In recent years, mobile devices have become an increasingly important part of everyday life. Thanks to their versatility and reliability, smartphones will soon be the most important devices carried by people in their daily lives, replacing even the most ubiquitous of items, such as wallets and keys. But with so much personal information stored on electronic devices, mobile security is of paramount importance.

Using Smartphones to Simplify Daily Life

Smartphones are extremely versatile, and they’re becoming more advanced all the time — enticing consumers with the promise of simplification and automation. Many smartphone users, for instance, are leaving their wallets behind, in favor of mobile payment services that offer quick, secure transactions. According to a 2015 study from the Blackhawk Network, 25 percent of smartphone users surveyed already take advantage of mobile wallets on their devices. In addition, mobile commerce as it relates to payments issued via smartphones is growing. According to a 2015 report from Gartner, mobile commerce currently generates 22 percent of total revenue in terms of American digital commerce. By 2017, the total revenue generated by mobile commerce is expected to grow to 50 percent.

In addition to electronic payments, smartphones are set to gradually replace traditional keys. Several automakers already have smartphone apps that allow drivers to lock, unlock and start their vehicles remotely. In addition, smart home locks are already available for purchase from big-box retailers and local hardware stores. These locks install in almost any door, and they can be controlled via a smartphone app. Even most hotels will replace traditional keys or key cards within five to 10 years, according to a 2014 article in USA Today.

In the travel industry, many smartphone owners already use their devices as an alternative to a printed boarding pass, providing much greater convenience. In the future, it’s possible that smartphones could function as an additional factor of authentication for passports.

Securing Smartphones With Samsung KNOX

Despite the obvious benefits of smartphones, mobile security concerns remain the top issue for 55 percent of consumers, according to a 2015 Gallup poll, deterred by fears of losing their phone or having it hacked. This is echoed in research from comScore, which shows that mobile security concerns are one of the top inhibitors that have been holding consumers back from using mobile banking services. This, however, does not have to be the case if consumers investigate secure options.

For instance, Samsung KNOX provides the level of smartphone security that will help to assuage many security concerns that could otherwise hold back more widespread application of mobile devices. With KNOX, user credentials are secured at the hardware level so they cannot be stolen. The same goes for fingerprint biometric data. Fingerprint biometrics are growing in popularity as more smartphone manufacturers are including fingerprint sensors on their devices. According to ABI Research, shipments of fingerprint sensors for smartphones will reach 1 billion by 2020, which is a cumulative average annual growth rate of 17 percent.

The high levels of security built into Samsung KNOX vastly reduce the chance that hackers could install malware onto a device to access the user’s credentials. KNOX provides a hardened platform with security built throughout the stack, from the hardware layer to the applications via a Secure Boot/Trusted Boot and TrustZone Integrity Measurement Architecture, which keeps the device safe from hackers, viruses and unauthorized access.

With security options like Samsung KNOX, consumers should feel more inclined to take advantage of the convenience offered by mobile devices, which will spur their use in a wider variety of situations. Soon, carrying bulky wallets and large key fobs just might be a thing of the past.

Posts By

Fran Howarth

Fran Howarth is an industry analyst specializing in security. She has worked within the security technology sector for over 25 years as an analyst, consultant and writer. Fran focuses on the business needs for security technologies, with a focus on emerging technology sectors. Current areas of focus include mobile security, cloud security, information governance and data security, identity and access management, network and endpoint security, security intelligence and analytics, and security governance and regulations. Follow Fran on Twitter: @FranNL

View more posts by Fran Howarth