Traditional non-secure KM switches offer centralized control of multiple computers, but offer no absolute isolation between them. This exposes systems to the possibility of malicious damage and disruption, and acquisition of sensitive data from one computer to another.
IPGard’s Secure KM Switch is designed for use in secure defense and intelligence applications where sensitive data must be protected. The Switch is NIAP PP 3.0 certified and equipped with the highest security features that meet today’s Information Assurance safe control standards. The switch prevents data leakage between computers that can run at different security levels, and eliminate any potential cyber threat.
The SKMN-4S allows users to control KM (Keyboard and Mouse) operation on up to four computers. It features mechanical, electrical and optical signal isolation to prevent hacking and data leakage in environments where security is paramount.
With the SKMN-4S, all data relays are controlled by inverted signals, shielding connections from outside intrusion by forcing them each to work one at a time. Each port uses its own isolated data channel and each unit features non-reprogrammable ROM to better protect the switch’s functions. Better yet, the SKMN-4S offers the highest security when accessing classified and public networks over the internet through these isolated connections. By isolating connections between networks, the SKMN-4S ensures no data is leaked between secure ports and the outside world.
The SKMN-4S has clearly marked front-panel buttons for controlling the device, so securely switching between sources is always simple. For high-grade secure switching made easy, look no further than the SKMN-4S.
The Secure KM emulates (simulates) the presence of a keyboard and mouse for every attached computer through a USB cable. Both selected and non-selected computers maintain a constant connection with the unit’s keyboard-mouse emulation controllers, allowing for ultra-fast switching and restricting discovery of newly connected peripherals during switching operations. Emulation of keyboard and mouse also prevents direct connection between the peripherals and the connected computers, shielding systems from potential vulnerabilities.