Secure KVM switches can carry various types of certifications, most notably NIAP 4.0. The NIAP 4.0 protection profile forces the design by nature to be secure from unwanted attacks or even snooping.
Seeing is believing. Watch the video to learn about the latest Secure KVM Switches.
Why Secure KMM?
Connecting peripherals such as monitor, keyboard, mouse, and speakers to a PC introduces potential data leakage and hacking risks. Secure KVM Switches are designed for use in any application where sensitive data must be protected, including defense, government agencies, and intelligence. Secure KVM Switches from Black Box are NIAP PP 4.0 certified and equipped with the highest security features that meet today’s Information Assurance safe control standards. The switches contain unique hardware configurations that prevent data leakage between PCs and connected peripherals, eliminating potential cyber threats.
NIAP (The National Information Assurance Partnership) has a protection profile on Peripheral Switches where if a switch is tested and approved by NIAP under this protection profile, it means it has certain security features enabled, including:
One-time programmable microchips
Anti-tamper seals on the chassis
Blocking of external disk drives/flash drives
Power cycling at every KVM switch port
Blocking of certain AUX channels
Not allowing data to flow in both directions by use of data diodes
However, this particular protection profile does not cover emissions.
The Black Box Secure KVM Desktop Switches allow a single operator to control multiple computers from a single workplace using one keyboard, mouse, and monitor. You will have peace of mind, knowing that each connection is secure. Options include 2-, 4-, or 8-port switches.
Convenient access to isolated networks
Clutter-free desks and improved situational awareness
Isolated channels ensure that data is not leaked between secure ports and the outside world
Supports unidirectional data flow from computer to peripheral, as well as mechanical, electrical, and optical isolation to stop hacking and data leaks in environments where security is critical
Secure EDID learning prevents unwanted and unsecure data from being transmitted through DDC lines
Protected firmware keeps intruders from reprogramming or reading the firmware
Anti-tamper switches and tamper-evident seals shield your confidential data