- Black Box Catalog
- Cabinets, Racks & Enclosures
- Carts & Storage
- Control Systems
- Digital Signage
- Jacks, Panels, & Hardware
- Power Solutions
- Premises Security
- Testers & Tools
- Video & Multimedia
- Voice Communications
Connecting computer peripherals such as keyboard & mouse to a PC introduces potential data leakage and hacking risks. Black Box NIAP 3.0 Certified Secure KVM Switch line provides port isolation between networks ensuring no data is leaked between secure ports and the outside world. Built with true data path isolation between systems and networks, these switches help prevent hardware tampering.
Relax and know that your systems are more secure while using our KVM switches.
No need to upgrade your equipment. Our secure KVM uses your existing peripherals and security devices.
Work the way you want with multiple device configurations.
Block peripheral exploits, data breaches, eavesdropping, computer malware.
Hardware and firmware tampering by enforcing multilayered security mechanisms.
Computers can be catalysts for malicious attack or intellectual property theft. Protect desktop access since your computer or device is a potential point of entry into your network.
Access multiple computers assured that your data is protected from accidental or unauthorized transfer when switching between systems.
Securely control computers with port-to-port isolation for secure switching with no port crosstalk.
Achieve air-gap isolation between computing devices with data path isolation, preventing cyber hacking and data leakage in environments where security is critical.
|Threat||Secure KVM's Solution|
|Microprocessor malfunction or unanticipated software bugs causing data to flow between ports.||Unidirectional data flow is enforced by hardware "data diodes" so data isolation doesn't rely on software integrity.|
|Malicious modification of microprocessor software causing data to leak between ports.||Microprocessors are one-time programmable and soldered on the board. Data isolation does not rely on software; it is ensured by hardware.|
|Detection of signals on one computer by monitoring for crosstalk (leakage) signals on another computer.||No connections to sensitive inputs - such as computer microphone ports. Minimum crosstalk separation provided between signals from one computer and input or I/O signals to another.|
|Timing analysis attacks (looking at what happens on one port to determine data flow patterns on another).||Only one computer is connected at a time to any shared circuitry. Links are unidirectional, preventing timing analysis.|
2/4/8/16-ports with DisplayPort, HDMI, DVI-I, audio, USB and optional CAC USB reader – centralize control of multiple systems for one keyboard-mouse and up to four monitors.
Allows multiple users to connect to multiple different computer sources – industry's first ever NIAP 3.0 certified. Choose from 4 to 8 users and up to four different secure computers.
4/8-ports with USB, audio
4-ports with DVI-I video, audio, USB
Locks down otherwise unprotected or vulnerable peripherals, blocks malicious attacks and keeps secure networks secure - perfect for conference rooms or existing large scale KVM Matrices.
Choose from DisplayPort, HDMI or DVI cables.
One of our secure KVM switch experts will help you find all the products that meet your security requirements and business objectives.