Black Box KVM Kit Evaluated By U.S. Government

Black Box says its Secure KVM Switch line have officially been listed as under evaluation for the latest U.S. Government Approved Protection Profile.

The Protection Profile for Peripheral Sharing Device Version 4.0 is designed to address the more stringent requirements of the National Information Assurance Partnership (NIAP).

Black Box says it will provide enhanced security against potential data leakage and hacking in applications including military and defence, transportation, education, healthcare, government, and banking and finance.

“Building on our wide range of NIAP 3.0 certified Secure KVM Switches, we will release new NIAP 4.0 certified devices that address the latest security profiles while providing industry-first KVM switch functionality and the very latest in flexible video connectivity,” said David Isola, Product Manager. “Network security is of the utmost importance in these times, and Black Box is at the forefront in developing products that meet our customers’ requirements across security, functionality and performance.”

He adds, "The Black Box Secure KVM Switch line provides port isolation between networks, ensuring no data is leaked between secure ports and the outside world. Built with data-path isolation between systems and networks, these switches help prevent hardware tampering and safeguard the network from accidental transfer, unauthorised access or compromise of critical data. As users control multiple computers through a single keyboard, mouse and up to four video displays, air gap isolation between all connected systems ensures the secure transfer of files."

You might also like...

Live Sports Production: Part 1 - New Sports Production Workflows

Welcome to Part 1 of ‘Live Sports Production’ - This new multi-part series uses a round table style format to explore the technology of live sports production with some of the industry’s leading system designers. It is a fascinating insight i…

Automating HDR-SDR Conversion

Automation seems like an obvious solution but effective conversion involves understanding what the image content is and therefore what the priorities are for how it should look.

Building Software Defined Infrastructure: Virtualization Vs Microservices

How virtualization and microservices differ, and workflows where virtualization and microservices would be used or avoided in terms of reliability, flexibility and security.

IP Security For Broadcasters: Part 8 - RADIUS Network Access

Maintaining controlled access is critical for any secure network, especially when working with high-value media in broadcast environments.

Standards: Part 25 - Designing Client-Side Video Players

Here we chart the historical development of client-side video players, describe the building blocks used to create them and the relevant standards.