By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Digital TrustDigital TrustDigital Trust
  • Cybersecurity
    • Incident response and recovery
    • Network security
    • Phishing attacks and social engineering
    • Malware and viruses
    • Cloud security
  • Emerging Tech
    • Quantum computing
    • Artificial intelligence and machine learning
    • Blockchain technology
    • Internet of Things (IoT)
    • Augmented and virtual reality
  • Data privacy
    • GDPR compliance
    • Data protection laws and regulations
    • Data breaches and cyber attacks
    • Privacy policies and terms of service
    • User consent and data sharing
  • Business
    • Cyber insurance
    • Cybersecurity budgeting
    • Risk management and assessment
    • Digital trust and brand reputation
    • Investment and funding in cybersecurity companies
  • Compliance
    • PCI DSS compliance
    • HIPAA compliance
    • GDPR compliance
    • CCPA compliance
    • Cybersecurity laws and regulations
  • Research Center
Reading: Samsung and Microsoft Partner for Industry First On-Device Attestation Solution
Share
Notification Show More
Font ResizerAa
Digital TrustDigital Trust
Font ResizerAa
  • Cybersecurity
    • Incident response and recovery
    • Network security
    • Phishing attacks and social engineering
    • Malware and viruses
    • Cloud security
  • Emerging Tech
    • Quantum computing
    • Artificial intelligence and machine learning
    • Blockchain technology
    • Internet of Things (IoT)
    • Augmented and virtual reality
  • Data privacy
    • GDPR compliance
    • Data protection laws and regulations
    • Data breaches and cyber attacks
    • Privacy policies and terms of service
    • User consent and data sharing
  • Business
    • Cyber insurance
    • Cybersecurity budgeting
    • Risk management and assessment
    • Digital trust and brand reputation
    • Investment and funding in cybersecurity companies
  • Compliance
    • PCI DSS compliance
    • HIPAA compliance
    • GDPR compliance
    • CCPA compliance
    • Cybersecurity laws and regulations
  • Research Center
Follow US
© 2024 Digital Trust, a Talk About Tech brand. All rights Reserved.
Digital Trust > Cybersecurity > Zero Trust Architecture > Samsung and Microsoft Partner for Industry First On-Device Attestation Solution
Zero Trust Architecture

Samsung and Microsoft Partner for Industry First On-Device Attestation Solution

Conal Cram
Last updated: July 28, 2023 12:51 pm
Conal Cram 2 years ago
Share
Samsung and Microsoft Partnership
SHARE

Pioneering Mobile Device Security: Samsung and Microsoft

In a transformative development for enterprise mobile device security, Samsung and Microsoft has unveiled a partnership, boasting an industry first on-device, mobile hardware-backed device attestation solution. This strategic collaboration brings together two global technology giants in an effort to increase security and flexibility for both business-owned and personal mobile devices.

Contents
Pioneering Mobile Device Security: Samsung and MicrosoftThe Importance of Device AttestationThe Impact of the Samsung and Microsoft PartnershipThe Benefits for Enterprises and End UsersSamsung and Microsoft Prepare for a Future of Zero Trust.

This revolutionary approach in device security ensures that devices are not compromised and verifies their identity and health. Samsung Galaxy devices, bolstered with Microsoft Intune protection, now provide an extra layer of security. This innovation offers a reassurance for enterprises, thwarting compromised devices from gaining access to sensitive data.

The Importance of Device Attestation

Device attestation is a critical aspect of the Zero Trust security model, a framework that assumes breach, verifies explicitly, and provides least privilege access. Given the changing work habits, evolving cyber threats, and increasing demands from regulated industries, device attestation has become increasingly essential.

The Samsung Microsoft partnership aims to facilitate the implementation of Zero Trust, enforcing end-to-end security, from apps to the network and the device itself, regardless of device ownership and enrollment. According to KC Choi, EVP and Head of Global Mobile B2B Team, MX Business at Samsung Electronics, this partnership “is paving the way for the future of enterprise device security and democratizing the means for businesses to better protect their information.”

