Black Box Secure NIAP 3.0 Single-Head DVI-I USB KVM Defender with CAC
The Black Box Secure KVM Peripheral Defender, NIAP 3.0, DVI-I, Audio, USB, CAC is designed to prevent data leakage between secure and unsecure systems through shared peripherals connections. The Peripheral Isolator offers a reliable way to protect vulnerable peripherals shared by classified or secure networks and prevents threats from connections with unauthorized or untrusted peripheral devices. The device also safeguards critical data from accidental transfers, unauthorized access, or compromised data. This is perfect for any organization that handles sensitive or confidential data on separate computer networks.
Use the Secure KVM Peripheral Defender to lock down and prevent data leakage between classified and unsecure computers through a shared peripheral device. The isolator blocks the direct connection between the host PC or laptop and a peripheral device exposed to security threats, such as a printer, projector, speaker or any other peripheral device that shares access with a classified computer or network and ensures that video, USB, and audio data flow only from the computer to the peripheral - with no access to other classified or sensitive networks. This single direction data transmission provides complete isolation of the secure computer, preventing all kinds of intruder attempts via cyber hacking, eavesdropping, or device re-tasking.
Install the isolator between your peripheral and computer by connecting the video, keyboard, mouse, and audio port of the computer to the isolator inputs as well as the DVI, keyboard, mouse or audio ports of your peripheral device. By doing this the computer and peripherals are completely isolated from each other.
Why Secure KVM
Connecting peripherals such as monitor, keyboard, mouse, and speakers to a PC introduces potential data leakage and hacking risks. Secure KVM Switches are designed for use in any application where sensitive data must be protected, including defense, government agencies, and intelligence. Secure KVM Switches from Black Box are NIAP PP 3.0 certified and equipped with the highest security features that meet today's Information Assurance safe control standards. The switches contain unique hardware configurations that prevent data leakage between PCs and connected peripherals eliminating potential cyber threats.
- Advanced and fully configurable CAC option available
- Available with DisplayPort 1.2, HDMI 2.0, and DVI-I video connections
- Resolutions up to UHD 4K or 2560x1600
- Secure EDID learning and emulation
- Absolute secure and isolation between data paths
- Equipped with anti-tampering protection such as tamper evident hologram seals, chassis intrusion, fixed firmware and automatic keyboard data clearing
- USB, audio, and DVI-I with best dual-link DVI resolutions up to 2560x1600, DisplayPort and HDMI resolutions up to 4K (3840x2160 @30Hz)
- Tested and certified to NIAP Protection Profile version 3.0
Call for Availability
Shipping calculated at checkout
The Black Box Secure KVM Peripheral Defender, NIAP 3.0, DVI-I, Audio, USB, CAC is designed to prevent data leakage between secure and unsecure systems through shared peripherals connections. The Peripheral Isolator offers a reliable way to protect vulnerable peripherals shared by classified or secure networks and prevents threats from connections with unauthorized or untrusted peripheral devices. The device also safeguards critical data from accidental transfers, unauthorized access, or compromised data. This is perfect for any organization that handles sensitive or confidential data on separate computer networks.
Use the Secure KVM Peripheral Defender to lock down and prevent data leakage between classified and unsecure computers through a shared peripheral device. The isolator blocks the direct connection between the host PC or laptop and a peripheral device exposed to security threats, such as a printer, projector, speaker or any other peripheral device that shares access with a classified computer or network and ensures that video, USB, and audio data flow only from the computer to the peripheral - with no access to other classified or sensitive networks. This single direction data transmission provides complete isolation of the secure computer, preventing all kinds of intruder attempts via cyber hacking, eavesdropping, or device re-tasking.
Install the isolator between your peripheral and computer by connecting the video, keyboard, mouse, and audio port of the computer to the isolator inputs as well as the DVI, keyboard, mouse or audio ports of your peripheral device. By doing this the computer and peripherals are completely isolated from each other.
Why Secure KVM
Connecting peripherals such as monitor, keyboard, mouse, and speakers to a PC introduces potential data leakage and hacking risks. Secure KVM Switches are designed for use in any application where sensitive data must be protected, including defense, government agencies, and intelligence. Secure KVM Switches from Black Box are NIAP PP 3.0 certified and equipped with the highest security features that meet today's Information Assurance safe control standards. The switches contain unique hardware configurations that prevent data leakage between PCs and connected peripherals eliminating potential cyber threats.
- Advanced and fully configurable CAC option available
- Available with DisplayPort 1.2, HDMI 2.0, and DVI-I video connections
- Resolutions up to UHD 4K or 2560x1600
- Secure EDID learning and emulation
- Absolute secure and isolation between data paths
- Equipped with anti-tampering protection such as tamper evident hologram seals, chassis intrusion, fixed firmware and automatic keyboard data clearing
- USB, audio, and DVI-I with best dual-link DVI resolutions up to 2560x1600, DisplayPort and HDMI resolutions up to 4K (3840x2160 @30Hz)
- Tested and certified to NIAP Protection Profile version 3.0
- Secure NIAP 3.0 Single-Head DVI-I USB KVM Defender with CAC
- 1 x 12-VDC Power Supply with US Power Cord
- Quick Start Guide
LTT PARTNERS
We are a full-service Systems and Solutions Integrator. Through close relationships with dozens of top technology brands, we are the preferred partner for many enterprise organizations and industry leaders.
ONGOING SUPPORT
We pride ourselves on building long-term relationships with our partners and clients. From initial consultation to post-installation maintenance, we are always available and happy to help through our support network.