Samsug SDS IAM&EMM Administrator’S Guide

Total Page:16

File Type:pdf, Size:1020Kb

Samsug SDS IAM&EMM Administrator’S Guide Samsug SDS IAM&EMM Administrator’s Guide Version 16.9 Published: October 2016 Before using this information and the product it supports, be sure to read the general information on this page. Publisher Samsung SDS Co., Ltd Address 125, 35-Gil, Olympic-Ro, Songpa-Gu, Seoul, South Korea. Phone +82 1644 0030 Email [email protected] Website www.samsungsdsbiz.com This edition applies to Samsung SDS EMM Version 16.9, and to all subsequent releases and modifications thereof until otherwise indicated in new editions. Make sure you are using the correct edition for your product. Samsung SDS Co., Ltd. has credence in the information contained in this document. However, Samsung SDS is not responsible for any circumstances which arise from inaccurate content or typographical errors. The content and specifications in this document are subject to change without notice. Samsung SDS Co., Ltd. holds all intellectual property rights, including the copyrights, to this document. Using, copying, disclosing to a third party or distributing this document without explicit permission from Samsung SDS is strictly prohibited. These activities constitute an infringement of the intellectual property rights of this company. Any reproduction or redistribution of part or all of these materials is strictly prohibited except as permitted by the license or by the express permission of Samsung SDS Co., Ltd. Samsung SDS Co., Ltd. owns the intellectual property rights in and to this document. Other product and company names referenced in this document are trademarks or registered trademarks of their respective owners. Copyright ⓒ 2016 Samsung SDS Co., Ltd. All rights reserved. Contents Getting Started with Samsung SDS IAM&EMM User Suite 1 Understanding users and roles . .3 Creating user accounts . .5 Bulk import user accounts . .8 Creating roles and adding users to roles . .11 Verifying users have access to Samsung SDS IAM&EMM user portal . .13 Possible next steps . .14 Chapter 1 Commonly used How To scenarios 16 How to configure Mobile Device Management or single sign-on only . .18 How to create a policy set and assign it to users . .22 How to enroll devices . .24 How to define authentication requirements . .28 How to configure and deploy applications to users . .34 How to install a Cloud Connector . .40 How to configure user self-service options . .50 Chapter 2 Services and components overview 54 Component summary . .55 Which software is installed and where . .58 Supported web and device browsers . .60 Supported devices . .61 Foreign language support . .62 Logging in to the user and administrator portals with silent authentication . .63 Samsung SDS IAM&EMM user portal overview . .64 Selecting an identity repository . .65 Selecting a policy service . .66 Chapter 3 Viewing dashboards 67 Displaying user login activity . 68 • i Interpreting the Security Overview dashboard . .69 Chapter 4 Managing users 71 Account sources . .72 Using the Active Directory/LDAP and cloud directory ID repositories . .73 Default user accounts . .74 Managing cloud accounts from the Users page . .75 Referencing accounts from Active Directory/LDAP . .79 Sending invitations to users . .81 Deleting accounts . .83 Specifying a user’s application login settings . .84 Using search filters . .86 Chapter 5 Managing applications 87 Deploying the Samsung SDS IAM&EMM User Portal application . .88 Viewing and sorting applications in the Apps page . .89 Modifying the application description . .91 Configuring automatic versus optional deployment . .92 Setting web application access policies . .93 Managing application access requests . .94 Application symbols . .99 Working with applications that require the Samsung SDS IAM&EMM Browser Extension . .101 Removing an application . .104 Adding web applications by using Admin Portal . .105 Adding web applications by using Samsung SDS IAM&EMM Infinite Apps . 108 Adding and deploying mobile applications using Admin Portal . 112 Android for Work . .115 Deploying web applications to KNOX containers . .120 Deploying mobile applications to KNOX containers . .121 Chapter 6 Managing devices 127 Enrolling a device . .128 Using Admin Portal to manage devices . .133 Using Active Directory Users and Computers to manage devices . .135 Using the device management commands . .138 Admin Portal user’s guide ii Working with Samsung KNOX devices . .145 Chapter 7 Managing policies 157 Using policy sets . .159 General device management settings . .161 Authentication - Setting authentication policy controls . .165 Setting password controls . .173 Configuring OATH OTP . .175 Configuring derived credentials . .176 Managing Application policies . .194 Managing device configuration policies . .195 Mobile device configuration policies overview . .201 Chapter 8 Managing roles 222 Predefined roles . .223 Removing users or groups from a role . .224 Assigning applications to and removing them from roles . .225 Creating cloud service administrators . .226 Deleting roles . .230 Chapter 9 Managing customer cloud services 231 About customer cloud services . .232 Creating an cloud service for a customer . .233 Disabling and enabling a customer cloud service . .235 Logging in to a customer cloud service . .236 Creating roles that can create and manage customer cloud services . .237 Chapter 10 Managing reports 239 What’s in the Report Library . .240 Reports provided in Admin Portal . .241 Access to shared reports and report data . .242 Selecting report data . .244 Common events that you can search for . .249 Working with reports . ..
