify, which has provided single-sign-on and device management tech for a while. Centrify integrates with Microsoft's Active Directory, and Samsung's KNOX platform incorporates the single-sign-on API from Centrify.

Apps developers just need to get approval from Samsung and the enterprise that decides to deploy their software in order to run in KNOX containers; Centrify's API smooths the user experience.

Samsung has made no secret of its intention to dominate mobile, and if KNOX works as advertised it replicates the killer feature of BlackBerry's new Balance platform, which also juggles work and personal data on the same handset. Balance is slightly more elegant - it knows that business and life appointments shouldn't clash for example - but that's a very small thing to stand against Samsung's might.

KNOX also pushes the Galaxy brand again, one which now rivals Android as an iPhone alternative, and looks likely to become the BlackBerry alternative, too. ®

Providing a secure and efficient Helpdesk

More from The Register

next story
Sea-Me-We 5 construction starts
New sub cable to go live 2016
Crouching tiger, FAST ASLEEP dragon: Smugglers can't shift iPhone 6s
China's grey market reports 'sluggish' sales of Apple mobe
EE coughs to BROKEN data usage metrics BLUNDER that short-changes customers
Carrier apologises for 'inflated' measurements cockup
Comcast: Help, help, FCC. Netflix and pals are EXTORTIONISTS
The others guys are being mean so therefore ... monopoly all good, yeah?
Surprise: if you work from home you need the Internet
Buffer-rage sends Aussies out to experience road rage
EE buys 58 Phones 4u stores for £2.5m after picking over carcass
Operator says it will safeguard 359 jobs, plans lick of paint
MOST iPhone strokers SPURN iOS 8: iOS 7 'un-updatening' in 5...4...
Guess they don't like our battery-draining update?
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.