Microsoft has teamed up with Samsung Electronics to develop a hardware-based device authentication solution for companies, with which they hope to help guarantee the identity of these organizations’ corporate terminals.

The technology company has commented that it is a tool that also works on workers’ personal terminals and that it is available on Samsung Galaxy series mobiles, including Security by Knox devices.

New is that it is combined with the protection of Microsoft Intune, a cloud-based management platform that brings together security management tools and endpoints to simplify IT workloads, adding greater security and flexibility.

In this way, Samsung and Microsoft have created a solution that offers an additional layer of protection, preventing access to sensitive corporate data. In this way, organizations will be able to allow employees to take their own computers to work knowing that they come “with the same level of security as the company,” as they have commented.

The South Korean company believes that being able to bring your personal devices to work translates into increased productivity for workers, providing better user experiences and simplifying administration.

Until now, traditional authentication works on company-managed devices, since it is server-based and requires network connectivity, so the phone or tablet must be registered with the corporate system.

On the contrary, with mobile hardware-based authentication, companies will be able to verify the integrity of a device and allow it to access the corporate system whether or not it is being handled by the company.

With this union, it seeks to offer the Zero Trust approach, which is a security model that is based on three principles: always assume non-compliance, verify explicitly and provide access with less privileges.

The South Korean manufacturer has recalled that the implementation of Zero Trust has become an obligation for technology industries and public sector clients, which requires a new approach to apply end-to-end security from applications to the network and the own device.

Leave a comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Trending

Design a site like this with WordPress.com
Get started