Microservices Expo Authors: Zakia Bouachraoui, Pat Romanski, Elizabeth White, Liz McMillan, Yeshim Deniz

News Feed Item

Route1 Comments on the Impact of Recent, Significant Data Security Events

MobiKEY Users remain Unaffected by Heartbleed Bug and Increased Litigation Risk

TORONTO, ONTARIO -- (Marketwired) -- 04/23/14 -- Route1 Inc. (TSX VENTURE: ROI), a leading provider of secure access technologies for the mobile workspace that protects businesses and government agencies and whose customers include the U.S. Department of Defense, the Department of Homeland Security, the Department of Energy and the Government of Canada, today released a statement on recent, important developments pertaining to corporate data security and Enterprise Mobility Practices.

NJ Court Ruling: FTC Authority

On April 7, 2014, U.S. District Judge Esther Salas of New Jersey affirmed that the Federal Trade Commission could proceed with its lawsuit against Wyndham Worldwide Corp. as a result of the company's failure to safeguard customer information, which resulted in multiple breaches of personal information. The ruling is a significant step towards holding organizations legally liable for failing to implement and enforce proper security controls for sensitive data.

As part of its thought leadership program, Route1 routinely speaks with its senior-level government and private sector clients to identify trends and emerging challenges in the market. As a result of these interactions Route1 issued a white paper on the possible legal implications of BYOD security policy in September 2013. Judge Salas' decision reinforces the assertions made in the white paper: poor data security policy will ultimately lead to legal action against an organization.

Tony Busseri, Route1 CEO, noted, "The New Jersey court's ruling confirms our assertion that legal consequences are a very concrete risk that organizations accept when settling for inadequate data security measures. As evidenced by Judge Salas' decision, proper technological controls must be put in place to ensure the security of sensitive information. Information Security can affect the financial well-being of the entire organization and thus ceases to simply be an IT function. Boards and executive management teams can no longer ignore the topic."

In pursuit of increased productive enterprise mobility initiatives are often rolled out without proper consideration of the two most common risk vectors leading to data breaches: Lost or stolen devices and USB sticks on one side, and the propagation of malware or viruses via compromised remote assets on the other side. Reducing these risks through policy has proven to be ineffective. Instead we are seeing organizations seeking to implement technology that allows them to unlock the productivity gains of BYOD and mobile access while neutralizing these risk vectors. High assurance access to enterprise resources can be enabled without actually downloading data to the remote devices. This way all sensitive data stays within the enterprise network and its established security controls. The cost effectiveness of this approach is self-evident. Instead of spending time and money on managing and controlling the remote asset, you simply ensure its identity, restrict its access and never let it cache or download anything.

The Heartbleed Bug: The end of single factor authentication

The New Jersey Court's decision coincides with the recent discovery of the widespread Heartbleed Bug. The Heartbleed Bug is a flaw in the OpenSSL open-source encryption implementation that is used across roughly two-thirds of available Internet services and website. The full extent of the fallout from the Heartbleed Bug is still unfolding, but it poses the very real possibility that untold millions of usernames and passwords, that were used only once with a vulnerable internet service are now in the hands of malicious parties.

Mr. Busseri continued, "Verizon just released its 2013 Data Breach Investigation Report and confirms that stolen passwords are used by hackers in the majority of data breaches. With Heartbleed we now have a situation where you need to assume that all of the limited number of passwords your employees use have been compromised on a web service that uses OpenSSL. Accordingly, you have to implement multifactor authentication when granting mobile access to corporate data. This is now a priority that simply cannot wait. Our customers continue to belief that integration of smart card technology is the easiest, most user-friendly, reliable and cost effective way to do so."

MobiKEY, Route1's flagship technology, meets all the named requirements. It features a smartcard enabled, cryptographic USB device or smartcard reader to ensure that employees leave no trace or evidence of their computing session when remotely accessing sensitive data. All enterprise files stay within the corporate network, simplifying security policy enforcement. Most importantly, MobiKEY does not require any changes to your IT infrastructure; instead it integrates with deployed technologies and can be rolled out in a matter of hours.

If a MobiKEY is lost or stolen, enterprise networks cannot be compromised in any way - unlike other portable devices that can be used to store sensitive data and can easily put organizations at risk. Just as a cell phone service can be suspended or cancelled when loss or theft occurs, digital certificates issued to MobiKEY can be temporarily suspended or revoked.

By providing airtight protection against data loss, MobiKEY enables organization to unlock the productivity gains of BYOD and mobile access without exposing them to the embarrassing and costly effects of prolonged litigation. Ultimately, MobiKEY provides enterprises with stability - technologically, legally and financially.

Mr. Busseri adds, "Complex times do not require complex solutions but rather simple ones that directly address the core problems of data security. Keeping sensitive data within the enterprise network via MobiKEY is such a solution. MobiKEY unlocks the productive gains that mobility promises without exposing organizations to the risk of data loss or litigation."


Route1 enables the mobile workspace without compromising on security. Its flagship technology MobiKEY uniquely combines secure mobile access, with high assurance identity validation and plug-and-play usability. Remote and mobile workers are able to securely and cost effectively access their workspace from any device without exposing the organization to the risk of data spillage or malware propagation. MobiKEY customers include Fortune 500 enterprises as well as the U.S. Department of Defense, the Department of Homeland Security, the Department of Energy and the Government of Canada. Headquartered in Toronto, Canada, Route1 is listed on the TSX Venture Exchange.

