banner inner

Use Cases

Overlay

Content

MobiKEY Use Cases

Specific use cases for the MobiKEY mobile computing technology.

Bring your own device (BYOD)

Allowing employees to use their mobile device of choice enhances productivity and can reduce hardware, maintenance and support costs.


Value Proposition

  • No enterprise data ever resides on the device. Risk of losing sensitive information due to loss or theft is eliminated.
  • No enterprise or government software required on the device, eliminating the requirement for installation, configuration, administration and support of the device.
  • Eliminates legal implications and liability risk resultant from confiscating or altering a user’s personal device or erasing its contents due to a security compromise.
  • Lost or stolen devices can be disabled immediately.
  • No need to license or develop and install mobile versions of applications.
  • No additional MDM (Mobile Device Management) solution required.

Laptop Reduction or Replacement

Laptops are one of the main causes of sensitive data leakage due to loss or theft. Their high Total Cost of Ownership (TCO) is a multiple of the cost of the hardware.

Value Proposition

  • The user does not require the issuance of an enterprise or government asset. The user can use a home computer, a computer at the public library, internet cafe, hotel business center, etc.
  • Data leakage risk removed as no enterprise data ever resides on the laptop.
  • A “lifestyle” benefit for personnel – no laptop to carry when commuting or travelling.
  • Organization can maintain a pool of “OS-only” devices.

Desktop Consolidation

VDI provides an agile computing model that improves security, lowers operating costs and simplifies desktop administration and management. 

Value Proposition

  • High assurance remote access for new or existing VDI implementations with no network infrastructure modifications or investment.
  • Flexible deployment models: static user VMs or integrated out-of-the-box VM pool management.
  • Support for VMware and Citrix products, as well as pools based on legacy physical PCs.

Contractor Access

Temporary personnel require agile and rapid provisioning. Security measures must be in place to prevent data leakage and malware introduction.

Value Proposition

  • Data leakage or spillage risk removed as personnel can only “look” at the data but cannot copy or remove it.
  • VDI-based pools of VMs enable instant provisioning of temporary personnel access.
  • Certificate based lifecycle management: access can be immediately suspended or revoked.
  • Secure access to data for offshore workforce.
  • No enterprise laptop or physical desktop required and no other costs to support.
  • Rapid provisioning and disbanding of users.

Multiple Host Assets – Cross-Domain Access

Mobile users with a requirement to access more than one Host asset, and the Host assets are on different domains or networks (potentially of differing classification levels). To support these users, enterprises should not ask the user to carry multiple assets.

Value Proposition

  • All Host Assets are available to the mobile user through one MobiKEY device.
  • The user does not require the issuance of an enterprise or government asset. The user can use a personal laptop, tablet, home computer, a computer at the public library, internet cafe, hotel business center, etc.
  • Data leakage risk removed as no enterprise data ever resides on the Remote Asset.
  • No enterprise or government software required on the device, eliminating the requirement for installation, configuration, administration and support of the device.

Legacy Application Enablement

Legacy software applications were not built with remote access requirements in mind.


Value Proposition

  • The MobiKEY technology provides the user the same experience in working with legacy applications as though the user was sitting in front of their Host Asset.
  • Route1’s MobiKEY technology efficiently handles the vast majority of legacy enterprise applications.
  • Subject to internet connectivity quality and bandwidth, the MobiKEY technology does not introduce a performance penalty or responsiveness lag for the user in working with these legacy applications.

Occasional Access Requirements

Oftentimes organizations have personnel whose primary job function does not involve the use of a computer (i.e. airport security, attending physicians, production floor supervisors, etc.) but they still require occasional access to certain applications and/or enterprise e-mail throughout the day or week.

Value Proposition

  • Enhanced identity management and auditable access from kiosk-type computer set-ups.
  • Extremely simple access from the user’s Remote Asset – there is no software to install, no end-point security applications to maintain and no MDM (mobile device management) requirements.
  • Rich, personalized portfolio of applications can be made available to the end-user where required.

Simplified High-Assurance Teleworking

There is a growing trend towards teleworking. Personnel need to access the enterprise network and applications from their home computers or mobile devices; they have similar access requirements when travelling. At the same time, enterprises face increased risks of sensitive data leakage and malicious network penetration attacks.

Value Proposition

  • No requirement to issue enterprise assets to teleworkers – significant capital and operational cost savings to the enterprise.
  • No complex configuration procedures for the user’s Remote Asset – no need for enterprise enforced end-point security as the computer does not become a node on the enterprise network (not a VPN).
  • No mobile device management (MDM) requirement for the user’s mobile device – no enterprise data ever resides on the device.
  • Simple and rapid connection for end-users, with no learning curve – very high end-user acceptance rate.
  • Enterprise data always remains within the enterprise – no risk of data leakage.
  • No risk of introducing malware into enterprise network from end-user devices, including zero day threats.
  • No inbound firewall ports open on the enterprise network – averts risk of penetration attacks and enhances resilience to DOS/DDOS attacks.
  • End-user lifestyle enhancement – secure access whenever and wherever without always carrying a laptop.

Twitter Updates

Find Us On

  • linkedin
  • twitter
  • facebook icon 30x30
  • 6ip6xX44Tb
  • Google Plus b

Copyright © 2017 Route1, Inc. All Rights Reserved.