OVERVIEW:
Created to deliver a streamlined user experience when working across security enclaves, Belkin's Universal 2nd Gen Secure KVM switches are designed to meet the latest in Common Criteria and NIAP Protection Profile for Peripheral Switching Devices version 4.0 requirements. Compatible with the optional Belkin Secure KVM Remote Control with Integrated Keyboard, the Universal 2nd Gen Secure KVMs elevate the user experience while vastly improving enclave awareness and minimizing operator errors. The keyboard combined with a variety of mounting options from Belkin helps declutter the desk without jeopardizing operator control. Optical data diodes and embedded peripheral emulation allow operators to safely share peripherals across multiple security enclaves without exposing potential vectors for attack. Innovative video combo connectors combined with auto-sensing and internal converters make the Universal 2nd Gen Secure KVM series compatible with modern and legacy systems, eliminating the need for external converters and their inherent cost and compatibility problems. Always on, active anti-tamper and some of the most advanced protections against ultrasonic audio attacks round out the Universal 2nd Gen Secure KVMs. US-manufactured and TAA-compliant, these Secure KVM series are ideal for use in IT environments that demand rigorous cybersecurity provisions—including government, military, and healthcare applications.
KEY FEATURES:
Designed for NIAP Protection Profile PSD 4.0 Compliance
Combo connector video support for up to 4K (3840x2160), @60hz refresh
Compatible with the Belkin Secure KVM Remote Control with Integrated Keyboard (Optional)
Customizable port coloring and naming on the front panel: Facilitates port identification and reduces user switching errors. Color coding mimicked by Belkin KVM Remote Control with Integrated Keyboard
Extrusion form factor that supports an under-counter mount (Optional)
Supports TAA combo and video cables for easy deployment
Supports up to four host computers
Supports one display for the user
Dedicated processors with emulators for every port: Isolated port paths for video, audio, and peripherals prevent data leaks between computers
Unidirectional data paths: Optical data diodes prevent peripherals from being used to breach systems
Display security: Protected display interface prevents data leakage via the monitor
Analog audio via 3.5mm jack with ultrasonic audio filtering
Peripheral management: USB device detection prevents unauthorized peripheral usage
Active Anti-tampering and Secure labeling: Holographic tamper-evident product label provides visual indication and prevention of tampering