Copyright © 2024 KVMGalore® - All rights reserved.
Secure KVM Isolators
Single-port KVM isolators supporting a DisplayPort, HDMI or DVI video connection for protecting a classified computer from vulnerable peripherals that may impose a security threat
Read more below...
1) SA-DPN-1S-P Model No. SA-DPN-1S-P Ships in 7-10 business days or less
2) SA-DVN-1S-P Model No. SA-DVN-1S-P Ships in 7-10 business days or less
3) SA-UHN-1S-P Model No. SA-UHN-1S-P Ships in 7-10 business days or less
Secure, single-port DisplayPort, HDMI or DVI KVM isolators
with audio and CAC support, NIAP Common Criteria PPs 3.0/4.0 compliant
The use of a secure KVM isolator suits scenarios where vulnerable peripherals or computers may impose a security threat.
A secure KVM isolator prevents vulnerable peripherals (such as a printer, a projector, speakers) or computers (such as an unsupervised/non-secure guest laptop brought into a secure meeting room) from mediating between compromised and secure computers by ensuring that keyboard/mouse, video and audio flow only in a single direction. By preventing host-to-peripheral direct access, a secure isolator eliminates data leakage. This single direction data transmission provides complete isolation of the secure computer, preventing all kinds of intruder attempts via cyber hacking, eavesdropping, or device re-tasking.
A secure isolator is designed to provide the highest possible computer and peripheral isolation as demanded by government agencies, military, financial institutions, and similar security-sensitive customers.
For example, in a secure meeting room, when an unsupervised (non-secure) guest laptop has to be connected to a projector which is shared with a classified computer. By isolating the classified computer from the projector, the secure isolator protects the classified computer from being infected by the guest laptop.
Additionally, by allowing sound to travel only in one direction from the PC to the speaker, the isolator protects against eavesdropping attempts, hence prevents intruders from compromising a computer's security and re-tasking the audio line-in (headset/speaker) into a microphone line.
Install the isolator between your peripherals and computer by connecting the video, keyboard, mouse, and audio ports of the computer to the isolator inputs, as well as the video, keyboard, mouse or audio ports of your peripherals. By doing this the computer and the peripherals are completely isolated from each other.