Route1 commends U.S. Air Force Special Operations Command on decision to cancel order for Apple iPad2 tablets for use as EFBs

Feb. 28, 2012
TORONTO, Canada, 28 Feb. 2012. Route1 Inc. (TSXV:ROI), a security and identity management company, has commended the U.S. Air Force Special Operations Command on cancelling its planned acquisition of Apple iPad2 tablet computers. The iPad2 tablet computers were intended to serve as electronic flight bags, storing digital versions of paper charts and technical manuals. The Air Force decision came shortly after receiving a query about the inclusion of Russian-developed security and documents reader software specified in procurement documents by NextGov.
TORONTO, Canada, 28 Feb. 2012. Route1 Inc. (TSXV:ROI), a security and identity management company, has commended the U.S. Air Force Special Operations Command on cancelling its planned acquisition of Apple iPad2 tablet computers. The iPad2 tablet computers were intended to serve as electronic flight bags (EFBs), storing digital versions of paper charts and technical manuals. The Air Force decision came shortly after receiving a query about the inclusion of Russian-developed security and documents reader software specified in procurement documents by NextGov.

The use of commercial off-the-shelf (COTS) tablets and other mobile computing solutions can pose a serious risk for any military or small business organization with data being stored outside of its network. Once outside the network, good data security relies partially on the underlying security of the device the user is using as their remote interface, says a Route 1 representative.

“We commend the U.S. Air Force for having the foresight to cancel their iPad2 order given the security concerns,” says Brian Brunetti, president of Route1 Inc. “BYOD (bring your own device) to work and mobile computing have the upside of reducing costs and increasing worker flexibility, but there are real and material risks if the appropriate diligence is not performed in establishing security protocols first. We strongly believe that any solution that is based on removing data from behind the organization’s firewalls has substantive risk with data integrity.

“We acknowledge that there are use cases where there is no Internet access and as such accessing data may require it go outside of the organization’s firewalls,” Brunetti adds. “In that case, an organization should consider an architected solution to manage data integrity risk. There is no such thing as perfect security, but simply managing vulnerabilities, especially obvious ones, will increase an organization’s success in protecting its most important asset: information.”

About the Author

Courtney E. Howard | Chief Editor, Intelligent Aerospace

Courtney enjoys writing about all things high-tech in PennWell’s burgeoning Aerospace and Defense Group, which encompasses Intelligent Aerospace and Military & Aerospace Electronics. She’s also a self-proclaimed social-media maven, mil-aero nerd, and avid avionics and space geek. Connect with Courtney at [email protected], @coho on Twitter, on LinkedIn, and on Google+.

Voice your opinion!

To join the conversation, and become an exclusive member of Military Aerospace, create an account today!