Use the Secure KM Switches featured on this page to operate 4 or 8 isolated computers through a single user console. Each computer keeps the direct monitor connection allowing the operator to monitor all systems simultaneously in real time. Keyboard, mouse and audio are shared through the Secure KM Switch with air-gap isolated circuits that prevent data leakage. The operator switches seamless between the systems just by moving the mouse cursor over the display borders to the monitor connected to his target source. No push buttons, no keyboard commands are required that disturb the operator attendance. The optimized desktop ergonomics allow an improved situational awareness, ideal for operators in public safety, defense, finance and equal applications where instant and isolated switching is required.
About Secure KVM
NIAP PP3.0 certified Secure KVM Switches from Black Box offer a secure desktop access solution to safeguard against cyber intrusion for government/military agencies, finance, healthcare, traffic control and educational facilities alike. The Black Box NIAP PP3.0 certified Secure KVM Switches provide ultra-secure switching between up to 16 standard personal/portable computers, servers or thin clients running operating systems such as Windows or Linux from an ergonomic workspace.
Broad Secure KVM Switch portfolio for every application and every industry
The Secure KVM Switch range from Black Box is one of the widest in the industry. Different applications and industry have differing requirements of centralized computer access. This portfolio has a suitable solution for every configuration:
- KVM Switches with 2-,4, 8- or 16- computer ports
- 4K digital and analogue video options featuring consoles with up to four monitors
- Single User or Matrix Switches for up to four users
- KM switches with dedicated computer-monitor connections and mouse switching
- 4-Port Multiviewer KVM Switch featuring a full screen and a 4-in-1 windowing display
- Single-Port KVM Protector
Why secure KVM
Connecting peripherals such as keyboard, mouse and speakers to a PC introduces potential data leakage and hacking risks. There are no filters nor is there data detection and protection features between the PC and peripherals using traditional KVM Switches.
Tested and certified to the latest NIAP PP3.0 security profile
Secure KVM Switches are designed for use in secure defense and intelligence applications where sensitive data must be protected. The Secure KVM Switches from Black Box are NIAP PP 3.0 certified and equipped with the highest security features that meet today’s Information Assurance safe control standards. The switches contain unique hardware configurations that prevent data leakage between PCs and connected peripherals that eliminates any potential cyber threat.
Multi-level security for strict information assurance
An absolute isolation of the mechanical, electrical and optical signals including air gapping prevents hacking and data leakage between the ports and outside world. Each port of the Secure KVM Switch uses its own isolated data channels. Upfront switching on another target computer, the KVM switch erases the internal cache and keyboard data to ensure that no residual data remains in the channel. The fixed secure firmware/ROM is non-reprogrammable and keeps intruders from reading, reprogramming via unwanted firmware upgrades, or physically removing.
Always on Tamper-proof design
The Secure KVM Switches feature active Anti-tamper switches, external hologram tamper-evident seals and a long-life internal Anti-tampering battery. If the cover is removed from the chassis, the KVM Switch becomes inoperable to protect against any attempt of physical intrusion.
Common Access Card (CAC Support)
The Secure KVM Switches are optionally available with a fully advanced and configurable CAC port that supports CAC devices like smart cards and biometric readers. Even further, authenticated admins can register and assign specific peripheral devices to the CAC port. Users can then switch the assigned device along with the KVM switching of the connected computers.
Ultra-fast Switching
Secure Video & Aux emulation allows for ultra-fast switching and restricts discovery of newly connected displays during switching operations this prevents unwanted and unsecure data from getting transmitted between the computers and the display. This shields systems from potential vulnerabilities.