iBeacon Security Part 3: Deployment Tips

Now that we understand how beacons work and best practices for keeping them secure, here are some tips for getting the most out of your beacons. Maintenance You should consider support costs beyond initial beacon deployment. While battery powered devices may be attractive for easy initial deployment, battery replacement can drive up support costs. A…

READ MORE

iBeacon Security Part 2: Beacon Privacy and Security

In the first part of the series, I talked about how beacons worked and the availability of the identifiers that are broadcast out from the iBeacon. Now that we covered the operations of how beacons work, let’s talk privacy. While an iBeacon broadcasts identifiers publicly, an iPhone does not need to connect to an iBeacon-enabled…

READ MORE

iBeacon Security Part 1: Beacon Basics—How do beacons even work?

Two words you keep hearing are iBeacon and security. What is a beacon? How do you keep them secure? It’s important when deploying iBeacon technology to understand how beacons are used and appropriate ways to assess beacon security. Let’s start off simple. How do beacons even work? Beacons that support iBeacon-technology do not broadcast content…

READ MORE