Samsung and Microsoft announce “on-device attestation” for Galaxy smartphones: What is it and what it means for users, and more – Times of India

Samsung and Microsoft have formed a strategic partnership to improve phone security for business customers. This new solution, known as “device attestation,” is designed to verify a device’s identity and health, thus ensuring that it has not been compromised.

According to Samsung, the device attestation is only available on certain Galaxy smartphones and tablets, specifically those that have “Security by Knox” and run on Android 10 or a later version. It is important to note that the devices must have been running Android 9 or a later version at the time of their release to be eligible for this solution.
What it means for users

Samsung Galaxy devices will offer attestation with added protection from Microsoft Intune to increase security and flexibility. This solution is designed for enterprises and provides an additional layer of protection against compromised devices falsely claiming to be secure and gaining access to sensitive corporate data.
“Samsung is committed to meaningful innovations that are as secure as they are versatile and optimised. As work habits evolve and people are working from virtually anywhere on any device, we are paving the way for the future of enterprise device security and democratising the means for businesses to better protect their information,” said KC Choi, EVP and Head of Global Mobile B2B Team, MX Business at Samsung Electronics.
How does “on-device attestation” works on Samsung Galaxy smartphones
As an enterprise IT manager, you can use Intune to ensure the security of your mobile devices without compromising the user experience. By integrating Samsung devices with this technology, even highly regulated organisations can allow employees to use their own devices for work. This increases productivity, improves user experience, and simplifies administration.
This partnership between Samsung and Microsoft works on both managed and unmanaged devices regardless of ownership. Traditional device attestation requires network connectivity and enrollment into the corporate system, making it mainly applicable to managed devices. However, with mobile hardware-backed attestation, enterprises can verify the device’s integrity and provide access to the corporate system, even if it is unmanaged. This streamlined process also allows employees to safely access the corporate system on their personal devices without additional security measures.

function loadGtagEvents(isGoogleCampaignActive) { if (!isGoogleCampaignActive) { return; } var id = document.getElementById('toi-plus-google-campaign'); if (id) { return; } (function(f, b, e, v, n, t, s) { t = b.createElement(e); t.async = !0; t.defer = !0; t.src = v; t.id = 'toi-plus-google-campaign'; s = b.getElementsByTagName(e)[0]; s.parentNode.insertBefore(t, s); })(f, b, e, 'https://www.googletagmanager.com/gtag/js?id=AW-877820074', n, t, s); };

window.TimesApps = window.TimesApps || {}; var TimesApps = window.TimesApps; TimesApps.toiPlusEvents = function(config) { var isConfigAvailable = "toiplus_site_settings" in f && "isFBCampaignActive" in f.toiplus_site_settings && "isGoogleCampaignActive" in f.toiplus_site_settings; var isPrimeUser = window.isPrime; if (isConfigAvailable && !isPrimeUser) { loadGtagEvents(f.toiplus_site_settings.isGoogleCampaignActive); loadFBEvents(f.toiplus_site_settings.isFBCampaignActive); } else { var JarvisUrl="https://jarvis.indiatimes.com/v1/feeds/toi_plus/site_settings/643526e21443833f0c454615?db_env=published"; window.getFromClient(JarvisUrl, function(config){ if (config) { loadGtagEvents(config?.isGoogleCampaignActive); loadFBEvents(config?.isFBCampaignActive); } }) } }; })( window, document, 'script', );

For all the latest Technology News Click Here 

Read original article here

Denial of responsibility! TechAI is an automatic aggregator around the global media. All the content are available free on Internet. We have just arranged it in one platform for educational purpose only. In each content, the hyperlink to the primary source is specified. All trademarks belong to their rightful owners, all materials to their authors. If you are the owner of the content and do not want us to publish your materials on our website, please contact us by email – [email protected]. The content will be deleted within 24 hours.