Microsoft and Samsung team up to boost work phone security

31.08.23 Mark Swift

You’ve checked your pockets, your bag, under cushions… and then it hits you. You left your work phone on the table at the coffee shop.

You panic.

It’s not the device itself that’s got you worried, but all the sensitive business information stored on it. If that mobile ends up in the wrong hands, you’re facing a nightmare.

But that worry could be over. Microsoft and Samsung are joining forces to make your work phones safer. This month, they’re launching a groundbreaking solution to help protect anyone who uses a Samsung Galaxy device in the workplace.

How?

With something called on-device attestation. It lets companies see if mobile devices have been compromised, even at their deepest components. Think of it as a security guard for your phone.

Samsung brings its software and hardware innovations to the table, whilst Microsoft provides its endpoint management expertise.

And whilst other device attestation tools require a network connection and access to cloud services, this solution works reliably regardless of network connectivity or device ownership model.

This solution will be released alongside Microsoft Intune (previously known as Windows Intune), a unified endpoint management service for both corporate devices and BYOD (Bring Your Own Device). And it will be available to select Samsung Galaxy smartphones and tablets, especially those “Secured by Knox”.

So, whether you’re working from the office, a busy coffee shop, or a remote cabin in the woods, you can rest assured your device is safe.

In business, your phone is more than just a communication device. It’s a vault of sensitive (and valuable) information. And with Microsoft and Samsung on the case, that vault just got a lot safer.

If we can help you keep any of your devices more secure, get in touch.

How can AAG help?

This field is for validation purposes and should be left unchanged.

Related insights

Browse more articles from our experts and discover how to make better use of IT in your business.

Video Guides

And the award for the most common phishing scam goes to…

13.03.24

Which phishing scam are you and your employees most at risk from? We tell you about the most common phishing emails and the easy way to stay safe. Read More

Video Guides
Before you replace your slow PCs…

Before you replace your slow PCs…

29.02.24

Windows PCs running slowly? It doesn’t necessarily mean it’s time to replace them. There are some other ways you can give things a boost. We’ll tell you how. Read More

Video Guides
Which ransomware payment option is best? (Hint: none)

Which ransomware payment option is best? (Hint: none)

22.02.24

Cyber criminals are giving you more options when it comes to paying your way out of a ransomware attack. Our advice remains the same though. Find out what that advice is here. Read More