Reviews

Kensington BungeeAir Power Wireless Security Tether for iPhone review

A wireless case and keyfob combination that sounds an alert if an iPhone 4 strays out of reach. But is it just another gimmick or a viable business accessory? Jennifer Scott aims to find out in this review.

Price
£66

Protecting the contents of a lost or stolen iPhone is all well and good, but it's obviously better not to part company with it the first place

Apple beefed up security in the last major release of iOS to make the iPhone more appealing to business users who deal with sensitive data, but strong passwords and secure encryption are only one line of defence.

Protecting the contents of a lost or stolen iPhone is all well and good, but it's obviously better not to part company with the device in the first place and that's just what the Kensington BungeeAir Power Wireless Security Tether is designed to ensure.

Kensington BungeeAir Power Wireless Security Tether for iPhone

The BungeeAir Power Wireless Security Tether is a two-part set-up that consists of an iPhone 4 case and an electronic fob, which attaches to a keying.

Wireless proximity alerts

The two are wirelessly paired and if the fob is taken beyond a certain range of the encased iPhone or vice versa an alarm sounds and the iPhone screen is locked. The idea is that this prevents an iPhone being left behind or from being moved without the owner's knowledge assuming the owner has remembered to bring the fob with them in the first place, of course.

Kensington BungeeAir Power Wireless Security Tether for iPhone

The case component is matte black and clips around the iPhone, covering all four sides and the back. External volume buttons press through to the ones on the iPhone itself, but there's a cut-out to access the ringer silence switch and a microUSB port in the base rather than a Dock connector. So, this isn't a case that's suitable for use with certain iPhone accessories.

Featured Resources

The ultimate law enforcement agency guide to going mobile

Best practices for implementing a mobile device program

Free download

The business value of Red Hat OpenShift

Platform cost savings, ROI, and the challenges and opportunities of Red Hat OpenShift

Free download

Managing security and risk across the IT supply chain: A practical approach

Best practices for IT supply chain security

Free download

Digital remote monitoring and dispatch services’ impact on edge computing and data centres

Seven trends redefining remote monitoring and field service dispatch service requirements

Free download

Recommended

SonicWall warns of imminent ransomware campaign on VPN hardware
virtual private network (VPN)

SonicWall warns of imminent ransomware campaign on VPN hardware

16 Jul 2021
Zyxel USG Flex 100 review: Flexible gateway security
unified threat management (UTM)

Zyxel USG Flex 100 review: Flexible gateway security

15 Apr 2021
Veritas Access Appliance with IBM Spectrum® Protect
Server & storage

Veritas Access Appliance with IBM Spectrum® Protect

27 Nov 2020
Zoom starts rolling out end-to-end encryption for all users
encryption

Zoom starts rolling out end-to-end encryption for all users

27 Oct 2020

Most Popular

Best Linux distros 2021
operating systems

Best Linux distros 2021

11 Oct 2021
Apple MacBook Pro 15in vs Dell XPS 15: Clash of the titans
Laptops

Apple MacBook Pro 15in vs Dell XPS 15: Clash of the titans

11 Oct 2021
Windows 11 has problems with Oracle VirtualBox
Microsoft Windows

Windows 11 has problems with Oracle VirtualBox

5 Oct 2021