Serving Eastern Pennsylvania Businesses
Since 1998
The Secure KVM Multiviewer allows displaying up to four secure DVI computers on a single screen. Using a single set of keyboard and mouse, operators can control all connected sources right from their desktop. With multiple modes such as Quad-View, T-Quad, and PiP it enables you to display the video from those four computers in a 4x4 matrix view on one monitor; all at the same time, and in real-time. The Secure KVM Multiviewer is the perfect solution for operators or analysts in defense or intelligence who need to access and control multiple sources with different security levels.
The Secure KVM Multiviewer protects your sensitive data using the latest technology. The switch has isolated channels to ensure that data is not leaked between secure ports and the outside world. To prevent eavesdropping attempts through vulnerable devices, the switch supports uni-directional data flow from computer to peripheral. Mechanical, electrical, and optical isolation stop hacking and data leaks in environments where security is critical. Plus, secure EDID learning prevents unwanted and unsecure data from being transmitted through DDC lines. The Secure KVM Multiviewer uses protected firmware to keep intruders from re-programming or reading the firmware. Keyboard/internal cache wiping and chassis intrusion protection provide even more security. The Secure KVM Multiviewer also uses anti-tamper switches and tamper-evident seals to shield your confidential data.
Why Secure KVM
Connecting peripherals such as monitor, keyboard, mouse, and speakers to a PC introduces potential data leakage and hacking risks. Secure KVM Switches are designed for use in any application where sensitive data must be protected, including defense, government agencies, and intelligence. Secure KVM Switches from Black Box are NIAP PP 3.0 certified and equipped with the highest security features that meet today's Information Assurance safe control standards. The switches contain unique hardware configurations that prevent data leakage between PCs and connected peripherals eliminating potential cyber threats.