Protecting You from the ‘Things’ in Your Smart Home

surveillance
IOT devices are easy ways for hackers to observe you and your families behavior

Each Internet of Things (IoT) or Smart Home device you add creates the probability that someone is hacking your home.  Watching your activities, profiling your activities.  Standard anti-virus and anti-malware don’t protect you.   

Would you allow someone to sit outside of your house and profile all that is happening in your home day and night?  

 

Traditional routers and firewalls don’t make a difference.

 Guard Dog by A Cloud of Own – protects your smart home and the things within it.

 

 

Order yours today on Kickstarter: https://www.kickstarter.com/projects/199226421/guard-dog-protecting-your-smart-home

Watch the Guard Dog catch and block a live attack on our lab!

View our presentation at Boston New Technologies – December 2018

We are featured on Product Hunt – For New Technologies

 

Active Protection is Critical for your Home 

hackers inside your home
Through the poor security on IoT Devices in your home, hackers to watch , listen and record what is happening in your home

 

Voted best new product – Mass Innovations Nights – January 2019.

A Cloud of My Own places a layer of protection around all of the ‘Smart Home’ devices in your home or business.  In the event that a device is hacked (or an attempt is made to compromise them), we take action and block and/or isolate that device from the others. 

 

 

 

Sign Up to Learn More

 

 

Trend Micro has released research papers that supports all of our statements on the risks in Smart Homes.

 

See their research here:

https://www.trendmicro.com/vinfo/au/security/news/internet-of-things/threats-and-risks-to-complex-iot-environments

 

So Many Risks, and they are growing

  •  U.S. broadband households now have an average of 9.1 connected devices,” said Brad Russell, Research Director, Connected Home, Parks (1)
  • IoT devices will outnumber the world’s population this year (2017) for the first time (2)
  • Unmanaged Firewalls used in homes provide minimal security for iot / home automation and smart home devices.  
  • Intrusion Detection Systems(IDS) and Intrusion Protection Systems (IPS) are rarely used outside of large companies.

Add leading edge ‘Smart Home’ network security to your Smart Home Now!

 

smart home / home automation diagram
Smart Homes are filled with online IOT devices. Who are they sending data to ?


What Risks?

Smart Home and internet of things concept. Smart House controls devices like security cam, lighting, air conditioning, radiator and music center flat icons.
  • Works with All Major Smart Home Hubs – Alexa, Google Home Familly (including Home Hub, Home Smart Speaker, etc), Samsung Smart Things, Siri and Apple Smart Home products – as well as DIY like Home Assisstant.
  • Simple to Install
  • Provides an Automated , learning Intrusion Detection System (IDS), and Intrusion Provension System (IPS).
  • Gives you Piece of Mind that your Smart Home Devices are protected

Add leading edge ‘Smart Home’ network security to your Smart Home Now!

 

 

Types of Devices Some Risks / Reasons for a Hack  
Security Camera Watch / record video  
Smart Light Bulbs Record when you are home  
Heating / Cooling Record schedules  
TV Record when you are home , record voices  
Kitchen Appliances Record when you are home  
Locks Record when you are home, provide access  
Toys Record audio potentially video  
     
     

** All devices provide potential location for within your home for a hacker to them begin exploting other devices in your network.

The explosive growth of the Internet of Things and Smart Home Technologies have dramatically changed the potential security risks on both home and business network.

Within the enterprise, these risks are reduced dramatically through enterprise network and security processes and technologies.

In your home, these computers are exposed to a dramatically different environment.   This network is most likely unmanaged, possibly having a firewall with default access credentials, and the machines are commingled with IOT/ home automation devices that have been proven to have extremely limited security in place.  IOT is largely unpatched, unmanaged and ripe for exploitation.

 

We are deep into final testing of the product.  If you are interested in learning more


 

 

 

 
Scroll to top