Mobileiron Analysis of Smartwatch Security Risks to Enterprise Data

Total Page:16

File Type:pdf, Size:1020Kb

Mobileiron Analysis of Smartwatch Security Risks to Enterprise Data MobileIron Analysis of Smartwatch Security Risks to Enterprise Data v 1.2 MKT-9170 | © 2015 MobileIron, Inc. 1 MobileIron Analysis of Smartwatch Security Risks to Enterprise Data Executive Summary Consumers are purchasing smartwatches to pair with downloaded and cached content, phone hardware their mobile devices to track health information, but information, and more. This particular pairing app also to access corporate email, calendar, contacts, and was downloaded outside of the Google Play store corporate apps. This can present a risk to enterprise and any potential risks present remind us of the data leading to possible data loss, but to what extent? importance of enforcing the curated apps within Google Play. For most organizations, smartwatch security became a priority with the release of the Apple Watch in April One of the most important aspects discovered during 2015. MobileIron had been analyzing smartwatch the research is the difference in passcode protections security risks prior to the Apple Watch release as of smartwatches when compared to mobile devices. demonstrated by the vulnerability identified and Most people are familiar with setting a mobile device reported to Samsung for the Samsung Gear 2 Neo back PIN or passcode as a fundamental security best in March 2015. Samsung was very responsive in issuing practice to avoid data loss in a lost or stolen scenario. a software update to disable this feature. Once the passcode is set, a time-based policy on the device locks the device, say after 15 minutes of MobileIron’s Security Research Team analyzed the non-use. Smartwatches use the passcode in a much myriad of various smartwatches to identify the risks to different way. They commonly use a proximity- enterprise data by pairing them with a mobile device based approach to protecting the smartwatch. The that is connected to enterprise resources, such as email passcode protection is enabled when the smartwatch or calendars. The team researched smartwatches that loses connectivity to the mobile device (typically can be paired with Android and iOS devices. Some Bluetooth), for example, if it was stolen. Furthermore, smatchwatches can pair with both the Android and the Apple Watch uses sensors to determine if it’s on iOS platforms. A pairing app is required for all of the the user’s wrist and enables the passcode protection smartwatches tested. when the sensor detects that it has been removed. In all of the smartwatches tested, the passcode was The team analyzed the Apple Watch, Motorola an option. The Apple Watch was the only one that Mobility Moto 360, Samsung Gear 2 Neo, and prompted for a passcode during setup. Shenzhen Qini U8 to ensure that a nice cross-section of smartwatches was analyzed. Each of these devices What follows is a detailed analysis of four represents a different wearable operating system. smartwatches, followed by a summary and best Additionally, the MobileIron Security Research practices guidance at the end of the whitepaper. Team analyzed the pairing apps installed on the mobile devices. While most pairing apps were benign, the whitepaper outlines a less common Chinese-manufactured smartwatch that presented some suspicious behaviors. This could pose a risk to personally identifiable information such as access to 2 MobileIron Analysis of Smartwatch Security Risks to Enterprise Data Samsung Gear 2 Neo One smartwatch that was analyzed was the Samsung Gear 2 Neo. This smartwatch can sync with an Android-based smartphone with the Samsung Gear pairing app. From there the user can pick and choose what apps to receive notifications from, as well as sync email, calendar, contacts, make calls, and sync and respond to SMS messages. Furthermore, attachments such as photos can be downloaded and saved on the smartwatch. When pairing the Gear 2 Neo with a corporate managed smartphone, the user can sync corporate email to the smartwatch. In this scenario, enterprise data is present on the smartwatch, so the data is potentially vulnerable to any risks to the watch itself. This was the genesis behind our research. The Samsung Gear 2 Neo provides an option for passcode protection, which is disabled by default and does not prompt the user to set it. This means that if the smartwatch was lost or stolen, an attacker would have full access to the data on the device. But if the user is security-minded they can find the PIN option under Settings on the smartwatch and can set a passcode, which only accepts numbers. It’s important to note that, as with many other smartwatches, the passcode protection is not time-based like a smartphone, but proximity-based. This means that as long as the smartwatch is paired with the smartphone, the passcode protection is disabled. Only when the smartwatch becomes unpaired with the smartphone – either because it’s outside proximity or because