Join today and have your say! It’s FREE!

Become a member today, It's free!

We will not release or resell your information to third parties without your permission.
Please Try Again
{{ error }}
By providing my email, I consent to receiving investment related electronic messages from Stockhouse.

or

Sign In

Please Try Again
{{ error }}
Password Hint : {{passwordHint}}
Forgot Password?

or

Please Try Again {{ error }}

Send my password

SUCCESS
An email was sent with password retrieval instructions. Please go to the link in the email message to retrieve your password.

Become a member today, It's free!

We will not release or resell your information to third parties without your permission.

Route1 Inc V.ROI

Alternate Symbol(s):  ROIUF

Route1 Inc. is a technology company that enables its clients with data-centric solutions. It brings security and operations together with real-time actionable intelligence to enhance safety and security, drive profitability and improve operational efficiencies. It is engaged in software development, network operations, and cybersecurity. It provides advanced data in a usable format from video capture technologies to enhance safety and security and improve operational efficiency. Its solutions include enterprise solutions and smart communities. Its AutoVu ALPR (advanced license plate recognition), manages its parking lots with pay-by-plate technologies. Its surveillance and video intelligence technology includes Omnicast, Stratocast, Body-Worn Cameras, In-Car Video and Synergis Access Control. Its Security Center Synergis IP access control connects to third-party access control devices. Its services include advisory and analysis, project management, design and engineering and others.


TSXV:ROI - Post by User

Bullboard Posts
Post by Wolfensteinon Jun 03, 2011 8:55am
223 Views
Post# 18666525

Tweeter and Web Page Update

Tweeter and Web Page UpdateEvery form of Electronic Media must be utilized in doing DD ...

just my honest opinion,
glta,
Wolf

Route1 Comments: Cyber Attack on Canadian Government the Most Recent in a Surge of Breaches that will Force Improved Data Security

TORONTO, ONTARIO – June 3, 2011 – The hacking and theft of confidential Canadian government data reported yesterday is the latest in a growing number of serious data security breaches. "The increasing pace of these incidents shows the need for all enterprises to rethink their approach to maintaining the security of vital data," said Tony Busseri, President and CEO of Route1 Inc. (TSX-V: ROI).

Route1 is a leading provider of data security and identity management technology. Its clients include the U.S. Department of Homeland Security, the U.S. Navy, the U.S. Department of the Interior, the Dutch Foreign Ministry, and Canada’s Office of the Privacy Commissioner, as well as private sector corporations.

"More data security breaches are being reported every day," Mr. Busseri said. "What they reveal is a widespread failure to meet two essential needs. The first is the growing demand for the capability to work remotely using the data within an organization’s network. The second is the vital requirement to control access to that data and to ensure it remains within the protective firewalls of the network. Remote access solutions are simple and readily available but most fail when it comes to identity management and security. That’s clear from the growing number of reported breaches. Too often, organizations go through the motions of constructing barriers to protect data while at the same time ignoring the gaps they create to allow their people to work outside the network. Those gaps allow data out and allow hackers in."

"Every organization recognizes that the security of its data must be protected. Many are also recognizing that providing their people with the ability to work outside the office is not simply a convenience but a necessity," added Mr. Busseri. "Route1 technology allows users to access networks from anywhere, anytime, with the highest possible security based on an architecture that keeps data within firewalls. Data security breaches are a huge and costly problem and will only get worse unless all organizations face the reality and take action using the best technology available."

The growth in security breaches can generally be traced to the use of systems that transfer data outside of network firewalls, that use simple one-factor identity confirmation such as a single password, and that are based on identifying the remote device being used rather than the individual using it. The failing systems also may not control what information within the network the user can access when they are remote.

