Feeds

GCHQ grants security clearance to Samsung's Knox mobe security

Galaxies all round for pen-pushers... 007 will have to stick with Q's kit

Internet Security Threat Report 2014

The official containerisation solution for security on Samsung phones and tablets has passed muster with GCHQ. It’s now deemed safe enough for UK government employees to get a Galaxy Note 3, Galaxy S3 S4 or Galaxy S5 all of which run the Korean firm's KNOX software.

This is only to the OFFICIAL (PDF) level of security.

This is akin to a standard business. The typical threat profile for the OFFICIAL classification is broadly similar to that faced by a large UK private company with valuable information and services. It anticipates the need to defend UK government data or services against compromise by attackers with an average of capability and resource, such as hacktivists, single-issue pressure groups, investigative journalists, competent individual hackers and the majority of criminal individuals and groups.

It’s not considered safe against offensive cyber attacks from well-funded organised crime or foreign agencies or governments.

For SECRET levels of security, there is an approved solution which uses a special version of BlackBerry phones which show a red border in secure mode and ancient Motorola phones with Sectéra hardware encryption modules for voice. General Dynamics, which makes Sectéra, has Android solutions, but they have not been approved.

While Knox has been around for a while, it has taken until now for it to win UK government approval. This is the original version of Knox, not version 2.0 – which has been announced but is not yet shipping.

It’s worth noting that Windows Phone 8 has not passed the testing requirements.

One of the nice things about Knox is that the user can do social and domestic stuff, such as Facebook and Instagram, outside of the Knox container and revert to the secure area for their government work.

Graham Long, vice president of the Samsung UK & Ireland enterprise business team said: “Mobile device data security is a major focus for Samsung, and our KNOX technology provides a comprehensive solution for businesses and the public sector. We are pleased that our KNOX enabled devices have been cleared for use by the UK Government, and are confident given the period of intensive testing that the robust capabilities of KNOX act as a credible security solution for government agencies.

Our technology is widely used in both the UK public and private sector, and with this approval we are committed to working more closely with government departments and agencies that need to maintain high levels of security and data confidentiality on their mobile devices.”

The devices very important governmental types can now buy include the Galaxy Note 3, Galaxy S III, Galaxy S4 and the Galaxy S5.

Gaining OFFICIAL status might not be the James Bond SECRET or TOP SECRET level which would make for exciting headlines but in reality there are very many more government employees which have a daily requirement for the lowest level of security and not that many with the DV clearance of the top level. Anyone with a real concern about security is best off not using a smartphone at all. ®

Beginner's guide to SSL certificates

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.