Scale Your Business with Freshservice® ITSM Learn how Freshservice has helped businesses grow efficiently by modernizing IT and other business functions with a refreshingly easy-to-use, simple-to-configure, feature loaded, cost effective, secure and ITIL ready IT Service Management solution on the cloud.
Consumers are becoming increasingly concerned about the hacking of their devices and data as they hear about more data breaches and have their own experiences with issues such as ransomware, identity theft and botnet attacks.
Concerns about data security also have been shown to increase with ownership of more connected devices. Currently, U.S. broadband households own an average of 10.4 connected devices -- including entertainment, smart home, smart speaker and connected health devices.
Enterprise security applications have applied advanced artificial intelligence for some time, but the financial constraints of the consumer market make it challenging to afford the cost of enterprise-grade security solutions.
Data security solution companies like Cujo AI and Dojo recently have expanded their direct-to-consumer offerings with carrier-grade, cloud-supported security solutions that include a software agent designed to sit on the carrier-provided residential gateway/router to provide network security for consumers.
The Sci-Fi Prediction of VR – Pygmalion’s Spectacles. Stanley G. Weinbaum, a well-known science fiction writer from the 1930s, had the vision of what Virtual Reality is and what it may become, even before the official term was coined. In his 1930s short story Pygmalion’s Spectacles, he shares the idea that a wearer of a pair of goggles can experience fictional worlds through holographics, touch, smell and taste. This truly made him a visionary in the field of virtual reality.
These robust emerging solutions for the connected home apply machine learning technology to identify devices on the home network, detect anomalous endpoint behavior, monitor and detect incoming threats, identify unreliable phishing websites, and enable more robust digital parenting.
AI for Device Identification
Device identification on the home network is foundational to providing endpoint security, network security, and digital parenting. Solutions vary with respect to identification capabilities, ranging from identifying only basic MAC addresses to detailed device types, model, brand and operating system classifiers.
When a security agent is running on the network and leveraging cloud intelligence, it can tap on every endpoint connection and see the header info for every protocol handshake with the device.
In the best architectures, such as Comcast's collaboration with Asus and Cujo AI, router hardware and firmware are optimized for the network security application to ensure that throughput, latency, memory and CPU utilization are not diminished to a degree that results in erosion of the user experience. As with all machine learning, the more data the software application has available to process, the smarter it gets.
Virtual Reality Doesn’t Replace Real Life. Strapping on a virtual reality headset is an amazing experience. In fact, it’s so realistic that you almost feel as if you’re visiting a location or taking part in an activity. But the key word in this sentence is “almost.” Virtual reality isn’t meant to replace real life, but instead enhance it. One of the best examples of this is how the travel industry uses virtual reality. For destinations and hotels, virtual reality is a research tool that enables potential guests get a glimpse of what it would be like to visit or book a room.
AI for Endpoint and Network Security
The device information then informs a device profile that enables security software to identify unreliable device behavior without having to decrypt and examine the data packets. This kind of IoT device behavioral analysis identifies deviations from acceptable device behavior, alerts the user, and quarantines infected devices from the network.
Certain categories of devices, such as networked cameras, have a unique attack profile that often begins with remote access of the camera. AI enables learning the unique attack profiles, detecting them in real-time by looking at destination URLs and protocols employed, and enacting blocking strategies such as remote access protection.
AI for Parental Controls
Parental control features typically enable parents to set schedules, limit access to popular services, limit screen time, and block inappropriate content. AI also can be used for Web content filtering, and it can employ advanced text analysis to detect threats from cyberbullies and sexual predators. Some comprehensive parental controls, such as F-Secure Safe, extend to mobile devices even when they are outside the home network.
As critical as network security is to the user experience, consumers have shown modest interest in buying more robust security solutions that can protect the home network and IoT devices.
We know from consumer data that there is growing concern over security, and consumers consider security issues a barrier to purchasing Internet of Things products. Thirty-two percent of U.S. broadband households will not purchase a smart home device due to security and privacy concerns.
Jaron Lanier created a virtual reality device in the 1980’s (EyePhone 1/HRX) and costed up to $49,000 for the goggles and gloves.
Consumer reluctance could be due to a lack understanding and awareness of security solutions. Also, some consumers have found previous solutions inconvenient to use.
On the business model side, advanced embedded security features differentiate operators and increase the value of their offerings to help sell services. Such value-added features help maintain price positions in the face of fierce competition. Visibility into the home network and the devices on it creates operational efficiencies for support services and reduces costly truck rolls.
How Smart Should a Home Be?
Most embedded cybersecurity currently is leveraged this way. Embedded security solutions will provide future opportunities for incremental revenue where the carrier may include them as a value-add in a premium tier service, but sell them as add-on subscriptions to lower tiers.
For these reasons, home network security currently is evolving from endpoint solutions and secondary security hardware to embedded security offered by carriers.
Connected products will supplant unconnected models, and AI is creating a new value tier that will enable brands to be more competitive at the same price point -- or enable them to demand higher prices for hardware and services.
Virtual Reality technology is widely accepted in the healthcare field. From diagnostics to treatment to practicing difficult surgical procedures, healthcare institutions are incorporating the technology in all the facets of the industry.
AI can reduce operational expenses for service and support and create new revenue opportunities derived from enhanced knowledge of the customer and deeper engagement.