Recent security breaches affect millions of people

Confidential information is being lost or stolen in a wide variety of situations from sophisticated online hacker attacks to simply being left on laptops, disks, USB drives and even on paper. Here are some recent reported examples from both the private sector and government:

? In May 2011, Lockheed-Martin’s network was hacked through compromised RSA SecurID tokens. That attack has been traced back to an attack on RSA itself in March when RSA said "while some information relating to RSA's token authentication system had been extracted by the intruders, RSA is confident that the information extracted does not enable a successful direct attack on any of our RSA SecurID customers". Lockheed-Martin is a large RSA customer.

? Also in May 2011, Honda Canada informed 283,000 of its customers that some of their personal information was stolen when its systems were hacked. It now faces a $200 million class action suit. The breach was similar to one at Honda in the United States that involved 4.9 million customers

? In April 2011, Sony’s network was hacked twice, compromising the confidential information of over 100 million customers.

? Personal information on 7,000 employees of the Edmonton, Alberta public school board was reported lost in April 2011, after being downloaded on to a USB memory stick.

? In February 2011, it was reported that hackers had breached servers at the company that runs the NASDAQ stock exchange and planted malware on a web-facing application used by 10,000 executives and directors to share confidential information.

? In January 2011, cyber spies struck Google and reportedly more than 30 other unidentified firms in an apparent bid for computer source codes, intellectual property, and other information.

? Four days prior to the Google attack, Adobe experienced a "computer security incident involving a sophisticated, coordinated attack against corporate networks systems" managed by them and other firms.

? The problem extends to personal medical records. The New York Times reported on May 31, 2011, that almost 300 U.S. hospitals, doctors and insurance companies have been found to have had security breaches involving personal information. In the case of one health insurer alone, 1.9 million health plan members were notified that records with their personal information were missing.

The tip of the security iceberg

Reported incidents do not tell the whole story. According to a recent McAfee, Inc. report, most network security breaches go unreported because of the potential consequences, including loss of confidence in the organization. Only three in 10 organizations report all data breaches suffered, and six in 10 currently "pick and choose" the breaches they report. McAfee also reported that mobile malware grew 46 percent from 2009 to 2010 with 55,000 new malware threats emerging daily.

The cost and the response

The cost of security breaches is projected to be $1 trillion globally based on a study conducted in eight countries. The chief information officers surveyed estimated they lost data worth a total of $4.6 billion while spending another $600 million cleaning up after breaches. It can be difficult to define and calculate losses and estimates of the cost of cyber crime in the United States range from millions to hundreds of billions of dollars. A 2010 study by the Ponemon Institute estimated that the median annual cost of cyber crime to an individual victim organization ranges from $1 million to $52 million.

Despite the growing risk and the high cost of poor data security, corporations and governments have been slow to respond. A 2010 survey of corporate directors and executives by Carnegie Mellon University/Global Cyber Risk LLC found that improving data security was not among any board’s top three priorities. Only 6 percent of respondents reported that their boards have an IT or data security committee. Less than half employ a Chief Information Security Officer.

"As costs rise and trust in organizations is undermined, corporate and government leadership will be forced to take data security more seriously and act," Mr. Busseri said.

The security challenge

To create a secure remote access system, three issues must be reconciled:

1. Access: Can people use the resources of the network wherever they are?

2. Data security: How can the organization ensure that its data cannot be accessed, stolen or tampered with by the wrong people?

3. Entitlement management: How does the organization ensure that only the right people can access the data and that only the right data is available to those people?

There are many remote access solutions, but most are unable to provide the answers to all three issues.

To meet that challenge, to date, many organizations have taken on component suppliers for each issue resulting in complex, cumbersome and costly systems that, as the recent evidence shows, fail in the end.

For example, some systems allow a user to access a network from only one device, such as a laptop, and to store network data on it. When the laptop is lost or stolen, so is the data. With the device in the wrong hands, the network is also vulnerable. Web-based systems using an internet portal are easily hacked with today’s tools.

SSL VPN systems are available and act as a true remote PC that hosts the data and processing at an off-site location. These solutions are cost-prohibitive for a large number of users and cannot provide assurance that the user accessing the system is an authorized individual. These solutions validate the remote PC as authorized to access the system through software downloaded onto the remote computer. If there is unauthorized access to the computer, or if it is lost or stolen, the network becomes an easy target for cyber attacks.