The Impact of the Samsung and Microsoft Partnership

Samsung’s global leadership in smartphone manufacturing and the success of its Knox security platform, which is relied upon by over 30,000 businesses in 110 markets, is complemented by Microsoft’s industry-leading position in unified endpoint management software. This potent combination of two industry giants leads to the creation of the first mobile hardware-backed device attestation bridging the consumer and work world.

The Benefits for Enterprises and End Users

The joint Samsung-Microsoft solution allows enterprises to verify a device’s integrity and allow access to the corporate system, irrespective of the device’s managed or unmanaged status. According to Michael Wallent, CVP Microsoft Security — Management, “With this partnership, we are committed to continuous innovation that will ensure the most security-minded organizations have the best possible mobile device protection.”

This innovation is not only a game-changer for IT managers in regulated organizations, who can now adopt a BYOD policy with additional protection, but also for users. This solution provides better user experiences, increases worker productivity, and simplifies administration.

Samsung and Microsoft Prepare for a Future of Zero Trust.

The Samsung Microsoft partnership signals an exciting shift in mobile device security, offering robust solutions for today’s complex enterprise landscape. Their revolutionary on-device attestation solution is not only a breakthrough for businesses but also an enabler for employees to bring their personal devices to work safely and securely.

We’d love to hear your thoughts on this pioneering development in mobile security. How do you think this will change the landscape of BYOD policies and overall enterprise security? Please share your thoughts in the comments below.

You Might Also Like

Unlocking Zero Trust Security with SymOps Dynamic Authorization Platform

New GPU Attack in Browsers: A Security Wake-Up Call

How Sanaz Yashar Fled Iran, Became an Israeli Spy and Paved Her Way to Becoming a Cybersecurity Leader

Oracle and Industry Leaders Unveil New Open Standard for Enhanced Network and Data Security

XONA Raises $18M to Enhance Zero-Trust User Access in Industrial Cybersecurity

Share This Article
Facebook Twitter Email Print
By Conal Cram
Follow:
Conal is a seasoned tech industry professional and content writer for numerous tech publications. With a strong background in software engineering and digital media development, he's passionate about sharing the latest updates and insights in the tech industry, particularly in artificial intelligence and other disruptive trends. In his spare time he loves a mezze platter and a good film, and if he's not playing Fortnite or spending time with his daughter you can assume he's at the dry slopes!
Previous Article MobiMed MobiMed Software Incident: A Deep Dive into the Cyber Attack Disrupting NHS Ambulance Services
Next Article Cisco Acquires CodeBGP to Enhance BGP Monitoring Cisco Acquires CodeBGP to Enhance BGP Monitoring
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts

HP Wolf Security Report Reveals Rise of Malware ‘Meal Kits’

HP Wolf Security Report Reveals Rise of Malware ‘Meal Kits’ Threatening Businesses

By Conal Cram 4 Min Read
Charlotte AI

Future of Cybersecurity: CrowdStrike Unveils Charlotte AI

By Conal Cram 4 Min Read
DNS: A Cornerstone of Digital Cybersecurity

The essential role of DNS in Today’s Cybersecurity Footprint

By Conal Cram 4 Min Read

Accelerating Digital Transformation: SUSE Cracks The Code

By Sam Taylor 4 Min Read

From our research center

KnowBe4 Africa (Pty) Ltd

10 Questions Every CISO Should Ask About AI-Powered Human Risk Management Tools

AI is transforming security awareness—but how much is marketing hype versus genuine value for your organisation? Human risk management (HRM) and security awareness vendors of...

Read content
about us

Our dedicated team of experts and journalists brings in-depth analysis, breaking news, and comprehensive reports from around the globe.

Useful links

  • About us
  • Contact us
  • Research Center
  • Disclaimer
  • Terms & Conditions
  • Privacy

Trending topics

  • Cybersecurity
  • Emerging technologies
  • Data privacy
  • Regulations and compliance
  • Digital trust and brand reputation

Find Us on Socials

© 2024 Digital Trust, a Talk About Tech brand. All rights Reserved.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?