Recommended publications
  • FIT to WORK: IMPROVING the SECURITY of MONITORED EMPLOYEES' HEALTH DATA Elizabeth A. Brown INTRODUCTION Imagine Coming to Work
    FIT TO WORK: IMPROVING THE SECURITY OF MONITORED EMPLOYEES' HEALTH DATA Elizabeth A. Brown1 INTRODUCTION Imagine coming to work one day and finding that your employer has given everyone in the company a wearable FitBit health monitor, free of charge. You pop the FitBit on, grateful for another bit of help in managing the health concerns that nag at you persistently but which never quite rise to the top of your priority list. At your next performance review, your supervisor expresses concern about your anxiety levels. Although your work output is slightly off, she notes, there has been a correlation in your lack of sleep and exercise, and she suspects you are depressed. You wonder how your employer might know these things, whether or not they are true, and then you remember the FitBit. Your supervisor then tells you that the promotion you had wanted is going to a colleague who is “better equipped to handle the demands of the job.” You interview for another job, and are asked to provide the password to the HealthDrive account that centralizes the fitness data all the apps on your iPhone collect about you during the day. Similar scenarios are playing out now in workplaces across the country, and will do so more frequently as the personal health sensor market and employee monitoring trends continue to grow. Employers are making key decisions based on employees’ biometric data, collected from specialized devices like a FitBit or the health-related apps installed on mobile phones. BP, for example, adjusts its employees’ health care premiums depending on how much physical activity their wearable FitBit devices monitor – devices that BP provides to thousands of employees, their spouses, and retirees for free.
    [Show full text]
  • Your Voice Assistant Is Mine: How to Abuse Speakers to Steal Information and Control Your Phone ∗ †
    Your Voice Assistant is Mine: How to Abuse Speakers to Steal Information and Control Your Phone ∗ y Wenrui Diao, Xiangyu Liu, Zhe Zhou, and Kehuan Zhang Department of Information Engineering The Chinese University of Hong Kong {dw013, lx012, zz113, khzhang}@ie.cuhk.edu.hk ABSTRACT General Terms Previous research about sensor based attacks on Android platform Security focused mainly on accessing or controlling over sensitive compo- nents, such as camera, microphone and GPS. These approaches Keywords obtain data from sensors directly and need corresponding sensor invoking permissions. Android Security; Speaker; Voice Assistant; Permission Bypass- This paper presents a novel approach (GVS-Attack) to launch ing; Zero Permission Attack permission bypassing attacks from a zero-permission Android application (VoicEmployer) through the phone speaker. The idea of 1. INTRODUCTION GVS-Attack is to utilize an Android system built-in voice assistant In recent years, smartphones are becoming more and more popu- module – Google Voice Search. With Android Intent mechanism, lar, among which Android OS pushed past 80% market share [32]. VoicEmployer can bring Google Voice Search to foreground, and One attraction of smartphones is that users can install applications then plays prepared audio files (like “call number 1234 5678”) in (apps for short) as their wishes conveniently. But this convenience the background. Google Voice Search can recognize this voice also brings serious problems of malicious application, which have command and perform corresponding operations. With ingenious been noticed by both academic and industry fields. According to design, our GVS-Attack can forge SMS/Email, access privacy Kaspersky’s annual security report [34], Android platform attracted information, transmit sensitive data and achieve remote control a whopping 98.05% of known malware in 2013.
