{"id":2353,"date":"2025-11-05T11:55:00","date_gmt":"2025-11-05T11:55:00","guid":{"rendered":"https:\/\/infosec-daily.com\/?page_id=2353"},"modified":"2025-11-05T11:55:00","modified_gmt":"2025-11-05T11:55:00","slug":"securing-the-open-android-ecosystem-with-samsung-knox","status":"publish","type":"page","link":"https:\/\/infosec-daily.com\/?page_id=2353","title":{"rendered":"Securing the Open Android Ecosystem with Samsung Knox"},"content":{"rendered":"<p>Raise your hand if you\u2019ve heard the myth, \u201cAndroid isn\u2019t secure.\u201d<br \/>\nAndroid phones, such as the Samsung Galaxy, unlock new ways of working. But, as an IT admin, you may worry about the security\u2014after all, work data is critical.<br \/>\nHowever, outdated concerns can hold your business back from unlocking its full potential. The truth is, with work happening everywhere, every device connected to your<\/p>","protected":false},"excerpt":{"rendered":"<p>Raise your hand if you\u2019ve heard the myth, \u201cAndroid isn\u2019t secure.\u201d Android phones, such as the Samsung Galaxy, unlock new ways of working. But, as an IT admin, you may&hellip;<\/p>\n","protected":false},"author":1,"featured_media":2354,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"saved_in_kubio":false,"footnotes":""},"class_list":["post-2353","page","type-page","status-publish","has-post-thumbnail","hentry"],"kubio_ai_page_context":{"short_desc":"","purpose":"general"},"_links":{"self":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages\/2353","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2353"}],"version-history":[{"count":0,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages\/2353\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/media\/2354"}],"wp:attachment":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2353"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}