Samsung phones - security/exchange policy questions


Well-known member
Feb 25, 2011
Visit site

My company allows us to connect Android devices to our exchange email system, but many of the devices are not 'secure' enough thus they do not allow employees to use them.

Most of the HTC phones (Incredible, Inredible 2, Thunderbolt) that go through my company's certification process pass the tests and are allowed to be used for exchange mail/contacts/calendar. However, not one single Samsung phones to date has passed the test. On one Motorola phone to date has passed the test, and that is the Droid Pro.

You can see from the links here that Motorola outlines what security policies their phones software is capable of. These links show me that the Droid Pro has Password expiration and history policies, as well as features as device inactivity timeout.

Most of Moto's phones do not meet our criteria for security. The Droid Pro does. Most of the HTC phones do meet our criteria, so obviously HTC does a great job with their Sense overlay that sits over Android to ensure their devices are compatible with the strictest of security policies.

No Samsung phone has ever been approved by my company but I am curious if anyone knows if the updated OS coming with the Galaxy S II line will have an update with security capabilities? I would love a Samsung phone. But I can't get one until they have the policy capabilities that my company requires.

Any information you could share would be greatly appreciated. If there is a site from Samsung similar to Moto's in regards to the software policy capabilities built into the phone, please share!

Thanks in advance.


Well-known member
Jun 21, 2011
Visit site
From Sprint's posted fact sheet:

Enterprise functionality provides support for exchange device management policies, offers increased security of data and services and enables mobile conferencing while on the go

Also included in the spec summary was "AES-256 internal/external hardware encryption".

I have no clue if this would cause this device to meet your company's security requirements, but you may want to email the wording over to someone in your tech dept to see if they can interpret it.

Trending Posts

Forum statistics

Latest member
Lethabo Mokoena