News & Events

A hot solution from Black Box to protect unsecured KVM systems

An exciting new product that provides complete protection against external and internal threats to the security and integrity of data passing across keyboard, video and mouse (KVM) switches was unveiled yesterday at BroadcastAsia 2019 by Black Box (booth 6G4-08), a leading provider of KVM extension and switching systems.

“The Secure KVM Defender is the first NIAP 3.0-certified port isolator that enables protection of unsecured KVM systems,” declares Hans Peter Kuhnert, vice-president – International Sales, for Black Box Network Services.

“By preventing data leakage between secure and unsecured systems through shared peripheral connections, the Secure KVM Defender adds a critical layer of security for sensitive or classified data passed across existing KVM matrix switching networks.”

As complete security is a must in applications ranging from healthcare and finance to defence and intelligence, the new Secure KVM Defender solution resolves a weak point that can threaten the security of data passing across KVM switches.

“With its extended security features, this device is an ideal addition for customers already using KVM matrix switching solutions, such as Black Box Emerald, DKM, or Agility, that are looking for ways to add an additional security layer for their KVM networks,” says Kuhnert.

The new product ensures that video, USB and audio data flow only from the computer to the peripheral, with no access to other classified or sensitive networks. Without compromising speed or support for DVI Dual Link resolutions, this single-direction data transmission provides a complete isolation of the secure computer, preventing all kinds of intruder attempts via cyber hacking, eavesdropping, or device retasking.

“Traditional KVM switches lack both the filters and the data detection and protection features needed to ensure the security of information sent between the PC and peripherals,” adds Kuhnert.

“The Secure KVM Defender addresses this issue, enabling reliable protection of vulnerable peripherals shared by classified or secure networks while preventing threats from connections with unauthorised or untrusted peripheral devices.”

Tags

Related Articles

QUICK POLL
Close