Ideas
Explore the world's #1 largest database of ideas and innovations, with over 400,000 inspiring examples.
Insights
Uncover major shifts and emerging opportunities with our exclusive PRO research.
Trend Reports
Discover why 750 brands rely on our AI-powered Trend Reports to get better, faster insights.
Newsletter
Join over 200,000 subscribers who rely on our weekly newsletter to keep up with need-to-know trends and insights.
Books
Join 20,000,000+ people getting better and faster with our New York Times Bestselling methods, best innovation books & keynote videos.
Dashboard
Get special access to premium content, topic tracking and customizable tools through our AI-powered Dashboard.
AI
Learn how the Trend Hunter harnesses the power of artificial intelligence.
Assessment
Enhance your innovation potential with a deeper understanding of your unique innovation archetype and how your organization benchmarks.
Overview
Accelerate innovation and ignite disruptive thinking with our award-winning programs and research.
Keynotes & Workshops
Empower your team with the insights and frameworks they need to innovate better and faster.
Custom Research
Get fast, customized trend reports, presentations and deep dives 20x faster than traditional research.
Plans
Get started today with a free consultation, our self-serve tools, or a dedicated program.
Jeremy Gutsche
Ignite your event with our CEO, a NY Times Bestselling Author and one of the top innovation keynote speakers.
Our Team of Futurists
Inspire your group with our most popular speakers on innovation, trends, change and futurism.
Contact
Get in touch to learn more, ask a question or submit a tip.
About Us
Learn more about Trend Hunter and how we accelerate innovation.
FAQ
Get answers to common questions about Trend Hunter.
Community
Stay on the cutting-edge with the help of the Trend Hunter community.
Team
Meet the team trusted by hundreds of leading businesses worldwide.
Jobs
Find opportunities to accelerate your career with the #1 Trend Firm.
Internships
Grow your professional skillset in an award-winning workplace.
News
Catch up on noteworthy Trend Hunter news and media mentions.
Join
Build a portfolio and put your trend-spotting abilities to the test.
Advertising
Supercharge your marketing by partnering with Trend Hunter.
Portfolio
Visit your public portfolio and browse your past articles.
Add a Trend
Write up an article and showcase your trend-spotting skills.
My Trends
Edit your articles and see how they stack up on the leaderboards.
Settings
Edit your profile, connect your social media accounts, and more.
Add a trend, customize your dashboard, or track topics.
Future Festival
World Summit
Join the world's top innovators at our 3-Day Toronto event.
Innovation Events
Explore our 2020 tour dates and find the best city to inspire your team.
Custom Events
Host a custom innovation conference in your city that will inform and inspire.
Custom Training
Bring the Future Festival experience directly to your team with custom training packages.
Search our database of over 390,000 cutting edge ideas.

23 E-Security Solutions

From Personally Secured Cloud Systems to Uncrackable Flash Drives

— December 17, 2014 — Tech
Whereas e-security and data protection were once solely the domain of government agencies and large corporations, the infiltration of computing and Internet use into every aspect of our daily lives means it is now just as important for the regular consumer.

Many people these days conduct highly sensitive dealings online. From paying credit card bills and filing taxes to sharing private photos and applying for jobs, everything is done on computers and smartphones these days. Meanwhile, tangible hard drives and flash drives are used to store prized and important personal documents.

This necessitates high-tech and easy-to-use data protection mechanisms that regular consumers as well as businesses and government agencies can call upon. The advent of cloud computing has made data sharing easier than ever but has also necessitated the development of cloud-centric tech security interventions.

