Microservices Expo Authors: Pat Romanski, Elizabeth White, Mehdi Daoudi, Flint Brenton, Gordon Haff

News Feed Item

Route1 Comments on the Impact of Recent, Significant Data Security Events

MobiKEY Users remain Unaffected by Heartbleed Bug and Increased Litigation Risk

TORONTO, ONTARIO -- (Marketwired) -- 04/23/14 -- Route1 Inc. (TSX VENTURE:ROI), a leading provider of secure access technologies for the mobile workspace that protects businesses and government agencies and whose customers include the U.S. Department of Defense, the Department of Homeland Security, the Department of Energy and the Government of Canada, today released a statement on recent, important developments pertaining to corporate data security and Enterprise Mobility Practices.

NJ Court Ruling: FTC Authority

On April 7, 2014, U.S. District Judge Esther Salas of New Jersey affirmed that the Federal Trade Commission could proceed with its lawsuit against Wyndham Worldwide Corp. as a result of the company's failure to safeguard customer information, which resulted in multiple breaches of personal information. The ruling is a significant step towards holding organizations legally liable for failing to implement and enforce proper security controls for sensitive data.

As part of its thought leadership program, Route1 routinely speaks with its senior-level government and private sector clients to identify trends and emerging challenges in the market. As a result of these interactions Route1 issued a white paper on the possible legal implications of BYOD security policy in September 2013. Judge Salas' decision reinforces the assertions made in the white paper: poor data security policy will ultimately lead to legal action against an organization.

Tony Busseri, Route1 CEO, noted, "The New Jersey court's ruling confirms our assertion that legal consequences are a very concrete risk that organizations accept when settling for inadequate data security measures. As evidenced by Judge Salas' decision, proper technological controls must be put in place to ensure the security of sensitive information. Information Security can affect the financial well-being of the entire organization and thus ceases to simply be an IT function. Boards and executive management teams can no longer ignore the topic."

In pursuit of increased productive enterprise mobility initiatives are often rolled out without proper consideration of the two most common risk vectors leading to data breaches: Lost or stolen devices and USB sticks on one side, and the propagation of malware or viruses via compromised remote assets on the other side. Reducing these risks through policy has proven to be ineffective. Instead we are seeing organizations seeking to implement technology that allows them to unlock the productivity gains of BYOD and mobile access while neutralizing these risk vectors. High assurance access to enterprise resources can be enabled without actually downloading data to the remote devices. This way all sensitive data stays within the enterprise network and its established security controls. The cost effectiveness of this approach is self-evident. Instead of spending time and money on managing and controlling the remote asset, you simply ensure its identity, restrict its access and never let it cache or download anything.

The Heartbleed Bug: The end of single factor authentication

The New Jersey Court's decision coincides with the recent discovery of the widespread Heartbleed Bug. The Heartbleed Bug is a flaw in the OpenSSL open-source encryption implementation that is used across roughly two-thirds of available Internet services and website. The full extent of the fallout from the Heartbleed Bug is still unfolding, but it poses the very real possibility that untold millions of usernames and passwords, that were used only once with a vulnerable internet service are now in the hands of malicious parties.

Mr. Busseri continued, "Verizon just released its 2013 Data Breach Investigation Report and confirms that stolen passwords are used by hackers in the majority of data breaches. With Heartbleed we now have a situation where you need to assume that all of the limited number of passwords your employees use have been compromised on a web service that uses OpenSSL. Accordingly, you have to implement multifactor authentication when granting mobile access to corporate data. This is now a priority that simply cannot wait. Our customers continue to belief that integration of smart card technology is the easiest, most user-friendly, reliable and cost effective way to do so."

MobiKEY, Route1's flagship technology, meets all the named requirements. It features a smartcard enabled, cryptographic USB device or smartcard reader to ensure that employees leave no trace or evidence of their computing session when remotely accessing sensitive data. All enterprise files stay within the corporate network, simplifying security policy enforcement. Most importantly, MobiKEY does not require any changes to your IT infrastructure; instead it integrates with deployed technologies and can be rolled out in a matter of hours.

If a MobiKEY is lost or stolen, enterprise networks cannot be compromised in any way - unlike other portable devices that can be used to store sensitive data and can easily put organizations at risk. Just as a cell phone service can be suspended or cancelled when loss or theft occurs, digital certificates issued to MobiKEY can be temporarily suspended or revoked.

By providing airtight protection against data loss, MobiKEY enables organization to unlock the productivity gains of BYOD and mobile access without exposing them to the embarrassing and costly effects of prolonged litigation. Ultimately, MobiKEY provides enterprises with stability - technologically, legally and financially.

