What is MobiKEY?
MobiKEY is the un-VPN. It’s the secure remote access solution that delivers your trusted desktop through the cloud.

Eliminate the risks to your enterprise:
- Penetration attacks
- Data leakage
- Identity falsification
- The human factor
Your trusted desktop
No matter where you areWhy Use MobiKEY?
With a simple, intuitive end-user experience and total trust, MobiKEY is the cost-effective solution for protecting data-at-rest, data-in-use and for guarding against identity falsification.
Trust
- Hardware and smart card-based multi-factor authentication
- Malware resistant; immune to zero day threats
- All connections originate from inside the enterprise network
- No inbound ports to open
- All files stay within the network
- No firewall rules or settings changes required
- Remote Assets do not become nodes on the enterprise network
- Leaves no footprint on the Remote Asset once the session is completed
- HSPD-12 compliant
User experience
- Same Windows experience from anywhere
- No software drivers to install on the user’s Remote Asset
- No need to carry an enterprise laptop
- No government furnished equipment (GFE) required
- BYOD-friendly
- Works on any device, any OS
Enterprise integration
- Easy integration with existing infrastructure
- No security posture compromise
- PKI-based technology for identity and access management
- Integrates with CAC or PIV cards
- Cross-domain technology – Host Assets can be on any domain or network
- Integrates with virtual desktop infrastructure (VDI): Citrix and VMware ready
- Integrates with Active Directory
- Bandwidth-efficient – 20 kbps average bandwidth usage per connected user
Enterprise value
- Provide secure remote access
- Subscription-based service – no capital investment required
- 24/7 support – Tier 1 or Tier 2 help desk included in subscription fee
- No engineering or integration costs
- No enterprise or GFE required
- No end point security software or Remote Asset management required
How Does MobiKEY Work?
Scalable. Proven. Trusted

Route1 has full authority to operate (ATO) from the U.S. Department of Defense, the U.S. Department of the Navy, the U.S. Department of the Interior, the U.S. Marine Corps and other government and enterprise security teams.