Widgetized Section

Go to Admin » Appearance » Widgets » and move Gabfire Widget: Social into that MastheadOverlay zone

Route1 Commends U.S. Air Force on their Decision to Cancel iPad2 Tablet Order

Toronto, Canada (PR) February 22, 2012

Toronto, Canada (February 22, 2012) Route1 Inc. (TSXV: ROI) a security and identity management company, today commended the U.S. Air Force Special Operations Command on cancelling its planned acquisition of Apple iPad2 tablet computers last week, two days after receiving a query about the inclusion of Russian developed security and documents reader software specified in procurement documents by NextGov see article. According to disclosure by the Command, it had planned to acquire iPad2 tablet computers to serve as electronic flight bags, storing digital versions of paper charts and technical manuals.

Yesterdays disclosure highlights the serious risk for a military organization or a small business in working with a mobile computing solution that relies on an organizations data being stored outside of their network. Once outside the network, good data security relies partially on the underlying security of the device the user is using as their remote interface.

Brian Brunetti, President of Route1 Inc. commented, We commend the U.S. Air Force for having the foresight to cancel their iPad2 order given the security concerns. BYOD to work and mobile computing have the upside of reducing costs and increasing worker flexibility, but there are real and material risks if the appropriate diligence is not performed in establishing security protocols first. We strongly believe that any solution that is based on removing data from behind the organizations firewalls has substantive risk with data integrity.

Mr. Brunetti continued, We acknowledge that there are use cases where there is no Internet access and as such accessing data may require it go outside of the organizations firewalls. In that case, an organization should consider an architected solution to manage data integrity risk. There is no such thing as perfect security, but simply managing vulnerabilities, especially obvious ones, will increase an organizations success in protecting its most important asset information.