Smart burglar alarms: Look who just tossed their hat into the ring ... It's, er, Ring

Launch comes a week after Nest does the same

The smart home battleground has moved to security systems, with smart doorbell biz Ring announcing this week a new product just days before Nest dove into the same market.

The Ring Protect is very similar to Nest's Secure system launched last month in that it aims to be a simpler, friendlier version of traditional beige boxes stuck on walls. However, Ring's Protect is significantly less expensive.

Nest's basic security bundle will be $499; Ring's is $199. And for that you get a keypad, base station, one door or window sensor, a passive infrared sensor and an extender that uses Z-wave for comms.

The main difference between the two systems is that Nest offer tags that you can attach to your keys and turn the system on and off without having to punch in a number.

The next Nest? We talk to Ring, the doorbell-come-security system


Ring says its product will offer an "incredibly effective level of security compared to expensive legacy systems… at a fraction of the cost." As opposed to home security giants like ADT, Ring says it will not tie you into a contract or add additional fees: you buy the system and a monitoring service will cost $10 a month.

The manufacturer is also making the same pitch as Nest: the system will work with its other products, its doorbells and smart cams, providing a smarter overall security system. And it matches the most recent iterations of home security companies by offering access to the system through a smartphone app.

Obvious entry

In many ways, burglar alarms are an obvious entry point for smart home companies: the market is ripe for shaking up. But even so, there is little revolutionary with either Nest's or Ring's latest security gear. They still rely on the same basic setup: a base station, motion sensors that talk to it, and a keypad to disarm or arm the system.

All products come with a more modern design and style but are the same size and use the same basic approaches. The motion sensors are still quite big and are stuck on with adhesive. Base stations look like base stations.

Nest's kit is a little more sophisticated in that it has one sensor to detect both motion within a room and motion of a specific thing – a door or window – and it brings corporate-style security with the use of electronic tags.

But that sophistication comes with a price: we calculated for an average house the overall cost would hit $1,000. Ring's system – which can be ordered now and will be available, just like Nest's, next month – will be less than half that. Although, unusually, Ring has not announced the cost of additional sensors so it is hard to know for sure.

Nest's monitoring is also going to be much more expensive: $5 a month for cellular coverage, $5 a month for each camera for full storage, and as-yet undisclosed pricing from MONI Smart Security for following up on any alerts. Ring's $10 a month, by contrast, includes unlimited camera storage.


In this sense, Nest and Ring have nearly split the market into mainstream and high-end with the Ring system doing everything you need a security system to do but at lower cost and Nest offers bells and whistle but at a cost. The big question is: will folks go for either?

One Ring to pwn them all: IoT doorbell can reveal your Wi-Fi key


Security system flingers go out of their way to tie people into their systems, offering steep discounts on the hardware in return for customers signing two-year contracts. The companies know that if people have a box already in their house they are likely to simply renew subscriptions rather than go to the trouble of introducing a whole new system.

Many of these gizmos are also designed to be a closed shop: installers work within an unnecessarily complex and occasionally byzantine system to get everything working. It is beyond the capabilities of most homeowners to figure out how to wrangle their equipment.

It may be that if people already have Ring or Nest products they decide to replace their existing home alarm system; it may be that people who have considered security systems but never installed one are persuaded to go with a new burglar catcher.

But, unlike smart doorbells – that let you see and talk to people at your doorstep – and smart themostats – that save you money by optimizing your house's heating and cooling systems – these devices do not offer a huge advantage over existing players in the home alarm market. They do look nicer and work with other internet-connected gadgets, but whether that is enough for consumers to part with their money, it's hard to know. ®

Similar topics

Other stories you might like

  • Makers of ad blockers and browser privacy extensions fear the end is near
    Overhaul of Chrome add-ons set for January, Google says it's for all our own good

    Special report Seven months from now, assuming all goes as planned, Google Chrome will drop support for its legacy extension platform, known as Manifest v2 (Mv2). This is significant if you use a browser extension to, for instance, filter out certain kinds of content and safeguard your privacy.

    Google's Chrome Web Store is supposed to stop accepting Mv2 extension submissions sometime this month. As of January 2023, Chrome will stop running extensions created using Mv2, with limited exceptions for enterprise versions of Chrome operating under corporate policy. And by June 2023, even enterprise versions of Chrome will prevent Mv2 extensions from running.

    The anticipated result will be fewer extensions and less innovation, according to several extension developers.

    Continue reading
  • Apple gets lawsuit over Meltdown and Spectre dismissed
    Judge finds security is not a central feature of iDevices

    A California District Court judge has dismissed a proposed class action complaint against Apple for allegedly selling iPhones and iPads containing Arm-based chips with known flaws.

    The lawsuit was initially filed on January 8, 2018, six days after The Register revealed the Intel CPU architecture vulnerabilities that would later come to be known as Meltdown and Spectre and would affect Arm and AMD chips, among others, to varying degrees.

    Amended in June, 2018 the complaint [PDF] charges that the Arm-based Apple processors in Cupertino's devices at the time suffered from a design defect that exposed sensitive data and that customers "paid more for their iDevices than they were worth because Apple knowingly omitted the defect."

    Continue reading
  • Threat and risk specialists signal post-COVID conference season is back on
    Well, we'll see in a week or so

    RSA Conference For the first time in over two years the streets of San Francisco have been filled by attendees at the RSA Conference and it seems that the days of physical cons are back on.

    The security conference trade has been more cautious than most when it comes to getting conferences back up to speed in the COVID years. Almost all cons were virtual with a very limited hybrid-conference season last year, including DEF CON, where masks were taken seriously. People still wanted to mingle and ShmooCon too went ahead, albeit later than usual in March.

    The RSA conference has been going for over 30 years and many security folks love going. There are usually some good talks, it's a chance to meet old friends, and certain pubs host meetups where more constructive work gets done on hard security ideas than a month or so of Zoom calls.

    Continue reading
  • Travis CI exposes free-tier users' secrets – new claim
    API can be manipulated to reveal tokens in clear text log data

    Travis CI stands for "Continuous Integration" but might just as well represent "Consciously Insecure" if, as security researchers claim, the company's automation software exposes secrets by design.

    Aqua Security Software on Monday said its researchers had reported a data disclosure vulnerability with the Travis CI API. The response they said they received is that everything is working as intended.

    In a blog post security researchers Yakir Kadkoda, Ilay Goldman, Assaf Morag, and Ofek Itach said they had found tens of thousands of user tokens were accessible through the Travis CI API, which provides a way to fetch clear-text log files.

    Continue reading

Biting the hand that feeds IT © 1998–2022