The Route1 solution

Route1 provides a unique integrated solution. Its MobiNET platform, TruOFFICE software application, and MobiKEY device work together to meet the need for secure identity management and remote data access.

The MobiNET provides universal identity authentication management and is also the service delivery platform. It is driven by the identity of the user, not the PC they are using or where the data is housed.

With a MobiKEY device, a user can be individually, consistently and accurately identified by the MobiNET platform. This allows IT managers to focus on what data individual users are authorized to access, where they can go on a network and what they can do.

Route1 technology:

? Allows organizations to keep complete control over data
? Authenticates the individual user’s identity using multiple factors
? Offers remote users exactly the same access they have at their office – they are actually working on their office computer
? Keeps enterprise data within enterprise firewalls – data cannot be moved outside the network
? Protects against man-in-the-middle attacks and malware
? Requires no software on the remote PC – any internet enabled PC can be used immediately
? Leaves no footprint on the remote PC – since no data is transferred, there is nothing on the remote device
? Integrates seamlessly into existing IT infrastructure with no requirement for additional servers or server upgrades
? Can be installed on the host computer very quickly – and is supported by a highly regarded help desk

"The alarming increase in reported security breaches may serve as a wake-up call for enterprises of all kinds," Mr. Busseri said. "When these organizations recognize the need for higher level data security, Route1 is ideally positioned to meet the growing need for simple, single-sourced and cost-effective solutions that actually work. Our clients have seen the need and taken action. The effectiveness of our technology is demonstrated by the fact that our clients include organizations that set the standard, such as the U.S. Department of Homeland Security."

ABOUT ROUTE1 INC.

Route1 delivers industry-leading security and identity management solutions to enterprises worldwide – businesses, government and military which need universal, secure access to all digital resources and sensitive data. These customers depend on The Power of MobiNET - Route1’s communications and service delivery platform. MobiNET provides identity assurance and individualized access to networks and data. Route1’s patented solutions are based on FIPS 140-2 cryptographic modules, and simplify the process of meeting increasingly stringent regulatory requirements for privacy and security. Headquartered in Toronto, Canada, Route1 is listed on the TSX Venture Exchange. For more information, visit our website at: www.route1.com.

For More Information Contact:
Ali Mahdavi
Capital Markets Advisor
416-962-3300
ali.mahdavi@route1.com

Media Contact:
John Lute
Lute & Company
416-929 5883
jlute@luteco.com

This news release, required by applicable Canadian laws, and does not constitute an offer to sell or a solicitation of an offer to buy any of the securities in the United States. The securities have not been and will not be registered under the United States Securities Act of 1933, as amended (the "U.S. Securities Act") or any state securities laws and may not be offered or sold within the United States or to U.S. Persons unless registered under the U.S. Securities Act and applicable state securities laws or an exemption from such registration is available.

Neither the TSX Venture Exchange nor its Regulation Services Provider (as that term is defined in the policies of the TSX Venture Exchange) accepts responsibility for the adequacy or accuracy of this release.

© Route1 Inc., 2011. All rights reserved. Route1, the Route1 and shield design Logo, SECURING THE DIGITAL WORLD, Mobi, MobiSecure, Route1 MobiKEY, Route1 MobiVDI, MobiKEY, MobiKEY IBAD, DEFIMNET, MobiNET, Route1 MobiNET, TruOFFICE, TruFLASH, TruOFFICE VDI, MobiKEY Fusion, EnterpriseLIVE, EnterpriseLIVE VO, MobiNET Agent and MobiKEY Classic, are either registered trademarks or trademarks of Route1 Inc. in the United States and or Canada. All other trademarks and trade names are the property of their respective owners. The DEFIMNET and MobiNET platforms and the MobiKEY, MobiKEY Classic and MobiKEY Fusion devices are protected by U.S. Patents 7,814,216 and 7,739,726, and other patents pending.

Bullboard Posts