MobiKEY A2T is a complete desktop, secure remote access technology that integrates multi-factor authentication and identity management in a mobile computing environment.
A MobiKEY Fusion A2T device is required to run this app. To purchase a MobiKEY Fusion A2T device, please contact sales@route1.com
Features
•Offers users exactly the same access remotely that they have at their office
•Integrates with government-issued PIV or CAC cards as part of the authentication process
•Your data stays within your network’s perimeter
•Compliment to an enterprise’s virtual desktop infrastructure investment and a path to desktop consolidation
•Cross domain technology, Host Assets (the one you want to access) can be on any domain or network
•Enterprise registration and deployment tools
•Integration with Active Directory
•Fully integrates with virtual desktop infrastructure
•Connection history details for auditing and reporting purposes
•Bandwidth efficient - 20 kbps average bandwidth usage per connected user
Security Compliances
•Hardware and smartcard-based, multi-factor authentication
•2048 to 4096-bit asymmetric keys
•TLS 1.1
•256-bit AES encryption
•RSA SHA-1 and SHA-2 signing algorithms
•All files stay within the network
•Route1 has no ability to see into the user’s data session
•PKI based technology – access and authorization management
•Malware resistant – immune to zero-day threats
•The iPad does not become a node on the enterprise network
A MobiKEY Fusion A2T device is required to run this app. To purchase a MobiKEY Fusion A2T device, please contact sales@route1.com
Features
•Offers users exactly the same access remotely that they have at their office
•Integrates with government-issued PIV or CAC cards as part of the authentication process
•Your data stays within your network’s perimeter
•Compliment to an enterprise’s virtual desktop infrastructure investment and a path to desktop consolidation
•Cross domain technology, Host Assets (the one you want to access) can be on any domain or network
•Enterprise registration and deployment tools
•Integration with Active Directory
•Fully integrates with virtual desktop infrastructure
•Connection history details for auditing and reporting purposes
•Bandwidth efficient - 20 kbps average bandwidth usage per connected user
Security Compliances
•Hardware and smartcard-based, multi-factor authentication
•2048 to 4096-bit asymmetric keys
•TLS 1.1
•256-bit AES encryption
•RSA SHA-1 and SHA-2 signing algorithms
•All files stay within the network
•Route1 has no ability to see into the user’s data session
•PKI based technology – access and authorization management
•Malware resistant – immune to zero-day threats
•The iPad does not become a node on the enterprise network
Show More