the user has disabled Bluetooth - the passcode protection becomes enabled. This is also the case when the smartwatch is rebooted. Next, the Security Research Team emulated a determined attacker whose goal is to obtain access to the data on the device. Analysis uncovered while a passcode can be enabled on the device, that an attacker could easily access the data through the micro-USB connection interface when USB debugging is enabled. While this allows for the syncing of data from a PC or Mac, there is also a command line shell. We determined that no passcode or account password was required to access the command line in this manner. For those familiar with the Android Debug Bridge (ADB), the Samsung Tizen operating system is very similar but requires the Tizen SDK. What’s key here is that tethering the smartwatch to a PC or Mac is very different than a smartphone. Syncing data between a smartwatch and a computer can be very different than syncing a mobile device and computer. Most iOS and Android smartphones and tablets require that you first enter the PIN to unlock 3 MobileIron Analysis of Smartwatch Security Risks to Enterprise Data the device before it can sync to a computer. The Samsung Gear 2 Neo does not require the user to unlock the smartwatch to access its data from a computer. Even with the passcode enabled, the command line can be accessed unauthenticated (this was recently patched by Samsung). It is quite common for users to enable USB debugging across smartphones and tablets and now smartwatches. USB debugging allows users to customize their devices by loading media such as music and pictures, as well as to side-load apps. If USB debugging is enabled, a determined attacker could navigate around the directory structure and view files on the device, including log files that enumerated further information. The Security Research Team was using the developer account, but there are known rooting techniques for the Samsung Gear 2 Neo that allow for privilege escalation to root. This vulnerability was shared with Samsung back in March 2015 through responsible disclosure, and Samsung was very responsive in issuing a software update to disable this feature. Motorola Mobility Moto 360 The Motorola Moto 360 is one of the leading smartwatches using the Android Wear platform and operating system. Like many of the other smartwatches, it leverages the Android Wear pairing app as well as the Motorola Connect app. Aside from the built-in health features and alarm, the Moto 360 allows notifications from apps, including email. It’s important to note that until Android app developers embrace Android Wear and add support in their apps, the Moto 360 will be able to access apps including email apps. Therefore the Moto 360 receives notifications, but viewing the details is relegated to the mobile device. Whether smartwatches receive notifications from business applications or actual content such as email, enterprises must consider the risks of such data on the Moto 360. Current versions of the Moto 360 purchased online or in stores do not seem to include the latest software update (Android Wear 5.1.1). This is important because the device has no password protection (ours was version 5.0.2). Whether paired or unpaired the device provides no lost or stolen protection. The latest software update Android Wear 5.1.1 adds optional password protection. Additionally, encryption is typically employed at the app level and is dependent on the developer’s desire to add it. The Security Research Team expects greater security enhancements to be available as the device and Android Wear platform mature and are accepted more in enterprise applications. 4 MobileIron Analysis of Smartwatch Security Risks to Enterprise Data Shenzhen Qini U8 For price-sensitive shoppers, generic smartwatches are available for purchase online. The Security Research Team acquired a Chinese-manufactured Shenzhen Qini U8 smartwatch, which runs Nucleus, a common embedded operating system. A pairing app is required to sync the smartwach with an Android smartphone. The “Smartwatch Helper” pairing app is available from an unknown IP address in China, notably outside of the Google Play store. The U8 Plus model now has a pairing app for Apple iOS. Once the Shenzhen Qini U8 was paired with the Android test smartphone over Bluetooth, data began to sync to the Messaging app. Notifications were received and permitted apps were allowed, including email. Contacts also synced to the device automatically. The only obvious security mechanism built into the device is the “anti-lost” feature that simply alarms when the device is lost, stolen, or simply out of range with the paired smartphone. There is no passcode option to protect the data on the device. The aforementioned “Smartwatch Helper” pairing app was also analyzed. Some suspicious behaviors were identified, such as the ability to retrieve information about the mobile service carrier, read the root filesystem, download cache, and collect the phone number, IMEI, and more.
