WHY SECURE KVM?
Traditional non-secure KVM switches offer centralized control of multiple computers, but offer no absolute isolation between them. This exposes systems to the possibility of malicious damage and disruption, and acquisition of sensitive data from one computer to another.
IPGard’s Secure KVM Switch is designed for use in secure defense and intelligence applications where sensitive data must be protected. The Switch is NIAP PP 3.0 certified and equipped with the highest security features that meet today’s Information Assurance safe control standards. The switch prevents data leakage between computers that can run at different security levels, and eliminate any potential cyber threat.
KEYBOARD AND MOUSE EMULATION
The Secure KVM emulates (simulates) the presence of a keyboard and mouse for every attached computer through a USB cable. Both selected and non-selected computers maintain a constant connection with the unit’s keyboard-mouse emulation controllers, allowing for ultra-fast switching and restricting discovery of newly connected peripherals during switching operations. Emulation of keyboard and mouse also prevents direct connection between the peripherals and the connected computers, shielding systems from potential vulnerabilities.
ULTRA-SECURE KVM SWITCHING
The SUHN-2S-P allows users to control KVM (Keyboard, Video and Mouse) operation of up to two computers with a single-head HDMI monitor. It features mechanical, electrical and optical signal isolation to prevent hacking and data leakage in environments where security is paramount.
With the SUHN-2S-P, all data relays are controlled by inverted signals, shielding connections from outside intrusion by forcing them each to work one at a time. Each port uses its own isolated data channel and each unit features non-reprogrammable ROM to better protect the switch’s functions. Better yet, the SUHN-2S-P offers the highest security when accessing classified and public networks over the internet through these isolated connections. By isolating connections between networks, the SUHN-2S-P ensures no data is leaked between secure ports and the outside world.
The SUHN-2S-P has clearly marked front-panel buttons for controlling the device, so securely switching between sources is always simple. For high-grade secure switching made easy, look no further than the SUHN-2S-P.
CAC SUPPORT
Many secure KVM switches support CAC devices, such as smart-card and biometric readers, bolstering security when using the device. However, IPGard takes CAC security even further, allowing users to assign specific peripheral devices to the SUHN-2S-P’s CAC port. Once a peripheral device has been registered by an authenticated admin, users can then switch the connection between that device and the PC’s along with KVM switching.
SECURE EDID LEARN AND VIDEO EMULATION
The SUHN-2S-P simulates a generic EDID as default, allowing it to operate most of the connected monitors. Both selected and non-selected computers maintain a constant connection with the unit’s video emulation controllers, allowing for ultra-fast switching and restricting discovery of newly connected monitors during switching operations. Upon activating the KVM, the unit will quickly and automatically learn new EDID for specific monitors. The unit then prevents unwanted and unsecure data from getting transmitted through DDC lines by means of secure EDID learning and emulation.