• Skip to content
  • Skip to primary sidebar
  • Skip to footer
  • About
  • Contact Us
  • Newsletters
  • Tech Guide
  • Cyber War
  • Pro
  • Members Only
  • Sign in

CTOvision.com

Context for the CTO, CIO, CISO and Data Scientist

You are here: Home / CTO / FingBox Gives You Network Superpowers: Network security that contributes to physical security

FingBox Gives You Network Superpowers: Network security that contributes to physical security

November 13, 2018 by Bob Gourley

Share this:

  • LinkedIn
  • Facebook
  • Twitter
  • Reddit
  • Email

FingBox is a fantastic device that I recommend everyone put in their home. It is also perfect for small businesses. Features of the FingBox help you track the status of your network and the many devices connected to it. It also enables you to set alerts and receive notifications when device status changes. You can also see who is coming and going by seeing which devices are nearby. The FingBox digital fence detects any device near your home, even it if it not connected to your WiFi network.

You control the device with an application that runs on your cell phone or tablet. The application is easy to configure and lets you check your network from anywhere in the globe.

Use cases:

  • KNOW WHO’S HOME: See family members and visitors at your home and keep a tab on who’s coming and going and when.
  • KNOW WHO IS AROUND: Detects any device around your Fingbox even if not connected to your WiFi. See who is nearby your home like dog walkers, babysitters, cleaning, or delivery persons.
  • SET PARENTAL CONTROLS: Detect, manage and control your kids internet access and activity time by device.
  • CATCH INTRUDERS & HACKERS!: Fingbox protects your home network seeing and controlling all devices connected or nearby — stop network phishing, snooping, and spying.
  • STOP BANDWIDTH HOGGING!: Check bandwidth usage and set limits for devices — control time-in and time-out!
  • DETECT THREATS & VULNERABILITIES: Get advance warnings on weaknesses and openings in your network — fix with 1 touch.

For more and to order see: FingBox

Other topics of note:

  • A Simple DNS Configuration Change Can Reduce Your Risk. Here Is What To Do
  • Warning Meat Puppets: Robotic Trucks Drive Across Europe In Demonstration Of What Is Possible Today
  • Opinion: Anyone with desire and a computer can have a successful career in AI
  • About
  • Latest Posts
Connect Here

Bob Gourley

Co-Founder and CTO at OODA
Bob Gourley is the co- founder of the Artificial Intelligence cybersecurity and due diligence consultancy OODA LLC . He is the publisher of CTOvision.com and contributor at OODAloop.com. Bob's background is as an all source intelligence analyst and an enterprise CTO. Find him on Twitter at @BobGourley
Connect Here

Latest posts by Bob Gourley

  • What the New U.S. Intelligence Strategy Says About Cyber Threats - February 11, 2019
  • OODA LLC: Helping clients identify, manage, and respond to global risks and uncertainties - February 10, 2019
  • Super Bowl Ads Indicate Big Businesses Think You Are Afraid of AI - February 4, 2019

Related

Filed Under: CTO, Cyber Security, Cyber War

Start Your Free Two Week Trial of CTOvision Pro



CTOvision Pro is our subscription only research and analysis service which provides exclusive content to enterprise IT professionals. We deliver actionable insights that will make direct contributions to your success.

About Bob Gourley

Bob Gourley is the co- founder of the Artificial Intelligence cybersecurity and due diligence consultancy OODA LLC . He is the publisher of CTOvision.com and contributor at OODAloop.com. Bob's background is as an all source intelligence analyst and an enterprise CTO. Find him on Twitter at @BobGourley

Primary Sidebar

Your account

Sign in

Featured Content

The Internet Has A New Problem: Repeating Random Numbers!

Ethical Concerns of AI

CTOvision Assessment on the Megatrend of Cloud Computing

AWS Snowball Edge And Hyper Converged Infrastructure Will Revolutionize Global Enterprises

Smart Cities Cybersecurity Challenge

Inform Your Cybersecurity Strategy With Lessons From July 1861

Secure Enclave Vidder Junaid Islam

Secure Enclaves: Foundation For The Cloud-Based Enterprise

CTOvision Assessment On The Megatrend of Artificial Intelligence


OODA

CTOvision Pro Free Trial

CTOvision Pro Members Only Section

Disruptive IT finder

CTOevents

CTOvision Mobile

CTOvision Newsletterss

Footer

CTOs on Facebook
CTOs on LinkedIn

CTO Events
CTOvision Mobile App

Free Newsletters and Tech Reports
CTOVision Pro: Exclusive Content
Crucial Point LLC

Copyright © 2019 · Magazine Pro on Genesis Framework · WordPress · Log in

loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.