Recommended publications
  • Texting on a Smartwatch Versus a Smartphone: a Comparison of Their Effects on Driving Performance
    TEXTING ON A SMARTWATCH VERSUS A SMARTPHONE: A COMPARISON OF THEIR EFFECTS ON DRIVING PERFORMANCE A Dissertation by Joel Persinger Master of Arts, Wichita State University, 2014 Bachelor of Science, Eastern Kentucky University, 2005 Submitted to the Department of Psychology and the faculty of the Graduate School of Wichita State University in partial fulfillment of the requirements for the degree of Doctor of Philosophy December 2017 ©Copyright 2017 by Joel A. Persinger All Rights Reserved TEXTING ON A SMARTWATCH VERSUS A SMARTPHONE: A COMPARISON OF THEIR EFFECTS ON DRIVING PERFORMANCE The following faculty members have examined the final copy of this dissertation for form and content, and recommend that it be accepted in partial fulfillment of the requirement for the degree of Doctor of Philosophy, with a major in Psychology. _____________________________________________ Rui Ni, Committee Chair _____________________________________________ Alex Chaparro, Committee Member _____________________________________________ Barbara Chaparro, Committee Member _____________________________________________ Jibo He, Committee Member _____________________________________________ Jeremy Patterson, Committee Member Accepted for the College of Liberal Arts and Sciences _______________________________________________ Ron Matson, Dean Accepted for the Graduate School _______________________________________________ Dennis Livesay, Dean iii DEDICATION To my beautiful wife, who has pushed me to go further than I ever thought I could. She has truly carried me though graduate school with love and encouragement. iv ABSTRACT The National Safety Council reports that 6 percent or more car crashes involved text messaging from a smartphone. In addition, many studies have found that cell phone while driving increases crash risk by 2.8–5 times (Klauer et al. 2006; Redelmeier and Tibshirani 1997; Violanti 1998; Violanti and Marshall 1996).
    [Show full text]
  • Mobile Gaming Victor Bahl 8.13.2012 Internet & Devices Growth (Obligatory Slide)
    mobile gaming Victor Bahl 8.13.2012 internet & devices growth (obligatory slide) Apps are ~$10 Billion market, growing at ~100% per year Fun Fact: Getting to 1 M users: AOL: 9 years; Facebook: 9 months; “Draw Something”: 9 days Mobility & Networking, Microsoft Research bandwidth demand! 1 ~ 10 billion mobile devices in 2016 10B (1.4 devices / human) 6B 6 2007 2011 2007 2011 2016 2011-2016 ~ 18X growth in mobile data traffic2 (~ 10 exabytes / month) Source: (1) GSMA; (2) Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2011–2016 Mobility & Networking, Microsoft Research gaming today Source: Strategy Analytics - Apptrax4 Mobility & Networking, Microsoft Research …but you already knew that Some things I heard today: . how game analytics was used to increase dwell time . how in-the-wild user behavior may be modeled (& used) . The challenges in getting to MMOG games . wireless peer-to-peer games . power management by making use of saliency All great stuff, let me say a few words about some things I didn’t hear ….. Mobility & Networking, Microsoft Research services behind the games Fun fact: in 2011 ~$12 billion was spent on social/mobile games in 2015 revenue is projected to be ~24 billion (19% CGR) Apps that connect to backends receive higher rankings and more downloads because they are likely dynamic with more fresh content and are more social and contextual - Kinvey Inc., 2012 Xbox LIVE 30% growth year over year 40+ Million Users 2.1 billion hours played per month 35 Countries 176,802,201,383 Gamer Points scored
    [Show full text]
  • Android Operating System
    Software Engineering ISSN: 2229-4007 & ISSN: 2229-4015, Volume 3, Issue 1, 2012, pp.-10-13. Available online at http://www.bioinfo.in/contents.php?id=76 ANDROID OPERATING SYSTEM NIMODIA C. AND DESHMUKH H.R. Babasaheb Naik College of Engineering, Pusad, MS, India. *Corresponding Author: Email- [email protected], [email protected] Received: February 21, 2012; Accepted: March 15, 2012 Abstract- Android is a software stack for mobile devices that includes an operating system, middleware and key applications. Android, an open source mobile device platform based on the Linux operating system. It has application Framework,enhanced graphics, integrated web browser, relational database, media support, LibWebCore web browser, wide variety of connectivity and much more applications. Android relies on Linux version 2.6 for core system services such as security, memory management, process management, network stack, and driver model. Architecture of Android consist of Applications. Linux kernel, libraries, application framework, Android Runtime. All applications are written using the Java programming language. Android mobile phone platform is going to be more secure than Apple’s iPhone or any other device in the long run. Keywords- 3G, Dalvik Virtual Machine, EGPRS, LiMo, Open Handset Alliance, SQLite, WCDMA/HSUPA Citation: Nimodia C. and Deshmukh H.R. (2012) Android Operating System. Software Engineering, ISSN: 2229-4007 & ISSN: 2229-4015, Volume 3, Issue 1, pp.