The beginner’s guide to MDM

Learn how to protect and manage your mobile devices with this step-by-step guide covering everything from planning groups and creating policies, to reporting.

Download Now
video Device Management

Knox Customization: Overcoming the Shortcomings of Mobile Device Management Solutions

A recent Total Economic Impact™ (TEI) study1, commissioned from Forrester Consulting, shows the benefits that an energy and utilities provider customer has seen from using the Knox Customization service for its Samsung device over the course of a year.

In the past, mobile device management solutions had several shortcomings when used in isolation, including the inability to fully control how devices were being used, leading to security and safety issues in risky field environments. When using mobile device management solutions alone, it was time-consuming to manually customize devices to its requirements.

Using Knox Customization, the process was streamlined considerably. IT administration costs were reduced, and manual device reconfiguration was significantly decreased. Forrester found that it achieved a 164 percent payback through using the Knox Customization solution over a three-year period.

Other benefits included an improved employee experience by providing them access to just the apps that they really need. Productivity and security were also improved considerably through uniform device settings and ensuring that there were no rogue apps installed.

See how Knox Customization helps businesses manage their devices, saving them time and money in the video above.


1The Total Economic Impact™ Of Knox Customization For Samsung Devices, a February 2017 commissioned study conducted by Forrester Consulting on behalf of Samsung

Posts By

Fran Howarth

Fran Howarth is an industry analyst specializing in security. She has worked within the security technology sector for over 25 years as an analyst, consultant and writer. Fran focuses on the business needs for security technologies, with a focus on emerging technology sectors. Current areas of focus include mobile security, cloud security, information governance and data security, identity and access management, network and endpoint security, security intelligence and analytics, and security governance and regulations. Follow Fran on Twitter: @FranNL

View more posts by Fran Howarth