Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Identity & Access

U.S. Navy Sticking with Secure Access and Identity

The U.S. Navy has continued to push forward on plans to secure remote access and identity management mandates, by purchasing more MobiKEY Fusion devices and TruOFFICE licenses from Route1.

The U.S. Navy has continued to push forward on plans to secure remote access and identity management mandates, by purchasing more MobiKEY Fusion devices and TruOFFICE licenses from Route1.

Headquartered in Toronto, Canada, Route1 offers a rand of services for governments and enterprises wanting to secure remote access and user identification. MobiKEY Fusion devices leverage existing government IDs to establish a secure session to remote networks, platforms, or services. Following their mandate, the Navy has ordered 1,746 MobiKEY Fusion devices, of which 1,708 devices have been shipped.

MobiKEYMobiKEY Fusion devices are one part of the overall platform, as Navy personnel will access Route1’s high security DEFIMNET platform.

“Route1’s security and identity management solutions are proving to be a great match for the U.S. Navy’s needs with regard to mobility and data security,” said Captain Scott Langley, CIO U.S. Navy Reserve.

“With Navy personnel deployed and protecting freedom across the globe, it is essential that we have powerful and proven solutions on hand to maintain the confidentiality and integrity of critical data. Route1 provides us with a tool that helps us accomplish our mission of being a global force for good.”

The only questionable side to the Navy’s order is that they are using a middleman in the supply chain, instead of ordering directly from Route1. According to a company press release Route1 is selling to an outside contractor, which is reselling to the Navy.

The reasoning for this is not known, but it could have something to do with the company being headquartered in Canada. Still, the markup would appear on the bottom-line of the Navy’s overall IT budget, which is money that could be spent elsewhere. SecurityWeek was unable to reach Route1 or the Navy for comment and explanation on the matter.

Advertisement. Scroll to continue reading.
Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.

Register

Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.

Register

Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Password management firm LastPass says the hackers behind an August data breach stole a massive stash of customer data, including password vault data that...

Application Security

Microsoft on Tuesday pushed a major Windows update to address a security feature bypass already exploited in global ransomware attacks.The operating system update, released...

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...

Identity & Access

NSA publishes recommendations on maturing identity, credential, and access management capabilities to improve cyberthreat protections.