-10-13. Copyright: Copyright©2012 Nimodia C. and Deshmukh H.R. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
    [Show full text]
  • A Survey Onmobile Operating System and Mobile Networks
    A SURVEY ONMOBILE OPERATING SYSTEM AND MOBILE NETWORKS Vignesh Kumar K1, Nagarajan R2 (1Departmen of Computer Science, PhD Research Scholar, Sri Ramakrishna College of Arts And Science, India) (2Department of Computer Science, Assistant Professor, Sri Ramakrishna College Of Arts And Science, India) ABSTRACT The use of smartphones is growing at an unprecedented rate and is projected to soon passlaptops as consumers’ mobile platform of choice. The proliferation of these devices hascreated new opportunities for mobile researchers; however, when faced with hundreds ofdevices across nearly a dozen development platforms, selecting the ideal platform is often met with unanswered questions. This paper considers desirable characteristics of mobileplatforms necessary for mobile networks research. Key words:smart phones,platforms, mobile networks,mobileplatforms. I.INTRODUCTION In a mobile network, position of MNs has been changing due todynamic nature. The dynamic movements of MNs are tracked regularlyby MM. To meet the QoS in mobile networks, the various issuesconsidered such as MM, handoff methods, call dropping, call blockingmethods, network throughput, routing overhead and PDR are discussed. In this paper I analyse the five most popular smartphone platforms: Android (Linux), BlackBerry, IPhone, Symbian, and Windows Mobile. Each has its own set of strengths and weaknesses; some platforms trade off security for openness, code portability for stability, and limit APIs for robustness. This analysis focuses on the APIs that platforms expose to applications; however in practice, smartphones are manufactured with different physical functionality. Therefore certain platform APIs may not be available on all smartphones. II.MOBILITY MANAGEMENT IP mobility management protocols proposed by Alnasouri et al (2007), Dell'Uomo and Scarrone (2002) and He and Cheng (2011) are compared in terms of handoff latency and packet loss during HM.
    [Show full text]
  • Guidelines on Mobile Device Forensics
    NIST Special Publication 800-101 Revision 1 Guidelines on Mobile Device Forensics Rick Ayers Sam Brothers Wayne Jansen http://dx.doi.org/10.6028/NIST.SP.800-101r1 NIST Special Publication 800-101 Revision 1 Guidelines on Mobile Device Forensics Rick Ayers Software and Systems Division Information Technology Laboratory Sam Brothers U.S. Customs and Border Protection Department of Homeland Security Springfield, VA Wayne Jansen Booz-Allen-Hamilton McLean, VA http://dx.doi.org/10.6028/NIST.SP. 800-101r1 May 2014 U.S. Department of Commerce Penny Pritzker, Secretary National Institute of Standards and Technology Patrick D. Gallagher, Under Secretary of Commerce for Standards and Technology and Director Authority This publication has been developed by NIST in accordance with its statutory responsibilities under the Federal Information Security Management Act of 2002 (FISMA), 44 U.S.C. § 3541 et seq., Public Law (P.L.) 107-347. NIST is responsible for developing information security standards and guidelines, including minimum requirements for Federal information systems, but such standards and guidelines shall not apply to national security systems without the express approval of appropriate Federal officials exercising policy authority over such systems. This guideline is consistent with the requirements of the Office of Management and Budget (OMB) Circular A-130, Section 8b(3), Securing Agency Information Systems, as analyzed in Circular A- 130, Appendix IV: Analysis of Key Sections. Supplemental information is provided in Circular A- 130, Appendix III, Security of Federal Automated Information Resources. Nothing in this publication should be taken to contradict the standards and guidelines made mandatory and binding on Federal agencies by the Secretary of Commerce under statutory authority.
