Kensington BungeeAir Power Wireless Security Tether for iPhone review

A wireless case and keyfob combination that sounds an alert if an iPhone 4 strays out of reach. But is it just another gimmick or a viable business accessory? Jennifer Scott aims to find out in this review.

Price
£66

Protecting the contents of a lost or stolen iPhone is all well and good, but it's obviously better not to part company with it the first place

Apple beefed up security in the last major release of iOS to make the iPhone more appealing to business users who deal with sensitive data, but strong passwords and secure encryption are only one line of defence.

Protecting the contents of a lost or stolen iPhone is all well and good, but it's obviously better not to part company with the device in the first place and that's just what the Kensington BungeeAir Power Wireless Security Tether is designed to ensure.

Kensington BungeeAir Power Wireless Security Tether for iPhone

The BungeeAir Power Wireless Security Tether is a two-part set-up that consists of an iPhone 4 case and an electronic fob, which attaches to a keying.

Advertisement
Advertisement - Article continues below

Wireless proximity alerts

The two are wirelessly paired and if the fob is taken beyond a certain range of the encased iPhone or vice versa an alarm sounds and the iPhone screen is locked. The idea is that this prevents an iPhone being left behind or from being moved without the owner's knowledge assuming the owner has remembered to bring the fob with them in the first place, of course.

Kensington BungeeAir Power Wireless Security Tether for iPhone

The case component is matte black and clips around the iPhone, covering all four sides and the back. External volume buttons press through to the ones on the iPhone itself, but there's a cut-out to access the ringer silence switch and a microUSB port in the base rather than a Dock connector. So, this isn't a case that's suitable for use with certain iPhone accessories.

Featured Resources

Application security fallacies and realities

Web application attacks are the most common vulnerability, so what is the truth about application security?

Download now

Your first step researching Managed File Transfer

Advice and expertise on researching the right MFT solution for your business

Download now

The KPIs you should be measuring

How MSPs can measure performance and evaluate their relationships with clients

Download now

Life in the digital workspace

A guide to technology and the changing concept of workspace

Download now
Advertisement

Most Popular

Visit/operating-systems/25802/17-windows-10-problems-and-how-to-fix-them
operating systems

17 Windows 10 problems - and how to fix them

4 Nov 2019
Visit/strategy/28115/the-pros-and-cons-of-net-neutrality
Business strategy

The pros and cons of net neutrality

4 Nov 2019
Visit/domain-name-system-dns/34842/microsoft-embraces-dns-over-https-to-secure-the-web
Domain Name System (DNS)

Microsoft embraces DNS over HTTPS to secure the web

19 Nov 2019
Visit/social-media/34844/can-wikipedia-founders-social-network-really-challenge-facebook
social media

Can Wikipedia founder's social network really challenge Facebook?

19 Nov 2019