Mr. Busseri adds, "Complex times do not require complex solutions but rather simple ones that directly address the core problems of data security. Keeping sensitive data within the enterprise network via MobiKEY is such a solution. MobiKEY unlocks the productive gains that mobility promises without exposing organizations to the risk of data loss or litigation."


Route1 enables the mobile workspace without compromising on security. Its flagship technology MobiKEY uniquely combines secure mobile access, with high assurance identity validation and plug-and-play usability. Remote and mobile workers are able to securely and cost effectively access their workspace from any device without exposing the organization to the risk of data spillage or malware propagation. MobiKEY customers include Fortune 500 enterprises as well as the U.S. Department of Defense, the Department of Homeland Security, the Department of Energy and the Government of Canada. Headquartered in Toronto, Canada, Route1 is listed on the TSX Venture Exchange.

For more information, visit our website at: www.route1.com.

This news release, required by applicable Canadian laws, does not constitute an offer to sell or a solicitation of an offer to buy any of the securities in the United States. The securities have not been and will not be registered under the United States Securities Act of 1933, as amended (the "U.S. Securities Act") or any state securities laws and may not be offered or sold within the United States or to U.S. Persons unless registered under the U.S. Securities Act and applicable state securities laws or an exemption from such registration is available.

Neither the TSX Venture Exchange nor its Regulation Services Provider (as that term is defined in the policies of the TSX Venture Exchange) accepts responsibility for the adequacy or accuracy of this release.

© Route1 Inc., 2014. All rights reserved. Route1, the Route1 and shield design Logo, SECURING THE DIGITAL WORLD, Mobi, MobiSecure, MobiLINK, Route1 MobiKEY, Route1 MobiVDI, MobiKEY, MobiKEY IBAD, DEFIMNET, MobiNET, Route1 MobiNET, TruOFFICE, TruFLASH, TruOFFICE VDI, MobiKEY Fusion, MobiNET Aggregation Gateway, MobiNET Switching Array, MobiNET Secure Gateway, EnterpriseLIVE, EnterpriseLIVE Virtualization Orchestrator, MobiNET Agent, MobiKEY Classic and MobiKEY Classic 2, are either registered trademarks or trademarks of Route1 Inc. in the United States and or Canada. All other trademarks and trade names are the property of their respective owners. The DEFIMNET and MobiNET platforms, the MobiKEY, MobiKEY Classic, MobiKEY Classic 2 and MobiKEY Fusion devices, and MobiLINK are protected by U.S. Patents 7,814,216 and 7,739,726, Canadian Patent 2,578,053, and other patents pending.

Other product and company names mentioned herein may be trademarks of their respective companies.

Route1 Inc.
Tony Busseri
+1 416 814-2635
[email protected]