    [Show full text]
  • Your Command and Control Center for the Secured Enterprise Blackberry UEM + Samsung Knox
    Datasheet BlackBerry UEM + Samsung Knox Comprehensive EMM Management Together, Samsung and BlackBerry secure and enable key enterprise workflows, from the boardroom to the battlefield, exceeding the demands of highly regulated industries and government organizations. With BlackBerry and Samsung, mobile users benefit from the latest in device technologies, while CIO’s are assured their sensitive data is protected from internal and external threats, both in transit and at rest. BlackBerry has integrated the most Knox Management Policies and is the only EMM solution that provides all-inclusive Knox Platform for Enterprise + licensing at no additional cost. BlackBerry UEM: Your command and control center for the secured enterprise Manage enterprise mobility across iOS®, Android™, Windows Phone® and BlackBerry® with enhanced support for Samsung Knox™-enabled devices. Built on BlackBerry’s trusted global network, BlackBerry® UEM makes managing enterprise mobility efficient and secure. 1 Samsung Knox: Defense-grade security for Android Satisfy enterprise security requirements without compromising business data or employee privacy. Samsung Knox brings an enhanced user experience and provides secure BYOD scenarios by delivering robust, hardware and software-integrated security for the Android platform. BlackBerry UEM support for Samsung Knox Platform provides an integrated EMM solution that brings together secure connectivity with device, applications and data management to provide uncompromised corporate security and employee privacy. BlackBerry UEM + Samsung Knox The combination of UEM and Samsung Knox Platform offers many benefits to the enterprise: Defense-grade, end-to-end security for Samsung® Galaxy devices. No additional cost for Knox with BlackBerry® Enterprise Mobility Suite, Collaboration Edition or higher. Run BlackBerry Apps in Samsung Knox™ Workspace, to deliver an integrated experience for corporate apps Flexibility for mixed deployment scenarios, supporting BYOD, COPE and COBO environments, and support for Knox Mobile Enrollment.
    [Show full text]
  • Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems
    Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems Nan Zhang∗, Xianghang Mi∗, Xuan Fengy∗, XiaoFeng Wang∗, Yuan Tianz and Feng Qian∗ ∗Indiana University, Bloomington Email: fnz3, xmi, xw7, [email protected] yBeijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, China Email: [email protected] zUniversity of Virginia Email: [email protected] Abstract—Virtual personal assistants (VPA) (e.g., Amazon skills by Amazon and actions by Google1) to offer further Alexa and Google Assistant) today mostly rely on the voice helps to the end users, for example, order food, manage bank channel to communicate with their users, which however is accounts and text friends. In the past year, these ecosystems known to be vulnerable, lacking proper authentication (from the user to the VPA). A new authentication challenge, from the VPA are expanding at a breathtaking pace: Amazon claims that service to the user, has emerged with the rapid growth of the VPA already 25,000 skills have been uploaded to its skill market to ecosystem, which allows a third party to publish a function (called support its VPA (including the Alexa service running through skill) for the service and therefore can be exploited to spread Amazon Echo) [1] and Google also has more than one thousand malicious skills to a large audience during their interactions actions available on its market for its Google Home system with smart speakers like Amazon Echo and Google Home. In this paper, we report a study that concludes such remote, large- (powered by Google Assistant).
    [Show full text]
  • Securing and Managing Wearables in the Enterprise
    White Paper: Securing and Managing Wearables in the Enterprise Streamline deployment and protect smartwatch data with Samsung Knox Configure White Paper: Securing and Managing Wearables in the Enterprise 2 Introduction: Smartwatches in the Enterprise As the wearable device market heats up, wrist-worn devices Industries as varied as healthcare, such as smartwatches are leading the pack. According to CCS Insight, forecasts for global sales of smart wearable devices finance, energy, transportation, will grow strongly over the next five years, with the global public safety, retail and hospitality market reaching nearly $30 billion by 2023.1 are deploying smartwatches for While smartwatches for fitness and activity tracking are popular, consumer demand is only part of the equation. added business value. Enterprises are also seeing business value in wearable devices. In a report by Robert Half Technology, 81 percent of CIOs surveyed expect wearable devices like smartwatches to Samsung has been working to address these concerns and become common tools in the workplace.2 has developed the tools to make its Galaxy and Galaxy Active smartwatches customizable, easily manageable and highly secure for enterprise users. This white paper will look at how these tools address key wearable security and manageability challenges, as well as considerations for smartwatch 81% deployments. of CIOs surveyed expect wearable devices like smartwatches to become common tools in the workplace. Industries as varied as healthcare, finance, energy, transportation, public safety, retail and hospitality are deploying smartwatches for added business value, such as hands-free communication for maintenance workers, task management, as well as physical monitoring of field workers in dangerous or remote locations.
