Risk
3/5/2014
02:12 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Belkin Secures Computing Enviornment With Webcam Adapter, USB Peripheral Switch

New products help mitigate cyberthreats and improve network safety for government agencies, financial institutions, and others

PLAYA VISTA, CA – March 5, 2013 – Belkin, a trusted leader of technology solutions for office, classroom, IT infrastructure, and mobile environments, today unveiled the Belkin Secure Web Camera Adapter, the only solution available that enables the use of standard USB web cameras in computing environments where classified or sensitive information is presented. The new Secure Web Camera Adapter includes a host of security features, including anti-tampering mechanism in the outside packaging, one-time programmable (OTP) protected firmware, and complete isolation of the USB circuit from the computer.

Using web cameras in a secure environment may cause a security breach if not properly protected. Intruders can exploit computers that are non-secure as a result of web cameras that can view and eavesdrop on conversations, without users being aware that the camera is on and active.

To avoid these potential breaches, Luis Artiz, director of product management, Business Division, Belkin International, said that the Belkin Secure Web Camera Adapter is the only product of its kind in the market, enabling the use of web cameras in environments where security or confidentiality are critical. "Belkin's Secure Web Camera is the perfect security solution for environments where computers are present and video calls are used to exchange confidential information," said Artiz. "It is well-suited for boardrooms, offices, defense, the military, and other areas where sensitive conversations take place." The Belkin Secure Web Camera Adapter is designed to connect and disconnect a web camera and other USB audio devices at the press of a button. Unlike other adapters, the Belkin web camera adapter makes it very clear to the user when the web camera is active and provides warning before deactivating through a lighting and flashing system. If desired, the user is then able to extend the web camera's activation period through a simple push of a button.

The Belkin Secure Web Camera Adapter is easy and intuitive to operate, and should be used whenever web cameras are used in boardrooms, offices, and other areas where sensitive conversations take place.

Key features of the Secure Web Camera Adapter include: • Automatic Timer Mechanism - The timer functionality combined with intuitive LED lights indicate when the camera is active and when the user must press a button to extend the video call if desired; a disconnect button allows the user to immediately disconnect the camera when necessary. • Easy Integration and Operation - the adapter operates with two simple buttons, with clear visual indicators of operation and approaching cut-off; it is easily connected with a standard USB port, including the supplied cable. • Advanced Security Features - the isolated independent microcontroller cannot be hacked, reprogrammed or tampered with, and all firmware is stored on a non-programmable ROM. • Anti-Tamper Protection - Secure and rugged housing, an active anti-tamper mechanism, non-programmable firmware, and tamper-evident packaging and label ensure that the adapter remains secure in transit at all times. • Increased Reliability - the adapter's simple hardened design, and low self-discharge anti-tamper battery, provide years of reliable usage. • Interoperability and Operating System Independent - supports all USB web cameras, requiring only the web camera driver software on the connected computer, and all Windows, iOS, LInux ad Chrome operating systems that support the web camera software.

Belkin delivers the necessary components for workstation security, as well as every essential accessory and peripheral device to provide a complete, efficient, productive workstation that meets the demands of government use. For more information visit: Belkin Government.

About Belkin Business Belkin Business, a division of Belkin International, offers technology solutions for office, classroom, IT infrastructure, and mobile environments. A proven technology leader for more than 30 years, organizations worldwide trust Belkin for its unwavering commitment to product quality, and expertise in creating solutions designed to address customer requirements in business, government and education. With a global supply chain and broad provider network, Belkin commands a purchasing power that delivers greater value and unparalleled execution advantages to customers. The company’s line of commercial products are available through Belkin's global network of distributors and resellers. Headquartered in Playa Vista, California, the company is represented in more than 25 countries and can be found on the Web at http://www.belkin.com/us/business/enterprise.

###

PLAYA VISTA, CA – March 5, 2013 – Belkin, a trusted leader of technology solutions for office, classroom, IT infrastructure, and mobile environments, today introduced the Belkin Advanced Secure USB Peripheral Switch that uniquely enables users to securely share any USB device on up to four different computers with different networks at different security levels. The new switch was designed and tested to support the widest variety of USB devices, including smart card readers, cameras, thumb drives, USB controllers and more. In tandem with Belkin's patent-pending desktop controller unit, the USB Switch improves usability, situational awareness, and security.

Belkin's Advanced Secure USB Peripheral Switch is configurable through an easy-to-use and password-protected application, ensuring that only authorized IT personnel have access to defined settings. It enables IT departments to assign a specific USB device access to only some of the computers connected to it, allowing a more exact and secure USB device policy. The switch is able to filter USB devices based on a detailed scheme with rules that allow or block USB devices based on specific, user-defined parameters without using software.

The switch is equipped with a designated port supporting the Belkin Advanced Secure Desktop Controller Unit (DCU). With an easy and intuitive user interface, the secure DCU enables browsing through available networks and a clear indication of selected channels through numbers, as well as programmable text and colors. In order to ensure the highest level of protection, the Advanced Secure Peripheral Switch is equipped with an end-to-end tamper-proof packaging system that prevents physical tampering, as well as color chips and name labels to reduce user-switching errors by providing clear identification.

