Feeds

Not so fast, BlackBerry. Now Samsung wants your tasty biz mobe pie

KNOX Android: Business at the front, party in the back

The essential guide to IT transformation

MWC 2013 Samsung is touting a new package called KNOX that attempts to split an Android device in two separate halves, one for business and the other for personal use.

Fresh from tussling with Apple for global smartphone supremacy, the South Koreans are now ready to tear into BlackBerry and invade its home turf of enterprise users.

Announced at MWC and available on forthcoming handsets, KNOX creates a container on an Android handset with its own calendar, email, web browser and applications, entirely separated and protected from the user's own personal data. The corporate container is under control of the enterprise's sysadmins, allowing employees to take their handsets to work and use them in confidence as long as they all come from Samsung.

KNOX needs additional hardware to provide proper separation and encryption, so it's not going to work on just any Android phone but it will work on forthcoming Galaxy devices. So that's the brand companies will be able to recommend to employees who want to subsidise the corporate IT budget by providing their own hardware.

The system is part of SAFE - Samsung For Enterprise - which is itself a component of the company's ongoing campaign to ensure there's no part of the mobile world without a Samsung logo on it.

While the containers used by KNOX are based on the "Security Enhanced" spin of Android, developed by the US National Security Agency, much of the usability comes from Centrify, which has provided single-sign-on and device management tech for a while. Centrify integrates with Microsoft's Active Directory, and Samsung's KNOX platform incorporates the single-sign-on API from Centrify.

Apps developers just need to get approval from Samsung and the enterprise that decides to deploy their software in order to run in KNOX containers; Centrify's API smooths the user experience.

Samsung has made no secret of its intention to dominate mobile, and if KNOX works as advertised it replicates the killer feature of BlackBerry's new Balance platform, which also juggles work and personal data on the same handset. Balance is slightly more elegant - it knows that business and life appointments shouldn't clash for example - but that's a very small thing to stand against Samsung's might.

KNOX also pushes the Galaxy brand again, one which now rivals Android as an iPhone alternative, and looks likely to become the BlackBerry alternative, too. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
6 Obvious Reasons Why Facebook Will Ban This Article (Thank God)
Clampdown on clickbait ... and El Reg is OK with this
So, Apple won't sell cheap kit? Prepare the iOS garden wall WRECKING BALL
It can throw the low cost race if it looks to the cloud
EE fails to apologise for HUGE T-Mobile outage that hit Brits on Friday
Customer: 'Please change your name to occasionally somewhere'
Time Warner Cable customers SQUEAL as US network goes offline
A rude awakening: North Americans greeted with outage drama
We need less U.S. in our WWW – Euro digital chief Steelie Neelie
EC moves to shift status quo at Internet Governance Forum
BT customers face broadband and landline price hikes
Poor punters won't be affected, telecoms giant claims
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.