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

@MicroservicesExpo Stories
There is a huge demand for responsive, real-time mobile and web experiences, but current architectural patterns do not easily accommodate applications that respond to events in real time. Common solutions using message queues or HTTP long-polling quickly lead to resiliency, scalability and development velocity challenges. In his session at 21st Cloud Expo, Ryland Degnan, a Senior Software Engineer on the Netflix Edge Platform team, will discuss how by leveraging a reactive stream-based protocol,...
"We started a Master of Science in business analytics - that's the hot topic. We serve the business community around San Francisco so we educate the working professionals and this is where they all want to be," explained Judy Lee, Associate Professor and Department Chair at Golden Gate University, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
For over a decade, Application Programming Interface or APIs have been used to exchange data between multiple platforms. From social media to news and media sites, most websites depend on APIs to provide a dynamic and real-time digital experience. APIs have made its way into almost every device and service available today and it continues to spur innovations in every field of technology. There are multiple programming languages used to build and run applications in the online world. And just li...
The general concepts of DevOps have played a central role advancing the modern software delivery industry. With the library of DevOps best practices, tips and guides expanding quickly, it can be difficult to track down the best and most accurate resources and information. In order to help the software development community, and to further our own learning, we reached out to leading industry analysts and asked them about an increasingly popular tenet of a DevOps transformation: collaboration.
We call it DevOps but much of the time there’s a lot more discussion about the needs and concerns of developers than there is about other groups. There’s a focus on improved and less isolated developer workflows. There are many discussions around collaboration, continuous integration and delivery, issue tracking, source code control, code review, IDEs, and xPaaS – and all the tools that enable those things. Changes in developer practices may come up – such as developers taking ownership of code ...
The dynamic nature of the cloud means that change is a constant when it comes to modern cloud-based infrastructure. Delivering modern applications to end users, therefore, is a constantly shifting challenge. Delivery automation helps IT Ops teams ensure that apps are providing an optimal end user experience over hybrid-cloud and multi-cloud environments, no matter what the current state of the infrastructure is. To employ a delivery automation strategy that reflects your business rules, making r...
Cloud Governance means many things to many people. Heck, just the word cloud means different things depending on who you are talking to. While definitions can vary, controlling access to cloud resources is invariably a central piece of any governance program. Enterprise cloud computing has transformed IT. Cloud computing decreases time-to-market, improves agility by allowing businesses to adapt quickly to changing market demands, and, ultimately, drives down costs.
Modern software design has fundamentally changed how we manage applications, causing many to turn to containers as the new virtual machine for resource management. As container adoption grows beyond stateless applications to stateful workloads, the need for persistent storage is foundational - something customers routinely cite as a top pain point. In his session at @DevOpsSummit at 21st Cloud Expo, Bill Borsari, Head of Systems Engineering at Datera, explored how organizations can reap the bene...
How is DevOps going within your organization? If you need some help measuring just how well it is going, we have prepared a list of some key DevOps metrics to track. These metrics can help you understand how your team is doing over time. The word DevOps means different things to different people. Some say it a culture and every vendor in the industry claims that their tools help with DevOps. Depending on how you define DevOps, some of these metrics may matter more or less to you and your team.
"CA has been doing a lot of things in the area of DevOps. Now we have a complete set of tool sets in order to enable customers to go all the way from planning to development to testing down to release into the operations," explained Aruna Ravichandran, Vice President of Global Marketing and Strategy at CA Technologies, in this SYS-CON.tv interview at DevOps Summit at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
"We are an integrator of carrier ethernet and bandwidth to get people to connect to the cloud, to the SaaS providers, and the IaaS providers all on ethernet," explained Paul Mako, CEO & CTO of Massive Networks, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
"Grape Up leverages Cloud Native technologies and helps companies build software using microservices, and work the DevOps agile way. We've been doing digital innovation for the last 12 years," explained Daniel Heckman, of Grape Up in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
"NetApp's vision is how we help organizations manage data - delivering the right data in the right place, in the right time, to the people who need it, and doing it agnostic to what the platform is," explained Josh Atwell, Developer Advocate for NetApp, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
"Outscale was founded in 2010, is based in France, is a strategic partner to Dassault Systémes and has done quite a bit of work with divisions of Dassault," explained Jackie Funk, Digital Marketing exec at Outscale, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
"I focus on what we are calling CAST Highlight, which is our SaaS application portfolio analysis tool. It is an extremely lightweight tool that can integrate with pretty much any build process right now," explained Andrew Siegmund, Application Migration Specialist for CAST, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Let's do a visualization exercise. Imagine it's December 31, 2018, and you're ringing in the New Year with your friends and family. You think back on everything that you accomplished in the last year: your company's revenue is through the roof thanks to the success of your product, and you were promoted to Lead Developer. 2019 is poised to be an even bigger year for your company because you have the tools and insight to scale as quickly as demand requires. You're a happy human, and it's not just...
The enterprise data storage marketplace is poised to become a battlefield. No longer the quiet backwater of cloud computing services, the focus of this global transition is now going from compute to storage. An overview of recent storage market history is needed to understand why this transition is important. Before 2007 and the birth of the cloud computing market we are witnessing today, the on-premise model hosted in large local data centers dominated enterprise storage. Key marketplace play...
Cavirin Systems has just announced C2, a SaaS offering designed to bring continuous security assessment and remediation to hybrid environments, containers, and data centers. Cavirin C2 is deployed within Amazon Web Services (AWS) and features a flexible licensing model for easy scalability and clear pay-as-you-go pricing. Although native to AWS, it also supports assessment and remediation of virtual or container instances within Microsoft Azure, Google Cloud Platform (GCP), or on-premise. By dr...
With continuous delivery (CD) almost always in the spotlight, continuous integration (CI) is often left out in the cold. Indeed, it's been in use for so long and so widely, we often take the model for granted. So what is CI and how can you make the most of it? This blog is intended to answer those questions. Before we step into examining CI, we need to look back. Software developers often work in small teams and modularity, and need to integrate their changes with the rest of the project code b...
Kubernetes is an open source system for automating deployment, scaling, and management of containerized applications. Kubernetes was originally built by Google, leveraging years of experience with managing container workloads, and is now a Cloud Native Compute Foundation (CNCF) project. Kubernetes has been widely adopted by the community, supported on all major public and private cloud providers, and is gaining rapid adoption in enterprises. However, Kubernetes may seem intimidating and complex ...