Key features of the Advanced Secure USB Peripheral Switch include: • USB Device Filtering - The USB device filtering is based on a detailed scheme with the ability to create up to 32 rules that allow or block USB devices based on class, subclass, protocol, serial number, VID and PID. • No Shared Resources - The switch is designed to securely operate even when peripheral devices are vulnerable to signaling attacks. The switch does not allow computer access to any shared resource and does not share controllable power sources. • Assign USB Devices to Specific Computers - The switch enables users to assign a specific or type of USB device only to some of the computers connected to it - or block others - allowing a more exact and secure USB device policy. • Wide Variety of USB Support - The switch was designed and tested to support the widest variety of USB devices. • Hot Swap USB Devices - The switch allows hot swapping of USB devices while still connected to the target computers. This enables organizations to create multiple USB device rules, allowing the users to share different devices in a single configuration. • Easy-to-Use, Password-Protected Configuration Application - The switch is configurable through an easy-to-use application that can be password-protected, ensuring that only authorized IT personnel can configure the device. • DCU (Desktop Controller Unit) Support - The switch supports the patented Belkin Advanced Secure DCU to enable easy and intuitive KVM operation, remotely at the user’s desk. Channel names may be programmed into the DCU display to improve usability, situational awareness and security. • Increased Reliability - Using a new, advanced, 25-year anti-tampering battery with an extremely low self-discharge rate, the life expectancy of the switch has been increased dramatically making it the most reliable Advanced Secure USB Peripheral Switch on the market today.

"Until now, USB device access was controlled by software running on the computer which meant it could be hacked or modified. A USB device not issued by an agency can infect the computer system and network which can be used to inject malicious software, for example," said Luis Artiz, director of product management, Business Division, Belkin International. "Now with the new USB Peripheral Switch and Belkin DCU, end users can access authorized USB peripherals on their desktops while ensuring network security. And for government agencies and financial institutions, where security is paramount, deploying a hardware-based solution is critical." Belkin delivers the necessary components for workstation security, as well as every essential accessory and peripheral device to provide a complete, efficient, productive workstation that meets the demands of government use. For more information visit: Belkin Government.

Tweet this: @BelkinBusiness Secure USB Peripheral Switch Delivers Security, Convenience & Control for Multiple Computers with Different Security Levels

About Belkin Business Belkin Business, a division of Belkin International, offers technology solutions for office, classroom, IT infrastructure, and mobile environments. A proven technology leader for more than 30 years, organizations worldwide trust Belkin for its unwavering commitment to product quality, and expertise in creating solutions designed to address customer requirements in business, government and education. With a global supply chain and broad provider network, Belkin commands a purchasing power that delivers greater value and unparalleled execution advantages to customers. The company’s line of commercial products are available through Belkin's global network of distributors and resellers. Headquartered in Playa Vista, California, the company is represented in more than 25 countries and can be found on the Web at http://www.belkin.com/us/business/enterprise.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
MaxB491
50%
50%
MaxB491,
User Rank: Apprentice
3/7/2014 | 2:46:48 AM
re: Belkin Secures Computing Enviornment With Webcam Adapter, USB Peripheral Switch
It is great that someone is going after this problem, but the solution seems to be more complicated than necessary. And I don't really understand how the timer mechanism is not going to be a hassle. It seems to me an external solution is simpler. I use a WebCameraCover, http://www.webcameracover.com/... and have had zero problems with it falling off, leaving residue, it looks new and I have had it for years. (It probably has saved me money on Post-its. But good for Belkin for highlighting a real problem.
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-7298
Published: 2014-10-24
adsetgroups in Centrify Server Suite 2008 through 2014.1 and Centrify DirectControl 3.x through 4.2.0 on Linux and UNIX allows local users to read arbitrary files with root privileges by leveraging improperly protected setuid functionality.

CVE-2014-8346
Published: 2014-10-24
The Remote Controls feature on Samsung mobile devices does not validate the source of lock-code data received over a network, which makes it easier for remote attackers to cause a denial of service (screen locking with an arbitrary code) by triggering unexpected Find My Mobile network traffic.

CVE-2014-0619
Published: 2014-10-23
Untrusted search path vulnerability in Hamster Free ZIP Archiver 2.0.1.7 allows local users to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll that is located in the current working directory.

CVE-2014-2230
Published: 2014-10-23
Open redirect vulnerability in the header function in adclick.php in OpenX 2.8.10 and earlier allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the (1) dest parameter to adclick.php or (2) _maxdest parameter to ck.php.

CVE-2014-7281
Published: 2014-10-23
Cross-site request forgery (CSRF) vulnerability in Shenzhen Tenda Technology Tenda A32 Router with firmware 5.07.53_CN allows remote attackers to hijack the authentication of administrators for requests that reboot the device via a request to goform/SysToolReboot.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.