recommended reading

FBI Orders 26,500 Licenses for Software to Guard Samsung Galaxy S5s

Manu Fernandez/AP

The FBI on Monday opened up bidding for a contract to supply the feds with a year's worth of the latest Samsung Knox security software suited for Galaxy S5 smartphones, and possibly other Samsung mobile devices. 

Version 2.0 of the software, which fences off personal data from work data, became available to businesses in February. 

In a product solicitation, FBI officials said they need a vendor who can provide "Samsung Knox Licenses to the FBI (current version 2.0) for use on Samsung Galaxy S5." And they need 26,500 of those licenses. The contract time frame is "one 12-month period."

Samsung claims version 2.0 of Knox can better support encryption tools than the first iteration of the “container” software, which came out last year.

The Samsung S5 is known for sporting a heart rate sensor, as well as fingerprint scanner for unlocking the phone and authorizing purchases. 

Knox 2.0 monitors in real-time for any unauthorized changes to the phone's operating system, and provides a two-step login process that requires the user to enter a password and swipe a finger to access sensitive data. 

The buy does not necessarily mean the FBI has thousands of S5s in stock for employees. It does seem to suggest the bureau plans to use a large number of newer model Samsung devices at some point this year. 

FBI was unable to immediately respond to a request for comment. 

Federal national security agencies are warming up to Knox, as Samsung garners more and more government certifications.

In May 2013, the Defense Department OK'd Samsung Knox for use on military networks. In May of this year, DOD announced Galaxy S4s running Knox are safe to use on the Defense Information Systems Agency's new mobile device control system. The approvals have not necessarily translated into purchases, however.

The Secret Service bought a small number, 2,000, of Knox licenses earlier this year. 

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.