    [Show full text]
  • Guidelines on Mobile Device Forensics
    NIST Special Publication 800-101 Revision 1 Guidelines on Mobile Device Forensics Rick Ayers Sam Brothers Wayne Jansen http://dx.doi.org/10.6028/NIST.SP.800-101r1 NIST Special Publication 800-101 Revision 1 Guidelines on Mobile Device Forensics Rick Ayers Software and Systems Division Information Technology Laboratory Sam Brothers U.S. Customs and Border Protection Department of Homeland Security Springfield, VA Wayne Jansen Booz Allen Hamilton McLean, VA http://dx.doi.org/10.6028/NIST.SP. 800-101r1 May 2014 U.S. Department of Commerce Penny Pritzker, Secretary National Institute of Standards and Technology Patrick D. Gallagher, Under Secretary of Commerce for Standards and Technology and Director Authority This publication has been developed by NIST in accordance with its statutory responsibilities under the Federal Information Security Management Act of 2002 (FISMA), 44 U.S.C. § 3541 et seq., Public Law (P.L.) 107-347. NIST is responsible for developing information security standards and guidelines, including minimum requirements for Federal information systems, but such standards and guidelines shall not apply to national security systems without the express approval of appropriate Federal officials exercising policy authority over such systems. This guideline is consistent with the requirements of the Office of Management and Budget (OMB) Circular A-130, Section 8b(3), Securing Agency Information Systems, as analyzed in Circular A- 130, Appendix IV: Analysis of Key Sections. Supplemental information is provided in Circular A- 130, Appendix III, Security of Federal Automated Information Resources. Nothing in this publication should be taken to contradict the standards and guidelines made mandatory and binding on Federal agencies by the Secretary of Commerce under statutory authority.
    [Show full text]
  • Samsung Gear 2 Product Specifications
    Samsung Gear 2 Product Specifications: Display 1.63” Super AMOLED (320 x 320) AP 1.0 GHz Dual Core Processor OS Tizen based wearable platform Gear 2 : 2.0 Megapixel Auto Focus (1920x1080, 1080x1080, 1280x960) Camera Gear 2 Neo : N/A Codec: H.264(AVC), H.263 Video Format: 3GP, MP4 HD(720p, @30fps) Playback & Recording Codec: MP3/AAC/ AAC+/eAAC+ Audio Format: MP3, M4A, AAC, OGG Camera Auto Focus Camera, Sound & Shot, Location Tags, Signature Features Fitness Features: 1. Heart Rate sensor 2. Pedometer 3. Exercise Standalone Modes: Running, Walking Companion Modes: Cycling, Hiking 4. Sleep Music Player with Bluetooth® Headset and Speaker WatchON Remote: Remote Controller via IrLED Sensor Additional Basic Features: Features - Bluetooth Call, Camera, Notification(SMS, E-mail, Apps), Voice Memo, Contact, Find My Device, Gallery, Logs, Media Controller, Schedule, Smart Relay, S Voice, Stopwatch, Timer, Weather More Features(Downloadable): - Calculator, ChatON, Flashlight, Quick Settings Changeable Strap Color Options: - Gear 2 : Charcoal Black, Gold Brown and Wild Orange - Gear 2 Neo : Charcoal Black, Mocha Grey and Wild Orange IP67 Dust and Water Resistant, Noise Cancellation Samsung Services Samsung Apps Connectivity Bluetooth® v4.0 LE, IrLED Sensor Accelerometer, Gyroscope, Heart Rate RAM: 512MB Memory Storage: 4GB Internal Memory Gear 2 : 36.9 x 58.4x 10.0 mm, 68g Dimension Gear 2 Neo : 37.9 x 58.8 x 10.0mm, 55g Standard Battery, Li-ion 300mAh Battery Typical Usage 2~3 days, Low Usage up to 6 days About Samsung Electronics Co., Ltd. Samsung Electronics Co., Ltd. is a global leader in technology, opening new possibilities for people everywhere.
