Newsletter
Hem > Lösningar > By Technology > KVM växling och förlängning > Secure KVM Switches NIAP Certified

NIAP 3.0 Certified
Secure KVM Switches


Secure Peripheral Control between Multiple Computers and Devices

NIAP 3.0 certified KVM Switches

Need More Information?

Give us some info, and we'll get in touch.

Contact Us Now

Connecting computer peripherals such as keyboard & mouse to a PC introduces potential data leakage and hacking risks. Black Box Secure KVM Switch line provides port isolation between networks ensuring no data is leaked between secure ports and the outside world. Built with true data path isolation between systems and networks, these switches help prevent hardware tampering.

Contact us to learn about our new TEMPEST SDIP-27 Level B options.

Secure KVM Switches Benefits and Features


  • NIAP 3.0 Certified Security

    The Secure KVM Switches received NIAP PP 3.0 security certification equipped with the highest security features that meet today's Information Assurance safe control standards. The new 3.0 Protection Profile (PP_PSS_V3.0) replaces previous EAL2, EAL4 and Common Criteria regulations with stricter requirements and enhanced security assurance.

  • Improved Operator Situational Awareness with Secure Air-Gap Network Isolation

    Control multiple computers through a single keyboard, mouse, and up to four video displays while air-gap maintains absolute isolation between all connected systems.

  • TEMPEST Options Available

    NATO Compliant with optional TEMPEST SDIP-27 Level B testing and certification. Contact us for details on available solutions.

  • Multiple Switching Signals – DVI-I/DisplayPort/HDMI

    Monitor systems with the highest analogue or digital resolutions of up to 4K Ultra-HD 3840×2160 @ 60Hz.

SECURITY BENEFITS


Network Port Security

Access multiple computers assured that your data is protected from accidental or unauthorized transfer when switching between systems.

Network Isolation

Securely control computers with port to port isolation for secure switching with no port crosstalk.

Air Gap your Network

Achieve air-gap isolation between computing devices with data path isolation, preventing cyber hacking and data leakage in environments where security is critical.

Prevent Data Leakage / Breaches

Block peripheral exploits, data breaches, eavesdropping, computer malware.

Prevent Hardware/ Firmware Tampering

Hardware and firmware tampering by enforcing multilayered security mechanisms.

Prevent Cyber Intrusion

Computers can be catalysts for malicious attack or intellectual property theft. Protect desktop access since your computer or device is a potential point of entry into your network.

PREVENT CYBER THREATS


Threat: Solution:
Microprocessor malfunction or unanticipated software bugs causing data to flow between ports. Unidirectional data flow is enforced by hardware "data diodes" so data isolation doesn't rely on software integrity.
Malicious modification of microprocessor software causing data to leak between ports. Microprocessors are one-time programmable and soldered on the board. Data isolation does not rely on software; it is ensured by hardware.
Detection of signals on one computer by monitoring for crosstalk (leakage) signals on another computer. No connections to sensitive inputs such as computer microphone ports. Minimum crosstalk separation provided between signals from one computer and input or I/O signals to another.
Timing analysis attacks (looking at what happens on one port to determine data flow patterns on another). Only one computer is connected at a time to any shared circuitry. Links are unidirectional, preventing timing analysis.
Spying on information systems through leaking emanations, including unintentional radio or electrical signals, sounds, and vibrations. Optional TEMPEST testing and certification.

INDUSTRY APPLICATIONS


SECURE KVM SWITCH USE CASES


Standard KVM Switching between unclassified computers

Secure KVM Switching between computers with different security levels

Diagram Secure KVM Application

NIAP 3.0 certified Secure KVM Switches provide absolute isolation between networks, ideal for use in defense, intelligence and other applications where sensitive data must be protected by controlling access to classified networks in addition to public networks such as the Internet.

Secure KVM Switches supported Connections


(Example 4-Port dual head DisplayPort KVM Switch)

PRODUCT PORTFOLIO


DVI Secure KVM Switches NIAP 3.0

DVI Secure KVM Switches, NIAP 3.0

2/4/8/16-ports with DVI-I video, audio, USB and optional CAC - Centralize control of multiple systems from one keyboard-mouse and up to four monitors. *VGA analog connection via adapter

DP or HDMI Secure KVM Switches NIAP 3.0

DP or HDMI Secure KVM Switches, NIAP 3.0

2/4/8-ports with 4K DisplayPort or HDMI, USB and optional CAC - Centralize control of multiple systems from one keyboard-mouse and up to two monitors.

Secure KM Switches NIAP 3.0

Secure KM Switch

4/8-ports with USB, audio and optional CAC - Switch seamless between systems with the cursor, while simultaneously viewing all video sources.

DVI Multiviewer Secure KVM Switches NIAP 3.0

DVI Secure KVM Multiviewer, NIAP 3.0

4-ports with DVI-I video, audio, USB and CAC – allows users to see up to four different secure sources on a single monitor.

Secure KVM Matrix Switches NIAP 3.0

DVI Secure KVM Matrix Switches, NIAP 3.0

DVI-I, USB, Audio and CAC – Allow two or four users secure access to four or eight computers.

KVM Protector NIAP 3.0

KVM Protector, NIAP 3.0

Blocks the direct connection between a host PC and a peripheral device like a projector exposed to security threats.

RESOURCES


Brochure
Secure KVM Switches

Brochure Download
Brochure

White Paper
"Keep Classified Information
Classified"

White Paper Download
White Paper

Flyer
Secure KVM Switches

Flyer Download
Flyer

Flyer
Secure KVM Defender NIAP 3.0

Secure KVM Defender Download
Flyer

Datasheet
Secure KVM Switches

Datasheet Download
data sheets (zip)

Need a Standard KVM Switch? View our Desktop KVM Switches