Tripp Lite, a global manufacturer of power protection and connectivity solutions, has released a new line of secure KVM switches. All 11 models are on the National Information Assurance Partnership (NIAP) list of compliant products, having achieved certification for Protection Profile v3.0 (vPP3.0) for Peripheral Sharing Switches.

This NIAP certification holds IT networking products to high standards for data protection capabilities, meeting the strict security needs of the U.S. military and government agencies. These capabilities are increasingly in demand in other sectors as well (healthcare, education, finance), as organisations learn more about the internal vulnerabilities of their networks.

Sensitive data protection

In particular, organisations are realising their need for desktop solutions that can isolate sensitive data from internal computers and connected peripheral devices. “It's not just the external hackers posing the threat,” said David Posner, Tripp Lite's Director of Product Marketing, Connectivity. “Large amounts of data can flow in and out of an employee's desktop computer, and a traditional KVM switch doesn't do enough to secure it.”

The damage could be unintentional too,” Mr. Posner continued. “A USB port on a KVM switch opens a lot of doors. If someone plugs a flash drive into a traditional KVM, and that flash drive contains malware, the entire network could get infected.”

Tripp Lite's new B002 series of secure KVM switches addresses these challenges directly. Models provide isolated data paths, peripheral device restrictions and secure switching between connected computers.

Secure KVM Switches

Key Features of B002 Secure KVM Switches:

  • 2-, 4- and 8-port switches available; select models support dual monitors.
  • Models available for DVI, DisplayPort and HDMI connections; select models support 4K resolutions.
  • NIAP vPP3.0-certified and TAA-compliant for GSA Schedule purchases.
  • Isolated data paths prevent transfer of data between channels.
  • One-way communication over the switch, securing data on the host computer.
  • Flash drive restriction at USB ports.
  • Switching requires physical access to the KVM’s push buttons.
  • Internal memory clearing after every data transmission.
  • Tamper-evident seal on physical casing (if opened, KVM will disable itself).
  • CAC (Common Access Card) ports supporting smart card readers (select models).

In case you missed it

What are emerging applications for physical security in transportation?
What are emerging applications for physical security in transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher & Fortified enhance perimeter security solutions
Gallagher & Fortified enhance perimeter security solutions

Global security manufacturer - Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years...

Genetec: Data sovereignty in physical security
Genetec: Data sovereignty in physical security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...