Home and neighbourhood security

February 2018 Editor's Choice, Perimeter Security, Alarms & Intruder Detection, Products & Solutions

Fynoti is a Danish-based startup company that aims to deliver the most cost-effective home, personal and neighbourhood security solutions to its clients. Customers can buy a Fynoti for as low as $9 with no ongoing monthly fees.

The Fynoti home alarm system is a standalone, wireless device that users can place unobtrusively in their homes. It is ideal for a shelf or small table, for example. The system is completely wireless and runs on batteries that will last for more than a year. Users can interchange the cover on the device to find a look that matches with their decorative scheme. A wide range of styles and colours are available.

The system also comes with an intuitive mobile app, available for iOS and Android that allows users to control and monitor their system conveniently from the mobile device of their choosing. The free app also comes with an advanced neighbourhood watch system, which automatically connects users in the same neighbourhood together. This enables them to work together to help keep their neighbourhood as safe as possible. The more residents in a neighbourhood who use Fynoti, the safer the environment will be for everyone who lives there.

To help draw attention to this new product, Fynoti teamed up with strongman and actor Hafthor Julius Bjornsson for promotional content. People may know the actor for his role as The Mountain from the popular TV show Game of Thrones.

See the video at https://goo.gl/fV7K4L, or go to www.fynoti.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Deepfakes and digital trust
Editor's Choice
By securing the video right from the specific camera that captured it, there is no need to prove the chain of custody for the video, you can verify the authenticity at every step.

Read more...
A new generational framework
Editor's Choice Training & Education
Beyond Generation X, and Millennials, Dr Chris Blair discusses the seven decades of technological evolution and the generations they defined, from the 1960’s Mainframe Cohort, to the 2020’s AI Navigators.

Read more...
Back-up securely and restore in seconds
Betatrac Telematic Solutions Editor's Choice Information Security Infrastructure
Betatrac has a solution that enables companies to back-up up to 8 TB of data onto a device and restore it in 30 seconds in an emergency, called Rapid Access Data Recovery (RADR).

Read more...
Key design considerations for a control room
Leaderware Editor's Choice Surveillance Training & Education
If you are designing or upgrading a control room, or even reviewing or auditing an existing control room, there are a number of design factors that one would need to consider.

Read more...
How intrusion protection helps secure O&G operations
Surveillance Perimeter Security, Alarms & Intruder Detection Industrial (Industry)
For O&G operators in Africa, physical security remains one of the biggest considerations, particularly when it comes to perimeter protection and the ability to mitigate intruder-related incidents.

Read more...
Advanced surveillance storage from ASBIS
Infrastructure Surveillance Products & Solutions
From a video storage solutions perspective, SkyHawk drives, designed for DVRs and NVRs, offer high capacity, optimised firmware, and a reliability workload rating of hundreds of terabytes per year.

Read more...
CCTV control room operator job description
Leaderware Editor's Choice Surveillance Training & Education
Control room operators are still critical components of security operations and will remain so for the foreseeable future, despite the advances of AI, which serves as a vital enhancement to the human operator.

Read more...
A passport to offline backups
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure Smart Home Automation
SMART Security Solutions tested a 6 TB WD My Passport and found it is much more than simply another portable hard drive when considering the free security software the company includes with the device.

Read more...
Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...
Rewriting the rules of reputation
Technews Publishing Editor's Choice Security Services & Risk Management
Public Relations is more crucial than ever in the generative AI and LLMs age. AI-driven search engines no longer just scan social media or reviews, they prioritise authoritative, editorial content.

Read more...