Security Management With Your Phone

Jumat, 26 Maret 2010 ·

Since the Apple iPhone debuted, the term "smartphone" finally caught on in the public consciousness, despite there being quite capable Blackberry models from RIM (Research In Motion) and other offerings from Motorola, Nokia and LG for years now. With the recent flurry of activity involving the Google Android operating systems, smartphones are definitely moving from headlines to people's hands. Like other PDA/phone systems, users get multiple capabilities for testing, e-mailing, calling and using specially designed "apps" to do many things. One of the most valuable "things" happens to be security management with your phone, and owners of home and business security systems are well served with the new, rapidly maturing technology.

It doesn't take long for top manufacturers of DVRs, cameras and pre-packaged surveillance systems to recognize a great new platform, so Android, Blackberry and iPhone users can all take advantage of new remote-control security powers. There are now standalone DVR systems that run a Web server on the equipment and offer basic remote viewing of up to four cameras, simultaneously, refreshing the views up to once every second (depending on Internet speeds). The viewing is basic, but with some of these systems the size of an old VCR, with no requirement for a dedicated PC, it meets many users' needs. Computerized systems With the more popular PC-based systems, home and business security can take advantage of even more "tech power."

You can get "DVR cards" that let you capture video into your PC or connect IP cameras, and your smartphone (of most types) can run a mobile application especially designed to interface with the components you select. You can get streaming video, not sequential snapshots, directly into your smartphone from your remote system. More and more PC-based systems are being developed to support Android, Apple and other operating systems, and the pickings are getting pretty good. Make sure you do your homework before buying a new smartphone if your security system is already installed and operating as you like. You need security camera software with a client designed for your specific OS, a universally-accessible Web page with "dashboard" style controls or a standalone DVR using a similarly "friendly" interface. You may be able to do much more than passively view images, too, and change settings, archive or delete material or alter various other operations, even in real-time. Phones need security, too Of course, if you are going to start running your security operation remotely, you need to ensure that your smartphone, laptop, netbook or whatever device you are using can connect without being hacked, hijacked or incapacitated. According to a January 2010 report from ABI Research, the number of smartphones protected by some form of advanced security software will increase fivefold in the next five years. This is just what is expected when IT departments look to mobile management services to offer functionality that is similar to that of the desktop. At the same time that this is occurring, however, many of those departments have not instituted well-defined policies set up as they do for remote computers. The report concluded that there was "almost nothing" for smartphones. It may be that smartphone security won't be something that individual IT departments choose to manage, which explains the numbers of mobile operators and security firms starting to enter the "mobile device management" field. When developed by another company with the reach and the market presence to amortize the development cost over thousand or millions of units, the resulting service model might add just a small monthly fee to each secured smartphone's operational cost. Security client software would be installed on the smartphones, and each IT department could engage remote handset locks or initiate data wiping, or accomplish whatever it is the situation requires.

And next? It was not that long ago that the PC security software market exploded with the growth in the sophistication and penetration of malware, and the Wi-Fi security market reacted similarly when the Wireless Encryption Protocol (WEP) was shattered into a million pieces. Mobile device management and security services has definitely ripened as a market now that smartphones are used as desktops, are used to control other kinds of desktops and even store valuable intellectual property locally, which they will do more and more of as their memory capacities increase. Even when the smartphones are mere conduits, holes in the security could result in your flow of information being diverted, without your knowledge, to various other destinations. As smartphones and security systems continue both independent and integrated development tracks, competition and ongoing technological progress will provide tools, at reasonable cost, for securing your company or home, managing that security remotely with a variety of devices like smartphones and protecting every new tool and process that enters into the formula. There's a lot to keep up on, but fortunately, you don't have to go it alone. Keep up on what is happening by continuing to read a good blog, a few good sites and any ads and commercials on the products - that is how you stay up to date!



Baca juga postingan di bawah ini :



0 komentar:

Posting Komentar

ICT Center

ICT Center
" Majulah Teknologi dan Pendidikan Indonesia ! "

SPONSOR

Jumlah Kunjungan

 

ICT Center | Copyright © 2009 - Blogger Template Edited By paksoleh