For more information, visit our website at: www.route1.com.

This news release, required by applicable Canadian laws, does not constitute an offer to sell or a solicitation of an offer to buy any of the securities in the United States. The securities have not been and will not be registered under the United States Securities Act of 1933, as amended (the "U.S. Securities Act") or any state securities laws and may not be offered or sold within the United States or to U.S. Persons unless registered under the U.S. Securities Act and applicable state securities laws or an exemption from such registration is available.

Neither the TSX Venture Exchange nor its Regulation Services Provider (as that term is defined in the policies of the TSX Venture Exchange) accepts responsibility for the adequacy or accuracy of this release.

© Route1 Inc., 2014. All rights reserved. Route1, the Route1 and shield design Logo, SECURING THE DIGITAL WORLD, Mobi, MobiSecure, MobiLINK, Route1 MobiKEY, Route1 MobiVDI, MobiKEY, MobiKEY IBAD, DEFIMNET, MobiNET, Route1 MobiNET, TruOFFICE, TruFLASH, TruOFFICE VDI, MobiKEY Fusion, MobiNET Aggregation Gateway, MobiNET Switching Array, MobiNET Secure Gateway, EnterpriseLIVE, EnterpriseLIVE Virtualization Orchestrator, MobiNET Agent, MobiKEY Classic and MobiKEY Classic 2, are either registered trademarks or trademarks of Route1 Inc. in the United States and or Canada. All other trademarks and trade names are the property of their respective owners. The DEFIMNET and MobiNET platforms, the MobiKEY, MobiKEY Classic, MobiKEY Classic 2 and MobiKEY Fusion devices, and MobiLINK are protected by U.S. Patents 7,814,216 and 7,739,726, Canadian Patent 2,578,053, and other patents pending.

Other product and company names mentioned herein may be trademarks of their respective companies.

Route1 Inc.
Tony Busseri
+1 416 814-2635
[email protected]

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Microservices Articles
When building large, cloud-based applications that operate at a high scale, it’s important to maintain a high availability and resilience to failures. In order to do that, you must be tolerant of failures, even in light of failures in other areas of your application. “Fly two mistakes high” is an old adage in the radio control airplane hobby. It means, fly high enough so that if you make a mistake, you can continue flying with room to still make mistakes. In his session at 18th Cloud Expo, Lee A...
Lori MacVittie is a subject matter expert on emerging technology responsible for outbound evangelism across F5's entire product suite. MacVittie has extensive development and technical architecture experience in both high-tech and enterprise organizations, in addition to network and systems administration expertise. Prior to joining F5, MacVittie was an award-winning technology editor at Network Computing Magazine where she evaluated and tested application-focused technologies including app secu...
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
Containers and Kubernetes allow for code portability across on-premise VMs, bare metal, or multiple cloud provider environments. Yet, despite this portability promise, developers may include configuration and application definitions that constrain or even eliminate application portability. In this session we'll describe best practices for "configuration as code" in a Kubernetes environment. We will demonstrate how a properly constructed containerized app can be deployed to both Amazon and Azure ...
Modern software design has fundamentally changed how we manage applications, causing many to turn to containers as the new virtual machine for resource management. As container adoption grows beyond stateless applications to stateful workloads, the need for persistent storage is foundational - something customers routinely cite as a top pain point. In his session at @DevOpsSummit at 21st Cloud Expo, Bill Borsari, Head of Systems Engineering at Datera, explored how organizations can reap the bene...
Using new techniques of information modeling, indexing, and processing, new cloud-based systems can support cloud-based workloads previously not possible for high-throughput insurance, banking, and case-based applications. In his session at 18th Cloud Expo, John Newton, CTO, Founder and Chairman of Alfresco, described how to scale cloud-based content management repositories to store, manage, and retrieve billions of documents and related information with fast and linear scalability. He addresse...
The now mainstream platform changes stemming from the first Internet boom brought many changes but didn’t really change the basic relationship between servers and the applications running on them. In fact, that was sort of the point. In his session at 18th Cloud Expo, Gordon Haff, senior cloud strategy marketing and evangelism manager at Red Hat, will discuss how today’s workloads require a new model and a new platform for development and execution. The platform must handle a wide range of rec...
SYS-CON Events announced today that DatacenterDynamics has been named “Media Sponsor” of SYS-CON's 18th International Cloud Expo, which will take place on June 7–9, 2016, at the Javits Center in New York City, NY. DatacenterDynamics is a brand of DCD Group, a global B2B media and publishing company that develops products to help senior professionals in the world's most ICT dependent organizations make risk-based infrastructure and capacity decisions.
Discussions of cloud computing have evolved in recent years from a focus on specific types of cloud, to a world of hybrid cloud, and to a world dominated by the APIs that make today's multi-cloud environments and hybrid clouds possible. In this Power Panel at 17th Cloud Expo, moderated by Conference Chair Roger Strukhoff, panelists addressed the importance of customers being able to use the specific technologies they need, through environments and ecosystems that expose their APIs to make true ...
In his keynote at 19th Cloud Expo, Sheng Liang, co-founder and CEO of Rancher Labs, discussed the technological advances and new business opportunities created by the rapid adoption of containers. With the success of Amazon Web Services (AWS) and various open source technologies used to build private clouds, cloud computing has become an essential component of IT strategy. However, users continue to face challenges in implementing clouds, as older technologies evolve and newer ones like Docker c...