NIAP PP 3.0 certification. Prevents cyber attacks, data tampering, etc. through complete network isolation.
The "Secure KVM Switch" completely isolates networks, allowing for safe switching between computers with different security levels. It protects confidential information from risks such as data leakage, data tampering due to unauthorized access, and cyber attacks. It has obtained security certification under NIAP PP 3.0 and complies with TAA. *Currently offering a free white paper that includes explanations of this product, its implementation benefits, and usage examples available for download as a PDF! [Excerpt from the white paper] - What is a Secure Desktop KVM? - How does the Secure KVM Switch prevent cyber attacks? - Benefits of Secure KVM - Use cases in the military sector
Inquire About This Product
basic information
【Features】 ■ Prevents the transmission of unprotected unnecessary data through secure EDID emulation ■ Automatically erases keyboard data with keyboard cache wiping to prevent sharing ■ Non-reprogrammable ROM ■ Tamper-proof switch ■ External hologram and tamper-evident seal ■ Made in the USA, TAA compliant *For more details, please refer to the documentation. Feel free to contact us with any inquiries.
Price range
Delivery Time
Applications/Examples of results
For more details, please refer to the materials. Feel free to contact us as well.
catalog(3)
Download All CatalogsCompany information
Black Box, as a leading technology solutions provider in the industry, operates in 175 countries worldwide, including its headquarters in the United States, as well as North America, South America, Europe, and the Asia-Pacific region. ■ KVM switches, KVM extenders ■ AV and multimedia equipment, digital signage ■ Industrial Ethernet, media converters, extenders ■ Office network products ■ LockPORT security LAN cables ■ Network product installation services Black Box realizes the most cost-effective and optimal systems. We assist from the assessment and planning of the desired system to design, equipment procurement, implementation of monitoring, management, and support. We propose optimal safety management, video management, environmental monitoring, remote control, and power management measures.