    [Show full text]
  • MOBILE OPERATING SYSTEM TRANSITION Insights and Considerations Mobile Operating System Transition – Insights and Considerations | 1
    MOBILE OPERATING SYSTEM TRANSITION Insights and Considerations Mobile Operating System Transition – Insights and Considerations | www.honeywellaidc.com 1 Introduction A shift in the mobile operating system landscape has occurred over the last several years. The transition from legacy Windows® is well underway. While there remain several distinct choices on the roadmap, the tradeoffs and compromises associated with each have become clearer. This paper will elaborate on these points and provide the reader with guidance on recommended solutions. Mobile Operating System Transition – Insights and Considerations | www.honeywellaidc.com 2 Table of contents 3 Mobile Operating System History 4 Legacy Operating Systems 5 Android Enterprise Evolution 6 How Honeywell Helps 8 Android Lifecycle Management 10 Conclusion and Recommendations Mobile Operating System Transition – Insights and Considerations | www.honeywellaidc.com 3 Mobile Operating System History For the open source Android operating system, Google OEMs and third parties began developing extensions that enabled device management capabilities, provided more control over user actions, and added support for Ten years ago, operating systems for mobile devices in the enterprise space were provided by Microsoft. Windows CE and Windows Mobile (later Windows Embedded Handheld) offered industrial Wi-Fi features and capabilities needed for enterprise deployment, while a robust ecosystem of networks and developer tools and third-party offerings allowed customers to create the solution needed barcode scanning to effectively operate and manage their businesses. Apple had only recently shown the first capabilities. iPhone®. Google acquired Android™ a few years earlier and had yet to see a phone come to market. Other options available at that time were largely focused around the white collar professional user and proved largely unsuitable for the unique needs of the purpose-built enterprise environment.
    [Show full text]
  • The Application of Personal Digital Assistants As Mobile Computing Device on Construction Site
    The Application of Personal Digital Assistants as Mobile Computing Device on Construction Site Kenji Kimoto, Kazuyoshi Endo, Satoru Iwashita and Mitsuhiro Fujiwara Konoike Construction Co., Ltd., Research Institute of Technology 1-20-1 Sakura, Tsukuba-Science City, IBARAKI 305-0003, Japan. {kimoto_kj, Iwashita_st, fujiwara_mh}@konoike.co.jp . Kogakuin University, Department of Architecture, 1-24-2 Nishishinjuku, Shinjyuku-ku, TOKYO 163-8677, Japan. [email protected] ABSTRACT: Construction managers need to access the real construction site to manage the construction project. They have recently handled various types of digital information such as drawings, specification, checklists and daily reports. They usually use sheets of paper and/or field notes. As a result, a gap in time and space between the outdoor construction site and the office, which leads to the low efficiency, occurs. This paper reports the application of PDA (Personal Digital Assistants) as mobile computing device for construction managers on construction sites. First, this paper describes the aim and the essential element of the mobile systems. This also shows the analysis of necessary functions as mobile computing device through the discussion with construction managers, and the concept of development of this computer-aided engineering system. Secondly, this paper describes the outline of below subsystems with PDA: Progress Monitoring System, Inspection System and Position Check System. Subsystems have two programs: the data input program in PDA and the output program in PC. Finally, this paper indicates the development of more refined process of construction management with the mobile computing device on construction site. • Progress Monitoring System has been built for construction managers to monitor the progress of works.
    [Show full text]
  • Presentación De Powerpoint
    Sergio Foncillas García Sales Manager Hospitality Agenda . Experiencia Mobility Hotel Samsung . Mercado Wearables . Características Wearables Samsung . Gear Fit . Gear 2 Neo / Gear . Aplicaciones actuales . Aplicaciones en desarrollo . Futuro wearables Samsung . Talent Program Gear 2 . Prueba de producto Experiencia Mobility Samsung Hotel https://www.youtube.com/watch?v=QmBHRLzJNXY La ‘Wearable Technology’ –o “tecnología para llevar puesta”- busca la integración y adaptación de la tecnología más avanzada a dispositivos que puedan llevarse encima de una manera cómoda. Se trata de gafas, relojes, anillos y pulseras que representan el futuro tecnológico y que, según las previsiones, tendrán un valor de mercado en el año 2018 superior a los 12.000 millones de dólares. Fuente: 1st Wearable Technology Conference Wearables Samsung Mide pulsaciones Aviso de llamadas, mensajes, emails… Conectado por Bluetooth a tu smartphone Samsung Fotografías (Gear 2) Resistente al agua y polvo (IP67) Llamadas de teléfono Aplicación S Health Podómetro, ejercicio, sueño, cuenta atrás, cronómetro, buscar dispositivo… Mando a distancia Sistema operativo Tizen Tarjeta de Embarque . Ejercicio . Nivel de stress . Sueño . SIMBAND: sensores modulares . Nueva plataforma de software . Presión arterial . Respiración . Frecuencia cardíaca . Nivel de hidratación … Aplicaciones en desarrollo Presente Geolocalización Realidad aumentada Códigos QR Acceso a parques temáticos, resorts… … Futuro Tarjeta SIM/MicroSIM incorporada NFC … Madrid, Abril de 2014 – Anunciamos una nueva edición de nuestro Talent Program, un concurso para desarrolladores con el objetivo de fortalecer el mercado de aplicaciones para wearables, como complemento de la iniciativa internacional “Samsung Gear App Challenge”. Mediante esta iniciativa, en Samsung queremos animar a los desarrolladores de aplicaciones a trabajar en proyectos para enriquecer las posibilidades de los dispositivos wearables como Samsung Gear 2 a través del SDK específico de Tizen.