    [Show full text]
  • Remote Connect 2016
    The Convenience of Remote Connect 2016 TOYOTA APP SMARTWATCH GOOGLE AMAZON Remote Connect As a Companion of the Smartphone ASSISTANT ALEXA Toyota Action Toyota Skill Toyota offers an incredible array of convenience and connectivity features. These features now includeGoogle Assistant and Amazon Alexa3 capability – as well as smartwatch integration – for 2018 and later models equipped with Remote Connect². KEY FOB WITH REMOTE FUNCTIONALITY Vehicles equipped with Remote Connect² have key fob13 compatibility for Remote Start1. Connected Services registration will be required to use the complete suite of Remote Connect services, which include Smartphone, Smartwatch, and smart home devices. Audio Plus vehicle key fob functionality is available for up to 3 years. Beyond 3 years requires a subscription. Applicable for select Model Year 2018 through 2020 Remote Connect capable vehicles. Select Model Year 2020 Remote Connect capable vehicles will have functionality for up to 10 years. Premium Audio vehicle key fob functionality is available for up to 10 years. Beyond 10 years requires a subscription. Applicable for select Model Year 2018 through 2020 Remote Connect capable vehicles. Using the key fob to remote start my Toyota: 1. Press the LOCK button on the remote. 2. Press the LOCK button a second time within 1 second. 3. Press the LOCK button again, this time holding it for 3 seconds. The engine will start. Note: Key Fob Remote Start will not function if Connected Services are waived. REMOTE CONNECT EQUIPPED VEHICLES BUILT BEFORE 11/12/18 Remote Connect equipped vehicles built before 11/12/18 were required to have an active Remote Connect trial or paid subscription for the key fob to perform remote start functionality.
    [Show full text]
  • Introducing The
    Introducing the It unlocks with a look, communicates with you, connects to your home and can pretty much take you anywhere with Gear VR.¹ And meet Bixby, the assistant that learns from you to help you do more. A screen without limits. The Galaxy S8 has the world’s fi rst Infi nity Screen. The expansive display stretches from edge to edge, giving you the most amount of screen in the least amount of space. And the Galaxy S8+ is even more expansive—our biggest screen.² Meet Bixby. Bixby is an intelligent interface that learns from you to help you do more. It learns your routines to serve up the right content and apps at the right time, keeps track of your to-do list, and gives you a deeper understanding of what you are looking at. Our best camera, now even smarter. Take clearer, sharper, more detailed selfi es with our best camera yet. Take brilliant photos in any light with dual-pixel technology. Look at your world in a new way. Technical Specifi cations Bixby lives inside your Camera, Gallery and Internet to Dimensions give you a deeper understanding of what you’re looking 2.68" x 5.86" at. Just tap the Vision icon in your viewfi nder and Bixby 2.89" x 6.28" will serve up contextual icons: translation, QR code Midnight Black detection, landmark recognition and shopping. Display 5.8"/6.2" (full rectangle)⁶ A phone that can take you anywhere. 5.6"/6.1" (rounded corners)⁶ Place your Galaxy S8 into the Gear VR headset¹ to explore Quad HD+ Super AMOLED display 1440 x 2960 multi-dimensional worlds in virtual reality.
