Best-in-class device and data protection.

Defense in depth.

Each layer of defense works together to make the whole ecosystem stronger. We start by building a secure OS, and making sure device makers meet our strict hardware standards.

Then, we add security services on top to prevent leaks and hacks. And finally, we give you control over the entire fleet of devices. Because a wall is good. But a fortress is better.

Read the security paper

Device protection.


  • Verified boot alerts you to OS compromises when you start up.

  • Anti-exploitation techniques prevent vulnerabilities from becoming exploitable.

  • Critical security functions happen in the TEE separate from the OS.

Google security services.


  • Google Play Protect detects and blocks malware threats.

  • Google safe browsing protects you from malware and phishing.

  • SafetyNet API checks devices before they can access data.

Enterprise controls.


  • Deploy devices to enforce compliance across the business.

  • Distribute and configure apps safely with managed Google Play.

  • Work profile prevents leaks between personal and company data.

How our security stacks up.

We’ve been vetted by the best. Our security features and services meet regulatory certifications and industry standards and are validated by independent analysts and researchers. That’s good news for the safety of your business.