    [Show full text]
  • Securing and Managing Wearables in the Enterprise
    White Paper: Securing and Managing Wearables in the Enterprise Streamline deployment and protect smartwatch data with Samsung Knox Configure White Paper: Securing and Managing Wearables in the Enterprise 2 Introduction: Smartwatches in the Enterprise As the wearable device market heats up, wrist-worn devices Industries as varied as healthcare, such as smartwatches are leading the pack. According to CCS Insight, forecasts for global sales of smart wearable devices finance, energy, transportation, will grow strongly over the next five years, with the global public safety, retail and hospitality market reaching nearly $30 billion by 2023.1 are deploying smartwatches for While smartwatches for fitness and activity tracking are popular, consumer demand is only part of the equation. added business value. Enterprises are also seeing business value in wearable devices. In a report by Robert Half Technology, 81 percent of CIOs surveyed expect wearable devices like smartwatches to Samsung has been working to address these concerns and become common tools in the workplace.2 has developed the tools to make its Galaxy and Galaxy Active smartwatches customizable, easily manageable and highly secure for enterprise users. This white paper will look at how these tools address key wearable security and manageability challenges, as well as considerations for smartwatch 81% deployments. of CIOs surveyed expect wearable devices like smartwatches to become common tools in the workplace. Industries as varied as healthcare, finance, energy, transportation, public safety, retail and hospitality are deploying smartwatches for added business value, such as hands-free communication for maintenance workers, task management, as well as physical monitoring of field workers in dangerous or remote locations.
    [Show full text]
  • Samsung Gear 2 Pro Instructions the Gear Fit2 Pro Is Referred to As the Gear in This Manual
    Samsung Gear 2 Pro Instructions The Gear Fit2 Pro is referred to as the Gear in this manual. • The items supplied 2 On another mobile device, launch Samsung Gear to connect to your Gear. 2. Tap Gear connection _ Remote connection. Note: You must connect the Gear to Wi-Fi and sign in to your Samsung account on the smartphone to enable. This app displays Google Navigation instructions on your Samsung Gear Fit2 smartwatch. It automatically installs the companion app on your Gear Fit2. To get Swim.com on your Samsung Gear Fit2 Pro or Galaxy Fit, you'll the watch for 2 seconds until the lock has been confirmed as disabled. Samsung Gear 2 Pro Instructions Click Here --> Refer user manual for troubleshooting instructions. Not all Samsung Gear Fit 2 Pro SM-R365 Smart Fitness Band (SM-R365NZKAXAR) Liquid Black - Large. No information is available for this page.Learn why Manuals and User Guides for Samsung Gear Fit2 Pro. We have 2 Samsung Gear Fit2 Pro manuals available for free PDF download: User Manual, Quick Start. Buy Samsung Gear Fit 2 Pro Fitness Tracker - UK Version - Black at Amazon UK. So when you are out on a cycle the watch does not give you directions. This is the Instruction manual for the Argos Product SAMSUNG GEAR FIT 2 PRO SMARTWATCH (759/6706) in PDF format. Product support is also available. your Gear Fit2 Pro to find manuals, specs, features, and FAQs. You can also register your product to gain access to Samsung's world-class customer support. From the Apps screen of the smartphone, tap Samsung Gear.
    [Show full text]