    [Show full text]
  • Samsung Galaxy Note 5 N920R6 User Manual
    SMART PHONE User Manual Please read this manual before operating your device and keep it for future reference. Legal Notices Warning: This product contains chemicals known to Disclaimer of Warranties; the State of California to cause cancer, birth defects, or other reproductive harm. For more information, Exclusion of Liability please call 1-800-SAMSUNG (726-7864). EXCEPT AS SET FORTH IN THE EXPRESS WARRANTY CONTAINED ON THE WARRANTY PAGE ENCLOSED WITH THE PRODUCT, THE Intellectual Property PURCHASER TAKES THE PRODUCT “AS IS”, AND All Intellectual Property, as defined below, owned SAMSUNG MAKES NO EXPRESS OR IMPLIED by or which is otherwise the property of Samsung WARRANTY OF ANY KIND WHATSOEVER WITH or its respective suppliers relating to the SAMSUNG RESPECT TO THE PRODUCT, INCLUDING BUT Phone, including but not limited to, accessories, NOT LIMITED TO THE MERCHANTABILITY OF THE parts, or software relating there to (the “Phone PRODUCT OR ITS FITNESS FOR ANY PARTICULAR System”), is proprietary to Samsung and protected PURPOSE OR USE; THE DESIGN, CONDITION OR under federal laws, state laws, and international QUALITY OF THE PRODUCT; THE PERFORMANCE treaty provisions. Intellectual Property includes, OF THE PRODUCT; THE WORKMANSHIP OF THE but is not limited to, inventions (patentable or PRODUCT OR THE COMPONENTS CONTAINED unpatentable), patents, trade secrets, copyrights, THEREIN; OR COMPLIANCE OF THE PRODUCT software, computer programs, and related WITH THE REQUIREMENTS OF ANY LAW, RULE, documentation and other works of authorship. You SPECIFICATION OR CONTRACT PERTAINING may not infringe or otherwise violate the rights THERETO. NOTHING CONTAINED IN THE secured by the Intellectual Property. Moreover, INSTRUCTION MANUAL SHALL BE CONSTRUED you agree that you will not (and will not attempt TO CREATE AN EXPRESS OR IMPLIED WARRANTY to) modify, prepare derivative works of, reverse OF ANY KIND WHATSOEVER WITH RESPECT TO engineer, decompile, disassemble, or otherwise THE PRODUCT.
    [Show full text]
  • Digital Forensic Analysis of Smart Watches
    TALLINN UNIVERSITY OF TECHNOLOGY School of Information Technologies Kehinde Omotola Adebayo (174449IVSB) DIGITAL FORENSIC ANALYSIS OF SMART WATCHES Bachelor’s Thesis Supervisor: Hayretdin Bahsi Research Professor Tallinn 2020 TALLINNA TEHNIKAÜLIKOOL Infotehnoloogia teaduskond Kehinde Omotola Adebayo (174449IVSB) NUTIKELLADE DIGITAALKRIMINALISTIKA Bachelor’s Thesis Juhendaja: Hayretdin Bahsi Research Professor Tallinn 2020 Author’s declaration of originality I hereby certify that I am the sole author of this thesis. All the used materials, references to the literature and the work of others have been referred to. This thesis has not been presented for examination anywhere else. Author: Kehinde Omotola Adebayo 30.04.2020 3 Abstract As wearable technology is becoming increasingly popular amongst consumers and projected to continue to increase in popularity they become probable significant source of digital evidence. One category of wearable technology is smart watches and they provide capabilities to receive instant messaging, SMS, email notifications, answering of calls, internet browsing, fitness tracking etc. which can be a great source of digital artefacts. The aim of this thesis is to analyze Samsung Gear S3 Frontier and Fitbit Versa Smartwatches, after which we present findings alongside the limitations encountered. Our result shows that we can recover significant artefacts from the Samsung Gear S3 Frontier, also more data can be recovered from Samsung Gear S3 Frontier than the accompanying mobile phone. We recovered significant data that can serve as digital evidence, we also provided a mapping that would enable investigators and forensic examiners work faster as they are shown where to look for information in the course of an investigation. We also presented the result of investigating Fitbit Versa significant artefacts like Heart rate, sleep, exercise and personal data like age, weight and height of the user of the device, this shows this device contains artefacts that might prove useful for forensic investigators and examiners.
