
Customizing Tablets for Dedicated Business Use
Business use cases in many industries require customized tablets to create the ideal user experience. Fortunately, Samsung Knox Configure makes device customization simple and easy.
Get the latest insights from Samsung delivered right to your inbox.
Follow Us
Get the latest insights from Samsung delivered right to your inbox.
Business use cases in many industries require customized tablets to create the ideal user experience. Fortunately, Samsung Knox Configure makes device customization simple and easy.
Mobile management and security are top concerns for enterprise IT — but with Knox, your data is well protected.
IT managers diving into MDM for the first time can find it overwhelming. Start with these five first steps to get going fast.
Samsung Secure Folder keeps your personal apps and data separate from work on your smartphone.
Malware is getting smarter. Every computing device needs that last line of defense, especially your smartphone.
In this News Insight, WIRED Magazine offers some quick tips to step up your mobile security and reduce your risk of attack.
Mobile malware, device loss and theft, cryptocurrencies and wireless top the list of prominent mobile security threats.
A mobile phone number stolen through a SIM port attack can lead to a costly security breach.
Enterprises should take shadow IT projects seriously — and build IT architectures that reduce risks of shadow IT security failure.
Download this white paper for a comprehensive, step-by-step guide to planning and deploying a CYOD initiative at your company.
Business use cases in many industries require customized tablets to create the ideal user experience. Fortunately, Samsung Knox Configure makes device customization simple and easy.
Looking for a way to simplify mobile phone security? Samsung Pass makes it quick and simple to protect your data.
Loading apps from untrusted and unverified app stores introduces risks that enterprise IT managers should avoid.
Libraries and APIs attached to even official applications can be a conduit for security problems. Here's how to cover your tracks.
Discover how you can bolster your mobile security from solution implementation to endpoint management in this one-hour webinar.
Learn how to expect the unexpected, and to develop policies and a strategy to proactively prepare for a data breach.
Samsung's executives discuss the need for enhanced security on 5G networks, from automation to consolidated intelligence.
Samsung Knox Configure's cloud-based portal speeds and secures Android device configuration for healthcare.
Malware is getting smarter. Every computing device needs that last line of defense, especially your smartphone.