Fingerprint detection, voice detection and GPS are just some of the technologies being used to provide e-security for the modern consumer.
6.4
Score
Popularity
Activity
Freshness
32
Protective Mobile Apps
Protective Mobile Apps
The Lookout App Uses Predictive Security to Protect Important Data
<
31
Personally Secured Cloud Systems
Personally Secured Cloud Systems
The WEDG is a New Form of the Cloud
<
30
Smartphone Button Wallets
Smartphone Button Wallets
The PUSH iPhone Wallet Works with a Touch of a Button
<
29
Iris-Scanning Smartphones
Iris-Scanning Smartphones
The Fujitsu Arrows NX F-04G Smartphone Features Iris Scanning Security
<
28
Privacy-Focused Smartphones
Privacy-Focused Smartphones
This Smartphone Wants to Give You Privacy From Unwanted Visitors
<
27
Smart WiFi-Defending Systems
Smart WiFi-Defending Systems
The Pylon WiFi System Shortcuts All the Stress of Handing Out WiFi
<
26
Inconspicuous Mobile Card Carriers
Inconspicuous Mobile Card Carriers
The Push Smartphone Wallet is Designed with Security in Mind
<
25
Sleek Wireless Security Systems
Sleek Wireless Security Systems
Dropcam Tab Keep Tabs on What's Open or Closed
<
24
Revolutionary Flash Drives
Revolutionary Flash Drives
The iStick Flash Drive is the First Ever Lightning-to-USB Flash Drive
<
23
Circular Security Tracking Devices
Circular Security Tracking Devices
The Lupo Tracking Unit Protects Your Valuables Remotley
<
22
Digital Currency Wallets
Digital Currency Wallets
The 'Trezor' Wallet Lets You Carry Your Bitcoins in Your Hand
<
21
Ultra-Secure Calling Apps
Ultra-Secure Calling Apps
The Signal App is Encrypted for Increased Security
<
20
Phone Thief Selfie Systems
Phone Thief Selfie Systems
Lookout's Thefties Feature Snaps a Photo of a Phone Theif
<
19
USB Fingerprint Scanners
USB Fingerprint Scanners
The HS100-10 Keeps the Secrets on Your Computer Safe
<
18
Secure Searching Sticks
Secure Searching Sticks
This USB Device Ensures Private Browsing and Internet Anonymity
<
17
Personal Iris Scanners
Personal Iris Scanners
The EyeLock Myris USB Authenticator Functions as Sci-Fi Tech Security
<
16
Eye-Controlled Prototype Smartphones
Eye-Controlled Prototype Smartphones
Fujitsu Foresees People Unlocking Phones with a Blink
<
15
Cellular Security Keys
Cellular Security Keys
Clarion Hotel Introduces New Wireless Technology Locking System
<
14
Intercepting Connection Devices
Intercepting Connection Devices
Portable Wi-Fi Jammer Blocks All Negative Signals to Your Phone
<
13
Home Cloud Devices
Home Cloud Devices
EzeeCube Provides Private Storage that Automatically Backs Up Photos and More
<
12
Fingerprint Password Protectors
Fingerprint Password Protectors
Secure Your Personal Information with myIDkey Identity Cards
<
11
Electrical Spike Protectors
Electrical Spike Protectors
The Satechi Compact USB Surge Protector Safeguards Your Electronics
<
10
Dropbox Flash Drives
Dropbox Flash Drives
The iTwin USB Makes Transferring Files Easier and Safer
<
9
Twisting Security Thumbdrives
Twisting Security Thumbdrives
The Ur'SB Contorts Like a Turning Key to Unlock Your Private Files
<
8
High Security Tablet Locks
High Security Tablet Locks
Griffin TechSafe Case Offers Serious Protection from Bumps and Thieves
<
7
Security-Storing Devices
Security-Storing Devices
The Password Vault Acts as Your Privacy Repository
<
6
Touchscreen Credit Cards
Touchscreen Credit Cards
The MasterCard Display Card Allows People to Create One-Time Passwords
<
5
Padlock USB Keys
Padlock USB Keys
The Lok-It Numeric Flash Drive Requires a Combination to Access Data
<
4
Wallet-Consolidating Cards
Wallet-Consolidating Cards
The Plastc Card Can Replace Up to 20 Different Cards
<
3
Uncrackable Flash Drives
Uncrackable Flash Drives
The 'iStorage datAshur' is a Tough Data Stick
<
2
Fingerprint Security Wallets
Fingerprint Security Wallets
Dunhill's Biometric Wallets Uses High Security Technology
<
1
GPS-Trackable Wallets
GPS-Trackable Wallets
The Freedom Wallet by Royce Leather has a GPS Tracking System
<