    [Show full text]
  • Samsung Galaxy GS9|GS9+ G960U|G965U User Manual
    User manual Table of contents Features 1 Meet Bixby 1 Camera 1 Mobile continuity 1 Dark mode 1 Security 1 Expandable storage 1 Getting started 2 Galaxy S9 3 Galaxy S9+ 4 Assemble your device 5 Charge the battery 6 Start using your device 6 Use the Setup Wizard 6 Transfer data from an old device 7 Lock or unlock your device 8 Accounts 9 Set up voicemail 10 i UNL_G960U_G965U_EN_UM_TN_TA5_021820_FINAL Table of contents Navigation 11 Navigation bar 16 Customize your home screen 18 Bixby 26 Digital wellbeing and parental controls 27 Always On Display 28 Flexible security 29 Mobile continuity 33 Multi window 36 Edge screen 37 Enter text 44 Emergency mode 47 Apps 49 Using apps 50 Uninstall or disable apps 50 Search for apps 50 Sort apps 50 Create and use folders 51 Game Booster 51 ii Table of contents App settings 52 Samsung apps 54 Galaxy Essentials 54 Galaxy Store 54 Galaxy Wearable 54 Game Launcher 54 Samsung Health 55 Samsung Members 56 Samsung Notes 57 Samsung Pay 59 Smart Switch 60 SmartThings 61 Calculator 62 Calendar 63 Camera 65 Clock 71 Contacts 76 Email 81 Gallery 84 iii Table of contents Internet 90 Messages 93 My Files 95 Phone 97 Google apps 105 Chrome 105 Drive 105 Duo 105 Gmail 105 Google 105 Maps 106 Photos 106 Play Movies & TV 106 Play Music 106 Play Store 106 YouTube 106 Additional apps 107 Facebook 107 iv Table of contents Settings 108 Access Settings 109 Search for Settings 109 Connections 109 Wi-Fi 109 Bluetooth 111 Phone visibility 113 NFC and payment 113 Airplane mode 114 Data usage 114 Mobile hotspot 114 Tethering 116
    [Show full text]
  • Adattester: Secure Online Mobile Advertisement Attestation Using Trustzone
    AdAttester: Secure Online Mobile Advertisement Attestation Using TrustZone Wenhao Li, Haibo Li, Haibo Chen, Yubin Xia Institute of Parallel and Distributed Systems Shanghai Jiao Tong University ABSTRACT 1billiondollarsin2013duetothesefraudsandaroundonethird Mobile advertisement (ad for short) is a major financial pillar for of mobile ad clicks may constitute click-spam [18]. The most re- developers to provide free mobile apps. However, it is frequently cent research study [33] shows that, one of the largest click fraud thwarted by ad fraud, where rogue code tricks ad providers by forg- botnets, called ZeroAccess, induces advertising losses on the or- ing ad display or user clicks, or both. With the mobile ad market der of $100,000 per day. Ad frauds can typically be characterized growing drastically (e.g., from $8.76 billion in 2012 to $17.96 bil- into two types [26]: (1) Bot-driven frauds employ bot networks to lion in 2013), it is vitally important to provide a verifiable mobile initiate forged ad impressions and clicks; (2) Interaction frauds ma- ad framework to detect and prevent ad frauds. Unfortunately,this nipulate visual layouts of ads to trigger ad impressions and unaware is notoriously hard as mobile ads usually run in an execution envi- clicks from the end users. ronment with a huge TCB. Because of the urgent need to detecting mobile ad frauds, prior This paper proposes a verifiable mobile ad framework called approaches have made important first steps by using an offline- AdAttester, based on ARM’s TrustZone technology. AdAttester based approach [16, 26]. Specifically, they trigger the execution provides two novel security primitives, namely unforgeable clicks of mobile apps in a controlled environment to observe deviated and verifiable display.Thetwoprimitivesattestthatad-relatedop- behavior to detect ad frauds.
    [Show full text]
  • AT&T Samsung Galaxy S II
    Review: AT&T Samsung Galaxy S II 27 October 2011, By Matthew Fortner This also makes it pleasantly light. Despite having a larger screen and larger dimensions than my iPhone 4S, the Galaxy S II is lighter. Smartphone ergonomics can be subjective, but I felt more confident handling the Samsung. This surprised me since I thought the iPhone's smaller size would give it a handling edge. Users among those who actually make calls will appreciate the good and distortion-free call quality. Those moving from 3G will notice data transfer speeds over AT&T's HSPA+ network to be consistently faster, but not as fast as LTE. There has been a lot of talk about smartphone cameras lately. This new Galaxy S has an 8-megapixel back- illuminated sensor camera aided by a single-LED flash. It can record 1080p video at 30 frames per second. There is also a fixed focus front-facing Android is on fire, and Samsung is stoking the 2-megapixel camera that can also record VGA flames with the Galaxy S II. It's the fastest selling video at 640x480. Android device with 10 million units sold worldwide. Is the Galaxy S II the best current Android phone? There a have been a number of image Maybe. AT&T Wireless sent us theirs to try out. comparisons online. Some give the edge to Samsung, and some to Apple. I found both to be Android fans may have the forthcoming Motorola capable with distinctly different characteristics that Droid RAZR and Samsung Galaxy Nexus in their will appeal to different users.
    [Show full text]