Tripp Lite, a global manufacturer of power protection and connectivity solutions, has released a new line of secure KVM switches. All 11 models are on the National Information Assurance Partnership (NIAP) list of compliant products, having achieved certification for Protection Profile v3.0 (vPP3.0) for Peripheral Sharing Switches.
This NIAP certification holds IT networking products to high standards for data protection capabilities, meeting the strict security needs of the U.S. military and government agencies. These capabilities are increasingly in demand in other sectors as well (healthcare, education, finance), as organisations learn more about the internal vulnerabilities of their networks.
Sensitive data protection
In particular, organisations are realising their need for desktop solutions that can isolate sensitive data from internal computers and connected peripheral devices. “It's not just the external hackers posing the threat,” said David Posner, Tripp Lite's Director of Product Marketing, Connectivity. “Large amounts of data can flow in and out of an employee's desktop computer, and a traditional KVM switch doesn't do enough to secure it.”
“The damage could be unintentional too,” Mr. Posner continued. “A USB port on a KVM switch opens a lot of doors. If someone plugs a flash drive into a traditional KVM, and that flash drive contains malware, the entire network could get infected.”
Tripp Lite's new B002 series of secure KVM switches addresses these challenges directly. Models provide isolated data paths, peripheral device restrictions and secure switching between connected computers.
Secure KVM Switches
Key Features of B002 Secure KVM Switches:
- 2-, 4- and 8-port switches available; select models support dual monitors.
- Models available for DVI, DisplayPort and HDMI connections; select models support 4K resolutions.
- NIAP vPP3.0-certified and TAA-compliant for GSA Schedule purchases.
- Isolated data paths prevent transfer of data between channels.
- One-way communication over the switch, securing data on the host computer.
- Flash drive restriction at USB ports.
- Switching requires physical access to the KVM’s push buttons.
- Internal memory clearing after every data transmission.
- Tamper-evident seal on physical casing (if opened, KVM will disable itself).
- CAC (Common Access Card) ports supporting smart card readers (select models).