Mobile SecurityAdvanced Persistent Threats or malware, are increasingly using mobile devices as their point of attack. To address these threats requires a comprehensive approach to blocking their entry at the end-point as well as build processes to monitor and log breaches that will inevitably occur.
Connect5 can help with a thorough audit, recommend corporate policies for compliance and propose robust incident response systems and end-point security solutions. |
Internet of ThingsInternet of Things (IoT) has become a catch-all for any software system with a large number of managed end-points. At Connect5 we believe there are distinct system architectures that are best suited for different IoT networks and systems.
With deep experience in mobile devices, wireless telecom and IT infrastructure, we can evaluate and recommend scalable architectures for telematics bases systems, wearables, mesh networks and embedded systems, to name a few. |
Indoor Location PositioningWith an array of sensors (accelerometer, gyro, magnetometer and GPS) and positioning technologies, the smartphone is uniquely suited to connect us to the real world.
However indoor positioning is still in its infancy creating opportunities to build unique services. Whether it is Bluetooth Low Energy (BLE) beacons or LED lights, Connect5 has the experience to recommend strategies for applications in Retail, Healthcare, Security and Venue Management. |