Online criminals pose a danger to national security. These criminals may hack economic institutions, government websites, or power infrastructures as a way of stealing sensitive data or extorting money, or advancing an ideological agenda.1
Cybercrime is growing at about 15 percent year over year, and will cost companies worldwide an estimated $10.5 trillion annually by 2025, up from $3 trillion in 2015.2
To ensure that they introduce no additional risk when deployed in the national security sector, Secure KVM switches are evaluated according to a NIAP Protection Profile (PP). This comprehensive profile describes security requirements for a Peripheral Sharing Switch (PSS) that connects a common set of peripherals to one or more attached computers. Businesses in the private sector may choose to conform to these standards as well.
The NIAP PP for secure desktop KVM sets forth a baseline set of requirements to mitigate well-defined and well-described threats. Stringent conditions and test scopes for secure KVM switches include: type, usage, and authorization of connected peripherals (monitor, keyboard, mouse, and other USB devices); data flow and anti-tamper rules; audio/data/channel isolation; CAC settings; and video protocol authorization and handling.
Established as the official current protection profile in 2015, NIAP PP PSD V3.0 was superseded in 2020 by NIAP PP PSD V4.0. While NIAP 4.0 builds on the requirements outlined in NIAP 3.0, there are some notable differences between the two protection profiles for Secure KVM.
While NIAP PP 3.0 compliant devices are still on the market and provide excellent protection from cyber threats, the updated NIAP PP 4.0 addresses specific details about your particular network to help you better mitigate the risks of a cyberattack. Both NIAP 3.0 and 4.0 protection profiles guard your sensitive data against sophisticated, or not-so-sophisticated hacker. Complying with NIAP standards can prevent your network from becoming part of the projected 15% increase in cyber hacks now and beyond 2025.
To learn more about Secure KVM, download the free white paper, “Meeting Cybersecurity Threats with Secure KVM Switches.”
References
1https://safetymanagement.eku.edu/blog/threats-to-national-security/
2https://www.embroker.com/blog/cyber-attack-statistics/
Online criminals pose a danger to national security. These criminals may hack economic institutions, government websites, or power infrastructures as a way of stealing sensitive data or extorting money, or advancing an ideological agenda.1
Cybercrime is growing at about 15 percent year over year, and will cost companies worldwide an estimated $10.5 trillion annually by 2025, up from $3 trillion in 2015.2
To ensure that they introduce no additional risk when deployed in the national security sector, Secure KVM switches are evaluated according to a NIAP Protection Profile (PP). This comprehensive profile describes security requirements for a Peripheral Sharing Switch (PSS) that connects a common set of peripherals to one or more attached computers. Businesses in the private sector may choose to conform to these standards as well.
The NIAP PP for secure desktop KVM sets forth a baseline set of requirements to mitigate well-defined and well-described threats. Stringent conditions and test scopes for secure KVM switches include: type, usage, and authorization of connected peripherals (monitor, keyboard, mouse, and other USB devices); data flow and anti-tamper rules; audio/data/channel isolation; CAC settings; and video protocol authorization and handling.
Established as the official current protection profile in 2015, NIAP PP PSD V3.0 was superseded in 2020 by NIAP PP PSD V4.0. While NIAP 4.0 builds on the requirements outlined in NIAP 3.0, there are some notable differences between the two protection profiles for Secure KVM.
While NIAP PP 3.0 compliant devices are still on the market and provide excellent protection from cyber threats, the updated NIAP PP 4.0 addresses specific details about your particular network to help you better mitigate the risks of a cyberattack. Both NIAP 3.0 and 4.0 protection profiles guard your sensitive data against sophisticated, or not-so-sophisticated hacker. Complying with NIAP standards can prevent your network from becoming part of the projected 15% increase in cyber hacks now and beyond 2025.
To learn more about Secure KVM, download the free white paper, “Meeting Cybersecurity Threats with Secure KVM Switches.”
References
1https://safetymanagement.eku.edu/blog/threats-to-national-security/
2https://www.embroker.com/blog/cyber-attack-statistics/