MobiKEY Classic 2 Device

The MobiKEY Classic 2 (MC2) is an identity validation tool that simplifies the access component, while the MobiNET platform universally manages the identities of users and entitlement to digital resources through the MobiKEY application software.

This patented technology is embedded on a smartcard enabled, cryptographic USB device, making it one of the most powerful and easy-to-use multi-factor authentication technologies available today.

Completely clientless and driverless, the MobiKEY device ensures that the user leaves no trace or evidence of their computing session on the Remote asset, while protecting the enterprise network from any viruses and malware. All enterprise files stay within the enterprise firewalls, simplifying security policy enforcement.

If the MC2 device is lost or stolen, enterprise networks cannot be compromised in any way – unlike other portable devices which can be used to store sensitive enterprise data and can easily put organizations at risk. Just as a credit card or cell phone service can be suspended or cancelled when loss or theft occurs, digital certificates issued by the MobiNET platform can also be temporarily suspended or permanently revoked. The added advantage over the loss of a laptop or other mobile computing device is that no enterprise data is stored on the smartcard of the MC2 device.

MobiKEY Classic 2 Device

The MobiKEY Classic 2 (MC2) is an identity validation tool that simplifies the access component, while the MobiNET platform universally manages the identities of users and entitlement to digital resources through the MobiKEY application software.

This patented technology is embedded on a smartcard enabled, cryptographic USB device, making it one of the most powerful and easy-to-use multi-factor authentication technologies available today.

Completely clientless and driverless, the MobiKEY device ensures that the user leaves no trace or evidence of their computing session on the Remote asset, while protecting the enterprise network from any viruses and malware. All enterprise files stay within the enterprise firewalls, simplifying security policy enforcement.

MobiKEY Fusion A2T Device

The MobiKEY Fusion A2T device is a patented identity validation device that integrates with ID-1 smart cards or government issued identity cards such as CAC, PIV and FRAC. The multi-factor authentication technology combines physical possession of the MobiKEY Fusion A2T device and an identity card, with computer and network access, allowing for remote use of an iPad, iPad mini, iPhone or iPod touch running iOS 6 or higher.

The MobiKEY Fusion A2T differs from the MobiKEY Fusion in the type of mobile operating systems it is compatible with.  A2T is Route1’s response to mobile devices that do not have a USB port.  The MobiKEY Fusion A2T comes in two versions, a Lightning connector or the 30-pin version.

MobiKEY Fusion Device

The MobiKEY Fusion device is a patented identity validation device that integrates with government issued identity cards such as CAC, PIV and FRAC. This multi-factor authentication technology combines physical possession of the MobiKEY Fusion device and an identity card, with computer and network access, helping government and defense organizations meet the United States Homeland Security Presidential Directive 12.

It offers all of the same security features of the MC2 device while leveraging smartcards already issued to government personnel, aided by the additional factors of authentication to secure the access component, while the MobiNET or the DEFIMNET platform universally manages the identities of users and entitlement to digital resources. Users can only access systems remotely with a combination of their MobiKEY Fusion device, an identity or access card and secret PIN.

Patented Technology: “Portable Device for Accessing Host Computer via Remote Computer”(U.S. Patent 7,739,726 B2 – June 15, 2010) – A portable device enables access to a host computer via a guest computer. The portable device is connected to the guest computer, and a program stored in memory on the portable device is activated, the program including instructions for establishing communication with the host computer such that input to the guest computer serves as input to the host computer, and output displays from the host computer are displayed on the guest computer. The portable device includes a cryptographic processor for performing cryptographic processing for communicating with the host computer. The portable device also includes a protected memory for storing a private key accessible to the cryptographic processor, the private key being used during cryptographic processing. The protected memory can be internal or external to the cryptographic processor.

Patented Technology: “Portable Device for Accessing Host Computer via Remote Computer” (U.S. Patent 7,739,726 B2 – June 15, 2010) – A portable device enables access to a host computer via a guest computer. The portable device is connected to the guest computer, and a program stored in memory on the portable device is activated, the program including instructions for establishing communication with the host computer such that input to the guest computer serves as input to the host computer, and output displays from the host computer are displayed on the guest computer. The portable device includes a cryptographic processor for performing cryptographic processing for communicating with the host computer. The portable device also includes a protected memory for storing a private key accessible to the cryptographic processor, the private key being used during cryptographic processing. The protected memory can be internal or external to the cryptographic processor.

OUR PARTNERS
Unisys
CIGNEX
Leidos
Feddata
Dell
Lenovo
Dtech Data
DLT
IBM
Lockheed Martin
Apple
HP
Equinix